We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. A New Theoretical Framework for K-Means-Type Clustering

    One of the fundamental clustering problems is to assign n points into k clusters based on the minimal sum-of-squares(MSSC), which is known to be...
    Chapter
  2. The Mathematics of Learning: Dealing with Data *

    Learning is key to develo** systems tailored to a broad range of data analysis and information extraction tasks. We outline the mathematical...
    Chapter
  3. Web Page Classification*

    This chapter describes systems that automatically classify web pages into meaningful categories. It first defines two types of web page...
    Chapter
  4. Clustering Via Decision Tree Construction

    Clustering is an exploratory data analysis task. It aims to find the intrinsic structure of data by organizing data objects into similarity groups or...
    B. Liu, Y. **a, P.S. Yu in Foundations and Advances in Data Mining
    Chapter
  5. Sequential Pattern Mining by Pattern-Growth: Principles and Extensions*

    Sequential pattern mining is an important data mining problem with broad applications. However, it is also a challenging problem since the mining may...
    J. Han, J. Pei, X. Yan in Foundations and Advances in Data Mining
    Chapter
  6. Incremental Mining on Association Rules

    The discovery of association rules has been known to be useful in selective marketing, decision analysis, and business management. An important...
    W.-G. Teng, M.-S. Chen in Foundations and Advances in Data Mining
    Chapter
  7. A Feature/Attribute Theory for Association Mining and Constructing the Complete Feature Set

    A correct selection of features (attributes) is vital in data mining. For this aim, the complete set of features is constructed. Here are some...
    Chapter
  8. Web Mining – Concepts, Applications and Research Directions

    From its very beginning, the potential of extracting valuable knowledge from the Web has been quite evident. Web mining, i.e. the application of data...
    T. Srivastava, P. Desikan, V. Kumar in Foundations and Advances in Data Mining
    Chapter
  9. Mining Association Rules from Tabular Data Guided by Maximal Frequent Itemsets

    We propose the use of maximal frequent itemsets (MFIs) to derive association rules from tabular datasets. We first present an efficient method to...
    Q. Zou, Y. Chen, ... X. Lu in Foundations and Advances in Data Mining
    Chapter
  10. Privacy-Preserving Data Mining

    The growth of data mining has raised concerns among privacy advocates. Some of this is based on a misunderstanding of what data mining does. The...
    C. Clifton, M. Kantarcıoğlu, J. Vaidya in Foundations and Advances in Data Mining
    Chapter
  11. Logical Regression Analysis: From Mathematical Formulas to Linguistic Rules

    Data mining means the discovery of knowledge from (a large amount of)data, and so data mining should provide not only predictions but also knowledge...
    Chapter
  12. Smart Appliance Abnormal Electrical Power Consumption Detection

    Potential cyber threats now have an immensely larger attack surface due to the widespread use of smart devices and smart environments. Smart home...
    Conference paper 2024
  13. Projective Space Stern Decoding and Application to SDitH

    We show that here standard decoding algorithms for generic linear codes over a finite field can speeded up by a factor which is essentially the size...
    Kevin Carrier, Valerian Hatey, Jean-Pierre Tillich in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  14. Evaluation of Lightweight Machine Learning-Based NIDS Techniques for Industrial IoT

    Internet of Things (IoT) devices have revolutionized communication, transportation, healthcare, and many other fields. In particular, the adoption of...
    Alex Baron, Laurens Le Jeune, ... Nele Mentens in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  15. Device Fingerprinting in a Smart Grid CPS

    Data integrity attacks on the various meter readings found in smart grid systems can be executed to be undetectable by current detection algorithms...
    Chuadhry Mujeeb Ahmed, Nandha Kumar Kandasamy, ... Jianying Zhou in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  16. Towards Discovering Quantum-Threats for Applications Using Open-Source Libraries

    The improvement of quantum computing poses a significant threat to cryptographic security. It enables the potential utilization of quantum algorithms...
    **aodong Ye, Teik Guan Tan, Jianying Zhou in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  17. Game Theoretic Modeling of Insider Threats in an Organization

    Insider threats have emerged as serious threats to organizations due to the rapid advancement and incorporation of communication technologies....
    K. C. Lalropuia, Sanjeev Goyal, Borja Garcia de Soto in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  18. One Time Chat – A Toy End-to-End Encrypted Web Messaging Service

    In the digital age, instant messaging (IM) is a cornerstone of communication, necessitating secure and efficient platforms. The One Time Chat web...
    Kamil Kaczyński, Michał Glet in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  19. Everything All at Once: Deep Learning Side-Channel Analysis Optimization Framework

    Deep learning is becoming an increasingly proficient tool for side-channel analysis. While deep learning has been evolving around the tasks of image...
    Gabriele Serafini, Léo Weissbart, Lejla Batina in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  20. Physically Unclonable Fingerprints for Authentication

    We have developed an innovative fingerprinting method using the melt-electrospinning printing process for product authentication. This method...
    Navajit S. Baban, Jiarui Zhou, ... Ramesh Karri in Applied Cryptography and Network Security Workshops
    Conference paper 2024
Did you find what you were looking for? Share feedback.