Applying random projection to the classification of malicious applications using data mining algorithms.
Jan DurandTravis AtkisonPublished in: ACM Southeast Regional Conference (2012)
Keyphrases
- data mining algorithms
- random projections
- data mining
- preprocessing
- privacy preserving data mining
- data mining techniques
- data mining tasks
- machine learning
- knowledge discovery
- data analysis
- class labels
- dimension reduction
- pattern recognition
- data mining framework
- sparse representation
- high dimensionality
- image classification
- real world
- support vector
- feature extraction
- decision trees
- dimensionality reduction
- principal component analysis
- itemsets
- privacy preserving
- distance function
- feature vectors
- training set
- support vector machine
- database systems
- hash functions
- clustering algorithm
- feature selection
- database