Using malware for the greater good: Mitigating data leakage.
Mordechai GuriRami PuzisKim-Kwang Raymond ChooSergey RubinshteinGabi KedmaYuval EloviciPublished in: J. Netw. Comput. Appl. (2019)
Keyphrases
- data sets
- statistical analysis
- database
- data analysis
- raw data
- small number
- data collection
- training data
- data structure
- data distribution
- data points
- knowledge discovery
- input data
- complex data
- synthetic data
- image data
- data processing
- data mining techniques
- labeled data
- end users
- missing values
- high quality
- noisy data
- data quality
- neural network
- historical data