Login / Signup

A New Mining and Protection Method Based on Sensitive Data.

Xiaoyao ZhengYuqing LiuHao YouLiangmin GuoChuanxin Zhao
Published in: J. Control. Sci. Eng. (2018)
Keyphrases
  • tree structure
  • feature selection
  • support vector
  • input data
  • unsupervised learning
  • anomaly detection
  • frequent patterns
  • database design
  • information security