Utilizing network features for privacy violation detection.
Jaijit BhattacharyaRajanish DassVishal KapoorS. K. GuptaPublished in: COMSWARE (2006)
Keyphrases
- false positives
- automatic detection
- co occurrence
- personal information
- object detection
- detection method
- object recognition
- privacy preserving data mining
- network structure
- image features
- feature vectors
- feature extraction
- detection algorithm
- anomaly detection
- feature set
- network model
- detection accuracy
- personal data