Leakage in data mining: formulation, detection, and avoidance.
Shachar KaufmanSaharon RossetClaudia PerlichPublished in: KDD (2011)
Keyphrases
- data mining
- detection method
- false alarms
- knowledge discovery
- object detection
- automatic detection
- false positives
- data visualization
- data mining applications
- data mining methods
- intrusion detection
- detection algorithm
- data mining algorithms
- machine learning
- homeland security
- data sets
- data mining techniques
- association rules
- data analysis
- computer science
- data mining problems
- privacy preserving data mining
- detection accuracy
- web mining
- image segmentation