Leakage in data mining: Formulation, detection, and avoidance.
Shachar KaufmanSaharon RossetClaudia PerlichOri StitelmanPublished in: ACM Trans. Knowl. Discov. Data (2012)
Keyphrases
- data mining
- detection method
- data mining methods
- machine learning
- knowledge discovery in databases
- knowledge discovery
- detection algorithm
- previously unknown
- data mining applications
- false positives
- detection accuracy
- object detection
- automatic detection
- false alarms
- data mining techniques
- data warehouse
- association rules
- computer science
- object recognition
- database
- data mining problems
- web intelligence
- detection rate
- cluster analysis
- data mining algorithms
- intrusion detection
- data analysis
- information retrieval
- real world