-
2
-
-
34548741255
-
Discriminative frequent pattern analysis for effective classification
-
H. Cheng, X. Yan, J. Han, and C. Hsu. Discriminative frequent pattern analysis for effective classification. In ICDE-07, 2007.
-
(2007)
ICDE-07
-
-
Cheng, H.1
Yan, X.2
Han, J.3
Hsu, C.4
-
4
-
-
0042355196
-
Mining frequent patterns in an fp-tree without conditional fp-tree generation
-
M. Fan and C. Li. Mining frequent patterns in an fp-tree without conditional fp-tree generation. Journal of Computer Research and Development, 40:1216-1222, 2003.
-
(2003)
Journal of Computer Research and Development
, vol.40
, pp. 1216-1222
-
-
Fan, M.1
Li, C.2
-
6
-
-
0039253846
-
Mining frequent patterns without candidate generation
-
May
-
J. Han, J. Pei, and Y. Yin. Mining frequent patterns without candidate generation. In Proceedings of SIGMOD, pages 1-12, May 2000.
-
(2000)
Proceedings of SIGMOD
, pp. 1-12
-
-
Han, J.1
Pei, J.2
Yin, Y.3
-
7
-
-
0036505670
-
A comparison of methods for multiclass support vector machines
-
C. Hsu and C. Lin. A comparison of methods for multiclass support vector machines. IEEE Trans. Neural Networks, 13:415-425, 2002.
-
(2002)
IEEE Trans. Neural Networks
, vol.13
, pp. 415-425
-
-
Hsu, C.1
Lin, C.2
-
8
-
-
36849064392
-
-
J. Kephart and W. Arnold. Automatic extraction of computer virus signatures. In Proceedings of 4th Virus Bulletin International Conference, pages 178-184, 1994.
-
J. Kephart and W. Arnold. Automatic extraction of computer virus signatures. In Proceedings of 4th Virus Bulletin International Conference, pages 178-184, 1994.
-
-
-
-
9
-
-
12244279567
-
Learning to detect malicious executables in the wild
-
J. Kolter and M. Maloof. Learning to detect malicious executables in the wild. In Proceedings of KDD'04, 2004.
-
(2004)
Proceedings of KDD'04
-
-
Kolter, J.1
Maloof, M.2
-
10
-
-
84948104699
-
Integrating classification and association rule mining
-
B. Liu, W. Hsu, and Y. Ma. Integrating classification and association rule mining. In Proceedings of KDD'98, 1998.
-
(1998)
Proceedings of KDD'98
-
-
Liu, B.1
Hsu, W.2
Ma, Y.3
-
11
-
-
24344458137
-
Feature selection based on mutual information: Criteria of max-dependency, max-relevance, and min-redundancy
-
H. Peng, F. Long, and C. Ding. Feature selection based on mutual information: Criteria of max-dependency, max-relevance, and min-redundancy. IEEE Trans. Pattern Analysis and Machine Intelligence, 27, 2005.
-
(2005)
IEEE Trans. Pattern Analysis and Machine Intelligence
, vol.27
-
-
Peng, H.1
Long, F.2
Ding, C.3
-
12
-
-
18844437024
-
Detection of injected, dynamically generated, and obfuscated malicious code
-
J. Rabek, R. Khazan, S. Lewandowski, and R. Cunningham. Detection of injected, dynamically generated, and obfuscated malicious code. In Proceedings of the 2003 ACM workshop on Rapid malcode, pages 76-82, 2003.
-
(2003)
Proceedings of the 2003 ACM workshop on Rapid malcode
, pp. 76-82
-
-
Rabek, J.1
Khazan, R.2
Lewandowski, S.3
Cunningham, R.4
-
18
-
-
2342663706
-
Virus detection using data mining techniques
-
J. Wang, P. Deng, Y Fan, L. Jaw, and Y. Liu. Virus detection using data mining techniques. In Proceedings of IEEE International Conference on Data Mining, 2003.
-
(2003)
Proceedings of IEEE International Conference on Data Mining
-
-
Wang, J.1
Deng, P.2
Fan, Y.3
Jaw, L.4
Liu, Y.5
|