Trends and Applications in Knowledge Discovery and Data Mining

This book constitutes the refereed proceedings at PAKDD Workshops 2013, affiliated with the 17th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD) held in Gold Coast, Australia in April 2013. The 47 revised full papers presented were carefully reviewed and selected from 92 submissions. The workshops affiliated with PAKDD 2013 include: Data Mining Applications in Industry and Government (DMApps), Data Analytics for Targeted Healthcare (DANTH), Quality Issues, Measures of Interestingness and Evaluation of Data Mining Models (QIMIE), Biologically Inspired Techniques for Data Mining (BDM), Constraint Discovery and Application (CDA), Cloud Service Discovery (CloudSD).

[1]  Engin Kirda,et al.  Hypervisor-based malware protection with AccessMiner , 2015, Comput. Secur..

[2]  Stefano Zanero,et al.  ZARATHUSTRA: Extracting Webinject signatures from banking trojans , 2014, 2014 Twelfth Annual International Conference on Privacy, Security and Trust.

[3]  Thomas Mensink,et al.  Image Classification with the Fisher Vector: Theory and Practice , 2013, International Journal of Computer Vision.

[4]  Lillian Lee,et al.  Opinion Mining and Sentiment Analysis , 2008, Found. Trends Inf. Retr..

[5]  Shahira S Fahmy,et al.  Gatekeeping and citizen journalism: The use of social media during the recent uprisings in Iran, Egypt, and Libya , 2013 .

[6]  Sharon Meraz,et al.  Is There an Elite Hold? Traditional Media to Social Media Agenda Setting Influence in Blog Networks , 2009, J. Comput. Mediat. Commun..

[7]  Jeongsub Lim A Cross-Lagged Analysis of Agenda Setting among Online News Media , 2006 .

[8]  Rob Malouf,et al.  Taking sides: user classification for informal online political discourse , 2008, Internet Res..

[9]  Kweku-Muata Osei-Bryson,et al.  Using ontologies to facilitate post-processing of association rules by domain experts , 2011, Inf. Sci..

[10]  Jianping Fan,et al.  Class-specific object proposals re-ranking for object detection in automatic driving , 2017, Neurocomputing.

[11]  L. L. Kaid,et al.  Media Coverage of Climate Change in Chile: A Content Analysis of Conservative and Liberal Newspapers , 2012 .

[12]  Kaiming He,et al.  Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[13]  Roya Gholami,et al.  Time series analysis in the assessment of ICT impact at the aggregate level - lessons and implications for the new economy , 2005, Inf. Manag..

[14]  Justin Grimmer,et al.  Text as Data: The Promise and Pitfalls of Automatic Content Analysis Methods for Political Texts , 2013, Political Analysis.

[15]  Bruno Pouliquen,et al.  Sentiment Analysis in the News , 2010, LREC.

[16]  David J. Atkin,et al.  Agenda setting and micro-blog use: An analysis of the relationship between Sina Weibo and newspaper agendas in China , 2013 .

[17]  Isabell M. Welpe,et al.  Predicting Elections with Twitter: What 140 Characters Reveal about Political Sentiment , 2010, ICWSM.

[18]  Toshihiko Watanabe,et al.  An improvement of fuzzy association rules mining algorithm based on redundacy of rules , 2010, 2010 2nd International Symposium on Aware Computing.

[19]  Wilhelmiina Hämäläinen,et al.  StatApriori: an efficient algorithm for searching statistically significant association rules , 2010, Knowledge and Information Systems.

[20]  Kyung-Goo Doh,et al.  Detection of DOM-based Cross-Site Scripting by Analyzing Dynamically Extracted Scripts , 2012 .

[21]  Jie Jennifer Zhang,et al.  Social Media and Firm Equity Value , 2013, Inf. Syst. Res..

[22]  Laks V. S. Lakshmanan,et al.  Exploratory mining and pruning optimizations of constrained associations rules , 1998, SIGMOD '98.

[23]  Ke Wang,et al.  Visually Aided Exploration of Interesting Association Rules , 1999, PAKDD.

[24]  Yves Bastide,et al.  Intelligent Structuring and Reducing of Association Rules with Formal Concept Analysis , 2001, KI/ÖGAI.

[25]  Ana Cristina Bicharra Garcia,et al.  Association Rule Visualization and Pruning through Response-Style Data Organization and Clustering , 2012, IBERAMIA.

[26]  Lin Wu,et al.  Exploiting Attribute Correlations: A Novel Trace Lasso-Based Weakly Supervised Dictionary Learning Method , 2017, IEEE Transactions on Cybernetics.

[27]  Fabrice Guillet,et al.  Knowledge-Based Interactive Postmining of Association Rules Using Ontologies , 2010, IEEE Transactions on Knowledge and Data Engineering.

[28]  C. Granger Investigating causal relations by econometric models and cross-spectral methods , 1969 .

[29]  Hua Li,et al.  Retrieval of non-rigid 3D shapes from multiple aspects , 2015, Comput. Aided Des..

[30]  Sohag Kabir,et al.  Penguins Search Optimisation Algorithm for Association Rules Mining , 2016, J. Comput. Inf. Technol..

[31]  Stefano Zanero,et al.  Prometheus: Analyzing WebInject-based information stealers , 2017, J. Comput. Secur..

[32]  Smaine Mazouzi,et al.  Penguin Search Optimisation Algorithm for Finding Optimal Spaced Seeds , 2015, Int. J. Softw. Sci. Comput. Intell..

[33]  Ben Stock,et al.  25 million flows later: large-scale detection of DOM-based XSS , 2013, CCS.

[34]  Stefan Stieglitz,et al.  AN INVESTIGATION OF INFLUENTIALS AND THE ROLE OF SENTIMENT IN POLITICAL COMMUNICATION ON TWITTER DURING ELECTION PERIODS , 2013 .

[35]  Djamel Djenouri,et al.  Bee swarm optimization for solving the MAXSAT problem using prior knowledge , 2017, Soft Computing.

[36]  Thorsten Holz,et al.  IceShield: Detection and Mitigation of Malicious Websites with a Frozen DOM , 2011, RAID.

[37]  Bruce Garrison,et al.  Study Shows Some Blogs Affect Traditional News Media Agendas , 2011 .

[38]  Jian Pei,et al.  Mining frequent patterns without candidate generation , 2000, SIGMOD '00.

[39]  Christopher Krügel,et al.  Noxes: a client-side solution for mitigating cross-site scripting attacks , 2006, SAC '06.

[40]  Steven Skiena,et al.  Large-Scale Sentiment Analysis for News and Blogs (system demonstration) , 2007, ICWSM.

[41]  Qi Tian,et al.  Coupled Binary Embedding for Large-Scale Image Retrieval , 2014, IEEE Transactions on Image Processing.

[42]  Steven Sams,et al.  Networked Politics on Cyworld: The Text and Sentiment of Korean Political Profiles , 2011 .

[43]  Ben Stock,et al.  From Facepalm to Brain Bender: Exploring Client-Side Cross-Site Scripting , 2015, CCS.

[44]  Qi Tian,et al.  Fast Image Retrieval: Query Pruning and Early Termination , 2015, IEEE Transactions on Multimedia.

[45]  Zarul Fitri Zaaba,et al.  Web Security: Detection of Cross Site Scripting in PHP Web Application using Genetic Algorithm , 2017 .

[46]  Zarul Fitri Zaaba,et al.  Detection and Removing Cross Site Scripting Vulnerability in PHP Web Application , 2017, 2017 International Conference on Promising Electronic Technologies (ICPET).

[47]  Heikki Mannila,et al.  Finding interesting rules from large sets of discovered association rules , 1994, CIKM '94.

[48]  Wynne Hsu,et al.  Pruning and summarizing the discovered associations , 1999, KDD '99.