Trends and Applications in Knowledge Discovery and Data Mining
暂无分享,去创建一个
[1] Engin Kirda,et al. Hypervisor-based malware protection with AccessMiner , 2015, Comput. Secur..
[2] Stefano Zanero,et al. ZARATHUSTRA: Extracting Webinject signatures from banking trojans , 2014, 2014 Twelfth Annual International Conference on Privacy, Security and Trust.
[3] Thomas Mensink,et al. Image Classification with the Fisher Vector: Theory and Practice , 2013, International Journal of Computer Vision.
[4] Lillian Lee,et al. Opinion Mining and Sentiment Analysis , 2008, Found. Trends Inf. Retr..
[5] Shahira S Fahmy,et al. Gatekeeping and citizen journalism: The use of social media during the recent uprisings in Iran, Egypt, and Libya , 2013 .
[6] Sharon Meraz,et al. Is There an Elite Hold? Traditional Media to Social Media Agenda Setting Influence in Blog Networks , 2009, J. Comput. Mediat. Commun..
[7] Jeongsub Lim. A Cross-Lagged Analysis of Agenda Setting among Online News Media , 2006 .
[8] Rob Malouf,et al. Taking sides: user classification for informal online political discourse , 2008, Internet Res..
[9] Kweku-Muata Osei-Bryson,et al. Using ontologies to facilitate post-processing of association rules by domain experts , 2011, Inf. Sci..
[10] Jianping Fan,et al. Class-specific object proposals re-ranking for object detection in automatic driving , 2017, Neurocomputing.
[11] L. L. Kaid,et al. Media Coverage of Climate Change in Chile: A Content Analysis of Conservative and Liberal Newspapers , 2012 .
[12] Kaiming He,et al. Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[13] Roya Gholami,et al. Time series analysis in the assessment of ICT impact at the aggregate level - lessons and implications for the new economy , 2005, Inf. Manag..
[14] Justin Grimmer,et al. Text as Data: The Promise and Pitfalls of Automatic Content Analysis Methods for Political Texts , 2013, Political Analysis.
[15] Bruno Pouliquen,et al. Sentiment Analysis in the News , 2010, LREC.
[16] David J. Atkin,et al. Agenda setting and micro-blog use: An analysis of the relationship between Sina Weibo and newspaper agendas in China , 2013 .
[17] Isabell M. Welpe,et al. Predicting Elections with Twitter: What 140 Characters Reveal about Political Sentiment , 2010, ICWSM.
[18] Toshihiko Watanabe,et al. An improvement of fuzzy association rules mining algorithm based on redundacy of rules , 2010, 2010 2nd International Symposium on Aware Computing.
[19] Wilhelmiina Hämäläinen,et al. StatApriori: an efficient algorithm for searching statistically significant association rules , 2010, Knowledge and Information Systems.
[20] Kyung-Goo Doh,et al. Detection of DOM-based Cross-Site Scripting by Analyzing Dynamically Extracted Scripts , 2012 .
[21] Jie Jennifer Zhang,et al. Social Media and Firm Equity Value , 2013, Inf. Syst. Res..
[22] Laks V. S. Lakshmanan,et al. Exploratory mining and pruning optimizations of constrained associations rules , 1998, SIGMOD '98.
[23] Ke Wang,et al. Visually Aided Exploration of Interesting Association Rules , 1999, PAKDD.
[24] Yves Bastide,et al. Intelligent Structuring and Reducing of Association Rules with Formal Concept Analysis , 2001, KI/ÖGAI.
[25] Ana Cristina Bicharra Garcia,et al. Association Rule Visualization and Pruning through Response-Style Data Organization and Clustering , 2012, IBERAMIA.
[26] Lin Wu,et al. Exploiting Attribute Correlations: A Novel Trace Lasso-Based Weakly Supervised Dictionary Learning Method , 2017, IEEE Transactions on Cybernetics.
[27] Fabrice Guillet,et al. Knowledge-Based Interactive Postmining of Association Rules Using Ontologies , 2010, IEEE Transactions on Knowledge and Data Engineering.
[28] C. Granger. Investigating causal relations by econometric models and cross-spectral methods , 1969 .
[29] Hua Li,et al. Retrieval of non-rigid 3D shapes from multiple aspects , 2015, Comput. Aided Des..
[30] Sohag Kabir,et al. Penguins Search Optimisation Algorithm for Association Rules Mining , 2016, J. Comput. Inf. Technol..
[31] Stefano Zanero,et al. Prometheus: Analyzing WebInject-based information stealers , 2017, J. Comput. Secur..
[32] Smaine Mazouzi,et al. Penguin Search Optimisation Algorithm for Finding Optimal Spaced Seeds , 2015, Int. J. Softw. Sci. Comput. Intell..
[33] Ben Stock,et al. 25 million flows later: large-scale detection of DOM-based XSS , 2013, CCS.
[34] Stefan Stieglitz,et al. AN INVESTIGATION OF INFLUENTIALS AND THE ROLE OF SENTIMENT IN POLITICAL COMMUNICATION ON TWITTER DURING ELECTION PERIODS , 2013 .
[35] Djamel Djenouri,et al. Bee swarm optimization for solving the MAXSAT problem using prior knowledge , 2017, Soft Computing.
[36] Thorsten Holz,et al. IceShield: Detection and Mitigation of Malicious Websites with a Frozen DOM , 2011, RAID.
[37] Bruce Garrison,et al. Study Shows Some Blogs Affect Traditional News Media Agendas , 2011 .
[38] Jian Pei,et al. Mining frequent patterns without candidate generation , 2000, SIGMOD '00.
[39] Christopher Krügel,et al. Noxes: a client-side solution for mitigating cross-site scripting attacks , 2006, SAC '06.
[40] Steven Skiena,et al. Large-Scale Sentiment Analysis for News and Blogs (system demonstration) , 2007, ICWSM.
[41] Qi Tian,et al. Coupled Binary Embedding for Large-Scale Image Retrieval , 2014, IEEE Transactions on Image Processing.
[42] Steven Sams,et al. Networked Politics on Cyworld: The Text and Sentiment of Korean Political Profiles , 2011 .
[43] Ben Stock,et al. From Facepalm to Brain Bender: Exploring Client-Side Cross-Site Scripting , 2015, CCS.
[44] Qi Tian,et al. Fast Image Retrieval: Query Pruning and Early Termination , 2015, IEEE Transactions on Multimedia.
[45] Zarul Fitri Zaaba,et al. Web Security: Detection of Cross Site Scripting in PHP Web Application using Genetic Algorithm , 2017 .
[46] Zarul Fitri Zaaba,et al. Detection and Removing Cross Site Scripting Vulnerability in PHP Web Application , 2017, 2017 International Conference on Promising Electronic Technologies (ICPET).
[47] Heikki Mannila,et al. Finding interesting rules from large sets of discovered association rules , 1994, CIKM '94.
[48] Wynne Hsu,et al. Pruning and summarizing the discovered associations , 1999, KDD '99.