Data stream clustering: a review

A Zubaroğlu, V Atalay - Artificial Intelligence Review, 2021 - Springer
Abstract Number of connected devices is steadily increasing and these devices continuously
generate data streams. Real-time processing of data streams is arousing interest despite …

Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers

W Wang, Y Li, X Wang, J Liu, X Zhang - Future generation computer …, 2018 - Elsevier
Android platform has dominated the markets of smart mobile devices in recent years. The
number of Android applications (apps) has seen a massive surge. Unsurprisingly, Android …

A pca-based change detection framework for multidimensional data streams: Change detection in multidimensional data streams

AA Qahtan, B Alharbi, S Wang, X Zhang - Proceedings of the 21th ACM …, 2015 - dl.acm.org
Detecting changes in multidimensional data streams is an important and challenging task. In
unsupervised change detection, changes are usually detected by comparing the distribution …

Social media driven big data analysis for disaster situation awareness: A tutorial

A Pal, J Wang, Y Wu, K Kant, Z Liu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Situational awareness tries to grasp the important events and circumstances in the physical
world through sensing, communication, and reasoning. Tracking the evolution of changing …

Autonomic intrusion detection: Adaptively detecting anomalies over unlabeled audit data streams in computer networks

W Wang, T Guyet, R Quiniou, MO Cordier… - Knowledge-Based …, 2014 - Elsevier
In this work, we propose a novel framework of autonomic intrusion detection that fulfills
online and adaptive intrusion detection over unlabeled HTTP traffic streams in computer …

Identifying vulnerabilities of SSL/TLS certificate verification in Android apps with static and dynamic analysis

Y Wang, G Xu, X Liu, W Mao, C Si, W Pedrycz… - Journal of Systems and …, 2020 - Elsevier
Many Android developers fail to properly implement SSL/TLS during the development of an
app, which may result in Man-In-The-Middle (MITM) attacks or phishing attacks. In this work …

Abstracting massive data for lightweight intrusion detection in computer networks

W Wang, J Liu, G Pitsilis, X Zhang - Information Sciences, 2018 - Elsevier
Anomaly intrusion detection in big data environments calls for lightweight models that are
able to achieve real-time performance during detection. Abstracting audit data provides a …

Dynamic sparse subspace clustering for evolving high-dimensional data streams

J Sui, Z Liu, L Liu, A Jung, X Li - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In an era of ubiquitous large-scale evolving data streams, data stream clustering (DSC) has
received lots of attention because the scale of the data streams far exceeds the ability of …

Synchronization-based clustering on evolving data stream

J Shao, Y Tan, L Gao, Q Yang, C Plant, I Assent - Information Sciences, 2019 - Elsevier
Clustering streams of data is of increasing importance in many applications. In this paper,
we propose a new synchronization-based clustering approach for evolving data streams …

Clustering stream data by exploring the evolution of density mountain

S Gong, Y Zhang, G Yu - Proceedings of the VLDB Endowment, 2017 - dl.acm.org
Stream clustering is a fundamental problem in many streaming data analysis applications.
Comparing to classical batch-mode clustering, there are two key challenges in stream …