Software fault proneness prediction with group lasso regression: On factors that affect classification performance
Machine learning algorithms have been used extensively for software fault proneness
prediction. This paper presents the first application of Group Lasso Regression (G-Lasso) for …
prediction. This paper presents the first application of Group Lasso Regression (G-Lasso) for …
Automatic security classification by machine learning for cross-domain information exchange
Cross-domain information exchange is necessary to obtain information superiority in the
military domain, and should be based on assigning appropriate security labels to the …
military domain, and should be based on assigning appropriate security labels to the …
Data loss prevention based on text classification in controlled environments
Loss of sensitive data is a common problem with potentially severe consequences. By
categorizing documents according to their sensitivity, security controls can be performed …
categorizing documents according to their sensitivity, security controls can be performed …
Advanced classification lists (dirty word lists) for automatic security classification
With the increasing risk of data leakage, information guards have emerged as a novel
concept in the field of security which bears similarity to spam filter that examine the content …
concept in the field of security which bears similarity to spam filter that examine the content …
Automatic security classification based on incremental learning and similarity comparison
Y Liang, Z Wen, Y Tao, GL Li… - 2019 IEEE 8th Joint …, 2019 - ieeexplore.ieee.org
Document security classification is the foundation of security management for the sensitive
and confidential information. Different with the general document classification, the security …
and confidential information. Different with the general document classification, the security …
Towards protecting sensitive text with differential privacy
Natural language processing can often require handling privacy-sensitive text. To avoid
revealing confidential information, data owners and practitioners can use differential privacy …
revealing confidential information, data owners and practitioners can use differential privacy …
Analysis of time-dependencies in automatic security classification
Research that explores the use of machine learning for automatic security classification of
information objects is about to emerge. In this paper we investigate the opportunity to …
information objects is about to emerge. In this paper we investigate the opportunity to …
[BOOK][B] How to Think about Data Science
D Miranda-Saavedra - 2022 - books.google.com
This book is a timely and critical introduction for those interested in what data science is (and
isn't), and how it should be applied. The language is conversational and the content is …
isn't), and how it should be applied. The language is conversational and the content is …
Data loss prevention for cross-domain instant messaging
This paper proposes a cascading classifier for inspecting and validating the payload of chat
messages in (military) instant messaging. The first step in the cascading classifier pipeline is …
messages in (military) instant messaging. The first step in the cascading classifier pipeline is …
FPGA-accelerated isotope pattern calculator for use in simulated mass spectrometry peptide and protein chemistry
Over the past 20 to 30 years, the analysis of tandem mass spectrometry data generated from
protein fragments has become the dominant method for the identification and classification …
protein fragments has become the dominant method for the identification and classification …