Results 21 to 30 of about 2,277 (164)

Critical Review for One‐Class Classification: Recent Advances and Reality Behind Them

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 16, Issue 1, March 2026.
This review presents a new taxonomy to summarize one‐class classification (OCC) algorithms and their applications. The main argument is that OCC should not learn multiple classes. The paper highlights common violations of OCC involving multiple classes.
Toshitaka Hayashi   +3 more
wiley   +1 more source

Privacy Preserving Utility Mining: A Survey

open access: yes, 2018
In big data era, the collected data usually contains rich information and hidden knowledge. Utility-oriented pattern mining and analytics have shown a powerful ability to explore these ubiquitous data, which may be collected from various fields and ...
Chao, Han-Chieh   +4 more
core   +1 more source

HI-Tree: Mining High Influence Patterns Using External and Internal Utility Values [PDF]

open access: yes, 2015
We propose an efficient algorithm, called HI-Tree, for mining high influence patterns for an incremental dataset. In traditional pattern mining, one would find the complete set of patterns and then apply a post-pruning step to it.
C Ahmed   +7 more
core   +1 more source

Global Copper Deposit Dataset: A New Open‐Source Database for Advanced Data Analysis and Exploration Targeting

open access: yesGeoscience Data Journal, Volume 13, Issue 1, January 2026.
We build a new, open‐source global copper deposit dataset (GCDD), facilitating AI‐driven data analysis for exploration targeting and improving our understanding of copper mineralizing systems and their mappable expressions. The GCDD hosts information about 1483 copper deposits worldwide, capturing key deposit attributes such as location, genetic type ...
Bin Wang   +2 more
wiley   +1 more source

A Design‐Driven Machine Learning Approach for Invariant Mining in a Smart Grid

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 11, Issue 1, January/December 2026.
An ICS is vulnerable to cyber‐attacks arising from within its communication network or directly from the SCADA and devices such as PLCs. The study reported here presents a scenario‐specific invariant mining approach to detect anomalies in plant behaviour.
Danish Hudani   +5 more
wiley   +1 more source

From Prediction to Prevention: Using Text Mining and Explainable Machine Learning for Urban Bus Accident Analytics

open access: yesRisk Analysis, Volume 46, Issue 1, January 2026.
ABSTRACT Urban bus accidents present major safety and operational challenges, particularly in densely populated metropolitan areas. This study develops a machine learning‐based analytical framework to identify, quantify, and interpret the factors associated with severe bus accidents.
Bowei Chen   +3 more
wiley   +1 more source

Local and global recoding methods for anonymizing set-valued data [PDF]

open access: yes, 2011
In this paper, we study the problem of protecting privacy in the publication of set-valued data. Consider a collection of supermarket transactions that contains detailed information about items bought together by individuals.
Kalnis, P, Mamoulis, N, Terrovitis, M
core   +1 more source

Correlation Analysis of Influencing Factors of Autonomous Vehicle Accidents Based on Improved Apriori Algorithm

open access: yesJournal of Advanced Transportation, Volume 2026, Issue 1, 2026.
The purpose of this study was to explore the risk factors for autonomous vehicle (AV) crashes and their interdependencies. A total of 659 AV crash data were collected between 2018 and July 2024 from AV crash reports published by the California Department of Motor Vehicles.
Tao Wang   +4 more
wiley   +1 more source

Taming the Triangle: On the Interplays Between Fairness, Interpretability, and Privacy in Machine Learning

open access: yesComputational Intelligence, Volume 41, Issue 4, August 2025.
ABSTRACT Machine learning techniques are increasingly used for high‐stakes decision‐making, such as college admissions, loan attribution, or recidivism prediction. Thus, it is crucial to ensure that the models learnt can be audited or understood by human users, do not create or reproduce discrimination or bias and do not leak sensitive information ...
Julien Ferry   +4 more
wiley   +1 more source

Improving the quality of the personalized electronic program guide [PDF]

open access: yes, 2003
As Digital TV subscribers are offered more and more channels, it is becoming increasingly difficult for them to locate the right programme information at the right time.
McDonald, Kieran   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy