Cybersecurity threats and their mitigation approaches using Machine Learning—A Review

M Ahsan, KE Nygard, R Gomes… - … of Cybersecurity and …, 2022 - mdpi.com
Machine learning is of rising importance in cybersecurity. The primary objective of applying
machine learning in cybersecurity is to make the process of malware detection more …

Assuring the machine learning lifecycle: Desiderata, methods, and challenges

R Ashmore, R Calinescu, C Paterson - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Machine learning has evolved into an enabling technology for a wide range of highly
successful applications. The potential for this success to continue and accelerate has placed …

Leakage in data mining: Formulation, detection, and avoidance

S Kaufman, S Rosset, C Perlich… - ACM Transactions on …, 2012 - dl.acm.org
Deemed “one of the top ten data mining mistakes”, leakage is the introduction of information
about the data mining target that should not be legitimately available to mine from. In …

The Higgs boson machine learning challenge

C Adam-Bourdarios, G Cowan… - … 2014 workshop on …, 2015 - proceedings.mlr.press
Abstract The Higgs Boson Machine Learning Challenge (HiggsML or the Challenge for
short) was organized to promote collaboration between high energy physicists and data …

Mining health knowledge graph for health risk prediction

X Tao, T Pham, J Zhang, J Yong, WP Goh, W Zhang… - World Wide Web, 2020 - Springer
Nowadays classification models have been widely adopted in healthcare, aiming at
supporting practitioners for disease diagnosis and human error reduction. The challenge is …

An empirical study of the impact of data splitting decisions on the performance of AIOps solutions

Y Lyu, H Li, M Sayagh, ZM Jiang… - ACM Transactions on …, 2021 - dl.acm.org
AIOps (Artificial Intelligence for IT Operations) leverages machine learning models to help
practitioners handle the massive data produced during the operations of large-scale …

Be careful of when: an empirical study on time-related misuse of issue tracking data

F Tu, J Zhu, Q Zheng, M Zhou - Proceedings of the 2018 26th ACM Joint …, 2018 - dl.acm.org
Issue tracking data have been used extensively to aid in predicting or recommending
software development practices. Issue attributes typically change over time, but users may …

Scoded: Statistical constraint oriented data error detection

JN Yan, O Schulte, MH Zhang, J Wang… - Proceedings of the 2020 …, 2020 - dl.acm.org
Statistical Constraints (SCs) play an important role in statistical modeling and analysis. This
paper brings the concept to data cleaning and studies how to leverage SCs for error …

Trust and transparency in machine learning-based clinical decision support

C Gretton - Human and Machine Learning: Visible, Explainable …, 2018 - Springer
Abstract Machine learning and other statistical pattern recognition techniques have the
potential to improve diagnosis in medicine and reduce medical error. But technology can be …

Dataset Artefacts in anti-spoofing systems: a case study on the ASVspoof 2017 benchmark

B Chettri, E Benetos, BLT Sturm - IEEE/ACM Transactions on …, 2020 - ieeexplore.ieee.org
The Automatic Speaker Verification Spoofing and Countermeasures Challenges motivate
research in protecting speech biometric systems against a variety of different access attacks …