2015 International Computer Science and Engineering Conference (ICSEC) 2015
DOI: 10.1109/icsec.2015.7401435
|View full text |Cite
|
Sign up to set email alerts
|

Training set size reduction in large dataset problems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…Our work differs in using active learning guided by a boosting classifier and a naïve bayes anomaly detector, applied to command embedding representation, with the goal of detecting LOL attacks that leverage existing Windows tools. An orthogonal problem studied in previous work [11] is training data reduction, while our work addresses the challenge of limited malicious samples.…”
Section: Related Workmentioning
confidence: 99%
“…Our work differs in using active learning guided by a boosting classifier and a naïve bayes anomaly detector, applied to command embedding representation, with the goal of detecting LOL attacks that leverage existing Windows tools. An orthogonal problem studied in previous work [11] is training data reduction, while our work addresses the challenge of limited malicious samples.…”
Section: Related Workmentioning
confidence: 99%
“…However, RBFN accuracy mainly depending on the initial centers selected from dataset before network training begins [15,39,41,44,45]. Besides, the size of training datasets and invalid data found in datasets also play an important role in determining networks training speed and accuracy [46][47][48][49][50]. Furthermore, it is also reported that the learning algorithm for networks training may perform worse with the increases of dataset [51].…”
Section: Related Workmentioning
confidence: 99%
“…Our work differs in using active learning guided by a boosting classifier and a Naïve Bayes anomaly detector, applied to command embedding representation, with the goal of detecting LOL attacks that leverage existing Windows tools. An orthogonal problem studied in previous work [47] is training data reduction, while our work addresses the challenge of limited malicious samples.…”
Section: Related Workmentioning
confidence: 99%