19,995 research outputs found

    The Assessment of Machine Learning Model Performance for Predicting Alluvial Deposits Distribution

    Get PDF
    This paper discusses the development and evaluation of distribution models for predicting alluvial mineral potential mapping. A number of existing models includes Weight of Evidence, Knowledge-driven Fuzzy, Data-driven Fuzzy, Neural-Network, Bayesian Classifier and Geostatistical Kriging. We offer classification models developed in our laboratory, where point pattern analysis was used to identify presence or absence of a known secondary alluvial (cassiterite) deposits in the Nigerian Younger Granite Region (NYGR) and the model performance assessed. We focused on the training and testing data split using longitudinal spatial data splitting (strips and halves) to ensure predictive attribute's independence. The spatial data split runs counter to the traditional random sample data selection as a procedure for checking overfitting of models mainly due to spatial data autocorrelation. Specifically, we used classification algorithms such as; Naive Bayes, Support Vector Machine, K-Nearest Neighbour, Decision Tree Bagging and Discriminant Analysis algorithms for training and testing. We analysed the model's performance results using model predictive accuracy and ROC curve values in two different approaches that improve spatial data independence among predictive attributes to give a meaningful model performance

    Data Leak Detection As a Service: Challenges and Solutions

    Get PDF
    We describe a network-based data-leak detection (DLD) technique, the main feature of which is that the detection does not require the data owner to reveal the content of the sensitive data. Instead, only a small amount of specialized digests are needed. Our technique – referred to as the fuzzy fingerprint – can be used to detect accidental data leaks due to human errors or application flaws. The privacy-preserving feature of our algorithms minimizes the exposure of sensitive data and enables the data owner to safely delegate the detection to others.We describe how cloud providers can offer their customers data-leak detection as an add-on service with strong privacy guarantees. We perform extensive experimental evaluation on the privacy, efficiency, accuracy and noise tolerance of our techniques. Our evaluation results under various data-leak scenarios and setups show that our method can support accurate detection with very small number of false alarms, even when the presentation of the data has been transformed. It also indicates that the detection accuracy does not degrade when partial digests are used. We further provide a quantifiable method to measure the privacy guarantee offered by our fuzzy fingerprint framework
    • …
    corecore