TY - GEN
T1 - Document security identification based on multi-classifier
AU - Gu, Kaiwen
AU - Li, Huakang
AU - Sun, Guozi
N1 - Publisher Copyright:
© 2018, Springer International Publishing AG.
PY - 2018
Y1 - 2018
N2 - Data leakage is a potentially important issue for businesses. Numerous corporate offer data loss prevention (DLP) solutions to monitor information flow, and detect such leakage. Adding a secret label to a document, DLP can use documents label to do securely control, effectively protecting data. With the increasing documents every day, manual labeling is time-consuming. To better solve the difficult task, recently researchers need to start use document security identification by machine learning quickly classify a large number of texts. The contribution of this paper is to explore dimensionality reduction by feature selection and combine two models to avoid the process of weighting different type of features. In contrast to training all features with one algorithm, our experimental results demonstrate that the combination of two models can improve the classification performance.
AB - Data leakage is a potentially important issue for businesses. Numerous corporate offer data loss prevention (DLP) solutions to monitor information flow, and detect such leakage. Adding a secret label to a document, DLP can use documents label to do securely control, effectively protecting data. With the increasing documents every day, manual labeling is time-consuming. To better solve the difficult task, recently researchers need to start use document security identification by machine learning quickly classify a large number of texts. The contribution of this paper is to explore dimensionality reduction by feature selection and combine two models to avoid the process of weighting different type of features. In contrast to training all features with one algorithm, our experimental results demonstrate that the combination of two models can improve the classification performance.
KW - Data leakage prevention
KW - Document security identification
KW - Feature selection
KW - Machine learning
KW - Model combination
UR - http://www.scopus.com/inward/record.url?scp=85032693535&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-67071-3_18
DO - 10.1007/978-3-319-67071-3_18
M3 - Conference Proceeding
AN - SCOPUS:85032693535
SN - 9783319670706
T3 - Advances in Intelligent Systems and Computing
SP - 122
EP - 127
BT - International Conference on Applications and Techniques in Cyber Security and Intelligence - Applications and Techniques in Cyber Security and Intelligence
A2 - Islam, Rafiqul
A2 - Choo, Kim-Kwang Raymond
A2 - Abawajy, Jemal
PB - Springer Verlag
T2 - International Conference on Applications and Techniques in Cyber Security and Intelligence, ATCSI 2017
Y2 - 16 June 2017 through 18 June 2017
ER -