scispace - formally typeset
Search or ask a question
Topic

Feature hashing

About: Feature hashing is a research topic. Over the lifetime, 993 publications have been published within this topic receiving 51462 citations.


Papers
More filters
Proceedings ArticleDOI
10 Aug 2015
TL;DR: In an attempt to develop strong spam filtering model, the features are ranked using Chi--Square feature ranking method and the effectiveness of feature length on classification accuracy is investigated.
Abstract: In spam filtering techniques, the classification of emails are performed on the basis of a collection words that are extracted from the training set. The accuracy and performance of the classifier highly depends on features and length of feature space. Feature selection methods are used in such scenario for evaluating the best features for classification. In an attempt to develop strong spam filtering model we rank the features using Chi--Square feature ranking method and also investigate the effectiveness of feature length on classification accuracy. The results are promising and also the feature ranking method proposed is effective than other methods referred in the literature.

1 citations

Journal ArticleDOI
TL;DR: A new hashing method is proposed called the locality-preserving hashing, which builds the hash codes and tables with much lower algorithmic complexity and is very competitive in terms of the training time spent for large data-sets among the state of the arts, and with reasonable or even better query accuracy.
Abstract: State-of-the-art hashing methods, such as the kernelised locality-sensitive hashing and spectral hashing, have high algorithmic complexities to build the hash codes and tables. Our observation from...

1 citations

Book ChapterDOI
06 Dec 2015
TL;DR: It is shown how to construct lossy encryption and fully IND secure deterministic public key encryption from lossy projective hashing and one round UCE secure hash functions recently introduced by Bellare et al.
Abstract: In this paper, we introduce a primitive called lossy projective hashing. It is unknown before whether smooth projective hashing Cramer-Shoup, Eurocrypt'02 can be constructed from dual projective hashing Wee, Eurocrypt'12. The lossy projective hashing builds a bridge between dual projective hashing and smooth projective hashing. We give instantiations of lossy projective hashing from DDH, DCR, QR and general subgroup membership assumptions including $$2^k$$2k-th residue, p-subgroup and higher residue assumptions. We also show how to construct lossy encryption and fully IND secure deterministic public key encryption from lossy projective hashing. We give a construction of lossy projective hashing via dual projective hashing. We prove that lossy projective hashing can be converted to smooth projective hashing via pairwise independent hash functions, which in turn yields smooth projective hashing from dual projective hashing.We propose a direct construction of lossy encryption via lossy projective hashing. Our construction is different from that given by Hemenway et al. Eurocrypt 2011 via smooth projective hashing. In addition, we give a fully IND secure deterministic public key encryption via lossy projective hashing and one round UCE secure hash functions recently introduced by Bellare et al. Crypto 2013.

1 citations

Proceedings Article
01 Jan 2011
TL;DR: This paper study memory database management system of the principles and key technologies, monitoring system based on mobile messaging features in memory database, analysis system used to solve the spam messages in the massive access problems.
Abstract: This paper study memory database management system of the principles and key technologies,Monitoring system based on mobile messaging features in memory database,Designed and implemented based on the indices of a special Hash + type memory database system,Analysis system used to solve the spam messages in the massive access problems.

1 citations

Journal Article
TL;DR: A generalized two dimensional matrix hashing algorithm that has several optional matrices, and the image can be restored through reverse transform, has such advantages as good robustness, high security, requiring not the original image for watermarking extraction, etc.
Abstract: In order to enhance the security of hashing algorithm,the authors propose a generalized two dimensional matrix hashing algorithm.The algorithm has several optional matrices, and the image can be restored through reverse transform. Thus, it is very difficult to decode the hashing algorithm; the security is enhanced via using the selected matrix and iteration time as the secret keys.Numerical experiments show that, under various image processing and attacks, the proposed algorithm has such advantages as good robustness, high security,requiring not the original image for watermarking extraction, etc.

1 citations


Network Information
Related Topics (5)
Feature extraction
111.8K papers, 2.1M citations
84% related
Convolutional neural network
74.7K papers, 2M citations
84% related
Feature (computer vision)
128.2K papers, 1.7M citations
84% related
Deep learning
79.8K papers, 2.1M citations
83% related
Support vector machine
73.6K papers, 1.7M citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202333
202289
202111
202016
201916
201838