School of Computing and Information Systems (CIS) The University of Melbourne COMP90073
Security Analytics
Tutorial exercises: Week 9
1. HowthefollowingGCNpropagatesinformationacrossthegraph(onlystate the first 3 layers/depth) to compute node features?
Copyright By PowCoder代写 加微信 powcoder
2. (a)WhataretheapplicationsofGraphConvolutionalNetworks(GCNs)? (b) What kind of dataset it may most suit regarding anomaly detection?
3. Adatabasehasfivetransactions.Letmin_sup=60%andmin_conf=80%. (a) Find all frequent itemsets using Apriori and FP-growth, respectively.
(b) Compare the efficiency of the two mining processes.
4. The price of each item in a store is nonnegative. The store manager is only interested in patterns of the form: ¡°one free item may trigger $200 total purchases in the same transaction¡±. State how to mine such patterns efficiently.
程序代写 CS代考 加微信: powcoder QQ: 1823890830 Email: powcoder@163.com