An abnormal telephone identification model based on ensemble algorithm
暂无分享,去创建一个
Kun Ma | Runyuan Sun | Yahan Yuan | Kei Ji
[1] Xie Zhen. Data Warehouse Technology and Its Application , 2003 .
[2] T. Fearn. Independent Component Analysis , 2008 .
[3] D. Simberloff. Risk Assessments, Blacklists, and White Lists for Introduced Species: Are Predictions Good Enough to Be Useful? , 2006, Agricultural and Resource Economics Review.
[4] Sébastien Marcel,et al. End-to-End convolutional neural network-based voice presentation attack detection , 2017, 2017 IEEE International Joint Conference on Biometrics (IJCB).
[5] Ching-Hsien Hsu,et al. A Vertical Handoff Method via Self-Selection Decision Tree for Internet of Vehicles , 2016, IEEE Systems Journal.
[6] Salvatore Cuomo,et al. IoT-based collaborative reputation system for associating visitors and artworks in a cultural scenario , 2017, Expert Syst. Appl..
[7] Fateh Krim,et al. Design and implementation of predictive current control of three-phase PWM rectifier using space-vector modulation (SVM) , 2010 .