Data mining, fraud detection and mobile telecommunications: call pattern analysis with unsupervised neural networks
暂无分享,去创建一个
[1] Klaus Boehm,et al. Dynamic gesture recognition using neural networks: a fundament for advanced interaction construction , 1994, Electronic Imaging.
[2] Jürgen Schmidhuber,et al. Unsupervised Learning in Recurrent Neural Networks , 2001 .
[3] Mark B. Ring. Learning Sequential Tasks by Incrementally Adding Higher Orders , 1992, NIPS.
[4] Tom Fawcett,et al. Adaptive Fraud Detection , 1997, Data Mining and Knowledge Discovery.
[5] E. Jonsson,et al. Combining fraud and intrusion detection-meeting new requirements - , 2000 .
[6] Jürgen Schmidhuber,et al. Learning to Forget: Continual Prediction with LSTM , 2000, Neural Computation.
[7] Ray J. Frank,et al. Applications of neural networks to telecommunications systems , 1999 .
[8] Ah Chung Tsoi,et al. FIR and IIR Synapses, a New Neural Network Architecture for Time Series Modeling , 1991, Neural Computation.
[9] Hiroshi Wakuya,et al. Time series prediction with a neural network model based on bidirectional computation style: An analytical study and its estimation on acquired signal transformation , 2003 .
[10] R. Shortland,et al. Data mining applications in BT , 1995 .
[11] David E. Rumelhart,et al. Predicting the Future: a Connectionist Approach , 1990, Int. J. Neural Syst..
[12] Joos Vandewalle,et al. A hybrid system for fraud detection in mobile communications , 1999, ESANN.
[13] D20 - Project final report and results of trials , 1987 .
[14] Hiroshi Wakuya,et al. Time Series Prediction with a Neural Network Model Based on Bi-directional Computation Style: An Analytical Study and Its Estimation on Acquired Signal Transformation , 2002 .
[15] J. C. Hardin,et al. Introduction to time series analysis , 1986 .
[16] Michael Collins,et al. Telecommunications crime - Part 1 , 1999, Comput. Secur..
[17] Jürgen Schmidhuber,et al. Learning Precise Timing with LSTM Recurrent Networks , 2003, J. Mach. Learn. Res..
[18] Eric Wan,et al. Finite Impulse Response Neural Networks for Autoregressive Time Series Prediction , 1993 .
[19] Anders Krogh,et al. Introduction to the theory of neural computation , 1994, The advanced book program.
[20] T. Kohonen,et al. Bibliography of Self-Organizing Map SOM) Papers: 1998-2001 Addendum , 2003 .
[21] Yves Chauvin,et al. Backpropagation: theory, architectures, and applications , 1995 .
[22] F. Gers,et al. Long short-term memory in recurrent neural networks , 2001 .
[23] Ronald J. Brachman,et al. Brief Application Description; Visual Data Mining: Recognizing Telephone Calling Fraud , 2004, Data Mining and Knowledge Discovery.
[24] Masoud Mohammadian. Intelligent Agents for Data Mining and Information Retrieval , 2004 .
[25] Judith E. Dayhoff,et al. Trajectory recognition with a time-delay neural network , 1992, [Proceedings 1992] IJCNN International Joint Conference on Neural Networks.
[26] Michael C. Mozer,et al. Induction of Multiscale Temporal Structure , 1991, NIPS.
[27] Ah Chung Tsoi,et al. Classification of Electroencephalogram Using Artificial Neural Networks , 1993, NIPS.
[28] Hazel Heath. Beating the bugs: An infection seven times more common than MRSA is posing severe risks to the health of older people, says Hazel Heath , 2005 .
[29] M. V. Velzen,et al. Self-organizing maps , 2007 .
[30] Aluizio F. R. Araújo,et al. A Taxonomy for Spatiotemporal Connectionist Networks Revisited: The Unsupervised Case , 2003, Neural Computation.
[31] Kazuo J. Ezawa,et al. Fraud/Uncollectible Debt Detection Using a Bayesian Network Based Learning System: A Rare Binary Outcome with Mixed Data Structures , 1995, UAI.
[32] Terrence J. Sejnowski,et al. Unsupervised Discrimination of Clustered Data via Optimization of Binary Information Gain , 1992, NIPS.
[33] Jürgen Schmidhuber,et al. LSTM can Solve Hard Long Time Lag Problems , 1996, NIPS.
[34] Jürgen Schmidhuber,et al. Long Short-Term Memory , 1997, Neural Computation.
[35] Guo-Zheng Sun,et al. Time Warping Invariant Neural Networks , 1992, NIPS.
[36] G. Cottrell. Optimization of Entropy with Neural Networks , 1995 .
[37] Yoshua Bengio,et al. Gradient Flow in Recurrent Nets: the Difficulty of Learning Long-Term Dependencies , 2001 .
[38] John W. Sammon,et al. A Nonlinear Mapping for Data Structure Analysis , 1969, IEEE Transactions on Computers.
[39] Philipp Slusallek,et al. Introduction to real-time ray tracing , 2005, SIGGRAPH Courses.
[40] Teuvo Kohonen,et al. The self-organizing map , 1990, Neurocomputing.
[41] Michel Verleysen,et al. Are they really neighbors? A statistical analysis of the SOM algorithm output , 2001, AISTATS.
[42] Ray J. Frank,et al. The detection of fraud in mobile phone networks , 1996 .
[43] Tom Fawcett,et al. Combining Data Mining and Machine Learning for Effective User Profiling , 1996, KDD.
[44] Ronald J. Williams,et al. A Learning Algorithm for Continually Running Fully Recurrent Neural Networks , 1989, Neural Computation.
[45] Herbert Jaeger,et al. The''echo state''approach to analysing and training recurrent neural networks , 2001 .
[46] Jaakko Hollmén,et al. User profiling and classification for fraud detection in mobile communications networks , 2000 .
[47] R. Palmer,et al. , Introduction to the Theory of Neural Computation 1 , 2007 .
[48] Jouko Lampinen,et al. Self-Organizing Maps in data analysis - notes on overfitting and overinterpretation , 2000, ESANN.
[49] Kazuo J. Ezawa,et al. Constructing Bayesian Networks to Predict Uncollectible Telecommunications Accounts , 1996, IEEE Expert.
[50] Moninder Singh,et al. Learning Goal Oriented Bayesian Networks for Telecommunications Risk Management , 1996, ICML.
[51] Judith E. Dayhoff,et al. Adaptive time-delay neural network for temporal correlation and prediction , 1992, Other Conferences.
[52] Lynne Pearce. Beating the bugs. , 2004, Nursing standard (Royal College of Nursing (Great Britain) : 1987).
[53] Geoffrey E. Hinton,et al. Phoneme recognition using time-delay neural networks , 1989, IEEE Trans. Acoust. Speech Signal Process..
[54] Sheldon B. Kopp,et al. The good guys , 1976, Journal of Contemporary Psychotherapy.
[55] John Shawe-Taylor,et al. Frameworks For Fraud Detection In Mobile Telecommunications Networks , 1996 .
[56] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[57] John Shawe-Taylor,et al. Novel Techniques for Fraud Detection in Mobile Telecommunication Networks , 2007 .
[58] Ronald J. Williams,et al. Gradient-based learning algorithms for recurrent networks and their computational complexity , 1995 .
[59] Christian W. Omlin,et al. Recurrent Neural Networks for Signature Verification , 2003 .
[60] James L. McClelland,et al. Parallel distributed processing: explorations in the microstructure of cognition, vol. 1: foundations , 1986 .
[61] Paul Gray,et al. Introduction to Data Mining and Knowledge Discovery , 1998, Proceedings of the Thirty-First Hawaii International Conference on System Sciences.
[62] David J. Hand,et al. Statistical fraud detection: A review , 2002 .
[63] John Shawe-Taylor,et al. Detecting Cellular Fraud Using Adaptive Prototypes. , 1997, AAAI 1997.
[64] Yoshua Bengio,et al. Learning long-term dependencies with gradient descent is difficult , 1994, IEEE Trans. Neural Networks.
[65] Jacek M. Zurada,et al. Bi-directional computing architecture for time series prediction , 2001, Neural Networks.
[66] John Shawe-Taylor,et al. BRUTUS - A Hybrid Detection Tool , 1997 .
[67] James Hammerton,et al. Named Entity Recognition with Long Short-Term Memory , 2003, CoNLL.
[68] Jürgen Schmidhuber,et al. Finding temporal structure in music: blues improvisation with LSTM recurrent networks , 2002, Proceedings of the 12th IEEE Workshop on Neural Networks for Signal Processing.
[69] Zoran Obradovic,et al. Data mining techniques for designing neural network time series predictors , 2000 .
[70] Alexander H. Waibel,et al. The Tempo 2 Algorithm: Adjusting Time-Delays By Supervised Learning , 1990, NIPS.
[71] Joos Vandewalle,et al. Detection of Mobile Phone Fraud Using Supervised Neural Networks: A First Prototype , 1997, ICANN.
[72] Thomas G. Dietterich. What is machine learning? , 2020, Archives of Disease in Childhood.
[73] Peter Hoath. Telecoms fraud, the gory details , 1998 .
[74] S. Hyakin,et al. Neural Networks: A Comprehensive Foundation , 1994 .
[75] Samuel Kaski,et al. Bibliography of Self-Organizing Map (SOM) Papers: 1981-1997 , 1998 .