A User-Friendly Algorithm for Detecting the Influence of Background Risks on a Model
暂无分享,去创建一个
[1] Ruodu Wang,et al. Gini-Type Measures of Risk and Variability: Gini Shortfall, Capital Allocations, and Heavy-Tailed Risks , 2016 .
[2] Harris Schlesinger,et al. Risk taking with additive and multiplicative background risks , 2011, J. Econ. Theory.
[3] Takashi Onoda. Probabilistic models-based intrusion detection using sequence characteristics in control system communication , 2015, Neural Computing and Applications.
[4] Rivcardas Zitikis,et al. Assessing Transfer Functions in Control Systems , 2018, Journal of Statistical Theory and Practice.
[5] Takashi Onoda. Probabilistic Models Based Intrusion Detection Using Sequence Characteristics in Control System Communication , 2014, EANN.
[6] Edward Furman,et al. On a Multiplicative Multivariate Gamma Distribution With Applications in Insurance , 2018, Risks.
[7] G. Giorgi. A fresh look at the topical interest of the Gini concentration ratio , 2005 .
[8] Zhao Yang Dong,et al. A Review of False Data Injection Attacks Against Modern Power Systems , 2017, IEEE Transactions on Smart Grid.
[9] Alvaro A. Cárdenas,et al. Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.
[10] Javier Perote Peña,et al. Strategy-Proof Estimators for Simple Regression , 2003 .
[11] Gabriela Hug,et al. Vulnerability Assessment of AC State Estimation With Respect to False Data Injection Cyber-Attacks , 2012, IEEE Transactions on Smart Grid.
[12] David C. Nachman. Preservation of "more risk averse" under expectations , 1982 .
[13] Zhu Han,et al. Real-Time Detection of False Data Injection in Smart Grid Networks: An Adaptive CUSUM Method and Analysis , 2016, IEEE Systems Journal.
[14] Edward Furman,et al. Multiple risk factor dependence structures: Distributional properties , 2016, 1607.04739.
[15] Marc Dacier,et al. Towards a taxonomy of intrusion-detection systems , 1999, Comput. Networks.
[16] M. Scarsini,et al. On risk aversion with two risks , 1999 .
[17] Lixing Zhu,et al. Mean–variance, mean–VaR, and mean–CVaR models for portfolio selection with background risk , 2018, Risk Management.
[18] Y. Davydov,et al. Estimating the Index of Increase via Balancing Deterministic and Random Data , 2017, Mathematical Methods of Statistics.
[19] Harris Schlesinger,et al. Multiplicative Background Risk , 2006, Manag. Sci..
[20] Lixing Zhu,et al. The two-moment decision model with additive risks , 2017 .
[21] John W. Pratt,et al. Aversion to one risk in the presence of others , 1988 .
[22] Youri Davydov,et al. Quantifying non-monotonicity of functions and the lack of positivity in signed measures , 2017, 1705.02742.
[23] Ričardas Zitikis,et al. Weighted risk capital allocations in the presence of systematic risk , 2017 .
[24] Javier Perote,et al. Strategic behavior in regressions: an experimental study , 2015 .
[25] Jin Wei,et al. Real-Time Detection of False Data Injection Attacks in Smart Grid: A Deep Learning-Based Intelligent Mechanism , 2017, IEEE Transactions on Smart Grid.