Effect of Feature Selection, SMOTE and under Sampling on Class Imbalance Classification
暂无分享,去创建一个
[1] Christopher Krügel,et al. Intrusion Detection and Correlation - Challenges and Solutions , 2004, Advances in Information Security.
[2] Nathalie Japkowicz,et al. A Mixture-of-Experts Framework for Learning from Imbalanced Data Sets , 2001, IDA.
[3] David A. Cieslak,et al. Combating imbalance in network intrusion datasets , 2006, 2006 IEEE International Conference on Granular Computing.
[5] GuoHongyu,et al. Learning from imbalanced data sets with boosting and data generation , 2004 .
[6] Salvatore J. Stolfo,et al. Cost-based modeling for fraud and intrusion detection: results from the JAM project , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[7] John McHugh,et al. Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory , 2000, TSEC.
[8] Hewijin Christine Jiau,et al. Evaluation of neural networks and data mining methods on a credit assessment task for class imbalance problem , 2006 .
[9] Antoine Geissbühler,et al. Learning from imbalanced data in surveillance of nosocomial infection , 2006, Artif. Intell. Medicine.
[10] Taghi M. Khoshgoftaar,et al. An Empirical Study of Learning from Imbalanced Data Using Random Forest , 2007, 19th IEEE International Conference on Tools with Artificial Intelligence(ICTAI 2007).
[11] D.S. Anyfantis,et al. Local cost sensitive learning for handling imbalanced data sets , 2007, 2007 Mediterranean Conference on Control & Automation.
[12] Ali Al-Shahib,et al. Franksum: new feature selection method for protein function prediction , 2005, Int. J. Neural Syst..
[13] Gongping Yang,et al. On the Class Imbalance Problem , 2008, 2008 Fourth International Conference on Natural Computation.
[14] A.H. Sung,et al. Identifying important features for intrusion detection using support vector machines and neural networks , 2003, 2003 Symposium on Applications and the Internet, 2003. Proceedings..
[15] Li Guo,et al. Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System , 2006, Inscrypt.
[16] Giandomenico Spezzano,et al. An Adaptive Distributed Ensemble Approach to Mine Concept-Drifting Data Streams , 2007 .
[17] Efstathios Stamatatos,et al. Author identification: Using text sampling to handle the class imbalance problem , 2008, Inf. Process. Manag..
[18] Dimitris Kanellopoulos,et al. Handling imbalanced datasets: A review , 2006 .
[19] Giovanni Vigna,et al. Intrusion detection: a brief history and overview , 2002 .
[20] Daoqiang Zhang,et al. Hybrid neural network and C4.5 for misuse detection , 2003, Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693).
[21] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[22] Nitesh V. Chawla,et al. C4.5 and Imbalanced Data sets: Investigating the eect of sampling method, probabilistic estimate, and decision tree structure , 2003 .
[23] Herna L. Viktor,et al. Learning from imbalanced data sets with boosting and data generation: the DataBoost-IM approach , 2004, SKDD.