Counterfeiting Detection in RFID-enabled Supply Chain
暂无分享,去创建一个
[1] Damith C. Ranasinghe,et al. Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting , 2010 .
[2] Peter D. Turney. Types of Cost in Inductive Concept Learning , 2002, ArXiv.
[3] Peter D. Turney. Cost-Sensitive Classification: Empirical Evaluation of a Hybrid Genetic Decision Tree Induction Algorithm , 1994, J. Artif. Intell. Res..
[4] T. Saaty. An exposition of the AHP in reply to the paper “remarks on the analytic hierarchy process” , 1990 .
[5] Damith C. Ranasinghe,et al. EPC Network Architecture , 2008 .
[6] Robert C. Holte,et al. Exploiting the Cost (In)sensitivity of Decision Tree Splitting Criteria , 2000, ICML.
[7] Jian Huang,et al. An approach to security and privacy of RFID system for supply chain , 2004, IEEE International Conference on E-Commerce Technology for Dynamic E-Business.
[8] Aiko M. Hormann,et al. Programs for Machine Learning. Part I , 1962, Inf. Control..
[9] Kai Ming Ting,et al. Inducing Cost-Sensitive Trees via Instance Weighting , 1998, PKDD.
[10] Sherali Zeadally,et al. TMS-RFID: Temporal management of large-scale RFID applications , 2011, Inf. Syst. Frontiers.
[11] Yoav Freund,et al. Experiments with a New Boosting Algorithm , 1996, ICML.
[12] Manmeet Mahinderjit Singh,et al. Trust Framework for RFID Tracking in Supply Chain Management , 2009, IWRT.
[13] John Langford,et al. Cost-sensitive learning by cost-proportionate example weighting , 2003, Third IEEE International Conference on Data Mining.
[14] Salvatore J. Stolfo,et al. AdaCost: Misclassification Cost-Sensitive Boosting , 1999, ICML.
[15] Ian H. Witten,et al. The WEKA data mining software: an update , 2009, SKDD.
[16] Florian Michahelles,et al. Trust and Security in RFID-Based Product Authentication Systems , 2007, IEEE Systems Journal.
[17] Chi-Sung Laih,et al. IDSIC: an intrusion detection system with identification capability , 2007, International Journal of Information Security.
[18] Gary M. Weiss,et al. Cost-Sensitive Learning vs. Sampling: Which is Best for Handling Unbalanced Classes with Unequal Error Costs? , 2007, DMIN.
[19] Xue Li,et al. A Cost-based Model for Risk Management in RFID-Enabled Supply Chain Applications , 2011 .
[20] Ian H. Witten,et al. Data mining: practical machine learning tools and techniques with Java implementations , 2002, SGMD.
[21] Salvatore J. Stolfo,et al. A Multiple Model Cost-Sensitive Approach for Intrusion Detection , 2000, ECML.
[22] Ari Juels,et al. Strengthening EPC tags against cloning , 2005, WiSe '05.
[23] Lea Kutvonen,et al. Trust Management Survey , 2005, iTrust.
[24] Pedro M. Domingos. MetaCost: a general method for making classifiers cost-sensitive , 1999, KDD '99.
[25] Elgar Fleisch,et al. How to detect cloned tags in a reliable way from incomplete RFID traces , 2009, 2009 IEEE International Conference on RFID.
[26] Salvatore J. Stolfo,et al. A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[27] Kai Ming Ting,et al. A Comparative Study of Cost-Sensitive Boosting Algorithms , 2000, ICML.
[28] Pedro M. Domingos,et al. Tree Induction for Probability-Based Ranking , 2003, Machine Learning.
[29] Manmeet Mahinderjit Singh,et al. Trust in RFID-enabled Supply-Chain Management , 2010, Int. J. Secur. Networks.
[30] David J. Hand,et al. Measuring classifier performance: a coherent alternative to the area under the ROC curve , 2009, Machine Learning.
[31] Xue Li,et al. RFID Data Management: Challenges and Opportunities , 2007, 2007 IEEE International Conference on RFID.