暂无分享,去创建一个
Yuan Qi | Cen Chen | Xiaolong Li | Shaosheng Cao | Xinxing Yang | Jun Zhou | Jun Zhou | Xiaolong Li | Xinxing Yang | Shaosheng Cao | Yuan Qi | Cen Chen
[1] Foster Provost,et al. A Simple Relational Classifier , 2003 .
[2] Steven Skiena,et al. DeepWalk: online learning of social representations , 2014, KDD.
[3] Corinna Cortes,et al. Computational Methods for Dynamic Graphs , 2003 .
[4] Graham J. Williams,et al. On-Line Unsupervised Outlier Detection Using Finite Mixtures with Discounting Learning Algorithms , 2000, KDD '00.
[5] Chengqi Zhang,et al. Network Representation Learning: A Survey , 2017, IEEE Transactions on Big Data.
[6] J. Christopher Westland,et al. Employing transaction aggregation strategy to detect credit card fraud , 2012, Expert Syst. Appl..
[7] J. Ross Quinlan,et al. Induction of Decision Trees , 1986, Machine Learning.
[8] Xu Chen,et al. KunPeng: Parameter Server based Distributed Learning Systems and Its Applications in Alibaba and Ant Financial , 2017, KDD.
[9] Chao Li,et al. Fuxi: a Fault-Tolerant Resource Management and Job Scheduling System at Internet Scale , 2014, Proc. VLDB Endow..
[10] Guido Dedene,et al. A case study of applying boosting naive Bayes to claim fraud diagnosis , 2004, IEEE Transactions on Knowledge and Data Engineering.
[11] Zhi-Hua Zhou,et al. Isolation Forest , 2008, 2008 Eighth IEEE International Conference on Data Mining.
[12] Richard E. Overill,et al. Design of an artificial immune system as a novel anomaly detector for combating financial fraud in the retail sector , 2003, The 2003 Congress on Evolutionary Computation, 2003. CEC '03..
[13] John Shawe-Taylor,et al. An Unsupervised Neural Network Approach to Profiling the Behavior of Mobile Phone Users for Use in Fraud Detection , 2001, J. Parallel Distributed Comput..
[14] Shen Jia-jie,et al. Electronic transaction fraud detection based on improved PSO algorithm , 2012, Proceedings of 2012 2nd International Conference on Computer Science and Network Technology.
[15] J. R. Quinlan. Learning Logical Definitions from Relations , 1990 .
[16] Yizhak Idan,et al. Discovery of fraud rules for telecommunications—challenges and solutions , 1999, KDD '99.
[17] Navneet Vidyarthi,et al. A Fuzzy-Based Algorithm for Auditors to Detect Element of Fraud in Settled Insurance Claims , 2003 .
[18] Jian Ma,et al. A hybrid ensemble approach for enterprise credit risk assessment based on Support Vector Machine , 2012, Expert Syst. Appl..
[19] Le Song,et al. Discriminative Embeddings of Latent Variable Models for Structured Data , 2016, ICML.
[20] Chieh-Yuan Tsai,et al. A Web services-based collaborative scheme for credit card fraud detection , 2004, IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004.
[21] Ronald J. Brachman,et al. Brief Application Description; Visual Data Mining: Recognizing Telephone Calling Fraud , 2004, Data Mining and Knowledge Discovery.
[22] J. R. Quinlan,et al. Data Mining Tools See5 and C5.0 , 2004 .
[23] Huan Liu,et al. Relational learning via latent social dimensions , 2009, KDD.
[24] Aaron Q. Li,et al. Parameter Server for Distributed Machine Learning , 2013 .
[25] LiuHuan,et al. Leveraging social media networks for classification , 2011 .
[26] J. Ross Quinlan,et al. C4.5: Programs for Machine Learning , 1992 .
[27] Tao Guo,et al. Neural data mining for credit card fraud detection , 2008, 2008 International Conference on Machine Learning and Cybernetics.
[28] S. Kotsiantis,et al. Discretization Techniques: A recent survey , 2006 .
[29] John A. Major,et al. EFD: A hybrid knowledge/statistical‐based system for the detection of fraud , 1992, Int. J. Intell. Syst..
[30] Huan Liu,et al. Leveraging social media networks for classification , 2011, Data Mining and Knowledge Discovery.
[31] Florian Skopik,et al. POSTER: (Semi)-Supervised Machine Learning Approaches for Network Security in High-Dimensional Network Data , 2016, CCS.
[32] M Syeda,et al. Parallel granular neural networks for fast credit card fraud detection , 2002, 2002 IEEE World Congress on Computational Intelligence. 2002 IEEE International Conference on Fuzzy Systems. FUZZ-IEEE'02. Proceedings (Cat. No.02CH37291).
[33] Jeffrey Dean,et al. Distributed Representations of Words and Phrases and their Compositionality , 2013, NIPS.
[34] Christina Freytag,et al. Using Mpi Portable Parallel Programming With The Message Passing Interface , 2016 .
[35] Wilson C. Hsieh,et al. Bigtable: A Distributed Storage System for Structured Data , 2006, TOCS.
[36] Mingzhe Wang,et al. LINE: Large-scale Information Network Embedding , 2015, WWW.
[37] R. Patidar,et al. Credit Card Fraud Detection Using Neural Network , 2011 .
[38] S. Mallika,et al. Online transaction fraud detection techniques: A review of data mining approaches , 2016, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom).
[39] David J. Hand,et al. Discrimination and Classification , 1982 .
[40] Jure Leskovec,et al. node2vec: Scalable Feature Learning for Networks , 2016, KDD.
[41] Kazuo J. Ezawa,et al. Constructing Bayesian Networks to Predict Uncollectible Telecommunications Accounts , 1996, IEEE Expert.
[42] Mohammad Kazem Akbari,et al. A novel model for credit card fraud detection using Artificial Immune Systems , 2014, Appl. Soft Comput..
[43] J. Friedman. Stochastic gradient boosting , 2002 .
[44] J. Friedman. Greedy function approximation: A gradient boosting machine. , 2001 .
[45] P. Cochat,et al. Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.
[46] Erland Jonsson,et al. Synthesizing test data for fraud detection systems , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[47] Niall M. Adams,et al. Transaction aggregation as a strategy for credit card fraud detection , 2009, Data Mining and Knowledge Discovery.
[48] Kate Smith-Miles,et al. A Comprehensive Survey of Data Mining-based Fraud Detection Research , 2010, ArXiv.
[49] Strother H. Walker,et al. Estimation of the probability of an event as a function of several independent variables. , 1967, Biometrika.
[50] William W. Cohen. Fast Effective Rule Induction , 1995, ICML.
[51] Yong Hu,et al. The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature , 2011, Decis. Support Syst..
[52] Rekha Bhowmik,et al. Detecting Auto Insurance Fraud by Data Mining Techniques , 2011 .
[53] Qiongkai Xu,et al. GraRep: Learning Graph Representations with Global Structural Information , 2015, CIKM.
[54] Palash Goyal,et al. Graph Embedding Techniques, Applications, and Performance: A Survey , 2017, Knowl. Based Syst..
[55] Max Kuhn,et al. Applied Predictive Modeling , 2013 .
[56] Dean P. Foster,et al. Variable Selection in Data Mining , 2004 .
[57] Alberto Maria Segre,et al. Programs for Machine Learning , 1994 .
[58] Douglas L. Reilly,et al. Credit card fraud detection with a neural-network , 1994, 1994 Proceedings of the Twenty-Seventh Hawaii International Conference on System Sciences.
[59] Bernd Freisleben,et al. CARDWATCH: a neural network based database mining system for credit card fraud detection , 1997, Proceedings of the IEEE/IAFE 1997 Computational Intelligence for Financial Engineering (CIFEr).
[60] Mohamed Abdel-Aty,et al. Application of Stochastic Gradient Boosting Technique to Enhance Reliability of Real-Time Risk Assessment , 2013 .
[61] Constantin von Altrock,et al. Fuzzy Logic and NeuroFuzzy Applications in Business and Finance , 1996 .
[62] Reggio Emilia,et al. Insurance Fraud Evaluation - A Fuzzy Expert System , 2001, FUZZ-IEEE.
[63] D. Hand,et al. Unsupervised Profiling Methods for Fraud Detection , 2002 .
[64] Foster J. Provost,et al. Aggregation-based feature invention and relational concept classes , 2003, KDD '03.
[65] J. Stuart Aitken,et al. Multiple algorithms for fraud detection , 2000, Knowl. Based Syst..