IoT System Data Quality Optimization: Research Status and Problem Analysis
暂无分享,去创建一个
Quanbo Ge | Haoyu Jiang | Chunxi Li | Jiacheng Ji | Quanbo Ge | Haoyu Jiang | Chunxi Li | Jiacheng Ji
[1] M. Weatherford,et al. Mining for fraud , 2002 .
[2] C. L. Philip Chen,et al. Broad Learning System: An Effective and Efficient Incremental Learning System Without the Need for Deep Architecture , 2018, IEEE Transactions on Neural Networks and Learning Systems.
[3] Idan Szpektor,et al. Churn prediction in new users of Yahoo! answers , 2012, WWW.
[4] Tao Yang,et al. An Anomaly Detection Method Based On Deep Learning , 2015 .
[5] Siddhartha Bhattacharyya,et al. Data mining for credit card fraud: A comparative study , 2011, Decis. Support Syst..
[6] Martijn Onderwater,et al. Detecting unusual user proles with outlier detection techniques , 2010 .
[7] Mohd Rizam Abu Bakar,et al. Fraud detection in telecommunication industry using Gaussian mixed model , 2013, 2013 International Conference on Research and Innovation in Information Systems (ICRIIS).
[8] Yong Hu,et al. The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature , 2011, Decis. Support Syst..
[9] Gary M. Weiss. Data Mining in Telecommunications , 2005, The Data Mining and Knowledge Discovery Handbook.