:::

詳目顯示

回上一頁
題名:Novel Machine Learning Approach for Analyzing Anonymous Credit Card Fraud Patterns
書刊名:International Journal of Electronic Commerce Studies
作者:Manlangit, SylvesterAzam, SamiShanmugam, BharanidharanKarim, Asif
出版日期:2019
卷期:10:2
頁次:頁175-201
主題關鍵詞:Fraudulent credit card transactionsk-NNSMOTEPCAMachine learning
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:6
期刊論文
1.Wold, S.、Esbensen, K.、Geladi, P.(1987)。Principal Component Analysis。Chemometrics and Intelligent Laboratory Systems,2(1-3),37-52。  new window
2.Bhattacharyya, Siddhartha、Jha, Sanjeev、Tharakunnel, Kurian、Westland, J. Christopher(2011)。Data Mining for Credit Card Fraud: A Comparative Study。Decision Support Systems,50(3),602-613。  new window
3.Dal Pozzolo, Andrea、Caelen, Olivier、Le Borgne, Yann-Aël、Waterschoot, Serge、Bontempi, Gianluca(2014)。Learned lessons in credit card fraud detection from a practitioner perspective。Expert Systems with Applications,41(10),4915-4928。  new window
4.Weiss, G. M.(2004)。Mining with rarity: a unifying framework。ACM SIGKDD Explorations Newsletter,6(1),7-19。  new window
5.Jha, Sanjeev、Westland, J. Christopher(2013)。A Descriptive Study of Credit Card Fraud Pattern。Global Business Review,14(3),373-84。  new window
6.Liñares-Zegarra, J. M.、Wilson, J. O. S.(2014)。Credit card interest rates and risk: new evidence from US survey data。The European Journal of Finance,20(10),892-914。  new window
7.Lepoivre, M. R.、Avanzini, C. O.、Bignon, G.、Legendre, L.、Piwele, A. K.(2016)。Credit card fraud detection with unsupervised algorithms (Report)。Journal of Advances in Information Technology,7(1)。  new window
8.Jiang, C.、Song, J.、Liu, G.、Zheng, L.、Luan, W.(2018)。Credit Card Fraud Detection: A Novel Approach Using Aggregation Strategy and Feedback Mechanism。IEEE Internet of Things Journal,5,3637-3647。  new window
9.Prakash, A.、Chandrasekar, C.(2013)。A parameter optimized approach for improving credit card fraud detection。International Journal of Computer Science Issues,10(1),360-366。  new window
10.Ganji, V. R.、Mannem, S. N. P.(2012)。Credit card fraud detection using anti-k nearest neighbor algorithm。International Journal on Computer Science and Engineering,4(6),1035-1039。  new window
11.Elitzur, Revital、Sai, Ying(20100600)。A Laboratory Study Designed for Reducing the Gap between Information Security Knowledge and Implementation。International Journal of Electronic Commerce Studies,1(1),37-49。new window  new window
12.Bahnsen, A. C.、Aouada, D.、Stojanovic, A.、Ottersten, B.(2016)。Feature engineering strategies for credit card fraud detection。Expert Systems with Applications,51,134-142。  new window
13.Novaković, J.(2016)。Toward optimal feature selection using ranking methods and classification algorithms。Yugoslav Journal of Operations Research,21(1),119-135。  new window
14.Scott, D. W.(2009)。Sturges' rule。Wiley Interdisciplinary Reviews: Computational Statistics,1(3),303-306。  new window
15.Nadarajan, S.、Ramanujam, B.(2016)。Encountering imbalance in credit card fraud detection with metaheuristics。Advances in Natural and Applied Sciences,10(8),33-42。  new window
16.Prakash, A.、Chandrasekar, C.(2012)。A Novel Hidden Markov Model for Credit Card Fraud Detection。International Journal of Computer Applications,59(3),35-41。  new window
17.Chaudhary, K.、Mallick, B.(2012)。Exploration of Data mining techniques in Fraud Detection: Credit Card。International Journal of Electronics and Computer Science Engineering,1(3),1765-1771。  new window
18.Kim, J.、Han, Y.、Lee, J.(2016)。Data Imbalance Problem solving for SMOTE Based Oversampling: Study on Fault Detection Prediction Model in Semiconductor Manufacturing Process。Advanced Science and Technology Letters,133,79-84。  new window
會議論文
1.Jose, J.、Kannoorpatti, K.、Shanmugam, B.、Azam, S.、Yeo, K. C.(2017)。A Critical Review of Bitcoins Usage by Cybercriminals。International Conference on Computer Communication and Informatics。  new window
2.Pozzolo, A. D.、Caelen, O.、Johnson, R. A.、Bontempi, G.(2015)。Calibrating Probability with Undersampling for Unbalanced Classification。IEEE Symposium Series on Computational Intelligence,159-166。  new window
圖書
1.Hand, David J.、Mannila, Heikki、Smyth, Padhraic(2001)。Principles of data mining。MIT Press。  new window
單篇論文
1.Smith, L. I.(2002)。A tutorial on Principal Components Analysis。  new window
其他
1.(2018)。e-Commerce,https://www.statista.com/outlook/243/100/ecommerce/worldwide#。  new window
2.(2016)。The Nilson Report,https://www.nilsonreport.com/upload/contentpromo/TheNilsonReport10-17-2016.pdf。  new window
3.Srivastava, T.(2014)。Introduction to k-nearest neighbours: Simplified,https://www.analyticsvidhya.com/blog/2014/10/introduction-kneighbours-algorithm-clustering/。  new window
4.Jacobe, D.,Jones, M.(2009)。Consumers Spend More on Weekends, Payday Weeks: Average daily spending is lowest at beginning of work week (Survey)。  new window
5.West, R.(2016)。Training Set vs. Test Set,http://content.nexosis.com/blog/training-set-vs.-test-set。  new window
6.Powell, V.(2015)。Principal Component Analysis,http://setosa.io/ev/principal-component-analysis/。  new window
7.Roberts, D.。Mean Absolute Deviation,https://mathbitsnotebook.com/Algebra1/StatisticsData/STMAD.html。  new window
8.Roberts, D.。Variance and Standard Deviation,https://mathbitsnotebook.com/Algebra1/StatisticsData/STSD.html。  new window
9.Linear Projection,https://docs.orange.biolab.si/3/visual-programming/widgets/visualize/linearprojection.html。  new window
圖書論文
1.Manlangit, S.、Azam, S.、Shanmugam, B.、Kannoorpatti, K.、Jonkman, M.、Balasubramaniam, A.(2018)。An efficient method for detecting fraudulent transactions using classification algorithms on an anonymized credit card dataset。Intelligent Systems Design and Applications。Springer。  new window
2.Chawla, N. V.(2015)。Data mining for imbalanced datasets: An overview。Data mining and knowledge discovery handbook。Springer。  new window
3.Han, Hui、Wang, Wen-Yuan、Mao, Bing-Huan(2005)。Borderline-SMOTE: A New Over-Sampling Method in Imbalanced Data Sets Learning。Advances in intelligent computing。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關博士論文
 
無相關書籍
 
無相關著作
 
QR Code
QRCODE