資料載入處理中...
臺灣人文及社會科學引文索引資料庫系統
:::
網站導覽
國圖首頁
聯絡我們
操作說明
English
行動版
(3.149.214.32)
登入
字型:
**字體大小變更功能,需開啟瀏覽器的JAVASCRIPT,如您的瀏覽器不支援,
IE6請利用鍵盤按住ALT鍵 + V → X → (G)最大(L)較大(M)中(S)較小(A)小,來選擇適合您的文字大小,
如為IE7以上、Firefoxy或Chrome瀏覽器則可利用鍵盤 Ctrl + (+)放大 (-)縮小來改變字型大小。
來源文獻查詢
引文查詢
瀏覽查詢
作者權威檔
引用/點閱統計
我的研究室
資料庫說明
相關網站
來源文獻查詢
/
簡易查詢
/
查詢結果列表
/
詳目列表
:::
詳目顯示
第 1 筆 / 總合 1 筆
/1
頁
來源文獻資料
引文資料
題名:
Novel Machine Learning Approach for Analyzing Anonymous Credit Card Fraud Patterns
書刊名:
International Journal of Electronic Commerce Studies
作者:
Manlangit, Sylvester
/
Azam, Sami
/
Shanmugam, Bharanidharan
/
Karim, Asif
出版日期:
2019
卷期:
10:2
頁次:
頁175-201
主題關鍵詞:
Fraudulent credit card transactions
;
k-NN
;
SMOTE
;
PCA
;
Machine learning
原始連結:
連回原系統網址
相關次數:
被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
排除自我引用:0
共同引用:0
點閱:6
期刊論文
1.
Wold, S.、Esbensen, K.、Geladi, P.(1987)。Principal Component Analysis。Chemometrics and Intelligent Laboratory Systems,2(1-3),37-52。
2.
Bhattacharyya, Siddhartha、Jha, Sanjeev、Tharakunnel, Kurian、Westland, J. Christopher(2011)。Data Mining for Credit Card Fraud: A Comparative Study。Decision Support Systems,50(3),602-613。
3.
Dal Pozzolo, Andrea、Caelen, Olivier、Le Borgne, Yann-Aël、Waterschoot, Serge、Bontempi, Gianluca(2014)。Learned lessons in credit card fraud detection from a practitioner perspective。Expert Systems with Applications,41(10),4915-4928。
4.
Weiss, G. M.(2004)。Mining with rarity: a unifying framework。ACM SIGKDD Explorations Newsletter,6(1),7-19。
5.
Jha, Sanjeev、Westland, J. Christopher(2013)。A Descriptive Study of Credit Card Fraud Pattern。Global Business Review,14(3),373-84。
6.
Liñares-Zegarra, J. M.、Wilson, J. O. S.(2014)。Credit card interest rates and risk: new evidence from US survey data。The European Journal of Finance,20(10),892-914。
7.
Lepoivre, M. R.、Avanzini, C. O.、Bignon, G.、Legendre, L.、Piwele, A. K.(2016)。Credit card fraud detection with unsupervised algorithms (Report)。Journal of Advances in Information Technology,7(1)。
8.
Jiang, C.、Song, J.、Liu, G.、Zheng, L.、Luan, W.(2018)。Credit Card Fraud Detection: A Novel Approach Using Aggregation Strategy and Feedback Mechanism。IEEE Internet of Things Journal,5,3637-3647。
9.
Prakash, A.、Chandrasekar, C.(2013)。A parameter optimized approach for improving credit card fraud detection。International Journal of Computer Science Issues,10(1),360-366。
10.
Ganji, V. R.、Mannem, S. N. P.(2012)。Credit card fraud detection using anti-k nearest neighbor algorithm。International Journal on Computer Science and Engineering,4(6),1035-1039。
11.
Elitzur, Revital、Sai, Ying(20100600)。A Laboratory Study Designed for Reducing the Gap between Information Security Knowledge and Implementation。International Journal of Electronic Commerce Studies,1(1),37-49。
12.
Bahnsen, A. C.、Aouada, D.、Stojanovic, A.、Ottersten, B.(2016)。Feature engineering strategies for credit card fraud detection。Expert Systems with Applications,51,134-142。
13.
Novaković, J.(2016)。Toward optimal feature selection using ranking methods and classification algorithms。Yugoslav Journal of Operations Research,21(1),119-135。
14.
Scott, D. W.(2009)。Sturges' rule。Wiley Interdisciplinary Reviews: Computational Statistics,1(3),303-306。
15.
Nadarajan, S.、Ramanujam, B.(2016)。Encountering imbalance in credit card fraud detection with metaheuristics。Advances in Natural and Applied Sciences,10(8),33-42。
16.
Prakash, A.、Chandrasekar, C.(2012)。A Novel Hidden Markov Model for Credit Card Fraud Detection。International Journal of Computer Applications,59(3),35-41。
17.
Chaudhary, K.、Mallick, B.(2012)。Exploration of Data mining techniques in Fraud Detection: Credit Card。International Journal of Electronics and Computer Science Engineering,1(3),1765-1771。
18.
Kim, J.、Han, Y.、Lee, J.(2016)。Data Imbalance Problem solving for SMOTE Based Oversampling: Study on Fault Detection Prediction Model in Semiconductor Manufacturing Process。Advanced Science and Technology Letters,133,79-84。
會議論文
1.
Jose, J.、Kannoorpatti, K.、Shanmugam, B.、Azam, S.、Yeo, K. C.(2017)。A Critical Review of Bitcoins Usage by Cybercriminals。International Conference on Computer Communication and Informatics。
2.
Pozzolo, A. D.、Caelen, O.、Johnson, R. A.、Bontempi, G.(2015)。Calibrating Probability with Undersampling for Unbalanced Classification。IEEE Symposium Series on Computational Intelligence,159-166。
圖書
1.
Hand, David J.、Mannila, Heikki、Smyth, Padhraic(2001)。Principles of data mining。MIT Press。
單篇論文
1.
Smith, L. I.(2002)。A tutorial on Principal Components Analysis。
其他
1.
(2018)。e-Commerce,https://www.statista.com/outlook/243/100/ecommerce/worldwide#。
2.
(2016)。The Nilson Report,https://www.nilsonreport.com/upload/contentpromo/TheNilsonReport10-17-2016.pdf。
3.
Srivastava, T.(2014)。Introduction to k-nearest neighbours: Simplified,https://www.analyticsvidhya.com/blog/2014/10/introduction-kneighbours-algorithm-clustering/。
4.
Jacobe, D.,Jones, M.(2009)。Consumers Spend More on Weekends, Payday Weeks: Average daily spending is lowest at beginning of work week (Survey)。
5.
West, R.(2016)。Training Set vs. Test Set,http://content.nexosis.com/blog/training-set-vs.-test-set。
6.
Powell, V.(2015)。Principal Component Analysis,http://setosa.io/ev/principal-component-analysis/。
7.
Roberts, D.。Mean Absolute Deviation,https://mathbitsnotebook.com/Algebra1/StatisticsData/STMAD.html。
8.
Roberts, D.。Variance and Standard Deviation,https://mathbitsnotebook.com/Algebra1/StatisticsData/STSD.html。
9.
Linear Projection,https://docs.orange.biolab.si/3/visual-programming/widgets/visualize/linearprojection.html。
圖書論文
1.
Manlangit, S.、Azam, S.、Shanmugam, B.、Kannoorpatti, K.、Jonkman, M.、Balasubramaniam, A.(2018)。An efficient method for detecting fraudulent transactions using classification algorithms on an anonymized credit card dataset。Intelligent Systems Design and Applications。Springer。
2.
Chawla, N. V.(2015)。Data mining for imbalanced datasets: An overview。Data mining and knowledge discovery handbook。Springer。
3.
Han, Hui、Wang, Wen-Yuan、Mao, Bing-Huan(2005)。Borderline-SMOTE: A New Over-Sampling Method in Imbalanced Data Sets Learning。Advances in intelligent computing。
推文
當script無法執行時可按︰
推文
推薦
當script無法執行時可按︰
推薦
引用網址
當script無法執行時可按︰
引用網址
引用嵌入語法
當script無法執行時可按︰
引用嵌入語法
轉寄
當script無法執行時可按︰
轉寄
top
:::
相關期刊
相關論文
相關專書
相關著作
熱門點閱
1.
A Laboratory Study Designed for Reducing the Gap between Information Security Knowledge and Implementation
無相關博士論文
無相關書籍
無相關著作
1.
Integrated Exploratory Factor Analysis and Data Envelopment Analysis to Evaluate Balanced Ambidexterity Fostering Innovation in Manufacturing SMEs
2.
The Effect of Information on Supply Chain Coordination: A Model of Value Discounting
3.
19th APMC: Strategy to Enhance International Competitiveness: Technology and Innovation
4.
Hollywood Movie Data Analysis by Social Network Analysis and Text Mining
5.
Using Correspondence Analysis to Map Online Purchase Criteria of Different Product Categories
6.
Set-top Box and Its Penetration in the Home Console Market
7.
How to Increase Customer Repurchase Intention in an Online Retailing Store? An Extended Expectation Confirmatory Model
8.
Factors Affecting Mobile Shoppers' Continuation Intention of Coffee Shop Online Store: A Perspective on Consumer Tolerance
9.
Exploring the Benefits of Social Media Marketing for Brands and Communities
10.
New Attack Potential Measurement Method to Kaizen Event for Web Application Security Vulnerabilities
11.
A Survey on Comprehensive Trends in Recommendation Systems & Applications
12.
Determinants of Mobile Payment Usage and the Moderating Effect of Gender: Extending the UTAUT Model with Privacy Risk
13.
Online Purchase Preference and Personal Characteristics: A Moderation Approach
14.
工程財物損失保險設計瑕疵不保事項研探
15.
財產保險業服務創新、體驗行銷對再購意願之影響:以顧客滿意度為中介變數
QR Code