메뉴 건너뛰기




Volumn 5, Issue , 2005, Pages 3040-3045

Fuzzy ROC curves for unsupervised nonparametric ensemble techniques

Author keywords

[No Author keywords available]

Indexed keywords

MULTIPLE CLASSIFICATION SYSTEMS (MCS); NONPARAMETRIC STATISTICS; RECEIVER OPERATING CHARACTERISTIC (ROC);

EID: 33750101099     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IJCNN.2005.1556410     Document Type: Conference Paper
Times cited : (6)

References (33)
  • 3
    • 0031191630 scopus 로고    scopus 로고
    • The use of the area under the ROC curve in the evaluation of machine learning algorithms
    • Andrew P. Bradley. The Use of the Area Under the ROC Curve in the Evaluation of Machine Learning Algorithms. Pattern Recognition, Volume 30(7): 1145-1159, 1997.
    • (1997) Pattern Recognition , vol.30 , Issue.7 , pp. 1145-1159
    • Bradley, A.P.1
  • 7
    • 84899149437 scopus 로고    scopus 로고
    • A fast computer intrusion detection algorithm based on hypothesis testing of command transition probabilities
    • August
    • William DuMouchel and Matthius Schonlau. A Fast Computer Intrusion Detection Algorithm Based on Hypothesis Testing of Command Transition Probabilities, pages 189-193. The Fourth International Conference of Knowledge Discovery and Data Mining, August 1998.
    • (1998) The Fourth International Conference of Knowledge Discovery and Data Mining , pp. 189-193
    • DuMouchel, W.1    Schonlau, M.2
  • 8
    • 0041952823 scopus 로고    scopus 로고
    • A comparison of test statistics for computer intrusion detection based on principal components regression of transition probabilities
    • William DuMouchel and Matthius Schonlau. A Comparison of Test Statistics for Computer Intrusion Detection Based on Principal Components Regression of Transition Probabilities, pages 404-413. Proceedings of the 30th Symposium on the Interface: Computing Science and Statistics, 1999.
    • (1999) Proceedings of the 30th Symposium on the Interface: Computing Science and Statistics , pp. 404-413
    • DuMouchel, W.1    Schonlau, M.2
  • 10
    • 0345438685 scopus 로고    scopus 로고
    • ROC graphs: Notes and practical considerations for data mining researchers
    • Palo Alto, CA, Hewlett Packard
    • Tom Fawcett. ROC Graphs: Notes and Practical Considerations for Data Mining Researchers. Palo Alto, CA, 2003. Technical Report HPL-2003-4, Hewlett Packard.
    • (2003) Technical Report , vol.HPL-2003-4
    • Fawcett, T.1
  • 11
    • 0020083498 scopus 로고
    • The meaning and use of the area under the receiver operating characteristic curve
    • James A. Hanley and Barbara J. McNeil. The Meaning and Use of the Area Under the Receiver Operating Characteristic Curve. Radiology, 143(1):29-36, 1982.
    • (1982) Radiology , vol.143 , Issue.1 , pp. 29-36
    • Hanley, J.A.1    McNeil, B.J.2
  • 14
    • 0346076780 scopus 로고    scopus 로고
    • 'Fuzzy' vs. 'Non-fuzzy' in combining classifiers designed by boosting
    • Ludmila I. Kuncheva. 'Fuzzy' vs. 'Non-fuzzy' in Combining Classifiers Designed by Boosting. IEEE Transactions on Fuzzy Systems, 11(3):729-741, 2003.
    • (2003) IEEE Transactions on Fuzzy Systems , vol.11 , Issue.3 , pp. 729-741
    • Kuncheva, L.I.1
  • 17
    • 0037403516 scopus 로고    scopus 로고
    • Measures of diversity in classifier ensembles
    • Ludmila I. Kuncheva and C.J. Whitaker. Measures of Diversity in Classifier Ensembles. Machine Learning, 51:181-207, 2003.
    • (2003) Machine Learning , vol.51 , pp. 181-207
    • Kuncheva, L.I.1    Whitaker, C.J.2
  • 18
    • 84885774862 scopus 로고    scopus 로고
    • A framework for constructing features and models for intrusion detection systems
    • Wenke Lee and Salvatore J. Stolfo. A Framework for Constructing Features and Models for Intrusion Detection Systems. ACM Transactions on Information and System Security (TISSEC), 3(4):227-261, 2000.
    • (2000) ACM Transactions on Information and System Security (TISSEC) , vol.3 , Issue.4 , pp. 227-261
    • Lee, W.1    Stolfo, S.J.2
  • 20
    • 0141682928 scopus 로고    scopus 로고
    • Time-series novelty detection using one-class support vector machines
    • Portland, Oregon, July
    • Junshui Ma and Simon Perkins. Time-series Novelty Detection Using One-class Support Vector Machines. Portland, Oregon, July 2003. International Joint Conference on Neural Networks.
    • (2003) International Joint Conference on Neural Networks
    • Junshui, M.1    Perkins, S.2
  • 21
    • 0036630603 scopus 로고    scopus 로고
    • Areas beneath the Relative Operating Characteristics (ROC) and relative operating levels (ROC) curves: Statistical Significance and interpretation
    • S.J. Mason and N.E. Graham. Areas Beneath the Relative Operating Characteristics (ROC) and relative operating levels (ROC) curves: Statistical Significance and Interpretation. Quarterly Journal of the Royal Meteorological Society, 128:2145-2166, 2002.
    • (2002) Quarterly Journal of the Royal Meteorological Society , vol.128 , pp. 2145-2166
    • Mason, S.J.1    Graham, N.E.2
  • 28
    • 0034325396 scopus 로고    scopus 로고
    • Detecting masquerades in intrusion detection based on unpopular commands
    • Matthius Schonlau and Martin Theus. Detecting Masquerades in Intrusion Detection Based on Unpopular Commands. Information Processing Letters, 76(1-2):33-38, 2000.
    • (2000) Information Processing Letters , vol.76 , Issue.1-2 , pp. 33-38
    • Schonlau, M.1    Theus, M.2
  • 31
    • 0041965980 scopus 로고    scopus 로고
    • Cluster ensembles - A knowledge reuse framework for combining multiple partitions
    • December
    • Alexander Strehl and Joydeep Ghosh. Cluster Ensembles - A Knowledge Reuse Framework for Combining Multiple Partitions. Journal of Machine Learning Research, 3:583-617, December 2002.
    • (2002) Journal of Machine Learning Research , vol.3 , pp. 583-617
    • Strehl, A.1    Ghosh, J.2
  • 32
    • 15944400613 scopus 로고    scopus 로고
    • Recursive data mining for masquerade detection and author identification
    • West Point, NY, 9-11 June
    • Boleslaw K. Szymanski and Yongqiang Zhang. Recursive Data Mining for Masquerade Detection and Author Identification. West Point, NY, 9-11 June 2004. 3rd Annual IEEE Information Assurance Workshop.
    • (2004) 3rd Annual IEEE Information Assurance Workshop
    • Szymanski, B.K.1    Zhang, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.