-
1
-
-
33645782918
-
Statistical modeling of biomedical corpora: Mining the Caenorhabditis genetic center bibliography for genes related to life span
-
D.M. Blei, K. Franks, M.I. Jordan, and I.S. Mian Statistical modeling of biomedical corpora: mining the Caenorhabditis genetic center bibliography for genes related to life span BMC Bioinformatics 7 1 2006
-
(2006)
BMC Bioinformatics
, vol.7
, Issue.1
-
-
Blei, D.M.1
Franks, K.2
Jordan, M.I.3
Mian, I.S.4
-
3
-
-
0042421807
-
Statistical fraud detection: A review
-
R.J. Bolton, and D.J. Hand Statistical fraud detection: a review Statistical Science 17 3 2002 235 255
-
(2002)
Statistical Science
, vol.17
, Issue.3
, pp. 235-255
-
-
Bolton, R.J.1
Hand, D.J.2
-
4
-
-
0031362016
-
Fraud detection and management in mobile telecommunications networks
-
IEEE
-
P. Burge, J. Shawe-Taylor, C. Cooke, Y. Moreau, B. Preneel, C. Stoermann, Fraud detection and management in mobile telecommunications networks, in: Proceedings of the European Conference on Security and Detection ECOS 97, No. 437, IEEE, 1997, pp. 91-96.
-
(1997)
Proceedings of the European Conference on Security and Detection ECOS 97
, vol.437
, pp. 91-96
-
-
Burge, P.1
Shawe-Taylor, J.2
Cooke, C.3
Moreau, Y.4
Preneel, B.5
Stoermann, C.6
-
7
-
-
0345438685
-
ROC graphs: Notes and practical considerations for data mining researchers
-
HP Labs
-
T. Fawcett, ROC graphs: notes and practical considerations for data mining researchers, Tech. Rep., HPL-2003-4, HP Labs, 2003.
-
(2003)
Tech. Rep., HPL-2003-4
-
-
Fawcett, T.1
-
9
-
-
0036896227
-
On choosing and bounding probability metrics
-
A.L. Gibbs, and F.E. Su On choosing and bounding probability metrics International Statistical Review 70 3 2002 419 435
-
(2002)
International Statistical Review
, vol.70
, Issue.3
, pp. 419-435
-
-
Gibbs, A.L.1
Su, F.E.2
-
10
-
-
22044450174
-
Sequential activity profiling: Latent dirichlet allocation of Markov chains
-
DOI 10.1007/s10618-005-0362-2
-
M. Girolami, and A. Kaban Sequential activity profiling: latent Dirichlet allocation of Markov chains Data Mining and Knowledge Discovery 10 2005 175 196 (Pubitemid 40963393)
-
(2005)
Data Mining and Knowledge Discovery
, vol.10
, Issue.3
, pp. 175-196
-
-
Girolami, M.1
Kaban, A.2
-
11
-
-
0345414074
-
An efficient image similarity measure based on approximations of KL-divergence between two Gaussian mixtures
-
J. Goldberger, S. Gordon, H. Greenspan, An efficient image similarity measure based on approximations of KL-divergence between two Gaussian mixtures, in: Proceedings of the Ninth IEEE International Conference on Computer Vision, vol. 1, 2003, pp. 487-493.
-
(2003)
Proceedings of the Ninth IEEE International Conference on Computer Vision
, vol.1
, pp. 487-493
-
-
Goldberger, J.1
Gordon, S.2
Greenspan, H.3
-
12
-
-
34547516258
-
Approximating the Kullback Leibler divergence between Gaussian mixture models
-
J.R. Hershey, P.A. Olsen, Approximating the Kullback Leibler divergence between Gaussian mixture models, in: IEEE International Conference on Acoustics Speech and Signal Processing ICASSP 07, vol. 4, 2007, pp. 317-320.
-
(2007)
IEEE International Conference on Acoustics Speech and Signal Processing ICASSP 07
, vol.4
, pp. 317-320
-
-
Hershey, J.R.1
Olsen, P.A.2
-
13
-
-
67349097789
-
Designing an expert system for fraud detection in private telecommunications networks
-
C.S. Hilas Designing an expert system for fraud detection in private telecommunications networks Expert Systems with Applications 36 2009 11559 11569
-
(2009)
Expert Systems with Applications
, vol.36
, pp. 11559-11569
-
-
Hilas, C.S.1
-
14
-
-
51149102669
-
An application of supervised and unsupervised learning approaches to telecommunications fraud detection
-
C.S. Hilas, and P.A. Mastorocostas An application of supervised and unsupervised learning approaches to telecommunications fraud detection Knowledge-Based Systems 21 7 2008 721 726
-
(2008)
Knowledge-Based Systems
, vol.21
, Issue.7
, pp. 721-726
-
-
Hilas, C.S.1
Mastorocostas, P.A.2
-
15
-
-
2942674608
-
Survey of fraud detection techniques
-
Y. Kou, C.-T. Lu, S. Sinvongwattana, Y.-P. Huang, Survey of fraud detection techniques, in: Proceedings of the 2004 IEEE International Conference on Networking, Sensing & Control, 2004.
-
(2004)
Proceedings of the 2004 IEEE International Conference on Networking, Sensing & Control
-
-
Kou, Y.1
Lu, C.-T.2
Sinvongwattana, S.3
Huang, Y.-P.4
-
17
-
-
79957443880
-
Grammatical error simulation for computer-assisted language learning
-
S. Lee, J. Lee, H. Noh, K. Lee, and G.G. Lee Grammatical error simulation for computer-assisted language learning Knowledge-Based Systems 24 6 2011 868 876
-
(2011)
Knowledge-Based Systems
, vol.24
, Issue.6
, pp. 868-876
-
-
Lee, S.1
Lee, J.2
Noh, H.3
Lee, K.4
Lee, G.G.5
-
18
-
-
78650819842
-
A support vector machine-based model for detecting top management fraud
-
P.-F. Pai, M.-F. Hsu, and M.-C. Wang A support vector machine-based model for detecting top management fraud Knowledge-Based Systems 24 2 2011 314 321
-
(2011)
Knowledge-Based Systems
, vol.24
, Issue.2
, pp. 314-321
-
-
Pai, P.-F.1
Hsu, M.-F.2
Wang, M.-C.3
-
19
-
-
84856043672
-
A mathematical theory of communication
-
623-656
-
C.E. Shannon A mathematical theory of communication The Bell System Technical Journal 27 1948 379 423 623-656
-
(1948)
The Bell System Technical Journal
, vol.27
, pp. 379-423
-
-
Shannon, C.E.1
-
20
-
-
84892142402
-
Fraud detection in communications networks using neural and probabilistic methods
-
M. Taniguchi, M. Haft, J. Hollmen, V. Tresp, Fraud detection in communications networks using neural and probabilistic methods, in: IEEE International Conference on Acoustics Speech and Signal Processing ICASSP 98, IEEE, vol. 2, 1998, pp. 1241-1244.
-
(1998)
IEEE International Conference on Acoustics Speech and Signal Processing ICASSP 98, IEEE
, vol.2
, pp. 1241-1244
-
-
Taniguchi, M.1
Haft, M.2
Hollmen, J.3
Tresp, V.4
-
21
-
-
34447336373
-
Employing Latent Dirichlet Allocation for fraud detection in telecommunications
-
DOI 10.1016/j.patrec.2007.04.015, PII S016786550700147X
-
D. Xing, and M. Girolami Employing latent Dirichlet allocation for fraud detection in telecommunications Pattern Recognition Letters 28 2007 1727 1734 (Pubitemid 47058626)
-
(2007)
Pattern Recognition Letters
, vol.28
, Issue.13
, pp. 1727-1734
-
-
Xing, D.1
Girolami, M.2
-
22
-
-
57749116564
-
Fraud detection in telecommunication: A rough fuzzy set based approach
-
W. Xu, Y. Pang, J. Ma, S.-Y. Wang, G. Hao, S. Zeng, Y.-H. Qian, Fraud detection in telecommunication: a rough fuzzy set based approach, in: Proceedings of the Seventh International Conference on Machine Learning and Cybernetics, 2008.
-
(2008)
Proceedings of the Seventh International Conference on Machine Learning and Cybernetics
-
-
Xu, W.1
Pang, Y.2
Ma, J.3
Wang, S.-Y.4
Hao, G.5
Zeng, S.6
Qian, Y.-H.7
|