-
1
-
-
0016355478
-
A new look at the statistical model identification
-
H. Akaike, "A new look at the statistical model identification" , IEEE Transactions on Automatics Control, Vol. AC-19, No. 6., 1974.
-
(1974)
IEEE Transactions on Automatics Control
, vol.AC-19
, Issue.6
-
-
Akaike, H.1
-
2
-
-
0003857778
-
A Gentle tutorial of the EM algorithm and its application to parameter estimation for Gaussian Mixture and Hidden Markov Models
-
University of Berkeley, ICSI-TR-97-021
-
J. A., Bilmes, "A Gentle tutorial of the EM algorithm and its application to parameter estimation for Gaussian Mixture and Hidden Markov Models", Technical Report, University of Berkeley, ICSI-TR-97-021, 1998.
-
(1998)
Technical Report
-
-
Bilmes, J.A.1
-
3
-
-
0042421807
-
Statistical fraud detection: A review
-
R. J, Bolton, and D. J., Hand, "Statistical Fraud Detection: A Review", Statistical Science, Vol. 17., No. 3, 235-255, 2002.
-
(2002)
Statistical Science
, vol.17
, Issue.3
, pp. 235-255
-
-
Bolton, R.J.1
Hand, D.J.2
-
5
-
-
0041960000
-
Detecting fraud in the real world
-
J. Abello, P. M. Pardalos, and M. G. C. Resende, eds. Kluwer, Dordrecht
-
M. H., Cahill, D., Lambert, J. C., Pinheiro, and D. X., Sun, "Detecting fraud in the real world", In Handbook of Massive Datasets (J. Abello, P. M. Pardalos, and M. G. C. Resende, eds.) Kluwer, Dordrecht, 2002.
-
(2002)
Handbook of Massive Datasets
-
-
Cahill, M.H.1
Lambert, D.2
Pinheiro, J.C.3
Sun, D.X.4
-
6
-
-
21944445756
-
Visual data mining: Recognizing telephone calling fraud
-
K. C., Cox, S. G., Erick, and G. J., Wills, "Visual data mining: Recognizing telephone calling fraud", Data Mining and Knowledge Discovery 1, 225-231, 1997.
-
(1997)
Data Mining and Knowledge Discovery
, vol.1
, pp. 225-231
-
-
Cox, K.C.1
Erick, S.G.2
Wills, G.J.3
-
7
-
-
0002629270
-
Maximum Likelihood from incomplete data via the EM algorithm
-
A. P., Dempster, N. M., Laird, D. B., Rubin, "Maximum Likelihood from incomplete data via the EM algorithm", Journal Royal Statistics Society, Vol. 39, no. 1, 1-21, 1977.
-
(1977)
Journal Royal Statistics Society
, vol.39
, Issue.1
, pp. 1-21
-
-
Dempster, A.P.1
Laird, N.M.2
Rubin, D.B.3
-
8
-
-
0142080708
-
Call based fraud detection in Mobile communication networks using a hierarchical regime-switching model
-
M. Kearns, S. Solla and D. Cohn Eds "Advances in Neural information processing systems II", MIT Press. © 1998 MIT Press
-
J. Hollmen and V. Tresp, "Call based fraud detection in Mobile communication networks using a hierarchical regime-switching model", M. Kearns, S. Solla and D. Cohn (Eds) "Advances in Neural information processing systems II", Proceedings of the 1998 Conference (NIPS'II), pp. 889-895. MIT Press. © 1998 MIT Press, 1998.
-
(1998)
Proceedings of the 1998 Conference (NIPS'II)
, pp. 889-895
-
-
Hollmen, J.1
Tresp, V.2
-
9
-
-
84937064883
-
A learning vector quantization algorithm for probabilistic models
-
J. Hollmen, V. Tresp, and O. Simula, "A learning vector quantization algorithm for probabilistic models", In proceedings of EUSIPCO 2000 - X European Signal Processing Conference, Volume II, pp. 721-724, 2000.
-
(2000)
Proceedings of EUSIPCO 2000 - X European Signal Processing Conference
, vol.2
, pp. 721-724
-
-
Hollmen, J.1
Tresp, V.2
Simula, O.3
-
10
-
-
0003607151
-
-
Academic Press Inc. London Ltd
-
K. V., Mardia, J. T., Kent, J. M., Bibby, "Multivariate analysis", Academic Press Inc. (London) Ltd, 1979.
-
(1979)
Multivariate Analysis
-
-
Mardia, K.V.1
Kent, J.T.2
Bibby, J.M.3
-
11
-
-
84897890129
-
-
ACTS Mobile Summit, Grenada
-
Y., Moreau, B., Preneel, P., Burge, J., Shawe-Taylor, C., Stoermann, and C., Cooke, "Novel techniques for fraud detection in mobile communications", In ACTS Mobile Summit, Grenada, 1996.
-
(1996)
Novel Techniques for Fraud Detection in Mobile Communications
-
-
Moreau, Y.1
Preneel, B.2
Burge, P.3
Shawe-Taylor, J.4
Stoermann, C.5
Cooke, C.6
-
12
-
-
0029209272
-
Robust text-independent speaker identification using gaussian mixture speaker models
-
January
-
D. A., Reynolds, R. C., Rose, "Robust Text-Independent Speaker Identification Using Gaussian Mixture Speaker Models", IEEE Transactions on speech and audio processing, Vol. 3, No. 1, January 1995.
-
(1995)
IEEE Transactions on Speech and Audio Processing
, vol.3
, Issue.1
-
-
Reynolds, D.A.1
Rose, R.C.2
-
13
-
-
0042961665
-
Novel techniques for profiling and fraud detection in mobile telecommunications
-
P. J. G. Lisboa, A. Vellido and B. Edisbury, eds., World Scientific, Singapore
-
J., Shawe-Taylor, K., Howker, P., Gosset, M., Hyland, H., Verrelst, Y., Moreau, C., Stoermann, and P., Burge, "Novel techniques for profiling and fraud detection in mobile telecommunications", In Business Application of Neural Networks (P. J. G. Lisboa, A. Vellido and B. Edisbury, eds.) 113-139. World Scientific, Singapore, 2000.
-
(2000)
Business Application of Neural Networks
, pp. 113-139
-
-
Shawe-Taylor, J.1
Howker, K.2
Gosset, P.3
Hyland, M.4
Verrelst, H.5
Moreau, Y.6
Stoermann, C.7
Burge, P.8
-
14
-
-
0012282403
-
Computer intrusion: Detecting masquerades
-
M., Schonlau, W., Dumouchel, W.-H., Ju, A. F., Karr, M., Theus, and Y., Vardi, "Computer intrusion: Detecting masquerades", Statist. Sci., 16, 58-74, 2001
-
(2001)
Statist. Sci.
, vol.16
, pp. 58-74
-
-
Schonlau, M.1
Dumouchel, W.2
Ju, W.-H.3
Karr, A.F.4
Theus, M.5
Vardi, Y.6
-
17
-
-
84892142402
-
Fraud detection in communications networks using neural and probabilistic methods
-
M., Tanigushi, M., Haft, J., Hollmen, V., Tresp, "Fraud detection in communications networks using neural and probabilistic methods", Proceeding of the 1998 IEEE International Conference in Acoustics, Speech and Signal Processing (ICASSP'98), Volume II, 1241-44, 1998.
-
(1998)
Proceeding of the 1998 IEEE International Conference in Acoustics, Speech and Signal Processing (ICASSP'98)
, vol.2
, pp. 1241-1244
-
-
Tanigushi, M.1
Haft, M.2
Hollmen, J.3
Tresp, V.4
-
20
-
-
22044450174
-
Sequential activity profiling: Latent Dirichlet allocation of Markov Chains
-
M., Girolami, A., Kaban, "Sequential activity profiling: latent Dirichlet allocation of Markov Chains", Data Mining and Knowledge Discovery, 10, 175-196, 2005
-
(2005)
Data Mining and Knowledge Discovery
, vol.10
, pp. 175-196
-
-
Girolami, M.1
Kaban, A.2
-
21
-
-
67349097789
-
Designing an expert system for fraud detection in private telecommunication networks
-
C. S., Hilas, "Designing an expert system for fraud detection in private telecommunication networks", Expert Systems with Applications, 36, 11559-11569, 2009.
-
(2009)
Expert Systems with Applications
, vol.36
, pp. 11559-11569
-
-
Hilas, C.S.1
-
22
-
-
51149102669
-
An application of supervised and unsupervised learning approaches to telecommunication fraud detection
-
C. S., Hilas, P. A., Mastorocostas, "An application of supervised and unsupervised learning approaches to telecommunication fraud detection", Knowledge Based Systems, 21(7), 721-726, 2008.
-
(2008)
Knowledge Based Systems
, vol.21
, Issue.7
, pp. 721-726
-
-
Hilas, C.S.1
Mastorocostas, P.A.2
-
23
-
-
34447336373
-
Employing latent Dirichlet allocation for fraud detection in telecommunications
-
D., Xing, M., Girolami, "Employing latent Dirichlet allocation for fraud detection in telecommunications", Pattern Recognition Letters, 28, 1727-1734, 2007.
-
(2007)
Pattern Recognition Letters
, vol.28
, pp. 1727-1734
-
-
Xing, D.1
Girolami, M.2
-
24
-
-
57749116564
-
Fraud detection in telecommunication: A rough fuzzy set based approach
-
W., Xu, Y., Pang, J. Ma, S.-Y., Wang, G., Hao, S., Zeng, Y.-H., Qian, "Fraud detection in telecommunication: a rough fuzzy set based approach", In Proceedings of the Seventh International Conference on Machine Learning and Cybernetics, 2008.
-
(2008)
Proceedings of the Seventh International Conference on Machine Learning and Cybernetics
-
-
Xu, W.1
Pang, Y.2
Ma, J.3
Wang, S.-Y.4
Hao, G.5
Zeng, S.6
Qian, Y.-H.7
-
25
-
-
84884231934
-
Improved expectation maximization algorithm for gaussian mixed model using the kernel method
-
Article ID 757240, 2013
-
M. I. M. Yusoff, I. Mohamed and M. R. A. Bakar, "Improved Expectation Maximization Algorithm for Gaussian Mixed Model Using the Kernel Method", Mathematical Problems in Engineering, Volume 2013, Article ID 757240, 9 Pages, http://dx.doi.org/10.1155/2013/757240, 2013.
-
Mathematical Problems in Engineering
, vol.2013
, pp. 9
-
-
Yusoff, M.I.M.1
Mohamed, I.2
Bakar, M.R.A.3
-
26
-
-
0001091769
-
Automatic speaker recognition using gaussian mixed speaker models
-
D. A. Reynolds, "Automatic Speaker Recognition Using Gaussian Mixed Speaker Models", The Lincoln Laboratory Journal, Volume 8, No. 2, 1995.
-
(1995)
The Lincoln Laboratory Journal
, vol.8
, Issue.2
-
-
Reynolds, D.A.1
|