Følg
Kok-Chin Khor
Tittel
Sitert av
Sitert av
År
A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection
KC Khor, CY Ting, S Phon-Amnuaisuk
Applied Intelligence 36, 320-329, 2012
972012
A multiple classifiers system for anomaly detection in credit card data with unbalanced and overlapped classes
SN Kalid, KH Ng, GK Tong, KC Khor
IEEE access 8, 28210-28221, 2020
712020
From feature selection to building of bayesian classifiers: A network intrusion detection perspective
KC Khor, CY Ting, SP Amnuaisuk
American Journal of applied sciences 6 (11), 1948, 2009
422009
A feature selection approach for network intrusion detection
KC Khor, CY Ting, SP Amnuaisuk
2009 international conference on information management and engineering, 133-137, 2009
252009
Price prediction using time-series algorithms for stocks listed on bursa malaysia
YT Choy, MH Hoo, KC Khor
2021 2nd international conference on artificial intelligence and data …, 2021
182021
The effectiveness of sampling methods for the imbalanced network intrusion detection data set
KC Khor, CY Ting, S Phon-Amnuaisuk
Recent Advances on Soft Computing and Data Mining: Proceedings of The First …, 2014
182014
A Bayesian approach to classify conference papers
KC Khor, CY Ting
Mexican International Conference on Artificial Intelligence, 1027-1036, 2006
142006
Comparing single and multiple Bayesian classifiers approaches for network intrusion detection
KC Khor, CY Ting, S Phon-Amnuaisuk
2010 Second International Conference on Computer Engineering and …, 2010
132010
StockProF: a stock profiling framework using data mining approaches
KH Ng, KC Khor
Information Systems and e-Business Management 15, 139-158, 2017
122017
Forming an optimal feature set for classifying network intrusions involving multiple feature selection methods
KC Khor, CY Ting, SP Amnuaisuk
2010 International Conference on Information Retrieval & Knowledge …, 2010
102010
The effect of sampling methods on the CICIDS2017 network intrusion data set
YB Ho, WS Yap, KC Khor
IT Convergence and Security: Proceedings of ICITCS 2021, 33-41, 2021
92021
Dimensionality reduction for predicting student performance in unbalanced data sets
TW Lim, KC Khor, KH Ng
Int. J. Advance Soft Compu. Appl 11 (2), 76-87, 2019
92019
A probabilistic approach for network intrusion detection
KC Khor, CY Ting, SP Amnuaisuk
2008 Second Asia International Conference on Modelling & Simulation (AMS …, 2008
92008
Detecting frauds and payment defaults on credit card data inherited with imbalanced class distribution and overlapping class problems: A systematic review
SN Kalid, KC Khor, KH Ng, GK Tong
IEEE Access 12, 23636-23652, 2024
82024
Autoencoders with Reconstruction Error and Dimensionality Reduction for Credit Card Fraud Detection
N Rosley, GK Tong, KH Ng, SN Kalid, KC Khor
International Conference on Computer, Information Technology and Intelligent …, 2022
82022
Profiling and Identifying Smurfs or Boosters on Dota 2 Using K-Means and IQR
YJ Ding, WS Yap, KC Khor
IEEE Transactions on Games 16 (3), 577-585, 2023
62023
Object Detection and Recognition for Visually Impaired Users: A Transfer Learning Approach
WC Won, YL Yong, KC Khor
2021 2nd International Conference on Artificial Intelligence and Data …, 2021
62021
Virtual musical instruments: air drums
S Phon-Amnuaisuk, K Rezahanjani, HR Momeni, K Khor
Proceedings of the Sixth International Conference on Information Technology …, 2009
62009
Automating conference paper assignment using classification algorithms incorporated with tf-idf vectorisation
SCH Ngan, MJ Lee, KC Khor
2023 IEEE Symposium on Industrial Electronics & Applications (ISIEA), 1-6, 2023
52023
Transfer learning on inception ResNet V2 for expiry reminder: a mobile application development
WY Ong, CW Too, KC Khor
Mobile Web and Intelligent Information Systems: 17th International …, 2021
42021
Systemet kan ikke utføre handlingen. Prøv på nytt senere.
Artikler 1–20