Modeling, diagnostics, optimization, and control of internal combustion engines via modern machine learning techniques: A review and future directions

M Aliramezani, CR Koch, M Shahbakhti - Progress in Energy and …, 2022 - Elsevier
A critical review of the existing Internal Combustion Engine (ICE) modeling, optimization,
diagnosis, and control challenges and the promising state-of-the-art Machine Learning (ML) …

Statistical fraud detection: A review

RJ Bolton, DJ Hand - Statistical science, 2002 - projecteuclid.org
Fraud is increasing dramatically with the expansion of modern technology and the global
superhighways of communication, resulting in the loss of billions of dollars worldwide each …

Meta-learning approaches for learning-to-learn in deep learning: A survey

Y Tian, X Zhao, W Huang - Neurocomputing, 2022 - Elsevier
Compared to traditional machine learning, deep learning can learn deeper abstract data
representation and understand scattered data properties. It has gained considerable …

A survey of outlier detection methodologies

V Hodge, J Austin - Artificial intelligence review, 2004 - Springer
Outlier detection has been used for centuries to detect and, where appropriate, remove
anomalous observations from data. Outliers arise due to mechanical faults, changes in …

A data mining framework for building intrusion detection models

W Lee, SJ Stolfo, KW Mok - … of the 1999 IEEE Symposium on …, 1999 - ieeexplore.ieee.org
There is often the need to update an installed intrusion detection system (IDS) due to new
attack methods or upgraded computing environments. Since many current IDSs are …

[PDF][PDF] Data mining approaches for intrusion detection

W Lee, S Stolfo - 1998 - usenix.org
In this paper we discuss our research in develo** general and systematic methods for
intrusion detection. The key ideas are to use data mining techniques to discover consistent …

Adaptive fraud detection

T Fawcett, F Provost - Data mining and knowledge discovery, 1997 - Springer
One method for detecting fraud is to check for suspicious changes in user behavior. This
paper describes the automatic design of user profiling methods for the purpose of fraud …

[PDF][PDF] AdaCost: misclassification cost-sensitive boosting

W Fan, SJ Stolfo, J Zhang, PK Chan - Icml, 1999 - ids.cs.columbia.edu
AdaCost, a variant of AdaBoost, is a misclassification cost-sensitive boosting method. It uses
the cost of misclassifications to update the training distribution on successive boosting …

Cost-based modeling for fraud and intrusion detection: Results from the JAM project

SJ Stolfo, W Fan, W Lee… - Proceedings DARPA …, 2000 - ieeexplore.ieee.org
We describe the results achieved using the JAM distributed data mining system for the real
world problem of fraud detection in financial information systems. For this domain we …

A framework for constructing features and models for intrusion detection systems

W Lee, SJ Stolfo - ACM transactions on Information and system security …, 2000 - dl.acm.org
Intrusion detection (ID) is an important component of infrastructure protection mechanisms.
Intrusion detection systems (IDSs) need to be accurate, adaptive, and extensible. Given …