Modeling, diagnostics, optimization, and control of internal combustion engines via modern machine learning techniques: A review and future directions
A critical review of the existing Internal Combustion Engine (ICE) modeling, optimization,
diagnosis, and control challenges and the promising state-of-the-art Machine Learning (ML) …
diagnosis, and control challenges and the promising state-of-the-art Machine Learning (ML) …
Statistical fraud detection: A review
RJ Bolton, DJ Hand - Statistical science, 2002 - projecteuclid.org
Fraud is increasing dramatically with the expansion of modern technology and the global
superhighways of communication, resulting in the loss of billions of dollars worldwide each …
superhighways of communication, resulting in the loss of billions of dollars worldwide each …
Meta-learning approaches for learning-to-learn in deep learning: A survey
Y Tian, X Zhao, W Huang - Neurocomputing, 2022 - Elsevier
Compared to traditional machine learning, deep learning can learn deeper abstract data
representation and understand scattered data properties. It has gained considerable …
representation and understand scattered data properties. It has gained considerable …
A survey of outlier detection methodologies
Outlier detection has been used for centuries to detect and, where appropriate, remove
anomalous observations from data. Outliers arise due to mechanical faults, changes in …
anomalous observations from data. Outliers arise due to mechanical faults, changes in …
A data mining framework for building intrusion detection models
There is often the need to update an installed intrusion detection system (IDS) due to new
attack methods or upgraded computing environments. Since many current IDSs are …
attack methods or upgraded computing environments. Since many current IDSs are …
[PDF][PDF] Data mining approaches for intrusion detection
In this paper we discuss our research in develo** general and systematic methods for
intrusion detection. The key ideas are to use data mining techniques to discover consistent …
intrusion detection. The key ideas are to use data mining techniques to discover consistent …
Adaptive fraud detection
T Fawcett, F Provost - Data mining and knowledge discovery, 1997 - Springer
One method for detecting fraud is to check for suspicious changes in user behavior. This
paper describes the automatic design of user profiling methods for the purpose of fraud …
paper describes the automatic design of user profiling methods for the purpose of fraud …
[PDF][PDF] AdaCost: misclassification cost-sensitive boosting
AdaCost, a variant of AdaBoost, is a misclassification cost-sensitive boosting method. It uses
the cost of misclassifications to update the training distribution on successive boosting …
the cost of misclassifications to update the training distribution on successive boosting …
Cost-based modeling for fraud and intrusion detection: Results from the JAM project
We describe the results achieved using the JAM distributed data mining system for the real
world problem of fraud detection in financial information systems. For this domain we …
world problem of fraud detection in financial information systems. For this domain we …
A framework for constructing features and models for intrusion detection systems
Intrusion detection (ID) is an important component of infrastructure protection mechanisms.
Intrusion detection systems (IDSs) need to be accurate, adaptive, and extensible. Given …
Intrusion detection systems (IDSs) need to be accurate, adaptive, and extensible. Given …