How complex is your classification problem? a survey on measuring classification complexity
Characteristics extracted from the training datasets of classification problems have proven to
be effective predictors in a number of meta-analyses. Among them, measures of …
be effective predictors in a number of meta-analyses. Among them, measures of …
An overview of ensemble methods for binary classifiers in multi-class problems: Experimental study on one-vs-one and one-vs-all schemes
Classification problems involving multiple classes can be addressed in different ways. One
of the most popular techniques consists in dividing the original data set into two-class …
of the most popular techniques consists in dividing the original data set into two-class …
Autoencoder-based deep metric learning for network intrusion detection
Nowadays intrusion detection systems are a mandatory weapon in the war against the ever-
increasing amount of network cyber attacks. In this study we illustrate a new intrusion …
increasing amount of network cyber attacks. In this study we illustrate a new intrusion …
GAN augmentation to deal with imbalance in imaging-based intrusion detection
Nowadays attacks on computer networks continue to advance at a rate outpacing cyber
defenders' ability to write new attack signatures. This paper illustrates a deep learning …
defenders' ability to write new attack signatures. This paper illustrates a deep learning …
Mixture of experts: a literature survey
Mixture of experts (ME) is one of the most popular and interesting combining methods, which
has great potential to improve performance in machine learning. ME is established based on …
has great potential to improve performance in machine learning. ME is established based on …
Financial credit risk assessment: a recent review
N Chen, B Ribeiro, A Chen - Artificial Intelligence Review, 2016 - Springer
The assessment of financial credit risk is an important and challenging research topic in the
area of accounting and finance. Numerous efforts have been devoted into this field since the …
area of accounting and finance. Numerous efforts have been devoted into this field since the …
[HTML][HTML] Deep face recognition using imperfect facial data
Today, computer based face recognition is a mature and reliable mechanism which is being
practically utilised for many access control scenarios. As such, face recognition or …
practically utilised for many access control scenarios. As such, face recognition or …
On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on intrusion detection systems
Security policies of information systems and networks are designed for maintaining the
integrity of both the confidentiality and availability of the data for their trusted users …
integrity of both the confidentiality and availability of the data for their trusted users …
Development of a 10-m resolution maize and soybean map over China: Matching satellite-based crop classification with sample-based area estimation
Spatially explicit information on crop distribution is essential for market information, food
security, and agricultural sustainability. However, high-resolution crop maps are unavailable …
security, and agricultural sustainability. However, high-resolution crop maps are unavailable …
Intelligent fault diagnosis of roller bearings with multivariable ensemble-based incremental support vector machine
XL Zhang, BJ Wang, XF Chen - Knowledge-Based Systems, 2015 - Elsevier
Since roller bearings are the key components in rotating machinery, detecting incipient
failure occurring in bearings is an essential attempt to assure machinery operational safety …
failure occurring in bearings is an essential attempt to assure machinery operational safety …