Computer Science ›› 2016, Vol. 43 ›› Issue (10): 145-149.doi: 10.11896/j.issn.1002-137X.2016.10.027
Previous Articles Next Articles
DONG Ya-nan, LIU Xue-jun and LI Bin
[1] Chen Shi-guo,Zhang Dao-qiang.Experimental Comparisons of Semi-Supervised Dimensional Reduction Methods[J].Journal of Software,2011,2(1):28-43(in Chinese) 陈诗国,张道强.半监督降维方法的实验比较[J].软件学报,2011,22(1):28-43 [2] Haddadi H.Fighting online click-fraud using bluff ads[J].ACM SIGCOMM Computer Communication Review,2010,0(2):21-25 [3] Tuzhilin A.The Lane’s Gifts v.Google Report[EB/OL].2006[2013-03-01].http://googleblog.blogspot.com/pdf/Tuzh-ilin-Report.pdf [4] Qin Chao.Visitor action analyzing system for electronic business website[D].Shanghai:Shanghai Jiao Tong University,2006(in Chinese) 秦超.电子商务网站访客行为分析系统[D].上海:上海交通大学,2006 [5] Perera K S,Neupane B,Faisal M A,et al.A Novel Ensemble Learning-Based Approach for Click Fraud Detection in Mobile Advertising[M]∥Mining Intelligence and Knowledge Exploration.Springer International Publishing,2013:370-382 [6] Immorlica N,Jain K,Mahdian M,et al.Click Fraud ResistantMethods for Learning Click-Through Rates[C]∥Proceedings of the Workshop on Internet and Network Economics.Berlin Heidelberg:Springer,2005:34-45 [7] Oentaryo R,Lim E P,Finegold M,et al.Detecting Click Fraud in Online Advertising:A Data Mining Approach[J].Journal of Machine Learning Research,2014,14(1):99-140 [8] Hager M,Landergren T.Implementing best practices for frauddetection on an online advertising platform [D].Gothenburg:Chalmers University of Technology,2010 [9] Sergios T,Konstantinos K.Pattern recognition(2nd ed)[M].Salt Lake City:Elsevier Academic Press,1999 [10] Chang C C,Lin C J.LIBSVM:A library for support vector machines[C]∥ACM Transactions on Intelligent Systems and Technology.2011:389-396 [11] Ravisankar P,Ravi V,Raghava Rao G,et al.Detection of financial statement fraud and feature selection using data mining techniques[J].Decision Support Systems,2011,50(2):491-500 [12] Cortes C,Vapnik V.Support vector networks [J].MachineLearning,1995,20(3):273-297 [13] Zhang Yi-rong,Xian Ming,Xiao Shun-ping,et al.An Anomaly Intrusion Detection Technique of Support Vector Machine Based on Rough Set Attribute Reduction[J].Computer Science,2006,33(6):64-68(in Chinese) 张义荣,鲜明,肖顺平,等.一种基于粗糙集属性约简的支持向量异常入侵检测方法[J].计算机科学,2006,33(6):64-68 [14] Chang C C,Lin C J.LIBSVM:a library for support vector machines[J].ACM Transactions on Intelligent & Technology,2011,2(3):389-396 |
No related articles found! |
|