Computer Science ›› 2021, Vol. 48 ›› Issue (5): 197-201.doi: 10.11896/jsjkx.200900043
• Artificial Intelligence • Previous Articles Next Articles
NING Ting, MIAO De-zhuang, DONG Qi-wen, LU Xue-song
CLC Number:
[1]FU K,CHENG D W,TU Y,et al.Credit Card Fraud Detection Using Convolutional Neural Networks[C] //International Conference on Neural Information Processing.Springer,Cham,2016:483-490. [2]CHEN Z Y.Zhulianbihe:Towards Network Credit Score Card Model based on Machine Learning [J].Wuhan Finance,2020(3):42-50. [3]PU Z.Towards Green Credit Risk Assessment Model of Listed Companies based on RF and Ensembling SVM [D].Shanghai:Shanghai Normal University,2019. [4]REN S P,PENG Y N.Default Risk Assessment of ConsumerCredit Based on Soft Voting Fusion Model [J].Financial Theory and Practice,2020(4):77-83. [5]CHENG H T,KOC L,HARMSEN J,et al.Wide & Deep lear-ning for recommender systems[C] //Deep Learning for Recommender Systems.2016:7-10. [6]YAO Z.Score Functions for Decision Tree Models [J].Journal of Management,2005(S2):166-168. [7]WEI L,SHUAI D,HAO W,et al.Heterogeneous ensemble learning with feature engineering for default prediction in peer-to-peer lending in China[J].World Wide Web,2020,23(1):23-45. [8]JEROME H.FRIEDMA N.Greedy Function Approximation:A Gradient Boosting Machine[J].The Annals of Statistics,2001,29(5):1189-1232. [9]CHEN T,GUESTRIN C.XGBoost:A Scalable Tree Boosting System[C]//Proceedings of the 22nd Sigkdd International Conference on Knowledge Discovery and Data Mining.2016:785-794. [10]LONG Z D.Towards Credit Risk Assessment of CommercialBanks based on BP Neural Network [D].Hubei:Hubei University of Technology,2018. [11]KVAMME H,SELLEREITE N,AAS K,et al.Predicting Mortgage Default using Convolutional Neural Networks[J].Expert Systems with Applications,2018,102:207-217. [12]WANG C,HAN D,LIU Q,et al.A Deep Learning Approach for Credit Scoring of Peer-to-peer Lending using Attention Mechanism LSTM[J].IEEE Access,2018(99):1-1. [13]ZHENG Z,YANG Y,NIU X,et al.Wide and Deep Convolutio-nal Neural Networks for Electricity-theft Detection to Secure Smart Grids[J].IEEE Transactions on Industrial Informatics,2017,14(4):1606-1615. [14]NIU M,CAI J.A Label Informative Wide & Deep Classifier for Patents and Papers[C] //In Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP).2019:3429-3434. [15]NGUYEN B P,PHAM H N,TRAN H,et al.Predicting the Onset of Type 2 Diabetes using Wide and Deep Learning with Electronic Health Records[J].Computer Methods and Programs in Biomedicine,2019,182:9. [16]BASTANI K,ASGARI E,NAMAVARI H.Wide and deeplearning for peer-to-peer lending[J].Expert Systems With Applications,2019,134:209-224. |
[1] | RAO Zhi-shuang, JIA Zhen, ZHANG Fan, LI Tian-rui. Key-Value Relational Memory Networks for Question Answering over Knowledge Graph [J]. Computer Science, 2022, 49(9): 202-207. |
[2] | LENG Dian-dian, DU Peng, CHEN Jian-ting, XIANG Yang. Automated Container Terminal Oriented Travel Time Estimation of AGV [J]. Computer Science, 2022, 49(9): 208-214. |
[3] | NING Han-yang, MA Miao, YANG Bo, LIU Shi-chang. Research Progress and Analysis on Intelligent Cryptology [J]. Computer Science, 2022, 49(9): 288-296. |
[4] | TANG Ling-tao, WANG Di, ZHANG Lu-fei, LIU Sheng-yun. Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy [J]. Computer Science, 2022, 49(9): 297-305. |
[5] | XU Yong-xin, ZHAO Jun-feng, WANG Ya-sha, XIE Bing, YANG Kai. Temporal Knowledge Graph Representation Learning [J]. Computer Science, 2022, 49(9): 162-171. |
[6] | LI Yao, LI Tao, LI Qi-fan, LIANG Jia-rui, Ibegbu Nnamdi JULIAN, CHEN Jun-jie, GUO Hao. Construction and Multi-feature Fusion Classification Research Based on Multi-scale Sparse Brain Functional Hyper-network [J]. Computer Science, 2022, 49(8): 257-266. |
[7] | WANG Jian, PENG Yu-qi, ZHAO Yu-fei, YANG Jian. Survey of Social Network Public Opinion Information Extraction Based on Deep Learning [J]. Computer Science, 2022, 49(8): 279-293. |
[8] | HAO Zhi-rong, CHEN Long, HUANG Jia-cheng. Class Discriminative Universal Adversarial Attack for Text Classification [J]. Computer Science, 2022, 49(8): 323-329. |
[9] | JIANG Meng-han, LI Shao-mei, ZHENG Hong-hao, ZHANG Jian-peng. Rumor Detection Model Based on Improved Position Embedding [J]. Computer Science, 2022, 49(8): 330-335. |
[10] | ZHANG Guang-hua, GAO Tian-jiao, CHEN Zhen-guo, YU Nai-wen. Study on Malware Classification Based on N-Gram Static Analysis Technology [J]. Computer Science, 2022, 49(8): 336-343. |
[11] | SUN Qi, JI Gen-lin, ZHANG Jie. Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection [J]. Computer Science, 2022, 49(8): 172-177. |
[12] | HE Qiang, YIN Zhen-yu, HUANG Min, WANG Xing-wei, WANG Yuan-tian, CUI Shuo, ZHAO Yong. Survey of Influence Analysis of Evolutionary Network Based on Big Data [J]. Computer Science, 2022, 49(8): 1-11. |
[13] | HOU Yu-tao, ABULIZI Abudukelimu, ABUDUKELIMU Halidanmu. Advances in Chinese Pre-training Models [J]. Computer Science, 2022, 49(7): 148-163. |
[14] | ZHOU Hui, SHI Hao-chen, TU Yao-feng, HUANG Sheng-jun. Robust Deep Neural Network Learning Based on Active Sampling [J]. Computer Science, 2022, 49(7): 164-169. |
[15] | SU Dan-ning, CAO Gui-tao, WANG Yan-nan, WANG Hong, REN He. Survey of Deep Learning for Radar Emitter Identification Based on Small Sample [J]. Computer Science, 2022, 49(7): 226-235. |
|