Author of the publication

Leveraging Adversarial Augmentation on Imbalance Data for Online Trading Fraud Detection.

, , , , and . IEEE Trans. Comput. Soc. Syst., 11 (2): 1602-1614 (April 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research on Automatic Fuzzy Ontology Generation from Fuzzy Context, , , and . ICICTA '09: Proceedings of the 2009 Second International Conference on Intelligent Computation Technology and Automation, page 764--767. Washington, DC, USA, IEEE Computer Society, (2009)Evolving Quantum Oracles with Hybrid Quantum-inspired Evolutionary Algorithm, , and . arXiv, (13 October 2008)arXiv:quant-ph/0610105 v1.Minimizing Area Cost of On-Chip Cache Memories by Caching Address Tags., , and . IEEE Trans. Computers, 46 (11): 1187-1201 (1997)TEA: Transmission Error Approximation for Distance Estimation between Two Zigbee Devices., , , and . IWNAS, page 15-22. IEEE Computer Society, (2006)A Parallelized Algorithm for the All-Row Preconditioned Interval Newton/Generalized Bisection Method., , , and . PPSC, page 205-209. SIAM, (1991)The Realization Methods of PC Cluster Experimental Platform in Linux., , and . GCC (1), volume 3032 of Lecture Notes in Computer Science, page 251-254. Springer, (2003)NeuralWalk: Trust Assessment in Online Social Networks with Neural Networks., , and . INFOCOM, page 1999-2007. IEEE, (2019)Jamming and anti-jamming techniques in wireless networks: a survey., , and . Int. J. Ad Hoc Ubiquitous Comput., 17 (4): 197-215 (2014)Single Image Rain Removal Based on Deep Learning and Symmetry Transform., , , and . Symmetry, 12 (2): 224 (2020)Segmentation of heterogeneous blob objects through voting and level set formulation., , and . Pattern Recognit. Lett., 28 (13): 1781-1787 (2007)