Author of the publication

Internet Financial Fraud Detection Based on a Distributed Big Data Approach With Node2vec.

, , , , , and . IEEE Access, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Offline Signature Verification Using Local Features and Decision Trees., , , and . IJPRAI, 31 (3): 1753001:1-1753001:31 (2017)Deep Learning Network Intrusion Detection Based on Network Traffic., , , , , , , , and . ICAIS (3), volume 13340 of Lecture Notes in Computer Science, page 194-207. Springer, (2022)Geo-BERT Pre-training Model for Query Rewriting in POI Search., , , and . EMNLP (Findings), page 2209-2214. Association for Computational Linguistics, (2021)The Optimization of DNA Encodings Based on GAFSA/GA Algorithm., , , and . BIC-TA, volume 212 of Advances in Intelligent Systems and Computing, page 81-88. Springer, (2013)Fusion of features and classifiers for off-line handwritten signature verification., and . ACPR, page 174-178. IEEE, (2011)Matrix Representation of Parallel Computation for Spiking Neural P Systems., , , , , and . BIC-TA (1), volume 681 of Communications in Computer and Information Science, page 187-199. Springer, (2016)A Survey of Parallel Clustering Algorithms Based on Spark., and . Sci. Program., (2020)Topic Modeling for Large-Scale Multimedia Analysis and Retrieval., , , and . Big Data - Algorithms, Analytics, and Applications, Chapman and Hall/CRC, (2015)An Editable k-Nearest Neighbor Classifier Based on Tissue-Like P Systems., , , , , and . BIC-TA, volume 1363 of Communications in Computer and Information Science, page 596-610. Springer, (2020)Behavior Modeling for Point of Interest Search., , , , , , , , , and . SIGIR, page 1843-1847. ACM, (2023)