共 15 条
[1]
[Anonymous], 2019, BEIJING BUSINESS TOD
[2]
Awoyemi JO, 2017, PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON COMPUTING NETWORKING AND INFORMATICS (ICCNI 2017)
[4]
Research of The Electronic Commerce Information Security Technology
[J].
PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION,
2009,
:124-126
[5]
Borderline-SMOTE: A new over-sampling method in imbalanced data sets learning
[J].
ADVANCES IN INTELLIGENT COMPUTING, PT 1, PROCEEDINGS,
2005, 3644
:878-887
[6]
Kooistra J., 2019, Newzoo's trends to watch in 2019
[7]
Lee N, 2017, INT WORKSH INF SEC A INT WORKSH INF SEC A, P297
[8]
Lemaître G, 2017, J MACH LEARN RES, V18
[9]
Ma C.-M., 2014, J APPL SCI, V14, P171, DOI DOI 10.3923/jas.2014.171.176
[10]
Malini N., 2017, 2017 Third International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB). Proceedings, P255, DOI 10.1109/AEEICB.2017.7972424