共 16 条
[1]
Amruthnath N, 2018, 2018 5TH INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND APPLICATIONS (ICIEA), P355, DOI 10.1109/IEA.2018.8387124
[2]
[Anonymous], 2019, INT J ENG ADV TECHNO
[3]
Balamurugan M, 2016, 2016 IEEE INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER APPLICATIONS (ICACA), P72, DOI 10.1109/ICACA.2016.7887926
[4]
Supervised Machine Learning Algorithms for Credit Card Fraudulent Transaction Detection: A Comparative Study
[J].
2018 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI),
2018,
:122-125
[5]
JIAN Z., 2010, 2010 INT C COMP APPL, V13
[6]
Kanawaday A, 2017, INT CONF SOFTW ENG, P87, DOI 10.1109/ICSESS.2017.8342870
[7]
Kou YG, 2017, 2017 INTERNATIONAL CONFERENCE ON SECURITY, PATTERN ANALYSIS, AND CYBERNETICS (SPAC), P684, DOI 10.1109/SPAC.2017.8304362
[8]
Kovacs L., 1999, 1999 European Control Conference (ECC). Proceedings, P4238
[9]
Mathew V., 2017, P 2017 IEEE INT C CI, P306
[10]
PATEL N., 2019, LECT NOTES NETWORKS, V55