共 31 条
[1]
True cost of fraud study: Financial services and lending, Lexisnexis Risk Solutions, (2020)
[2]
Carlini N., Wagner D., Kantchelian A., Adversarial examples are not easily detected: Bypassing ten detection methods, Proceedings of the 10Th ACM Workshop on Artificial Intelligence and Security (, pp. 3-14, (2017)
[3]
Bhattacharyya S., Jha S., Tharakunnel K., Westland J.C., Data mining for credit card fraud: a comparative study, Decis Support Syst, 50, 3, pp. 602-613, (2011)
[4]
Chandola V., Banerjee A., Kumar V., Anomaly detection: a survey, ACM Comput Surv (CSUR), 41, 3, pp. 1-58, (2009)
[5]
Biggio B., Nelson B., Laskov P., Poisoning attacks against support vector machines, Proceedings of the 29Th International Conference on Machine Learning, (2012)
[6]
Dietterich T.G., Ensemble methods in machine learning, International Workshop on Multiple Classifier Systems, pp. 1-15, (2000)
[7]
Breiman L., Bagging predictors, Mach Learn, 24, 2, pp. 123-140, (1996)
[8]
Freund Y., Schapire R.E., A decision-theoretic generalization of on-line learning and an application to boosting, J Comput Syst Sci, 55, 1, pp. 119-139, (1997)
[9]
Breiman L., Random forests, Mach Learn, 45, 1, pp. 5-32, (2001)
[10]
Wolpert D.H., Stacked generalization, Neural Netw, 5, 2, pp. 241-259, (1992)