This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Altay, O. (2022). Performance of different KNN models in prediction English language readability. 2022 2nd International Conference on Computing and Machine Intelligence (ICMI), Istanbul, Turkey, pp. 1–5.AltayO.2022Performance of different KNN models in prediction English language readability2022 2nd International Conference on Computing and Machine Intelligence (ICMI)Istanbul, Turkey15Search in Google Scholar
Anupriya, E., Kumaresan, N., Suresh, S., Dhanasekaran, S., Ramprathap, K, and Chinnasamy, P. (2022). Fraud Account Detection on Social Network Using Machine Learning Techniques. 2022 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC), Bhubaneswar, India, pp. 1–4.AnupriyaE.KumaresanN.SureshS.DhanasekaranS.RamprathapKChinnasamyP.2022Fraud Account Detection on Social Network Using Machine Learning Techniques2022 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC)Bhubaneswar, India14Search in Google Scholar
Bao, J. (2020). Multi-features Based Arrhythmia Diagnosis Algorithm Using Xgboost. 2020 International Conference on Computing and Data Science (CDS), Stanford, CA, USA, pp. 454–457.BaoJ.2020Multi-features Based Arrhythmia Diagnosis Algorithm Using Xgboost2020 International Conference on Computing and Data Science (CDS)Stanford, CA, USA454457Search in Google Scholar
Bheemesh. R.K, and Deepa. N. (2023). Accurate SMS Spam Detection Using Support Vector Machine in Comparison with Logistic Regression. 2023 Eighth International Conference on Science Technology Engineering and Mathematics (ICONSTEM), Chennai, India, pp. 1–5.BheemeshR.KDeepaN.2023Accurate SMS Spam Detection Using Support Vector Machine in Comparison with Logistic Regression2023 Eighth International Conference on Science Technology Engineering and Mathematics (ICONSTEM)Chennai, India15Search in Google Scholar
Bindu, P., Mishra, R., and Thilagam, P.S. (2018). Discovering spammer communities in twitter. Journal of Intelligent Information Systems, vol. 51, no. 3, pp. 503–527.BinduP.MishraR.ThilagamP.S.2018Discovering spammer communities in twitterJournal of Intelligent Information Systems513503527Search in Google Scholar
Cao, N., Shi, C., Lin, S., Lu, J., Lin, Y.,-R., and Lin C,-Y. (2015). Targetvue: Visual analysis of anomalous user behaviors in online communication systems. IEEE Transactions on Visualization and Computer Graphics, vol. 22, no. 1, pp. 280–289.CaoN.ShiC.LinS.LuJ.LinY.,-R.LinC,-Y.2015Targetvue: Visual analysis of anomalous user behaviors in online communication systemsIEEE Transactions on Visualization and Computer Graphics221280289Search in Google Scholar
Chang, K.-C, and Fan, C.-P. (2019). Cost-Efficient Adaboost-based Face Detection with FPGA Hardware Accelerator. 2019 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW), Yilan, Taiwan, pp. 1–2.ChangK.-CFanC.-P.2019Cost-Efficient Adaboost-based Face Detection with FPGA Hardware Accelerator2019 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW)Yilan, Taiwan12Search in Google Scholar
Doss, L.M, and Gunasekaran, M. (2023). Evasion and Poison attacks on Logistic Regression-based Machine Learning Classification Model. 2023 Eighth International Conference on Science Technology Engineering and Mathematics (ICONSTEM), Chennai, India, pp. 1–8.DossL.MGunasekaranM.2023Evasion and Poison attacks on Logistic Regression-based Machine Learning Classification Model2023 Eighth International Conference on Science Technology Engineering and Mathematics (ICONSTEM)Chennai, India18Search in Google Scholar
Gonzalez, P.A. (2005). Fraud detection method for mobile telecommunication networks, EP.GonzalezP.A.2005Fraud detection method for mobile telecommunication networksEPSearch in Google Scholar
Gori, M., G. Monfardini, and F. Scarselli. (2005). A new model for learning in graph domains. in Proceedings. 2005 IEEE International Joint Conference on Neural Networks. IEEE.GoriM.MonfardiniG.ScarselliF.2005A new model for learning in graph domainsin Proceedings2005 IEEE International Joint Conference on Neural NetworksIEEESearch in Google Scholar
Gurajala, S., White, J., Hudson, H, and Matthews, J. (2016). Profile characteristics of fake Twitter accounts. Big Data Society, pp. 1–13.GurajalaS.WhiteJ.HudsonHMatthewsJ.2016Profile characteristics of fake Twitter accountsBig Data Society113Search in Google Scholar
Hairani, H., Anggrawan, A., Wathan, A.I., Latif, K.A., Marzuki, K, and Zulfikri, M. (2021). The Abstract of Thesis Classifier by Using Naive Bayes Method. 2021 International Conference on Software Engineering & Computer Systems and 4th International Conference on Computational Science and Information Management (ICSECS-ICOCSIM), Pekan, Malaysia, pp. 312–315.HairaniH.AnggrawanA.WathanA.I.LatifK.A.MarzukiKZulfikriM.2021The Abstract of Thesis Classifier by Using Naive Bayes Method2021 International Conference on Software Engineering & Computer Systems and 4th International Conference on Computational Science and Information Management (ICSECS-ICOCSIM)Pekan, Malaysia312315Search in Google Scholar
Indumathi, N., Ramalakshmi, R, and Ajith, V. (2021). Analysis of risk factors in the Firework Industries: Using Decision Tree Classifier. 2021 International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), Greater Noida, India, pp. 811–814.IndumathiN.RamalakshmiRAjithV.2021Analysis of risk factors in the Firework Industries: Using Decision Tree Classifier2021 International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)Greater Noida, India811814Search in Google Scholar
Juszczyszyn, K & Kolaczek, G. (2019). Complex Networks Monitoring and Security and Fraud Detection for Enterprises. 2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), pp. 124–125.JuszczyszynKKolaczekG.2019Complex Networks Monitoring and Security and Fraud Detection for Enterprises2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)124125Search in Google Scholar
Manjula Devi, C., Gobinath, A., Padma Priya, S., Adithiyaa, M., Chandru, M.K and Jothi, M. (2024). Next-Generation Anomaly Detection Framework Leveraging Artificial Intelligence for Proactive Credit Card Fraud Prevention and Risk Management. 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT), Kamand, India, pp. 1–6.Manjula DeviC.GobinathA.Padma PriyaS.AdithiyaaM.ChandruM.KJothiM.2024Next-Generation Anomaly Detection Framework Leveraging Artificial Intelligence for Proactive Credit Card Fraud Prevention and Risk Management2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)Kamand, India16Search in Google Scholar
Mishra, S., Mallick, R.K, and Gadanayak, D.A. (2020). Islanding Detection of Microgrid using EMD and Random Forest Classifier. 2020 International Conference on Computational Intelligence for Smart Power System and Sustainable Energy (CISPSSE), Keonjhar, India, pp. 1–5.MishraS.MallickR.KGadanayakD.A.2020Islanding Detection of Microgrid using EMD and Random Forest Classifier2020 International Conference on Computational Intelligence for Smart Power System and Sustainable Energy (CISPSSE)Keonjhar, India15Search in Google Scholar
Molloy, I., Chari, S., Finkler, U., Wiggerman, M., Jonker, C., Habeck, T., Park, Y., Jordens, F and Schaik, R. (2016). Graph analytics for realtime scoring of cross-channel transactional fraud,” in Proceedings of International Conference on Financial Cryptography and Data Security, pp. 22–40.MolloyI.ChariS.FinklerU.WiggermanM.JonkerC.HabeckT.ParkY.JordensFSchaikR.2016Graph analytics for realtime scoring of cross-channel transactional fraud,”inProceedings of International Conference on Financial Cryptography and Data Security2240Search in Google Scholar
Niu, K., Jiao, H., Deng, N., and Gao, Z. (2016). A Real-Time Fraud Detection Algorithm Based on Intelligent Scoring for the Telecom Industry. 2016 International Conference on Networking and Network Application(NaNA), Hakodate, pp. 303–306.NiuK.JiaoH.DengN.GaoZ.2016A Real-Time Fraud Detection Algorithm Based on Intelligent Scoring for the Telecom Industry2016 International Conference on Networking and Network Application(NaNA)Hakodate303306Search in Google Scholar
Park, N., et al. (2019). Estimating node importance in knowledge graphs using graph neural networks.” in Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining.ParkN.2019Estimating node importance in knowledge graphs using graph neural networks.”inProceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data MiningSearch in Google Scholar
Peng, L, and Lin, R. (2018). Fraud Phone Calls Analysis Based on Label Propagation Community Detection Algorithm. 2018 IEEE World Congress on Services, San Francisco, CA, 2018, pp. 23–24.PengLLinR.2018Fraud Phone Calls Analysis Based on Label Propagation Community Detection Algorithm2018 IEEE World Congress on Services, San FranciscoCA20182324Search in Google Scholar
Raman, R., Kumar, V., Pillai, B.G., Rabadiya, D., Divekar, R and Vachharajani, H. (2024). Detecting Credit Card Fraud: A Comparative Analysis of KNN, Random Forest, and Logistic Regression Methods. 2024 Second International Conference on Data Science and Information System (ICDSIS), Hassan, India, pp. 1–5.RamanR.KumarV.PillaiB.G.RabadiyaD.DivekarRVachharajaniH.2024Detecting Credit Card Fraud: A Comparative Analysis of KNN, Random Forest, and Logistic Regression Methods2024 Second International Conference on Data Science and Information System (ICDSIS)Hassan, India15Search in Google Scholar
Sahoo, P. K., Mishra, S., Panigrahi, R., Bhoi, A. K., & Barsocchi, P. (2022). An Improvised Deep-Learning-Based Mask R-CNN Model for Laryngeal Cancer Detection Using CT Images. Sensors, 22(22), 8834.SahooP. K.MishraS.PanigrahiR.BhoiA. K.BarsocchiP.2022An Improvised Deep-Learning-Based Mask R-CNN Model for Laryngeal Cancer Detection Using CT ImagesSensors22228834Search in Google Scholar
Shearer, C. (2000). The CRISP-DM model: The new blueprint for data mining,” J. Data Warehousing, vol. 5, no. 4, pp. 13–22.ShearerC.2000The CRISP-DM model: The new blueprint for data mining,”J. Data Warehousing541322Search in Google Scholar
Sheng, C and Yu, H. (2022). An optimized prediction algorithm based on XGBoost. 2022 International Conference on Networking and Network Applications (NaNA), Urumqi, China, pp. 1–6.ShengCYuH.2022An optimized prediction algorithm based on XGBoost2022 International Conference on Networking and Network Applications (NaNA)Urumqi, China16Search in Google Scholar
Smruthi, N. Harini. (2019). A Hybrid Scheme for Detecting Fake Accounts in Facebook. International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, 7:5S3.SmruthiN. Harini.2019A Hybrid Scheme for Detecting Fake Accounts in FacebookInternational Journal of Recent Technology and Engineering (IJRTE)ISSN: 2277-3878,75S3Search in Google Scholar
Tarmazakov, E, I. and Silnov, D, S. (2018). Modern approaches to prevent fraud in mobile communications networks. 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), Moscow and St. Petersburg, Russia. pp. 379–381.TarmazakovE. I.SilnovD. S.2018Modern approaches to prevent fraud in mobile communications networks2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)Moscow and St. Petersburg, Russia379381Search in Google Scholar
Teng, H., Wang, C., Yang, Q., Chen X, and Li, R. (2023). Leveraging Adversarial Augmentation on Imbalance Data for Online Trading Fraud Detection. in IEEE Transactions on Computational Social Systems.TengH.WangC.YangQ.ChenXLiR.2023Leveraging Adversarial Augmentation on Imbalance Data for Online Trading Fraud DetectioninIEEE Transactions on Computational Social SystemsSearch in Google Scholar
Thar, K.W and Wai, T.T. (2024). Machine Learning Based Predictive Modelling for Fraud Detection in Digital Banking. 2024 IEEE Conference on Computer Applications (ICCA), Yangon, Myanmar, pp. 1–5.TharK.WWaiT.T.2024Machine Learning Based Predictive Modelling for Fraud Detection in Digital Banking2024 IEEE Conference on Computer Applications (ICCA)Yangon, Myanmar15Search in Google Scholar
Vijay, V, and Verma, P. (2023). Variants of Naïve Bayes Algorithm for Hate Speech Detection in Text Documents. 2023 International Conference on Artificial Intelligence and Smart Communication (AISC), Greater Noida, India, pp. 18–21.VijayVVermaP.2023Variants of Naïve Bayes Algorithm for Hate Speech Detection in Text Documents2023 International Conference on Artificial Intelligence and Smart Communication (AISC)Greater Noida, India1821Search in Google Scholar
Xuan, S., et al. (2018). Random forest for credit card fraud detection. in 2018 IEEE 15th International Conference on Networking, Sensing and Control (ICNSC). IEEE.XuanS.2018Random forest for credit card fraud detectionin2018 IEEE 15th International Conference on Networking, Sensing and Control (ICNSC)IEEESearch in Google Scholar
Yulita, I.N., Paulus, E., Sholahuddin, A, and Novita, D. (2021). AdaBoost Support Vector Machine Method for Human Activity Recognition. 2021 International Conference on Artificial Intelligence and Big Data Analytics, Bandung, Indonesia, pp. 1–4.YulitaI.N.PaulusE.SholahuddinANovitaD.2021AdaBoost Support Vector Machine Method for Human Activity Recognition2021 International Conference on Artificial Intelligence and Big Data AnalyticsBandung, Indonesia14Search in Google Scholar
Zhao, M, and Song, H. (2022). Semantic Analysis based on Artificial Intelligence—Prediction of Telecom Fraud. 2022 4th International Conference on Frontiers Technology of Information and Computer (ICFTIC), Qingdao, China, pp. 924–927.ZhaoMSongH.2022Semantic Analysis based on Artificial Intelligence—Prediction of Telecom Fraud2022 4th International Conference on Frontiers Technology of Information and Computer (ICFTIC)Qingdao, China924927Search in Google Scholar
Zhong, R., Dong, X., Lin, R. and Zou, H. (2019). An Incremental Identification Method for Fraud Phone Calls Based on Broad Learning System. 2019 IEEE 19th International Conference on Communication Technology (ICCT), Xi’an, China, pp. 1306–1310.ZhongR.DongX.LinR.ZouH.2019An Incremental Identification Method for Fraud Phone Calls Based on Broad Learning System2019 IEEE 19th International Conference on Communication Technology (ICCT), Xi’anChina13061310Search in Google Scholar
Zhou, J et al. (2023). FraudAuditor: A Visual Analytics Approach for Collusive Fraud in Health Insurance. in IEEE Transactions on Visualization and Computer Graphics.ZhouJ2023FraudAuditor: A Visual Analytics Approach for Collusive Fraud in Health InsuranceinIEEE Transactions on Visualization and Computer GraphicsSearch in Google Scholar
Zulfikar, W.B., Gerhana, Y.A, and Rahmania, A.F. (2018). An Approach to Classify Eligibility Blood Donors Using Decision Tree and Naive Bayes Classifier. 2018 6th International Conference on Cyber and IT Service Management (CITSM), Parapat, Indonesia, pp. 1–5.ZulfikarW.B.GerhanaY.ARahmaniaA.F.2018An Approach to Classify Eligibility Blood Donors Using Decision Tree and Naive Bayes Classifier2018 6th International Conference on Cyber and IT Service Management (CITSM)Parapat, Indonesia15Search in Google Scholar