Author of the publication

Detecting the financial statement fraud: The analysis of the differences between data mining techniques and experts' judgments.

, , , and . Knowl. Based Syst., (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis of Nyberg-Rueppel's message recovery scheme., and . IEEE Communications Letters, 4 (7): 231-232 (2000)Zero current detection technique for fast transient response in buck DC-DC converters., , , and . ISCAS, page 2214-2217. IEEE, (2008)IoT-interfaced solid-contact ion-selective electrodes for cyber-monitoring of element- specific nutrient information in hydroponics., , , , , , , , , and 1 other author(s). Comput. Electron. Agric., (November 2023)RTTLC: Video Colorization with Restored Transformer and Test-time Local Converter., , , , , , , and . CVPR Workshops, page 1722-1730. IEEE, (2023)The analysis of user behavior and relationship on Bulletin Board System., , , , and . TAAI, page 381-387. IEEE, (2015)A Nanodisk Array Based Localized Surface Plasmon Resonance (LSPR) Sensor Fabricated by Laser Interference Lithography., , , , and . NEMS, page 217-220. IEEE, (2019)New Audio Secret Sharing Schemes With Time Division Technique., , and . J. Inf. Sci. Eng., 19 (4): 605-614 (2003)The relationship among the social norms of college students, and their interpersonal relationships, smartphone use, and smartphone addiction., , , and . Behav. Inf. Technol., 40 (4): 415-426 (2021)Face gender recognition with halftoning-based adaboost classifiers., , , and . ISCAS, page 2497-2500. IEEE, (2013)Perturbation on-time (POT) control and inhibit time control (ITC) in suppression of THD of power factor correction (PFC) design., , , , , , , and . CICC, page 1-4. IEEE, (2011)