Author of the publication

Detecting Credit Card Fraud by Using Questionnaire-Responded Transaction Model Based on Support Vector Machines.

, , , and . IDEAL, volume 3177 of Lecture Notes in Computer Science, page 800-806. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Binary Classifier: Clustering-Launched Classification., , , , and . ICIC (2), volume 4114 of Lecture Notes in Computer Science, page 278-283. Springer, (2006)Detecting Credit Card Fraud by Using Questionnaire-Responded Transaction Model Based on Support Vector Machines., , , and . IDEAL, volume 3177 of Lecture Notes in Computer Science, page 800-806. Springer, (2004)Scalable IP Routing Lookup in Next Generation Network., , , , and . ICOIN, volume 2662 of Lecture Notes in Computer Science, page 46-55. Springer, (2003)A Systematic Approach to Order Fulfillment of On-demand Delivery Service for Bento Industry., , , , , , and . ITQM, volume 17 of Procedia Computer Science, page 96-103. Elsevier, (2013)Performance Improvement of Vector Quantization by Using Threshold., , , and . PCM (3), volume 3333 of Lecture Notes in Computer Science, page 647-654. Springer, (2004)Novel Questionnaire-Responded Transaction Approach with SVM for Credit Card Fraud Detection., , , and . ISNN (2), volume 3497 of Lecture Notes in Computer Science, page 916-921. Springer, (2005)Building an Intrusion Detection System Based on Support Vector Machine and Genetic Algorithm., , , , , and . ISNN (3), volume 3498 of Lecture Notes in Computer Science, page 409-414. Springer, (2005)A Research to Increase Users' Satisfaction and Loyalty Based on the Customer Satisfaction Index: A Case Study on the National Taichung Institute of Technology's Library., , and . ICADL, volume 3334 of Lecture Notes in Computer Science, page 574-583. Springer, (2004)A hierarchical FLP model for broadband networks., , , and . IEEE Communications Letters, 9 (3): 282-284 (2005)Exploring the intellectual structure of cloud patents using non-exhaustive overlaps., and . Scientometrics, 121 (2): 739-769 (2019)