Clifton Phua
Clifton Phua
CTO of Digital Systems at ST Engineering
Потвърден имейл адрес: stengg.com - Начална страница
A comprehensive survey of data mining-based fraud detection research
C Phua, V Lee, K Smith, R Gayler
arXiv preprint arXiv:1009.6119, 2010
Minority report in fraud detection: classification of skewed data
C Phua, D Alahakoon, V Lee
Acm sigkdd explorations newsletter 6 (1), 50-59, 2004
Deployment of assistive living technology in a nursing home environment: methods and lessons learned
H Aloulou, M Mokhtari, T Tiberghien, J Biswas, C Phua, JH Kenneth Lin, ...
BMC medical informatics and decision making 13 (1), 1-17, 2013
Detecting Click Fraud in Online Advertising: A Data Mining Approach
R Oentaryo, EP Lim, M Finegold, D Lo, F Zhu, C Phua, EY Cheu, GE Yap, ...
Journal of Machine Learning Research 14, 1-39, 2014
Resilient identity crime detection
C Phua, K Smith-Miles, V Lee, R Gayler
IEEE transactions on knowledge and data engineering 24 (3), 533-546, 2010
A possibilistic approach for activity recognition in smart homes for cognitive assistance to Alzheimer’s patients
PC Roy, S Giroux, B Bouchard, A Bouzouane, C Phua, A Tolstikov, ...
Activity Recognition in Pervasive Intelligent Environments, 33-58, 2011
An integrated framework for human activity recognition
H Cao, MN Nguyen, C Phua, S Krishnaswamy, XL Li
Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 621-622, 2012
Where will you go? mobile data mining for next place prediction
JB Gomes, C Phua, S Krishnaswamy
International conference on data warehousing and knowledge discovery, 146-158, 2013
Health and wellness monitoring through wearable and ambient sensors: exemplars from home-based care of elderly with mild dementia
J Biswas, A Tolstikov, M Jayachandran, V Foo, AAP Wai, C Phua, ...
Annals of telecommunications-annales des télécommunications 65 (9), 505-521, 2010
Protecting organisations from personal data breaches
C Phua
Computer Fraud & Security 2009 (1), 13-18, 2009
On the communal analysis suspicion scoring for identity crime in streaming credit applications
C Phua, R Gayler, V Lee, K Smith-Miles
European Journal of Operational Research 195 (2), 595-612, 2009
2-layer erroneous-plan recognition for dementia patients in smart homes
C Phua, VSF Foo, J Biswas, A Tolstikov, J Maniyeri, W Huang, MH That, ...
2009 11th International Conference on e-Health Networking, Applications and …, 2009
Improving the accuracy of erroneous-plan recognition system for Activities of Daily Living
K Sim, GE Yap, C Phua, J Biswas, AAP Wai, A Tolstikov, W Huang, P Yap
e-Health Networking Applications and Services (Healthcom), 2010 12th IEEE …, 2010
The Personal Name Problem and a Data Mining Solution
C Phua, V Lee, K Smith-Miles
Encyclopedia of Data Warehousing and Mining, Second Edition, 1524-1531, 2009
Activity Recognition using Correlated Pattern Mining for People with Dementia
K Sim, C Phua, GE Yap, J Biswas, M Mokhtari
33rd Annual International Conference of the IEEE Engineering in Medicine and …, 2011
Adaptive spike detection for resilient data stream mining
C Phua, K Smith-Miles, V Lee, R Gayler
Proceedings of the sixth Australasian conference on Data mining and …, 2007
Multiple People Activity Recognition Using Simple Sensors
C Phua, K Sim, J Biswas
Predicting near-future churners and win-backs in the telecommunications industry
C Phua, H Cao, JB Gomes, MN Nguyen
arXiv preprint arXiv:1210.6891, 2012
ACARP: auto correct activity recognition rules using process analysis toolkit (PAT)
VY Lee, Y Liu, X Zhang, C Phua, K Sim, J Zhu, J Biswas, JS Dong, ...
International Conference on Smart Homes and Health Telematics, 182-189, 2012
Multiple people activity recognition using mht over dbn
A Tolstikov, C Phua, J Biswas, W Huang
International Conference on Smart Homes and Health Telematics, 313-318, 2011
Системата не може да изпълни операцията сега. Опитайте отново по-късно.
Статии 1–20