Toward accurate dynamic time warping in linear time and space S Salvador, P Chan Intelligent Data Analysis 11 (5), 561-580, 2007 | 2652 | 2007 |
AdaCost: misclassification cost-sensitive boosting W Fan, SJ Stolfo, J Zhang, PK Chan Icml 99, 97-105, 1999 | 1019 | 1999 |
Determining the number of clusters/segments in hierarchical clustering/segmentation algorithms S Salvador, P Chan 16th IEEE international conference on tools with artificial intelligence …, 2004 | 972 | 2004 |
Cost-based modeling for fraud and intrusion detection: Results from the JAM project SJ Stolfo, W Fan, W Lee, A Prodromidis, PK Chan Proceedings DARPA Information Survivability Conference and Exposition …, 2000 | 884 | 2000 |
An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection MV Mahoney, PK Chan International Workshop on Recent Advances in Intrusion Detection, 220-237, 2003 | 828 | 2003 |
Distributed data mining in credit card fraud detection PK Chan, W Fan, AL Prodromidis, SJ Stolfo IEEE Intelligent Systems and Their Applications 14 (6), 67-74, 1999 | 826 | 1999 |
Toward Scalable Learning with Non-Uniform Class and Cost Distributions: A Case Study in Credit Card Fraud Detection. PK Chan, SJ Stolfo KDD 98, 164-168, 1998 | 743 | 1998 |
Learning nonstationary models of normal network traffic for detecting novel attacks MV Mahoney, PK Chan Proceedings of the eighth ACM SIGKDD international conference on Knowledge …, 2002 | 578 | 2002 |
Learning patterns from unix process execution traces for intrusion detection W Lee, SJ Stolfo, PK Chan AAAI workshop on AI approaches to fraud detection and risk management, 50-56, 1997 | 531 | 1997 |
JAM: Java Agents for Meta-Learning over Distributed Databases. SJ Stolfo, AL Prodromidis, S Tselepis, W Lee, DW Fan, PK Chan KDD 97, 74-81, 1997 | 500 | 1997 |
Systems for knowledge discovery in databases CJ Matheus, PK Chan, G Piatetsky-Shapiro IEEE Transactions on knowledge and data engineering 5 (6), 903-913, 1993 | 496 | 1993 |
Real time data mining-based intrusion detection W Lee, SJ Stolfo, PK Chan, E Eskin, W Fan, M Miller, S Hershkop, ... Proceedings DARPA Information Survivability Conference and Exposition II …, 2001 | 452 | 2001 |
Meta-learning in distributed data mining systems: Issues and approaches A Prodromidis, P Chan, S Stolfo Advances in distributed and parallel knowledge discovery 3 (0), 81-114, 2000 | 391 | 2000 |
Using artificial anomalies to detect unknown and known network intrusions W Fan, M Miller, S Stolfo, W Lee, P Chan Knowledge and Information Systems 6, 507-527, 2004 | 353 | 2004 |
PHAD: Packet header anomaly detection for identifying hostile network traffic PK Chan, MV Mahoney | 318 | 2001 |
Credit card fraud detection using meta-learning: Issues and initial results S Stolfo, DW Fan, W Lee, A Prodromidis, P Chan AAAI-97 Workshop on Fraud Detection and Risk Management 83, 1997 | 306 | 1997 |
Learning rules for anomaly detection of hostile network traffic MV Mahoney, PK Chan Third IEEE International Conference on Data Mining, 601-604, 2003 | 293 | 2003 |
Experiments on multistrategy learning by meta-learning PK Chan, SJ Stolfo Proceedings of the second international conference on information and …, 1993 | 284 | 1993 |
Advances in distributed and parallel knowledge discovery H Kargupta, P Chan MIT Press, 2000 | 281 | 2000 |
A comparative evaluation of voting and meta-learning on partitioned data PK Chan, SJ Stolfo Machine Learning Proceedings 1995, 90-98, 1995 | 280 | 1995 |