Default Risk Prediction Using Random Forest and XGBoosting Classifier (Englisch)
- Neue Suche nach: Sharma, Alok Kumar
- Neue Suche nach: Li, Li-Hua
- Neue Suche nach: Ahmad, Ramli
- Neue Suche nach: Tsihrintzis, George A.
- Neue Suche nach: Wang, Shiuh-Jeng
- Neue Suche nach: Lin, Iuon-Chang
- Neue Suche nach: Sharma, Alok Kumar
- Neue Suche nach: Li, Li-Hua
- Neue Suche nach: Ahmad, Ramli
In:
2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications
;
Kapitel: 10
;
91-101
;
2022
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Default Risk Prediction Using Random Forest and XGBoosting Classifier
-
Weitere Titelangaben:Smart Innovation, Systems and Technologies
-
Beteiligte:Tsihrintzis, George A. ( Herausgeber:in ) / Wang, Shiuh-Jeng ( Herausgeber:in ) / Lin, Iuon-Chang ( Herausgeber:in ) / Sharma, Alok Kumar ( Autor:in ) / Li, Li-Hua ( Autor:in ) / Ahmad, Ramli ( Autor:in )
-
Erschienen in:2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications ; Kapitel: 10 ; 91-101Smart Innovation, Systems and Technologies ; 314 ; 91-101
-
Verlag:
- Neue Suche nach: Springer International Publishing
-
Erscheinungsort:Cham
-
Erscheinungsdatum:30.11.2022
-
Format / Umfang:11 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Reversible Data Hiding in Encrypted Image Based on MSB InversionYang, Cheng-Hsing / Weng, Chi-Yao / Hung, Chia-Ling / Li, Chun-Ta et al. | 2022
- 2
-
Comments on the Visual Binary QR CodeLin, Pei-Yu / Chen, Yi-Hui / Wu, Wen-Chuan / Huang, Yu-Tzu / Chang, Ya-Fen et al. | 2022
- 3
-
NLP-Based Hardware Solution for Censoring Audio on Over-the-Top (OTT) Media ServicesSharma, Aneesh / Singampalli, Lavanya / Vegesna, Aditya / Singampalli, Mrudula / Weng, Chi-Yao et al. | 2022
- 4
-
Efficient Steganographic Method Based on Modulo CubeKo, Hung-Jui / Huang, Cheng-Ta / Tseng, Hsueh-Wen / Wang, Shiuh-Jeng et al. | 2022
- 5
-
A High Capacity Reversible Data Hiding in Encrypted Images Using Multi-MSB Prediction and Huffman CodingLin, Li-Chiun / Huang, Cheng-Ta / Wang, Shiuh-Jeng et al. | 2022
- 6
-
Reversible Data Hiding Based on Bidirectional Generalized Integer TransformXie, Xiao-Zhu / Lin, Chia-Chen / Chang, Chin-Chen et al. | 2022
- 7
-
A Prototype Design on Privacy-Preserving Outsourced Bayesian NetworkChen, Bo-Jia / Lin, Ching-Hsiang / Tseng, Ya-Shih / Chen, Yu-Chi et al. | 2022
- 8
-
The Security Challenge of Consumers’ Mobile PaymentLee, Shing-Mei et al. | 2022
- 9
-
Research on the Analysis of Key Attack Modes in a Wireless EnvironmentChen, Chin-Ling / Ye, Cheng-Yu / Chen, Wei-An / Lim, Zi-Yi et al. | 2022
- 10
-
Default Risk Prediction Using Random Forest and XGBoosting ClassifierSharma, Alok Kumar / Li, Li-Hua / Ahmad, Ramli et al. | 2022
- 11
-
An RFID Ownership Transfer Based on Multiple Owners with Different WeightsLuo, Jia-Ning / Yang, Ming-Hour et al. | 2022
- 12
-
Comments on a Scalable Healthcare Authentication Protocol with Attack-Resilience and Anonymous Key-AgreementChang, Ya-Fen / Lai, Kuan-Yu / Fung, Ka-Ho / Tai, Wei-Liang et al. | 2022
- 13
-
A LWE-Based Receiver-Deniable Encryption SchemeChi, Po-Wen / Wang, Ming-Hung / Chuang, Yun-Hsin et al. | 2022
- 14
-
Privacy-Preserved Hierarchical Authentication and Key Agreement for AI-Enabled Telemedicine SystemsLin, Tzu-Wei / Hsu, Chien-Lung et al. | 2022
- 15
-
Fuzzy C-Means Based Feature Selection Mechanism for Wireless Intrusion DetectionTseng, Chinyang Henry / Tsaur, Woei-Jiunn / Mujiono et al. | 2022
- 16
-
An Active User-Side Detector for Evil TwinsHsu, Fu-Hau / Lee, Chia-Hao / Wang, Chuan-Sheng et al. | 2022
- 17
-
Evaluation of Recurrent Neural Network Model Training for Health Care SuggestionsHsu, Ming-Hsia / Juang, Wang-Chuan / Cai, Zheng-Xun / Li-Chu, Wu / Huang, Wei-Chun / Kuo, Tsuang / Chen, Chia-Mei et al. | 2022
- 18
-
E-learning Behavior Analytics in the Curriculum of Big Data Visualization ApplicationHou, Hsing-Yu / Lee, Chin-Feng / Chen, Chih-Teng / Wu, Pei-Jung et al. | 2022
- 19
-
Malware Detection Based on Image ConversionKuo, Wen-Chung / Chen, Yu-Ting / Huang, Yu-Chih / Wang, Chun-Cheng et al. | 2022
- 20
-
Automobile Theft Detection by Driving Behavior Identification Using Deep AutoencoderKristianto, Edy / Lin, Po-Ching et al. | 2022
- 21
-
Combining a Bi-LSTM-Based Siamese Network with Word2Vec Algorithm for Classifying High-Dimensional DatasetLin, Xian-Zhong / Yeh, Chia-Hsuan / Jea, Kuen-Fang et al. | 2022
- 22
-
Real Time Drowsiness Detection Based on Facial Dynamic FeaturesChuang, Hsiu-Min / Huang, Tsai-Tao / Chou, Chao-Lung et al. | 2022
- 23
-
Gradient Deep Learning Boosting and Its Application on the Imbalanced Datasets Containing Noises in ManufacturingNguyen, Duc-Khanh / Chan, Chien-Lung / Phan, Dinh-Van et al. | 2022
- 24
-
Fabric Defect Detection by Applying Structural Similarity Index to the Combination of Variational Autoencode and Generative Adversarial NetworkLee, Chin-Feng / Chang, Ting-Chia et al. | 2022
- 25
-
A Novel Defense Mechanism Against Label-Flipping Attacks for Support Vector MachinesKuo, Ming-Yu / Cheng, Bo-Chao et al. | 2022
- 26
-
Study of Contribution Verifiability for Privacy-preserving Federated LearningHsu, Ruei-Hau / Kao, Shang-Wei / Huang, Ting-Yun et al. | 2022
- 27
-
Design and Application of Handwritten Numeral Recognizer Based on Convolutional Neural NetworkDu, Zhoujie / Chen, Puyang / Miao, Huaikou et al. | 2022
- 28
-
Collision Avoidance in Crowded Zone Using Adversarial Reinforcement LearningNatesan, Balaji / Liu, Chuan-Ming et al. | 2022
- 29
-
Cryptanaylsis to Sowjanya et al.’s ABEs from ECCTseng, Yi-Fan et al. | 2022
- 30
-
IIoT Key Distribution and Authentication Technology Based on Physical Unclonable FunctionOu, Long-Ci / Lee, Narn-Yih et al. | 2022
- 31
-
Lattice-Based Anonymous Multi-Receiver ID-Based EncryptionFan, Chun-I / Jia, Zhen-Yu / Zhuang, Er-Shuo et al. | 2022
- 32
-
The Design of Concurrent Signature Combined with Blind Signature Generation and Its Application on E-commerceWang, Chien-Ming / Wang, Chih-Hung et al. | 2022
- 33
-
Identification of the Issues in IoT Devices with HSTS Not Enforced and Their ExploitationSrivastava, Aman / Shah, Pranjali et al. | 2022
- 34
-
A Critique of a Lightweight Authentication and Key Agreement Scheme for Internet of DronesChang, Ya-Fen / Huang, Sheng-Jie / Chen, Guan-Xi / Tai, Wei-Liang et al. | 2022
- 35
-
A Blockchain-Based Custody System for Preserving Critical Video EvidenceHung, Wei-Che / Chew, Chit-Jie / Chen, Ying-Chin / Fan, Yun-Yi / Lee, Jung-San et al. | 2022
- 36
-
Lightweight and Efficient Source Authentication Scheme Based on Blockchain Approach in Open Data EnvironmentHuang, Jheng-Jia / Tseng, Yi-Fan / Lo, Nai-Wei / Tung, Shao-Wei / Dai, Wen-Yan et al. | 2022
- 37
-
Reconfigurable PM2.5 Sensor Green Deployment Mechanism Based on Blockchain TechnologyChen, Hsing-Chung / Liang, Yao-Hsien / Hsu, Pei-Yu et al. | 2022
- 38
-
Trustworthy Blockchain Oracles for Smart ContractsLin, Iuon-Chang / Kuo, Chun-Wei et al. | 2022
- 39
-
Analysis and Acquisition of APFS Data from a Forensic PerspectiveLee, Jino / Shon, TaeShik et al. | 2022