[1] PwC's global economic crime and fraud survey 2018[EB/OL].[2020-03-05].https://www.pwc.com/gx/en/services/advisory/forensics/economic-crime-survey.html. [2] HANSEN J V,MCDONALD J B,MESSIER W F,et al.A generalized qualitative-response model and the analysis of management fraud[J].Management Science,1996,42(7):1022-1032. [3] SAHIN Y,BULKAN S,DUMAN E.A cost-sensitive decision tree approach for fraud detection[J].Expert Systems with Applications,2013,40(15):5916-5923. [4] BHATTACHARYYA S,JHA S,THARAKUNNEL K,et al.Data mining for credit card fraud:a comparative study[J].Decision Support Systems,2011,50(3):602-613. [5] TAE C M,HUNG P D.Comparing ML algorithms on financial fraud detection[C]//Proceedings of the 2nd International Conference on Data Science and Information Technology.Washington D.C.,USA:IEEE Press,2019:15-26. [6] JO T,JAPKOWICZ N.Class imbalances versus small disjuncts[J].ACM SIGKDD Explorations News Letter,2004,6(1):40-41. [7] HE H,BAI Y,GARCIA E A,et al.ADASYN:adaptive synthetic sampling approach for imbalanced learning[C]//Proceedings of IEEE International Joint Conference on Neural Networks.Washington D.C.,USA:IEEE Press,2008:125-136. [8] LIU F T,TING K M,ZHOU Z.Isolation forest[C]//Proceedings of 2008 IEEE International Conference on Data Mining.Washington D.C.,USA:IEEE Press,2008:1225-1229. [9] BREIMAN L.Random forests[J].Machine Learning,2001,45(1):5-32. [10] SUN L,VERSTEEG S,BOZTAS S,et al.Detecting anomalous user behavior using an extended isolation forest algorithm[EB/OL].[2020-03-05].https://export.arxiv.org/pdf/1609.06676. [11] ARYAL S,TING K M,WELLS J R,et al.Improving iForest with relative mass[J].Advances in Knowledge Discovery and Data Mining,2014,8444(2):510-521. [12] HARIRI S,KIND M C,BRUNNER R J.Extended isolation forest[EB/OL].[2020-03-05].https://arxiv.org/pdf/1811.02141.pdf. [13] XIAO Chunhui,SU Chen,BAO Congxiao,et al.Anomaly detection in network management system based on isolation forest[C]//Proceedings of 2018 Annual International Conference on Network and Information Systems for Computers.Washington D.C.,USA:IEEE Press,2018:145-168. [14] DING Z,MO Y,PAN Z.A novel software defect prediction method based on isolation forest[C]//Proceedings of 2019 International Conference on Quality,Reliability,Risk,Maintenance,and Safety Engineering.Washington D.C.,USA:IEEE Press,2019:122-136. [15] TSAI C F,LIN W C,HU Y H,et al.Under-sampling class imbalanced datasets by combining clustering analysis and instance selection[J].Information Sciences,2018,447:47-54. [16] KUBAT M,MATWIN S.Addressing the curse of imbalanced training sets:one-sided selection[C]//Proceedings of the 40th International Conference on Machine Learning.Washington D.C.,USA:IEEE Press,1997:100-109. [17] CHAWLA N V,BOWYER K W,HALL L O,et al.SMOTE:synthetic minority over-sampling technique[J].Journal of Artificial Intelligence Research,2011,16(1):321-357. [18] HUI H,WANG W Y,MAO B H.Borderline-SMOTE:a new over-sampling method in imbalanced data sets learning[C]//Proceedings of 2005 International Conference on Advances in Intelligent Computing.Washington D.C.,USA:IEEE Press,2005:11-23. [19] HANSKUNATAI A.A new hybrid sampling approach for classification of imbalanced datasets[C]//Proceedings of 2018 International Conference on Computer and Communica-tion Systems.Washington D.C.,USA:IEEE Press,2018:67-71. [20] CHEN Mincheng,YUAN Jingling,WANG Xiaoyan,et al.Parallelization of random forest algorithm based on discretization and selection of weak-correlation feature subspaces[J].Computer Science,2016,43(6):55-58,90.(in Chinese)陈旻骋,袁景凌,王啸岩,等.基于弱相关化特征子空间选择的离散化随机森林并行分类算法[J].计算机科学,2016,43(6):55-58,90. [21] XUAN S,LIU G,LI Z,et al.Random forest for credit card fraud detection[C]//Proceedings of 2018 IEEE International Conference on Networking,Sensing and Control.Washington D.C.,USA:IEEE Press,2018:102-112. [22] SEYEDHOSSEIN L,HASHEMI M R.Mining information from credit card time series for timelier fraud detection[C]//Proceedings of International Symposium on Telecommunica-tions.Washington D.C.,USA:IEEE Press,2010:117-123. [23] ZHANG Jianjun.Undersampling near decision boundary for imbalance problems[C]//Proceedings of 2019 International Conference on Machine Learning and Cybernetics.Washington D.C.,USA:IEEE Press,2019:11-25. [24] ZHU H,YIN X,MA J,et al.Identifying the main paths of information diffusion in online social networks[J].Physica A:Statistical Mechanics and Its Applications,2016,452:320-328. [25] LÜ Fang,TANG Fenghe,HUANG Junheng,et al.Frequent path discovery algorithm for financial network[J].Chinese Journal of Network and Information Security,2019,5(5):48-55.(in Chinese)吕芳,汤丰赫,黄俊恒,等.金融网络频繁链路发现算法[J].网络与信息安全学报,2019,5(5):48-55. |