Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm
Journal Article
Ambusaidi, M. A., He, X., Nanda, P., & Tan, Z. (2016)
Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm. IEEE Transactions on Computers, 65(10), 2986-2998. https://doi.org/10.1109/tc.2016.2519914
Redundant and irrelevant features in data have caused a long-term problem in network traffic classification. These features not only slow down the process of classification bu...
On Privacy Aware Carriers for Value-Possessed e-Invoices Considering Intelligence Mining
Journal Article
Cha, S., Wang, H., Tan, Z., Joung, Y., Tseng, Y., & Yeh, K. (2020)
On Privacy Aware Carriers for Value-Possessed e-Invoices Considering Intelligence Mining. IEEE Transactions on Emerging Topics in Computational Intelligence, 4(5), 641-652. https://doi.org/10.1109/tetci.2019.2938547
Intelligence mining is one of the most promising technologies for effectively extracting intelligence (and knowledge) to enhance the quality of decision-making. In Taiwan, the...