Kok-Chin Khor

Orcid: 0000-0001-9346-1479

According to our database1, Kok-Chin Khor authored at least 16 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Detecting Frauds and Payment Defaults on Credit Card Data Inherited With Imbalanced Class Distribution and Overlapping Class Problems: A Systematic Review.
IEEE Access, 2024

2023
Fairness-Aware Unmanned Aerial Vehicle-Mounted Base Station Placement with Quality of Service Provisioning.
Proceedings of the International Conference on Computer, 2023

2022
Medical equipment recognition using deep transfer learning.
J. Intell. Fuzzy Syst., 2022

Mitigating unbalanced and overlapped classes in credit card fraud data with enhanced stacking classifiers system.
F1000Research, 2022

A Comparison of Machine Learning Models for Currency Pair Forecasting.
ICO, 2022

Evaluation of Recommendation Models for Matchmaking.
ICO, 2022

2021
Identifying the Important Demographic and Financial Factors Related to the Mortality Rate of COVID-19 with Data Mining Techniques.
Proceedings of the Soft Computing in Data Science - 6th International Conference, 2021

Construction of Optimal Stock Market Portfolios Using Outlier Detection Algorithm.
Proceedings of the Soft Computing in Data Science - 6th International Conference, 2021

Transfer Learning on Inception ResNet V2 for Expiry Reminder: A Mobile Application Development.
Proceedings of the Mobile Web and Intelligent Information Systems, 2021

2020
A Multiple Classifiers System for Anomaly Detection in Credit Card Data With Unbalanced and Overlapped Classes.
IEEE Access, 2020

2017
StockProF: a stock profiling framework using data mining approaches.
Inf. Syst. E Bus. Manag., 2017

2014
The Effectiveness of Sampling Methods for the Imbalanced Network Intrusion Detection Data Set.
Proceedings of the Recent Advances on Soft Computing and Data Mining, 2014

2012
A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection.
Appl. Intell., 2012

Evidence Conflict Analysis Approach to Obtain an Optimal Feature Set for Bayesian Tutoring Systems.
Proceedings of the Information Computing and Applications - Third International Conference, 2012

2008
A Probabilistic Approach for Network Intrusion Detection.
Proceedings of the Second Asia International Conference on Modelling and Simulation, 2008

2006
A Bayesian Approach to Classify Conference Papers.
Proceedings of the MICAI 2006: Advances in Artificial Intelligence, 2006


  Loading...