참고문헌
- Ballis, D., M. Falaschi, C. Ferri, J. Hernandez- Orallo, and M. J. Ramirez-Quintana, "Cost- Sensitive Diagnosis of Declarative Programs", Electronic Notes in Theorectical Computer Science, Vol.86, No.3(2003), 85-104. https://doi.org/10.1016/S1571-0661(04)80695-9
- Chawla, N. and X. Li, "Pricing Based Framework for Benefit Scoring", Proceedings of KDD Workshop on Utility-Based Data Mining, (2006), 1-5.
- Chung, S. H. and Y. Suh, "Estimating the Utility Value of Individual Credit Card Delinquents", Expert Systems with Applications, Vol.36, No.2(2009), 3975-3981. https://doi.org/10.1016/j.eswa.2008.02.031
- Ciraco, M., M. Rogalewski, and G. Weiss, "Improving Classifier Utility by Altering the Misclassification Cost Ratio", Proceedings of the 1st International Workshop on Utility- Based Data Mining, (2005), 46-52.
- Desai, V. S., J. N. Crook, and G. A. J. Overstreet, "A comparison of neural networks and linear scoring models in the credit union environment", European Journal of Operational Research, Vol.95, No.1(1996), 24-37. https://doi.org/10.1016/0377-2217(95)00246-4
- Domingos, P., "MetaCost: A General Method for Making Classifiers Cost-Sensitive", Proceedings of the 15th International Conference on Knowledge Discovery and Data Mining, (1999), 155-164.
- Estevez, P. A., C. M. Held, and C. A. Perez, "Subscription Fraud Prevention in Telecommunications Using Fuzzy Rules and Neural Networks", Expert Systems with Applications, Vol.31, No.2(2006), 337-344. https://doi.org/10.1016/j.eswa.2005.09.028
- Fawcett, T., "ROC Graphs with Instance-Varying Costs", Pattern Recognition Letters, Vol.27, No.8(2006), 882-891. https://doi.org/10.1016/j.patrec.2005.10.012
- Hilas, C. S., "Designing an Expert System for Fraud Detection in Private Telecommunications Networks", Expert Systems with Applications, Vol.36, No.9(2009), 11559-11569. https://doi.org/10.1016/j.eswa.2009.03.031
- Hilas, C. S. and P. A. Mastorocostas, "An Application of Supervised and Unsupervised Learning Approaches to Telecommunications Fraud Detection", Knowledge-Based Systems, Vol.21, No.7(2008), 721-726. https://doi.org/10.1016/j.knosys.2008.03.026
- Jiang, Y. and B. Cukic, "Misclassification Cost- Sensitive Fault Prediction Models", Proceedings of the 5th International Conference on Predictor Models in Software Engineering, (2009), 1-10.
- Kou, Y., C. T. Lu, S. Sirwongwattana, and Y. P. Huang, "Survey of Fraud Detection Techniques", Proceedings of IEEE International Conference on Networking, Sensing and Control, (2004), 749-754.
- Lee, H. K., S. B. Han, and W. C. Jhee, "Illegal Cash Accomodation Detection Modeling Using Ensemble Size Reduction", Journal of Intelligence and Information Systems, Vol.16, No.1(2010), 93-116.
- Lee, H. U. and H. Ahn, "An Intelligent Intrusion Detection Model Based on Support Vector Machines and the Classification Threshold Optimization for Considering the Asymmetric Error Cost", Journal of Intelligence and Information Systems, Vol.17, No.4(2011), 157-173.
- Leonard, K. J., "The Development of a Rule Based Expert System Model for Fraud Alert in Consumer Credit", European Journal of Operational Research, Vol.80, No.2(1995), 350- 356. https://doi.org/10.1016/0377-2217(93)E0249-W
- Ling, C. X. and V. S. Sheng, Cost-Sensitive Learning and the Class Imbalance Problem, Springer, 2008.
- Ling, C. X., V. S. Sheng, T. Bruckhaus, and N. H. Madhavji, "Maximum Profit Mining and Its Application in Software Development", Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (2006), 929-934.
- Ling, C. X., V. S. Sheng, and Q. Yang, "Test Strategies for Cost-Sensitive Decision Trees", IEEE Transactions on Knowledge and Data Engineering, Vol.18, No.8(2006), 1055-1067. https://doi.org/10.1109/TKDE.2006.131
- Lu, W. Z. and D. Wang, "Ground-Level Ozone Prediction by Support Vector Machine Approach with a Cost-Sensitive Classification Scheme", Science of the Total Environment, Vol.395, No.2(2008), 109-116. https://doi.org/10.1016/j.scitotenv.2008.01.035
- Malhotra, R. and D. K. Malhotra, "Differentiating between good credits and bad credits using neuro-fuzzy systems", European Journal of Operational Research, Vol.136, No.1(2002), 190-211. https://doi.org/10.1016/S0377-2217(01)00052-2
- Margineantu, D. D., "On Class-Probability Estimates and Cost-Sensitive Evaluation of Classifiers", Proceedings of International Conference on Machine Learning, (2000), 1-3.
- Merler, S., C. Furlanello, B. Larcher, and A. Sboner, "Automatic Model Selection in Cost-Sensitive Boosting", Information Fusion, Vol.4, No.1 (2003), 3-10. https://doi.org/10.1016/S1566-2535(02)00100-8
- Pendharkar, P. C., "A Threshold Varying Bisection Method for Cost Sensitive Learning in Neural Networks", Expert Systems with Applications, Vol.34, No.2(2008), 1456-1464. https://doi.org/10.1016/j.eswa.2007.01.011
- Phua, C., D. Alahakoon, and V. Lee, "Minority report in fraud detection : Classification of skewed data", ACM SIGKDD Explorations Newsletter, Vol.6, No.1(2004), 50-59. https://doi.org/10.1145/1007730.1007738
- Sanchez, D., M. A. Vila, L. Cerda, and J. M. Serrano, "Association Rules Applied to Credit Card Fraud Detection", Expert Systems with Applications, Vol.36, No.2(2009), 3630-3640. https://doi.org/10.1016/j.eswa.2008.02.001
- Shin, K. S., H. J. Kim, H. S. Kim, "Development of the Knowledge-based Systems for Antimoney Laundering in the Korea Financial Intelligence Unit", Journal of Intelligence and Information Systems, Vol.14, No.2(2008), 179-192.
- Stolfo, S. J., D. W. Fan, W. Lee, and A. L. Prodromidis, "Credit Card Fraud Detection Using Meta-Learning : Issues and Initial Results", AAAI Workshop, AI Approaches to Fraud Detection and Risk Management, (1997), 1-12.
- Sun, Y., M. S. Kamel, A. K. C. Wong, and Y. Wang, "Cost-Sensitive Boosting for Classification of Imbalanced Data", Pattern Recognition, Vol.40, No.12(2007), 3358-3378. https://doi.org/10.1016/j.patcog.2007.04.009
- Viaene, S., G. Dedene, and R. A. Derrig, "Auto claim fraud detection using Bayesian learning neural networks", Expert Systems with Applications, Vol.29, No.3(2005), 653-666. https://doi.org/10.1016/j.eswa.2005.04.030
- Wheeler, R. and S. Aitken, "Multiple algorithms for fraud detection", Knowledge-Based Systems, Vol.13, No.2(2000), 93-99. https://doi.org/10.1016/S0950-7051(00)00050-2
- Witten, I. H. and E. Frank, Data Mining-Practical Machine Learning Tools and Techniques, 2005.
- Yang, W. S. and S. Y. Hwang, "A Process-Mining Framework for the Detection of Healthcare Fraud and Abuse", Expert Systems with Applications, Vol.31, No.1(2006), 56-68. https://doi.org/10.1016/j.eswa.2005.09.003
- Yong, M. and D. Xiaoqing, "Real-Time Multi- View Face Detection and Pose Estimation Based on Cost-Sensitive AdaBoost", Tsinghua Science and Technology, Vol.10, No.2(2005), 152-157. https://doi.org/10.1016/S1007-0214(05)70047-X
- Zadrozny, B., "One-Benefit Learning : Cost-Sensitive Learning with Restricted Cost Information", Proceedings of KDD Workshop on Utility-Based Data Mining, (2005), 53-58.