|
[1] J. Li, S. Fong and Y. Zhuang, "Optimizing SMOTE by Metaheuristics with Neural Network and Decision Tree," 2015 3rd International Symposium on Computational and Business Intelligence (ISCBI), pp. 26-32, 2015. [2] C. Guo, Y. Ma, Z. Xu, M. Cao and Q. Yao, "An Improved Oversampling Method for imbalanced Data–SMOTE Based on Canopy and K-means," 2019 Chinese Automation Congress (CAC), pp. 1467-1469, 2019. [3] K. Cheng, C. Zhang, H. Yu, X. Yang, H. Zou and S. Gao, "Grouped SMOTE With Noise Filtering Mechanism for Classifying Imbalanced Data," IEEE Access, vol. 7, pp. 170668-170681, 2019. [4] E. Masry, "Polynomial interpolation and prediction of continuous-time processes from random samples," IEEE Transactions on Information Theory, vol. 43, no. 2, pp. 776-783, 1997. [5] P. Zhao, B. Niu, W. Feng and Z. Yan, "Input-to-State Stability and Stabilization of Sampled-Data Systems Under Aperiodic Sampling and Random Sampling," IEEE Access, vol. 9, pp. 47657 - 47667, 2021. [6] C. Luo and J. H. McClellan, "Discrete random sampling theory," 2013 IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 5430-5434, 2013. [7] N. L. Fitriyani, M. Syafrudin, G. Alfian and J. Rhee, "Development of Disease Prediction Model Based on Ensemble Learning Approach for Diabetes and Hypertension," IEEE Access, vol. 7, pp. 144777-144789, 2019. [8] M. A. H. Farquad and I. Bose, "Preprocessing unbalanced data using support vector machine," Decision Support Systems, vol. 53, no. 1, 2012. [9] M. Zeng, B. Zou, F. Wei, X. Liu and L. Wang, "Effective prediction of three common diseases by combining SMOTE with Tomek links technique for imbalanced medical data," 2016 IEEE International Conference of Online Analysis and Computing Science (ICOACS), pp. 225-228, 2016. [10] A. Nugroho, A. Z. Fanani and C. F. Shidik, "Evaluation of Feature Selection Using Wrapper For Numeric Dataset With Random Forest Algorithm," 2021 International Seminar on Application for Technology of Information and Communication (iSemantic), pp. 179-183, 2021. [11] J. K. Jaiswal and R. Samikannu, "Application of Random Forest Algorithm on Feature Subset Selection and Classification and Regression," 2017 World Congress on Computing and Communication Technologies (WCCCT), pp. 65-68, 2017. [12] J.-H. Kwon, S.-W. Lee, S.-B. Lee and E.-J. Kim, "Impact of Correlation-based Feature Selection on Photovoltaic Power Prediction," 2019 4th Technology Innovation Management and Engineering Science International Conference (TIMES-iCON), pp. 1-4, 2019. [13] N. Gopika and A. K. M. E., "Correlation Based Feature Selection Algorithm for Machine Learning," 2018 3rd International Conference on Communication and Electronics Systems (ICCES), pp. 692-695, 2018. [14] H. Hairani, M. Innuddin and M. Rahardi, "Accuracy Enhancement of Correlated Naive Bayes Method by Using Correlation Feature Selection (CFS) for Health Data Classification," 2020 3rd International Conference on Information and Communications Technology (ICOIACT), pp. 51-55, 2020. [15] S. S. Sundahari, "A knowledge discovery using decision tree by Gini coefficient," 2011 International Conference on Business, Engineering and Industrial Applications, pp. 232-235, 2011. [16] M. R. Mohebbian, H. A. M. Sohag, S. S. Vedaei and K. A. Wahid, "Automated Detection of Bleeding in Capsule Endoscopy Using On-Chip Multispectral Imaging Sensors," IEEE Sensors Journal, vol. 21, no. 13, pp. 14121-14130, 2021. [17] "Feature Selection for Gene Expression Using Model-Based Entropy," IEEE/ACM Transactions on Computational Biology and Bioinformatics, vol. 7, no. 1, pp. 25-36, 2010. [18] S. Mazuelas, Y. Shen and A. Pérez, "Generalized Maximum Entropy for Supervised Classification," IEEE Transactions on Information Theory, vol. 68, no. 4, pp. 2530-2550, April 2022. [19] S. Ali and Y. Li, "Learning Multilevel Auto-Encoders for DDoS Attack Detection in Smart Grid Network," IEEE Access, vol. 7, pp. 108647 - 108659, 2019. [20] Y. Li, R. Ma and R. Jiao, "A Hybrid Malicious Code Detection Method based on Deep Learning," International Journal of Security and Its Applications, vol. 9, pp. 205-216, 2015. [21] G. Andresini, A. Appice, N. D. Mauro, C. Loglisci and D. Malerba, "Multi-Channel Deep Feature Learning for Intrusion Detection," IEEE Access, vol. 8, pp. 53346-53359, 2020. [22] S. Garcia, A. Parmisano and M. J. Erquiaga, "IoT-23: A labeled dataset with malicious and benign IoT network traffic (Version 1.0.0) [Data set]," 2020. [Online]. Available: http://doi.org/10.5281/zenodo.4743746. [Accessed 7 March 2021].
|