Clifton Phua
Clifton Phua
CTO of Digital Systems at ST Engineering
Verified email at - Homepage
Cited by
Cited by
A comprehensive survey of data mining-based fraud detection research
C Phua, V Lee, K Smith, R Gayler
arXiv preprint arXiv:1009.6119, 2010
Minority report in fraud detection: classification of skewed data
C Phua, D Alahakoon, V Lee
Acm sigkdd explorations newsletter 6 (1), 50-59, 2004
Deployment of assistive living technology in a nursing home environment: methods and lessons learned
H Aloulou, M Mokhtari, T Tiberghien, J Biswas, C Phua, JH Kenneth Lin, ...
BMC medical informatics and decision making 13 (1), 1-17, 2013
Detecting Click Fraud in Online Advertising: A Data Mining Approach
R Oentaryo, EP Lim, M Finegold, D Lo, F Zhu, C Phua, EY Cheu, GE Yap, ...
Journal of Machine Learning Research 14, 1-39, 2014
Resilient identity crime detection
C Phua, K Smith-Miles, V Lee, R Gayler
IEEE transactions on knowledge and data engineering 24 (3), 533-546, 2010
An integrated framework for human activity recognition
H Cao, MN Nguyen, C Phua, S Krishnaswamy, XL Li
Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 621-622, 2012
A possibilistic approach for activity recognition in smart homes for cognitive assistance to Alzheimer’s patients
PC Roy, S Giroux, B Bouchard, A Bouzouane, C Phua, A Tolstikov, ...
Activity Recognition in Pervasive Intelligent Environments 4, 33-58, 2011
Where will you go? mobile data mining for next place prediction
JB Gomes, C Phua, S Krishnaswamy
Data Warehousing and Knowledge Discovery: 15th International Conference …, 2013
Health and wellness monitoring through wearable and ambient sensors: exemplars from home-based care of elderly with mild dementia
J Biswas, A Tolstikov, M Jayachandran, V Foo, AAP Wai, C Phua, ...
Annals of telecommunications-annales des télécommunications 65, 505-521, 2010
Protecting organisations from personal data breaches
C Phua
Computer Fraud & Security 2009 (1), 13-18, 2009
On the communal analysis suspicion scoring for identity crime in streaming credit applications
C Phua, R Gayler, V Lee, K Smith-Miles
European Journal of Operational Research 195 (2), 595-612, 2009
2-layer erroneous-plan recognition for dementia patients in smart homes
C Phua, VSF Foo, J Biswas, A Tolstikov, J Maniyeri, W Huang, MH That, ...
2009 11th International Conference on e-Health Networking, Applications and …, 2009
Improving the accuracy of erroneous-plan recognition system for Activities of Daily Living
K Sim, GE Yap, C Phua, J Biswas, AAP Wai, A Tolstikov, W Huang, P Yap
e-Health Networking Applications and Services (Healthcom), 2010 12th IEEE …, 2010
The personal name problem and a recommended data mining solution
C Phua, V Lee, K Smith-Miles
Encyclopedia of Data Warehousing and Mining, 24, 2006
Adaptive spike detection for resilient data stream mining
C Phua, K Smith-Miles, V Lee, R Gayler
Proceedings of the sixth Australasian conference on Data mining and …, 2007
Activity Recognition using Correlated Pattern Mining for People with Dementia
K Sim, C Phua, GE Yap, J Biswas, M Mokhtari
33rd Annual International Conference of the IEEE Engineering in Medicine and …, 2011
Multiple People Activity Recognition Using Simple Sensors
C Phua, K Sim, J Biswas
ACARP: auto correct activity recognition rules using process analysis toolkit (PAT)
VY Lee, Y Liu, X Zhang, C Phua, K Sim, J Zhu, J Biswas, JS Dong, ...
Impact Analysis of Solutions for Chronic Disease Prevention and Management …, 2012
From context to micro-context–Issues and challenges in sensorizing smart spaces for assistive living
J Biswas, AAP Wai, A Tolstikov, LJH Kenneth, J Maniyeri, FSF Victor, ...
Procedia Computer Science 5, 288-295, 2011
On the approximate communal fraud scoring of credit applications
C Phua, R Gayler, V Lee, K Smith
Proceedings of Credit Scoring and Credit Control, 1-10, 2005
The system can't perform the operation now. Try again later.
Articles 1–20