Follow
Philip K. Chan
Philip K. Chan
Verified email at cs.fit.edu - Homepage
Title
Cited by
Cited by
Year
Toward accurate dynamic time warping in linear time and space
S Salvador, P Chan
Intelligent Data Analysis 11 (5), 561-580, 2007
25992007
AdaCost: misclassification cost-sensitive boosting
W Fan, SJ Stolfo, J Zhang, PK Chan
Icml 99, 97-105, 1999
10071999
Determining the number of clusters/segments in hierarchical clustering/segmentation algorithms
S Salvador, P Chan
16th IEEE international conference on tools with artificial intelligence …, 2004
9622004
Cost-based modeling for fraud and intrusion detection: Results from the JAM project
SJ Stolfo, W Fan, W Lee, A Prodromidis, PK Chan
Proceedings DARPA Information Survivability Conference and Exposition …, 2000
8752000
An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection
MV Mahoney, PK Chan
International Workshop on Recent Advances in Intrusion Detection, 220-237, 2003
8242003
Distributed data mining in credit card fraud detection
PK Chan, W Fan, AL Prodromidis, SJ Stolfo
IEEE Intelligent Systems and Their Applications 14 (6), 67-74, 1999
8201999
Toward Scalable Learning with Non-Uniform Class and Cost Distributions: A Case Study in Credit Card Fraud Detection.
PK Chan, SJ Stolfo
KDD 98, 164-168, 1998
7391998
Learning nonstationary models of normal network traffic for detecting novel attacks
MV Mahoney, PK Chan
Proceedings of the eighth ACM SIGKDD international conference on Knowledge …, 2002
5782002
Learning patterns from unix process execution traces for intrusion detection
W Lee, SJ Stolfo, PK Chan
AAAI workshop on AI approaches to fraud detection and risk management, 50-56, 1997
5311997
JAM: Java Agents for Meta-Learning over Distributed Databases.
SJ Stolfo, AL Prodromidis, S Tselepis, W Lee, DW Fan, PK Chan
KDD 97, 74-81, 1997
5001997
Systems for knowledge discovery in databases
CJ Matheus, PK Chan, G Piatetsky-Shapiro
IEEE Transactions on knowledge and data engineering 5 (6), 903-913, 1993
4961993
Real time data mining-based intrusion detection
W Lee, SJ Stolfo, PK Chan, E Eskin, W Fan, M Miller, S Hershkop, ...
Proceedings DARPA Information Survivability Conference and Exposition II …, 2001
4512001
Meta-learning in distributed data mining systems: Issues and approaches
A Prodromidis, P Chan, S Stolfo
Advances in distributed and parallel knowledge discovery 3 (0), 81-114, 2000
3912000
Using artificial anomalies to detect unknown and known network intrusions
W Fan, M Miller, S Stolfo, W Lee, P Chan
Knowledge and Information Systems 6, 507-527, 2004
3512004
PHAD: Packet header anomaly detection for identifying hostile network traffic
PK Chan, MV Mahoney
3182001
Credit card fraud detection using meta-learning: Issues and initial results
S Stolfo, DW Fan, W Lee, A Prodromidis, P Chan
AAAI-97 Workshop on Fraud Detection and Risk Management 83, 1997
3061997
Learning rules for anomaly detection of hostile network traffic
MV Mahoney, PK Chan
Third IEEE International Conference on Data Mining, 601-604, 2003
2882003
Experiments on multistrategy learning by meta-learning
PK Chan, SJ Stolfo
Proceedings of the second international conference on information and …, 1993
2841993
Advances in distributed and parallel knowledge discovery
H Kargupta, P Chan
MIT Press, 2000
2802000
A comparative evaluation of voting and meta-learning on partitioned data
PK Chan, SJ Stolfo
Machine Learning Proceedings 1995, 90-98, 1995
2791995
The system can't perform the operation now. Try again later.
Articles 1–20