|
[1]Y. Kou, C. T. Lu, S. Sirwongwattana and Y. P. Huang, “Survey of fraud detection techniques,” 2004 IEEE international conference on Networking, sensing and control, vol. 2, pp. 749-754, 2004. [2]W. Lee and K. W. Mok, “Adaptive intrusion detection: a data mining approach,” Artificial Intelligence Review, vol. 14, no. 6, pp. 533-567, 2000. [3]M. H. Cahill, D. Lambert, J. C. Pinheiro and D. X. Sun, “Detecting fraud in the real world,” Handbook of massive data sets, pp. 911-929, 2002. [4]J. B. S. Freeman, A. Bivens and B. Szymanski, “Host-based intrusion detection using user signatures,” Graduate Research Conference, 2002. [5]S. C. Deerwester, S. T. Dumais, T. K. Landauer, G. W. Furnas and R. A. Harsh-man, “Indexing by Latent Semantic Analysis,” American Society for Information Science, vol. 41, no. 6, pp 391-407, 1990b. [6]C. D. Manning, P. Raghavan and H. Schütze, “Introduction to information retrieval,” Cambridge: Cambridge university press, 2008. [7]G. Cosma and M. Joy, “An Approach to Source-Code Plagiarism Detection and Investigation Using Latent Semantic Analysis,” Institute of Electrical and Electronics Engineers Transactions on Computers, vol. 61, no. 3, pp. 379-394, 2012. [8]N. Evangelopoulos, X. Zhang, and V. R. Prybutok, “Latent Semantic Analysis: Five Methodological Recommendations,” European Journal of Information Sys-tems, vol. 21, no. 1, pp. 70-86, 2010. [9]T. K. Landauer, D. S. McNamara, S. Dennis and W. Kintsch, Handbook of Latent Semantic Analysis, Psychology Press, 2013. [10]F.-F. Kuo, M.-K. Shan, and S.-Y. Lee, “Background Music Recommendation for Video Based on Multimodal Latent Semantic Analysis,” 2013 IEEE International Conference on Multimedia and Expo (ICME), pp. 1-6, 2013. [11]R. Klein, A. Kyrilov and M. Tokman, “Automated Assessment of Short Free-Text Responses in Computer Science using Latent Semantic Analysis,” in Proceedings of the 16th annual joint conference on innovation and technology in computer science education, ACM, pp. 158-162, 2011. [12]M. C. Lintean, C. Moldovan, V. Rus and D. S. McNamara, “The Role of Local and Global Weighting in Assessing the Semantic Similarity of Texts Using Latent Semantic Analysis,” FLAIRS Conference, pp. 235-240, 2010. [13]M. G. Ozsoy, F. N. Alpaslan and I. Cicekli, “Text summarization using Latent Semantic Analysis,” Journal of Information Science, vol. 37, no. 4, pp. 405-417, 2011. [14]C.-J. Luh, S.-A. Yang and D. T.-L. Huang, “Estimating Search Engine Ranking Function with Latent Semantic Analysis and a Genetic Algorithm,” in Proceed-ings of the 2012 3rd International Conference on E-Business and E-Government-Volume 04, IEEE Computer Society, pp. 439-442, 2012. [15]P. Y. Hui and H. Y. Meng, “Latent Semantic Analysis for Multimodal User Input With Speech and Gestures,” IEEE/ACM Transactions on Audio, Speech, and Language Processing, vol. 22, no. 2, pp. 417-429, 2014. [16]T. Hofmann, “Probabilistic latent semantic analysis,” in Proceedings of the 22nd annual international ACM SIGIR conference on Research and development in information retrieval, ACM, pp. 289-296, 1999. [17]J. Zhang and S. Gong, “Action Categorization by Structural Probabilistic Latent Semantic Analysis,” Computer Vision and Image Understanding, vol. 114, no. 8, pp. 857-864, 2010. [18]C. Shen, T. Li and C. H. Ding, “Integrating Clustering and Multi-Document Summarization by Bi-Mixture Probabilistic Latent Semantic Analysis (PLSA) with Sentence Bases,” Association for the Advancement of Artificial Intelligence, pp. 914-920, 2011. [19]E. C. Su, J.-M. Chang, C.-W. Cheng, T.-Y. Sung, and W.-L. Hsu, “Prediction of nuclear proteins using nuclear translocation signals proposed by probabilistic la-tent semantic indexing,” BMC bioinformatics (13:S17-S13), pp. 1-10, 2012. [20]Y. Wen, C. Zou and J. Liu, “Probabilistic latent semantic analysis for sketch-based 3D model retrieval," 2014 4th IEEE International Conference on Information Science and Technology (ICIST), pp. 594-597, 2014. [21]D. M. Blei, A. Y. Ng and M. I. Jordan, “Latent Dirichlet Allocation,” the Journal of machine Learning research, vol. 3, pp. 993-1022, 2003. [22]A. Bhardwaj, M. Reddy, S. Setlur, V. Govindaraju and S. Ramachandrula, “Latent Dirichlet Allocation Based Writer Identification in Offline Handwriting,” in Proceedings of the 9th IAPR International Workshop on Document Analysis Systems, ACM, pp. 357-362, 2010. [23]J. C. Niebles, H. Wang, and L. Fei-Fei, “Unsupervised learning of human action categories using spatial-temporal words,” International journal of computer vision, vol. 79, no. 3, pp. 299-318, 2008. [24]J. Caol, J. Li, Y. Zhang and S. Tang, “LDA-Based Retrieval Framework for Semantic News Video Retrieval,” 2007 IEEE International Conference on Semantic Computing (ICSC), pp. 155-160, 2007. [25]M. Juneja, A. Vedaldi, C. Jawahar and A. Zisserman, “Blocks that Shout: Distinctive Parts for Scene Classification,” 2013 IEEE Conference on Computer Vi-sion and Pattern Recognition (CVPR), pp. 924-930, 2013. [26]T. Pang-Ning, M. Steinbach and V. Kumar, “Introduction to data mining,” Library of Congress, 2006. [27]A. Singhal, “Modern information retrieval: A brief overview,” IEEE Data Eng. Bull, vol. 24, no. 4, pp. 35-43, 2001. [28]V. Thada and D. V. Jaglan, “Comparison of Jaccard, Dice, Cosine Similarity Coefficient To Find Best Fitness Value for Web Retrieved Documents Using Genet-ic Algorithm,” International Journal of Innovations in Engineering and Technology, 2013.
|