Skip to main content

and
  1. No Access

    Article

    Fraud detection via behavioral sequence embedding

    Fraud detection is usually compared to finding a needle in a haystack and remains a challenging task because fraudulent acts are buried in massive amounts of normal behavior and true intentions may be disguise...

    Guannan Liu, Jia Guo, Yuan Zuo, Junjie Wu in Knowledge and Information Systems (2020)

  2. No Access

    Article

    Tradable Credit Scheme for Control of Evolutionary Traffic Flows to System Optimum: Model and its Convergence

    We propose a dynamic tradable credit scheme for control of the day-to-day evolution process of traffic flows towards the system optimum (SO) state in a traffic network with elastic demand. In the scheme, the d...

    Ren-Yong Guo, Hai-Jun Huang, Hai Yang in Networks and Spatial Economics (2019)

  3. No Access

    Article

    A data-driven approach for extracting and analyzing collaboration patterns at the interagent and intergroup levels in business process

    We developed a data-driven approach for extracting and analyzing the interagent and intergroup collaboration patterns centered on the COLLSTRUC language and its related algorithm. The proposed approach is eval...

    Shanshan Wang, Kun Chen, Zhiyong Liu, Ren-Yong Guo in Electronic Commerce Research (2019)