default search action
Kok-Chin Khor
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Suraya Nurain Kalid, Kok-Chin Khor, Keng Hoong Ng, Gee-Kok Tong:
Detecting Frauds and Payment Defaults on Credit Card Data Inherited With Imbalanced Class Distribution and Overlapping Class Problems: A Systematic Review. IEEE Access 12: 23636-23652 (2024) - [j6]Jiajia Lu, Wun-She Yap, Kok-Chin Khor:
PointADAM: Unsupervised Adversarial Domain Adaptation on Point Clouds With Metric Learning via Compact Feature Representation. IEEE Access 12: 77486-77500 (2024) - [j5]Ying-Jih Ding, Wun-She Yap, Kok-Chin Khor:
Profiling and Identifying Smurfs or Boosters on Dota 2 Using K-Means and IQR. IEEE Trans. Games 16(3): 577-585 (2024) - [c11]Yin-Loon Khor, Yi Jie Wong, Mau-Luen Tham, Yoong Choon Chang, Ban-Hoe Kwan, Kok-Chin Khor:
Multi-Task YOLO for Vehicle Colour Recognition and Automatic License Plate Recognition. EAIS 2024: 1-7 - 2023
- [c10]Yen Khai Lim, Shengqi Jiang, Kok-Chin Khor, Ying Loong Lee, Feng Ke:
Fairness-Aware Unmanned Aerial Vehicle-Mounted Base Station Placement with Quality of Service Provisioning. IC3INA 2023: 1-6 - 2022
- [j4]Shi-Ting Wong, Chian Wen Too, Wun-She Yap, Kok-Chin Khor:
Medical equipment recognition using deep transfer learning. J. Intell. Fuzzy Syst. 43(1): 1001-1010 (2022) - [c9]Jia-Sheng Lee, Yoke-Leng Yong, Meei-Hao Hoo, Kok-Chin Khor:
A Comparison of Machine Learning Models for Currency Pair Forecasting. ICO 2022: 499-506 - [c8]Way-Siang Goh, Chian Wen Too, Meei-Hao Hoo, Kok-Chin Khor:
Evaluation of Recommendation Models for Matchmaking. ICO 2022: 843-852 - [i1]Nur Amirah Ishak, Keng Hoong Ng, Gee-Kok Tong, Suraya Nurain Kalid, Kok-Chin Khor:
Mitigating unbalanced and overlapped classes in credit card fraud data with enhanced stacking classifiers system. F1000Research 11: 71 (2022) - 2021
- [c7]Wi-Yi Ong, Chian Wen Too, Kok-Chin Khor:
Transfer Learning on Inception ResNet V2 for Expiry Reminder: A Mobile Application Development. MobiWIS 2021: 149-160 - [c6]Gee-Kok Tong, Keng Hoong Ng, Wun-She Yap, Kok-Chin Khor:
Construction of Optimal Stock Market Portfolios Using Outlier Detection Algorithm. SCDS 2021: 160-173 - [c5]Nur Sara Zainudin, Keng Hoong Ng, Kok-Chin Khor:
Identifying the Important Demographic and Financial Factors Related to the Mortality Rate of COVID-19 with Data Mining Techniques. SCDS 2021: 241-253 - 2020
- [j3]Suraya Nurain Kalid, Keng Hoong Ng, Gee-Kok Tong, Kok-Chin Khor:
A Multiple Classifiers System for Anomaly Detection in Credit Card Data With Unbalanced and Overlapped Classes. IEEE Access 8: 28210-28221 (2020)
2010 – 2019
- 2017
- [j2]Keng Hoong Ng, Kok-Chin Khor:
StockProF: a stock profiling framework using data mining approaches. Inf. Syst. E Bus. Manag. 15(1): 139-158 (2017) - 2014
- [c4]Kok-Chin Khor, Choo-Yee Ting, Somnuk Phon-Amnuaisuk:
The Effectiveness of Sampling Methods for the Imbalanced Network Intrusion Detection Data Set. SCDM 2014: 613-622 - 2012
- [j1]Kok-Chin Khor, Choo-Yee Ting, Somnuk Phon-Amnuaisuk:
A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection. Appl. Intell. 36(2): 320-329 (2012) - [c3]Choo-Yee Ting, Kok-Chin Khor, Yok-Cheng Sam:
Evidence Conflict Analysis Approach to Obtain an Optimal Feature Set for Bayesian Tutoring Systems. ICICA (LNCS) 2012: 576-583
2000 – 2009
- 2008
- [c2]Kok-Chin Khor, Choo-Yee Ting, Somnuk Phon-Amnuaisuk:
A Probabilistic Approach for Network Intrusion Detection. Asia International Conference on Modelling and Simulation 2008: 463-468 - 2006
- [c1]Kok-Chin Khor, Choo-Yee Ting:
A Bayesian Approach to Classify Conference Papers. MICAI 2006: 1027-1036
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 21:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint