A RISK CONTROL FRAMEWORK FOR MORTGAGED CARS BASED ON TRAJECTORY MINING, 469-477.

Feng Lin, Rongrong Jiang, Dongxian Shi, Dong Ren, Mingqi Lv, and Tieming Chen

References

  1. [1] D. Chen and C. Han, A comparative study of online P2P lending in the USA and China, Journal of Internet Banking and Commerce, 17(2), 2012, 1–15.
  2. [2] H. Platt and M. Platt, Risks to auto sector recovery: Bankruptcies of auto suppliers in East Asia and the USA, Journal of Asia Business Studies, 7(3), 2013, 231–243.
  3. [3] H. Zhang, Optimization of risk control in financial markets based on particle swarm optimization algorithm, Journal of Computational and Applied Mathematics, 368, 2019, 112530.
  4. [4] H. Gao, S. Mao, W. Huang, and X. Yang. Applying probabilistic model checking to financial production risk evaluation and control: A case study of Alibaba’s Yu’e Bao, IEEE Transactions on Computational Social Systems, 5(3), 2018, 785–795.
  5. [5] W. Hu, X. Xiao, and Z. Fu, A system for learning statistical motion patterns, IEEE Transactions on Pattern Analysis & Machine Intelligence, 28(9), 2006, 1450–1464.
  6. [6] A. Omer and M. Karsligil, Traffic event classification at intersections based on the severity of abnormality, Machine Vision and Applications, 25(3), 2014, 613–632.
  7. [7] N. Sumpter and A. Bulpitt, Learning spatio-temporal patterns for predicting object behaviour, Image & Vision Computing, 18(9), 2000, 697–704.
  8. [8] W. Hu, D. Xie, T. Tan, and S. Maybank, Learning activity patterns using fuzzy self-organizing neural network, IEEE Transactions on Systems Man & Cybernetics, Part B (Cybernetics), 34(3), 2004, 1618–1626.
  9. [9] J. Song, H. Takakura and Y. Okabe, Toward a more practical unsupervised anomaly detection system, Information Sciences, 231(9), 2013, 4–14.
  10. [10] Y. Chen, G. Liang, K. Lee, and Y. Xu, Abnormal behavior detection by multi-SVM-based Bayesian network, Proc. of Int. Conf. on Information Acquisition, Seogwipo-si, South Korea, 2007, 298–303.
  11. [11] L. Chen, M. Lv, and G. Chen, A system for destination and future route prediction based on trajectory mining, Pervasive and Mobile Computing, 6(6), 2010, 657–676.
  12. [12] D. Huttenlocher, G Klanderman, and W. Rucklidge, Comparing images using the Hausdorff distance, IEEE Transactions on Pattern Analysis and Machine Intelligence, 15(9), 1993, 850–863.
  13. [13] D. Tax and P. Laskov, Online SVM learning: from classification to data description and back, Proc. of Neural Network and Signal Processing, Toulouse, France, 2003, 499–508.
  14. [14] M.C. Gonzalez, C.A. Hidalgo, and A.L. Barabasi, Understanding individual human mobility patterns, Nature, 453(7196), 2008, 779–782.
  15. [15] T.L. Saaty, Decision making with the analytic hierarchy process, International Journal of Services Sciences, 1(1), 2008, 83–98.

Important Links:

Go Back