Follow
Clifton Phua
Clifton Phua
Director of Labs at IMDA
Verified email at imda.gov.sg - Homepage
Title
Cited by
Cited by
Year
A comprehensive survey of data mining-based fraud detection research
C Phua, V Lee, K Smith, R Gayler
arXiv preprint arXiv:1009.6119, 2010
13012010
Minority report in fraud detection: classification of skewed data
C Phua, D Alahakoon, V Lee
Acm sigkdd explorations newsletter 6 (1), 50-59, 2004
7432004
Deployment of assistive living technology in a nursing home environment: methods and lessons learned
H Aloulou, M Mokhtari, T Tiberghien, J Biswas, C Phua, JH Kenneth Lin, ...
BMC medical informatics and decision making 13, 1-17, 2013
1572013
Detecting Click Fraud in Online Advertising: A Data Mining Approach
R Oentaryo, EP Lim, M Finegold, D Lo, F Zhu, C Phua, EY Cheu, GE Yap, ...
Journal of Machine Learning Research 14, 1-39, 2014
1192014
Resilient identity crime detection
C Phua, K Smith-Miles, V Lee, R Gayler
IEEE transactions on knowledge and data engineering 24 (3), 533-546, 2010
942010
A possibilistic approach for activity recognition in smart homes for cognitive assistance to Alzheimer’s patients
PC Roy, S Giroux, B Bouchard, A Bouzouane, C Phua, A Tolstikov, ...
Activity recognition in pervasive intelligent environments, 33-58, 2011
792011
An integrated framework for human activity recognition
H Cao, MN Nguyen, C Phua, S Krishnaswamy, XL Li
Proceedings of the 2012 ACM conference on ubiquitous computing, 621-622, 2012
752012
Where will you go? mobile data mining for next place prediction
JB Gomes, C Phua, S Krishnaswamy
International conference on data warehousing and knowledge discovery, 146-158, 2013
732013
Health and wellness monitoring through wearable and ambient sensors: exemplars from home-based care of elderly with mild dementia
J Biswas, A Tolstikov, M Jayachandran, V Foo, AAP Wai, C Phua, ...
Annals of telecommunications-annales des télécommunications 65, 505-521, 2010
572010
Protecting organisations from personal data breaches
C Phua
Computer Fraud & Security 2009 (1), 13-18, 2009
482009
On the communal analysis suspicion scoring for identity crime in streaming credit applications
C Phua, R Gayler, V Lee, K Smith-Miles
European Journal of Operational Research 195 (2), 595-612, 2009
372009
2-layer erroneous-plan recognition for dementia patients in smart homes
C Phua, VSF Foo, J Biswas, A Tolstikov, J Maniyeri, W Huang, MH That, ...
2009 11th International Conference on E-Health Networking, Applications and …, 2009
352009
Improving the accuracy of erroneous-plan recognition system for Activities of Daily Living
K Sim, GE Yap, C Phua, J Biswas, AAP Wai, A Tolstikov, W Huang, P Yap
e-Health Networking Applications and Services (Healthcom), 2010 12th IEEE …, 2010
242010
The personal name problem and a recommended data mining solution
C Phua, V Lee, K Smith-Miles
Encyclopedia of Data Warehousing and Mining 24, 2006
202006
Adaptive spike detection for resilient data stream mining
C Phua, K Smith-Miles, V Lee, R Gayler
Proceedings of the sixth Australasian conference on Data mining and …, 2007
162007
Activity Recognition using Correlated Pattern Mining for People with Dementia
K Sim, C Phua, GE Yap, J Biswas, M Mokhtari
33rd Annual International Conference of the IEEE Engineering in Medicine and …, 2011
152011
ACARP: auto correct activity recognition rules using process analysis toolkit (PAT)
VY Lee, Y Liu, X Zhang, C Phua, K Sim, J Zhu, J Biswas, JS Dong, ...
Impact Analysis of Solutions for Chronic Disease Prevention and Management …, 2012
142012
Multiple People Activity Recognition Using Simple Sensors
C Phua, K Sim, J Biswas
142011
Predicting near-future churners and win-backs in the telecommunications industry
C Phua, H Cao, JB Gomes, MN Nguyen
arXiv preprint arXiv:1210.6891, 2012
132012
From context to micro-context–issues and challenges in sensorizing smart spaces for assistive living
J Biswas, AAP Wai, A Tolstikov, LJH Kenneth, J Maniyeri, FSF Victor, ...
Procedia Computer Science 5, 288-295, 2011
132011
The system can't perform the operation now. Try again later.
Articles 1–20