VCS Lee, Vincent C.S. Lee, CS Lee, V Lee, Cheng S Lee, Vincent Cheng-Siong Lee, Cheng Siong Lee, CSL
VCS Lee, Vincent C.S. Lee, CS Lee, V Lee, Cheng S Lee, Vincent Cheng-Siong Lee, Cheng Siong Lee, CSL
Verified email at
Cited by
Cited by
A comprehensive survey of data mining-based fraud detection research
C Phua, V Lee, K Smith, R Gayler
arXiv preprint arXiv:1009.6119, 2010
Minority report in fraud detection: classification of skewed data
C Phua, D Alahakoon, V Lee
Acm sigkdd explorations newsletter 6 (1), 50-59, 2004
A microblogging-based approach to terrorism informatics: Exploration and chronicling civilian sentiment and response to terrorism events via Twitter
M Cheong, V Lee
Information Systems Frontiers 13 (1), 45-59, 2011
Integrating web-based intelligence retrieval and decision-making from the twitter trends knowledge base
M Cheong, V Lee
Proceedings of the 2nd ACM workshop on Social web search and mining, 1-8, 2009
Enhance FFT-based parametric algorithm for simulataneous multiple harmonics analysis
IEE Proceedings-Generation, Transmission and Distribution 148 (3), 209-214, 2001
Privacy-preserving gradient-descent methods
S Han, WK Ng, L Wan, VCS Lee
IEEE transactions on knowledge and data engineering 22 (6), 884-899, 2009
Demand response architectures and load management algorithms for energy-efficient power grids: a survey
YW Law, T Alpcan, VCS Lee, A Lo, S Marusic, M Palaniswami
2012 seventh international conference on knowledge, information and …, 2012
Exception rules in association rule mining
D Taniar, W Rahayu, V Lee, O Daly
Applied Mathematics and Computation 205 (2), 735-750, 2008
A new multi-agent system framework for tacit knowledge management in manufacturing supply chains
K Al-Mutawah, V Lee, Y Cheung
Journal of Intelligent Manufacturing 20 (5), 593-610, 2009
Concrete crack detection with handwriting script interferences using faster region-based convolutional neural network
J Deng, Y Lu, VCS Lee
Computer Aided Civil and Infrastructure Eningeering 34, 1-17, 2019
Resilient identity crime detection
C Phua, K Smith-Miles, V Lee, R Gayler
IEEE transactions on knowledge and data engineering 24 (3), 533-546, 2010
Privacy-preservation for Gradient Descent Methods
VCSL Li, Wan, Wee Keong Ng, Shuguo Han
KDD'07, pp777-783, 2007
Automated pavement crack detection and segmentation based on two-step convolutional neural network
LD Jingwei Liu, Xu Yang, Stephen Lau, Xin Wang, Sang Luo, Cheng-Siong Lee
Computer-aided Civil and Infrastructure Engineering 35 (07), 2020
Teletraffic performance of mobile radio networks with hierarchical cells and overflow
P Fitzpatrick, CS Lee, B Warfield
IEEE Journal on Selected Areas in Communications 15 (8), 1549-1557, 1997
Twittering for Earth: A Study on the Impact of Microblogging Activism on Earth Hour 2009 in Australia
M Cheong, V Lee
Asian Conference on Intelligent Information and Database Systems, 114-123, 2010
An EM-based algorithm for clustering data streams in sliding windows
XH Dang, V Lee, WK Ng, A Ciptadi, KL Ong
International conference on database systems for advanced applications, 230-235, 2009
An explainable deep fusion network network for affect recognition using physiological signals
J Lin, S Pan, CS Lee, S Oviatt
28th ACM International Conference on Information and Knowledge Management …, 2019
An empirical study of genetic programming generated trading rules in computerized stock trading service system
D Mallick, VCS Lee, YS Ong
2008 International Conference on Service Systems and Service Management, 1-6, 2008
A study on detecting patterns in twitter intra-topic user and message clustering
M Cheong, V Lee
2010 20th International Conference on Pattern Recognition, 3125-3128, 2010
A conceptlink graph for text structure mining
R Chau, AC Tsoi, M Hagenbuchner, V Lee
The system can't perform the operation now. Try again later.
Articles 1–20