Order:
  1.  23
    Missing data imputation over academic records of electrical engineering students.Esteban Jove, Patricia Blanco-Rodríguez, José-Luis Casteleiro-Roca, Héctor Quintián, Francisco Javier Moreno Arboleda, José Antonio LóPez-Vázquez, Benigno Antonio Rodríguez-Gómez, María Del Carmen Meizoso-López, Andrés Piñón-Pazos, Francisco Javier De Cos Juez, Sung-Bae Cho & José Luis Calvo-Rolle - 2020 - Logic Journal of the IGPL 28 (4):487-501.
    Nowadays, the quality standards of higher education institutions pay special attention to the performance and evaluation of the students. Then, having a complete academic record of each student, such as number of attempts, average grade and so on, plays a key role. In this context, the existence of missing data, which can happen for different reasons, leads to affect adversely interesting future analysis. Therefore, the use of imputation techniques is presented as a helpful tool to estimate the value of missing (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  2.  12
    Evolutionary Reinforcement Learning for Adaptively Detecting Database Intrusions.Seul-Gi Choi & Sung-Bae Cho - 2020 - Logic Journal of the IGPL 28 (4):449-460.
    Relational database management system is the most popular database system. It is important to maintain data security from information leakage and data corruption. RDBMS can be attacked by an outsider or an insider. It is difficult to detect an insider attack because its patterns are constantly changing and evolving. In this paper, we propose an adaptive database intrusion detection system that can be resistant to potential insider misuse using evolutionary reinforcement learning, which combines reinforcement learning and evolutionary learning. The model (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  3.  9
    A Neurocognitive Model for.Sung-Bae Cho - 1997 - In S. O'Nuillain, Paul McKevitt & E. MacAogain (eds.), Two Sciences of Mind. John Benjamins. pp. 9--393.
  4.  12
    Insider attack detection in database with deep metric neural network with Monte Carlo sampling.Gwang-Myong Go, Seok-Jun Bu & Sung-Bae Cho - 2022 - Logic Journal of the IGPL 30 (6):979-992.
    Role-based database management systems are most widely used for information storage and analysis but are known as vulnerable to insider attacks. The core of intrusion detection lies in an adaptive system, where an insider attack can be judged if it is different from the predicted role by performing classification on the user’s queries accessing the database and comparing it with the authorized role. In order to handle the high similarity of user queries for misclassified roles, this paper proposes a deep (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  5.  13
    Fusion of modular bayesian networks for context-aware decision making.Seung-Hyun Lee & Sung-Bae Cho - 2012 - In Emilio Corchado, Vaclav Snasel, Ajith Abraham, Michał Woźniak, Manuel Grana & Sung-Bae Cho (eds.), Hybrid Artificial Intelligent Systems. Springer. pp. 375--384.
    Direct download  
     
    Export citation  
     
    Bookmark  
  6. A neurocognitive model of consciousness and attention.J. Newman, B. Baars & Sung-Bae Cho - 1997 - In S. O'Nuillain, Paul McKevitt & E. MacAogain (eds.), Two Sciences of Mind. John Benjamins. pp. 393--417.
     
    Export citation  
     
    Bookmark  
  7. Intelligent Computing in Bioinformatics-An Efficient Attribute Ordering Optimization in Bayesian Networks for Prognostic Modeling of the Metabolic Syndrome.Han-Saem Park & Sung-Bae Cho - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 4115--381.