Follow
Yong Shi
Title
Cited by
Cited by
Year
Automatic road crack detection using random structured forests
Y Shi, L Cui, Z Qi, F Meng, Z Chen
IEEE Transactions on Intelligent Transportation Systems 17 (12), 3434-3445, 2016
12232016
The role of text pre-processing in sentiment analysis
E Haddi, X Liu, Y Shi
Procedia computer science 17, 26-32, 2013
9702013
Evaluation of classification algorithms using MCDM and rank correlation
G Kou, Y Lu, Y Peng, Y Shi
International Journal of Information Technology & Decision Making 11 (01 …, 2012
6152012
Introduction to business data mining
DL Olson, Y Shi, Y Shi
McGraw-Hill/Irwin 10, 2250-2254, 2007
5632007
A descriptive framework for the field of data mining and knowledge discovery
Y Peng, G Kou, Y Shi, Z Chen
International Journal of Information Technology & Decision Making 7 (04 …, 2008
4382008
The analytic hierarchy process: task scheduling and resource allocation in cloud computing environment
D Ergu, G Kou, Y Peng, Y Shi, Y Shi
The Journal of Supercomputing 64, 835-848, 2013
3652013
Robust twin support vector machine for pattern classification
Z Qi, Y Tian, Y Shi
Pattern recognition 46 (1), 305-316, 2013
3552013
Optimization based data mining: theory and applications
Y Shi, Y Tian, G Kou, Y Peng, J Li
Springer Science & Business Media, 2011
3102011
Credit card churn forecasting by logistic regression and decision tree
G Nie, W Rowe, L Zhang, Y Tian, Y Shi
Expert Systems with Applications 38 (12), 15273-15285, 2011
3042011
A simple method to improve the consistency ratio of the pair-wise comparison matrix in ANP
D Ergu, G Kou, Y Peng, Y Shi
European Journal of Operational Research 213 (1), 246-259, 2011
2852011
An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization
SMH Bamakan, H Wang, T Yingjie, Y Shi
Neurocomputing 199, 90-102, 2016
2622016
Nonparallel support vector machines for pattern classification
Y Tian, Z Qi, X Ju, Y Shi, X Liu
IEEE transactions on cybernetics 44 (7), 1067-1079, 2013
2622013
Analytic network process in risk assessment and decision analysis
D Ergu, G Kou, Y Shi, Y Shi
Computers & Operations Research 42, 58-74, 2014
2552014
FAMCDM: A fusion approach of MCDM methods to rank multiclass classification algorithms
Y Peng, G Kou, G Wang, Y Shi
Omega 39 (6), 677-689, 2011
2452011
An empirical study of classification algorithm evaluation for financial risk prediction
Y Peng, G Wang, G Kou, Y Shi
Applied Soft Computing 11 (2), 2906-2915, 2011
2412011
Ensemble of software defect predictors: an AHP-based evaluation method
Y Peng, G Kou, G Wang, W Wu, Y Shi
International Journal of Information Technology & Decision Making 10 (01 …, 2011
2252011
Recent advances on support vector machines research
Y Tian, Y Shi, X Liu
Technological and economic development of Economy 18 (1), 5-33, 2012
2202012
Advances in big data analytics
Y Shi
Adv Big Data Anal, 2022
2162022
Public blockchain evaluation using entropy and TOPSIS
H Tang, Y Shi, P Dong
Expert Systems with Applications 117, 204-210, 2019
2152019
Laplacian twin support vector machine for semi-supervised classification
Z Qi, Y Tian, Y Shi
Neural networks 35, 46-53, 2012
2152012
The system can't perform the operation now. Try again later.
Articles 1–20