Clifton Phua

Clifton Phua
NCS Group · Smart & Safe City Centre of Excellence

About

42
Publications
36,127
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,582
Citations
Additional affiliations
January 2013 - January 2015
SAS Institute
Position
  • Security & Fraud Analytics Lead
January 2008 - February 2013
Institute for Infocomm Research
Position
  • Researcher

Publications

Publications (42)
Conference Paper
Full-text available
In this paper we present the problems associated with acquisition of ground truth, which is a critical step in facilitating accurate and automated care in Assisted Living Facilities. The approach permits both bottom up and top down methods of reasoning about data. The tradeoffs between granularity of ground truth acquisition and its impact on the d...
Article
Full-text available
The open-source Global Database of Events, Language, and Tone (GDELT) is the most comprehensive and updated Big Data source of important terms extracted from international news articles . We focus only on GDELT's Singapore events to better understand the data quality of its news articles, accuracy of its term extraction, and potential for predictio...
Article
Full-text available
Using Graham's rules on picking stocks has been proven to generate profits for value investors. The authors propose using 3D subspace clustering to generate rules to pick potential undervalued stocks; 3D subspace clustering is effective in handling high-dimensional financial data and is adaptive to new data. In addition, its results aren't influenc...
Article
Full-text available
Click fraud--the deliberate clicking on advertisements with no real interest on the product or service offered--is one of the most daunting problems in online advertising. Building an effective fraud detection method is thus pivotal for online advertising businesses. We organized a Fraud Detection in Mobile Advertising (FDMA) 2012 Competition, open...
Conference Paper
Full-text available
The technological advances in smartphones and their widespread use has resulted in the big volume and varied types of mobile data which we have today. Location prediction through mobile data mining leverages such big data in applications such as traffic planning, location-based advertising, intelligent resource allocation; as well as in recommender...
Conference Paper
Full-text available
With growing aging population around the world, there is urgent need of effective solution to improve the quality of life of demented elderly. In order to provide real-time monitoring and timely assistance to elderly in their home settings, we designed and developed a system employing model-based scenario verification, sensing-assisted activity rec...
Data
This survey paper categorises, compares, and summarises from almost all published technical and review articles in automated fraud detection within the last 10 years. It defines the professional fraudster, formalises the main types and subtypes of known fraud, and presents the nature of data evidence collected within affected industries. Within the...
Article
Full-text available
Background: With an ever-growing ageing population, dementia is fast becoming the chronic disease of the 21st century. Elderly people affected with dementia progressively lose their autonomy as they encounter problems in their Activities of Daily Living (ADLs). Hence, they need supervision and assistance from their family members or professional c...
Article
Full-text available
In this work, we presented the strategies and techniques that we have developed for predicting the near-future churners and win-backs for a telecom company. On a large-scale and real-world database containing customer profiles and some transaction data from a telecom company, we first analyzed the data schema, developed feature computation strategi...
Conference Paper
Full-text available
This poster presents an integrated framework to enable using standard non-sequential machine learning tools for accurate multi-modal activity recognition. Our framework contains simple pre- and post-classification strategies such as class-imbalance correction on the learning data using structure preserving oversampling, leveraging the sequential na...
Article
Full-text available
This paper presents an integrated framework to enable using standard non-sequential machine learning tools for accurate multi-modal activity recognition. We develop a novel framework that contains simple pre- and post-classification strategies to improve the overall performance. We achieve this through class-imbalance correction on the learning dat...
Conference Paper
Full-text available
Activity recognition within ambient environments is a highly non-trivial process. Such procedures can be managed using rule based systems in monitoring human behavior. However, designing and verification of such systems is laborious and time-consuming. We present a rule verification system that uses model checking techniques to ensure rule validity...
Conference Paper
Full-text available
To enhance ICP monitoring of Traumatic Brain Injury (TBI) patients, much research effort has been attracted to the development auto-alarming systems and forecasting methods to predict impending intracranial hypertension episodes. Nevertheless, the performance of the proposed methods are often limited by the presence of artifacts in the ICP signal....
Article
Full-text available
Most smart home based monitoring / assistive systems that attempt to recognize activities within a smart home are targeted towards living-alone elderly, and stop at providing instantaneous coarse grained information such as room-occupancy or provide specific programmed reminders for taking medication etc. In our work, we target multiple residents,...
Article
Full-text available
Due to the rapidly aging population around the world, senile dementia is growing into a prominent problem in many societies. To monitor the elderly dementia patients so as to assist them in carrying out their basic Activities of Daily Living (ADLs) independently, sensors are deployed in their homes. The sensors generate a stream of context informat...
Conference Paper
Full-text available
Multiple people activity recognition system is an essential step in Ambient Assisted Living system development. A possible approach for multiple people is to take an existing system for single person activity recognition and extend it to the case of multiple people. One approach is Multiple Hypothesis Tracking (MHT) which provides capabilities of m...
Chapter
Full-text available
Providing cognitive assistance to Alzheimer’s patients in smart homes is a field of research that receives a lot of attention lately. The recognition of the patient’s behavior when he carries out some activities in a smart home is primordial in order to give adequate assistance at the opportune moment. To address this challenging issue, we present...
Article
Full-text available
Monitoring and timely intervention are extremely important in the continuous management of health and wellness among all segments of the population, but particularly among those with mild dementia. In relation to this, we prescribe three design principles for the construction of services and applications. These are ambient intelligence, service con...
Article
Full-text available
This survey paper categorises, compares, and summarises from almost all published technical and review articles in automated fraud detection within the last 10 years. It defines the professional fraudster, formalises the main types and subtypes of known fraud, and presents the nature of data evidence collected within affected industries. Within the...
Conference Paper
Using ambient intelligence to assist people with dementia in carrying out their Activities of Daily Living (ADLs) independently in smart home environment is an important research area, due to the projected increasing number of people with dementia. We present herein, a system and algorithms for the automated recognition of ADLs; the ADLs are in ter...
Conference Paper
Full-text available
Providing cognitive assistance in smart homes is a field of research that receives a lot of attention lately. In order to give adequate assistance at the opportune moment, we need to recognize the observed behavior when the patient carries out some activities in a smart home. To address this challeng- ing issue, we present a formal activity recogni...
Conference Paper
People with dementia lose their ability to learn, solve problems, and communicate. And they are all around us. To potentially replace some of their diminished memory and problem-solving abilities, erroneous-plan recognition (EPR) aims to detect defects or faults in the execution of correct plans by the dementia patient, and send timely audio and vi...
Conference Paper
Full-text available
In this paper we propose an efficient and incremental plan recognition method for cognitive assistance. We design our unique method based on graph matching and heuristic chaining rules in order to deal with interleaved and sequential activities. The finding of this research work is to be applied to predict abnormal behavior of the users, and optimi...
Article
This paper describes a rapid technique: communal analysis suspicion scoring (CASS), for generating numeric suspicion scores on streaming credit applications based on implicit links to each other, over both time and space. CASS includes pair-wise communal scoring of identifier attributes for applications, definition of categories of suspiciousness f...
Article
Full-text available
Gigabytes of personal data are stored electronically by businesses, governments, universities, hospitals, and organisations on their customers, citizens, students, patients, and employees respectively. These personal data include social security numbers (or identity card numbers), names, addresses, dates-of-birth, driver's licence numbers, credit c...
Chapter
Full-text available
Security data mining, a form of countermeasure, is the use of large-scale data analytics to dynamically detect a small number of adversaries who are constantly changing. It encompasses data-and results-related safeguards; and is relevant across multiple domains such as financial, insurance, and health. With reference to security data mining, there...
Article
Full-text available
The work is motivated by the expanding demand and limited supply of long-term personal care for People with Dementia (PwD), and assistive technology as an alternative. Telecare allows PwD to live in the comfort of their homes for a longer time. It is challenging to have remote care in smart homes with ambient intelligence, using devices, networks,...
Conference Paper
The objective is to measure utility of real-time commercial decision making. It is important due to a higher possibility of mistakes in real-time decisions, problems with recording actual occurrences, and significant costs associated with predictions produced by algorithms. The first contribution is to use overall utility and represent individual u...
Chapter
Almost every person has a life-long personal name which is officially recognised and has only one correct version in their language. Each personal name typically has two components/parts: a first name (also known as given, fore, or Christian name) and a last name (also known as family name or surname). Both these name components are strongly influe...
Conference Paper
Full-text available
Automated adversarial detection systems can fail when under attack by adversaries. As part of a re- silient data stream mining system to reduce the pos- sibility of such failure, adaptive spike detection is attribute ranking and selection without class-labels. The first part of adaptive spike detection requires weighing all attributes for spiky-nes...
Article
Full-text available
This paper is on adaptive real-time searching of credit application data streams for identity crime with many search parameters. Specifically, we concentrated on handling our domain-specific adversarial activity problem with the adaptive Communal Analysis Suspicion Scoring (CASS) algorithm. CASS's main novel theoretical contribution is in the formu...
Article
Full-text available
The purpose of this paper is to outline some of the major developments of an identity crime/fraud stream mining system. Communal detection is about finding real communities of interest. The algorithm itself is unsupervised, single-pass, differentiates between normal and anomalous links, and mitigates the suspicion of normal links with a dynamic glo...
Conference Paper
Full-text available
Identity crime has increased enormously over the recent years. Spike detection is important because it highlights sudden and sharp rises in intensity relative to the current identity attribute value (which can be indicative of abuse). This paper proposes the new spike analysis framework for monitoring sparse personal identity streams. For each iden...
Article
Full-text available
This paper describes a technique for generating numeric suspicion scores on credit applications based on implicit links to each other, and over time and space. Its contributions include pair-wise communal scoring of identifier attributes for applications, definition of categories of suspiciousness for application-pairs, smoothed k-wise scoring of m...
Article
Full-text available
This paper proposes an innovative fraud detection method, built upon existing fraud detection research and Minority Report, to deal with the data mining problem of skewed data distributions. This method uses backpropagation (BP), together with naive Bayesian (NB) and C4.5 algorithms, on data partitions derived from minority oversampling with replac...
Article
Full-text available
This paper proposes an innovative fraud detection method, built upon existing fraud detection research and Minority Report, to deal with the data mining problem of skewed data distributions. This method uses backpropagation (BP), together with naive Bayesian (NB) and C4.5 algorithms, on data partitions derived from minority oversampling with replac...
Article
Full-text available
This paper outlines an approach that we are taking for eldercare applications in the smart home, involving cognitive errors and their compensation. Our approach involves high-level modeling of daily activities of the elderly by breaking down these activities into smaller units, which can then be automatically recognized at a low-level by collection...

Network

Cited By