<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">JDS</journal-id>
<journal-title-group><journal-title>Journal of Data Science</journal-title></journal-title-group>
<issn pub-type="epub">1683-8602</issn><issn pub-type="ppub">1680-743X</issn><issn-l>1680-743X</issn-l>
<publisher>
<publisher-name>School of Statistics, Renmin University of China</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">JDS1122</article-id>
<article-id pub-id-type="doi">10.6339/24-JDS1122</article-id>
<article-categories><subj-group subj-group-type="heading">
<subject>Data Science in Action</subject></subj-group></article-categories>
<title-group>
<article-title>BIE: Binary Image Encoding for the Classification of Tabular Data</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<contrib-id contrib-id-type="orcid">https://orcid.org/0000-0003-1804-3263</contrib-id>
<name><surname>Halladay</surname><given-names>James</given-names></name><email xlink:href="mailto:jehalladay112@gmail.com">jehalladay112@gmail.com</email><xref ref-type="aff" rid="j_jds1122_aff_001">1</xref><xref ref-type="corresp" rid="cor1">∗</xref>
</contrib>
<contrib contrib-type="author">
<contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-0000-8307</contrib-id>
<name><surname>Cullen</surname><given-names>Drake</given-names></name><xref ref-type="aff" rid="j_jds1122_aff_001">1</xref>
</contrib>
<contrib contrib-type="author">
<contrib-id contrib-id-type="orcid">https://orcid.org/0000-0001-6529-5493</contrib-id>
<name><surname>Briner</surname><given-names>Nathan</given-names></name><xref ref-type="aff" rid="j_jds1122_aff_001">1</xref>
</contrib>
<contrib contrib-type="author">
<name><surname>Miller</surname><given-names>Darrin</given-names></name><xref ref-type="aff" rid="j_jds1122_aff_001">1</xref>
</contrib>
<contrib contrib-type="author">
<name><surname>Primeau</surname><given-names>Riley</given-names></name><xref ref-type="aff" rid="j_jds1122_aff_001">1</xref>
</contrib>
<contrib contrib-type="author">
<name><surname>Avila</surname><given-names>Abraham</given-names></name><xref ref-type="aff" rid="j_jds1122_aff_001">1</xref>
</contrib>
<contrib contrib-type="author">
<name><surname>Watson</surname><given-names>Warin</given-names></name><xref ref-type="aff" rid="j_jds1122_aff_001">1</xref>
</contrib>
<contrib contrib-type="author">
<contrib-id contrib-id-type="orcid">https://orcid.org/0000-0001-6864-6893</contrib-id>
<name><surname>Basnet</surname><given-names>Ram</given-names></name><xref ref-type="aff" rid="j_jds1122_aff_001">1</xref>
</contrib>
<contrib contrib-type="author">
<contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-1279-689X</contrib-id>
<name><surname>Doleck</surname><given-names>Tenzin</given-names></name><xref ref-type="aff" rid="j_jds1122_aff_002">2</xref>
</contrib>
<aff id="j_jds1122_aff_001"><label>1</label>Department of Computer Science and Engineering, <institution>Colorado Mesa University (CMU)</institution>, Grand Junction, CO 81501, <country>USA</country></aff>
<aff id="j_jds1122_aff_002"><label>2</label>Faculty of Education, <institution>Simon Fraser University</institution>, Burnaby, BC V5A 1S6, <country>Canada</country></aff>
</contrib-group>
<author-notes>
<corresp id="cor1"><label>∗</label>Corresponding author. Email: <ext-link ext-link-type="uri" xlink:href="mailto:jehalladay112@gmail.com">jehalladay112@gmail.com</ext-link>.</corresp>
</author-notes>
<pub-date pub-type="ppub"><year>2025</year></pub-date><pub-date pub-type="epub"><day>19</day><month>4</month><year>2024</year></pub-date><volume>23</volume><issue>1</issue><fpage>109</fpage><lpage>129</lpage><supplementary-material id="S1" content-type="archive" xlink:href="jds1122_s001.zip" mimetype="application" mime-subtype="x-zip-compressed">
<caption>
<title>Supplementary Material</title>
<p>We provide the code and datasets separately in the supplementary material. Included in the code is also all of the figures included in the paper in svg, pdf, and png format. The code reflects the contents of the github repository used for these experiments at the time of publication (<xref ref-type="bibr" rid="j_jds1122_ref_012">Halladay et al.</xref>, <xref ref-type="bibr" rid="j_jds1122_ref_012">2023</xref>).</p>
</caption>
</supplementary-material><history><date date-type="received"><day>13</day><month>10</month><year>2023</year></date><date date-type="accepted"><day>13</day><month>2</month><year>2024</year></date></history>
<permissions><copyright-statement>2025 The Author(s). Published by the School of Statistics and the Center for Applied Statistics, Renmin University of China.</copyright-statement><copyright-year>2025</copyright-year>
<license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>Open access article under the <ext-link ext-link-type="uri" xlink:href="https://creativecommons.org/licenses/by/4.0/">CC BY</ext-link> license.</license-p></license></permissions>
<abstract>
<p>There has been remarkable progress in the field of deep learning, particularly in areas such as image classification, object detection, speech recognition, and natural language processing. Convolutional Neural Networks (CNNs) have emerged as a dominant model of computation in this domain, delivering exceptional accuracy in image recognition tasks. Inspired by their success, researchers have explored the application of CNNs to tabular data. However, CNNs trained on structured tabular data often yield subpar results. Hence, there has been a demonstrated gap between the performance of deep learning models and shallow models on tabular data. To that end, Tabular-to-Image (T2I) algorithms have been introduced to convert tabular data into an unstructured image format. T2I algorithms enable the encoding of spatial information into the image, which CNN models can effectively utilize for classification. In this work, we propose two novel T2I algorithms, Binary Image Encoding (BIE) and correlated Binary Image Encoding (cBIE), which preserve complex relationships in the generated image by leveraging the native binary representation of the data. Additionally, cBIE captures more spatial information by reordering columns based on their correlation to a feature. To evaluate the performance of our algorithms, we conducted experiments using four benchmark datasets, employing ResNet-50 as the deep learning model. Our results show that the ResNet-50 models trained with images generated using BIE and cBIE consistently outperformed or matched models trained on images created using the previous State of the Art method, Image Generator for Tabular Data (IGTD).</p>
</abstract>
<kwd-group>
<label>Keywords</label>
<kwd>computer vision</kwd>
<kwd>DeepInsight</kwd>
<kwd>IGTD</kwd>
<kwd>native representation</kwd>
<kwd>ResNet-50</kwd>
<kwd>tabular-to-image</kwd>
</kwd-group>
<funding-group><award-group><funding-source xlink:href="https://doi.org/10.13039/100023076">State of Colorado</funding-source></award-group><funding-statement>This work was supported by the State of Colorado through funds appropriated for cybersecurity by a piece of legislation dubbed “Cyber Coding Cryptology for State Records.” </funding-statement></funding-group>
</article-meta>
</front>
<back>
<ref-list id="j_jds1122_reflist_001">
<title>References</title>
<ref id="j_jds1122_ref_001">
<mixed-citation publication-type="other"> <string-name><surname>Aeberhard</surname> <given-names>S</given-names></string-name>, <string-name><surname>Forina</surname> <given-names>M</given-names></string-name> (1991). Wine. UCI Machine Learning Repository. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.24432/C5PC7J" xlink:type="simple">https://doi.org/10.24432/C5PC7J</ext-link></mixed-citation>
</ref>
<ref id="j_jds1122_ref_002">
<mixed-citation publication-type="journal"> <string-name><surname>Albanese</surname> <given-names>C</given-names></string-name>, <string-name><surname>Li</surname> <given-names>D</given-names></string-name>, <string-name><surname>Lobachevskiy</surname> <given-names>E</given-names></string-name>, <string-name><surname>Meissner</surname> <given-names>G</given-names></string-name> (<year>2013</year>). <article-title>A comparative analysis of correlation approaches in finance</article-title>. <source><italic>The Journal of Derivatives</italic></source>, <volume>21</volume>(<issue>2</issue>): <fpage>42</fpage>–<lpage>66</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.3905/jod.2013.21.2.042" xlink:type="simple">https://doi.org/10.3905/jod.2013.21.2.042</ext-link></mixed-citation>
</ref>
<ref id="j_jds1122_ref_003">
<mixed-citation publication-type="other"> <string-name><surname>Alom</surname> <given-names>MZ</given-names></string-name>, <string-name><surname>Taha</surname> <given-names>TM</given-names></string-name>, <string-name><surname>Yakopcic</surname> <given-names>C</given-names></string-name>, <string-name><surname>Westberg</surname> <given-names>S</given-names></string-name>, <string-name><surname>Sidike</surname> <given-names>P</given-names></string-name>, <string-name><surname>Nasrin</surname> <given-names>MS</given-names></string-name>, et al. (<year>2018</year>). The history began from alexnet: A comprehensive survey on deep learning approaches.</mixed-citation>
</ref>
<ref id="j_jds1122_ref_004">
<mixed-citation publication-type="other"> <string-name><surname>Buturović</surname> <given-names>L</given-names></string-name>, <string-name><surname>Miljković</surname> <given-names>D</given-names></string-name> (<year>2020</year>). A novel method for classification of tabular data using convolutional neural networks. <italic>BioRxiv</italic>, 2020–05. <uri>https://doi.org/10.1101/2020.05.02.074203</uri></mixed-citation>
</ref>
<ref id="j_jds1122_ref_005">
<mixed-citation publication-type="journal"> <string-name><surname>Cawley</surname> <given-names>GC</given-names></string-name>, <string-name><surname>Talbot</surname> <given-names>NL</given-names></string-name> (<year>2010</year>). <article-title>On over-fitting in model selection and subsequent selection bias in performance evaluation</article-title>. <source><italic>Journal of Machine Learning Research</italic></source>, <volume>11</volume>: <fpage>2079</fpage>–<lpage>2107</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1122_ref_006">
<mixed-citation publication-type="other"> <string-name><surname>Choi</surname> <given-names>S</given-names></string-name>, <string-name><surname>Fang</surname> <given-names>C</given-names></string-name>, <string-name><surname>Haddad</surname> <given-names>D</given-names></string-name>, <string-name><surname>Kim</surname> <given-names>M</given-names></string-name> (<year>2022</year>). Predictive modeling of charge levels for battery electric vehicles using cnn efficientnet and igtd algorithm. arXiv preprint: <uri>https://arxiv.org/abs/2206.03612</uri></mixed-citation>
</ref>
<ref id="j_jds1122_ref_007">
<mixed-citation publication-type="chapter"> <string-name><surname>Das</surname> <given-names>HP</given-names></string-name>, <string-name><surname>Spanos</surname> <given-names>CJ</given-names></string-name> (<year>2022</year>). <chapter-title>Improved dequantization and normalization methods for tabular data pre-processing in smart buildings</chapter-title>. In: <source><italic>Proceedings of the 9th ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and Transportation</italic></source>, <fpage>168</fpage>–<lpage>177</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1122_ref_008">
<mixed-citation publication-type="journal"> <string-name><surname>Fisher</surname> <given-names>RA</given-names></string-name> (<year>1936</year>). <article-title>The use of multiple measurements in taxonomic problems</article-title>. <source><italic>Annals of Eugenics</italic></source>, <volume>7</volume>(<issue>2</issue>): <fpage>179</fpage>–<lpage>188</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1111/j.1469-1809.1936.tb02137.x" xlink:type="simple">https://doi.org/10.1111/j.1469-1809.1936.tb02137.x</ext-link></mixed-citation>
</ref>
<ref id="j_jds1122_ref_009">
<mixed-citation publication-type="other"> <string-name><surname>Fisher</surname> <given-names>RA</given-names></string-name> (<year>1988</year>). Iris. UCI Machine Learning Repository. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.24432/C56C76" xlink:type="simple">https://doi.org/10.24432/C56C76</ext-link></mixed-citation>
</ref>
<ref id="j_jds1122_ref_010">
<mixed-citation publication-type="journal"> <string-name><surname>Gokhale</surname> <given-names>M</given-names></string-name>, <string-name><surname>Mohanty</surname> <given-names>SK</given-names></string-name>, <string-name><surname>Ojha</surname> <given-names>A</given-names></string-name> (<year>2023</year>). <article-title>Genevit: Gene vision transformer with improved deepinsight for cancer classification</article-title>. <source><italic>Computers in Biology and Medicine</italic></source>, <volume>155</volume>: <fpage>106643</fpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1016/j.compbiomed.2023.106643" xlink:type="simple">https://doi.org/10.1016/j.compbiomed.2023.106643</ext-link></mixed-citation>
</ref>
<ref id="j_jds1122_ref_011">
<mixed-citation publication-type="journal"> <string-name><surname>Halladay</surname> <given-names>J</given-names></string-name>, <string-name><surname>Cullen</surname> <given-names>D</given-names></string-name>, <string-name><surname>Briner</surname> <given-names>N</given-names></string-name>, <string-name><surname>Warren</surname> <given-names>J</given-names></string-name>, <string-name><surname>Fye</surname> <given-names>K</given-names></string-name>, <string-name><surname>Basnet</surname> <given-names>R</given-names></string-name>, <etal>et al.</etal> (<year>2022</year>). <article-title>Detection and characterization of ddos attacks using time-based features</article-title>. <source><italic>IEEE Access</italic></source>, <volume>10</volume>: <fpage>49794</fpage>–<lpage>49807</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/ACCESS.2022.3173319" xlink:type="simple">https://doi.org/10.1109/ACCESS.2022.3173319</ext-link></mixed-citation>
</ref>
<ref id="j_jds1122_ref_012">
<mixed-citation publication-type="other"> <string-name><surname>Halladay</surname> <given-names>J</given-names></string-name>, <string-name><surname>Cullen</surname> <given-names>D</given-names></string-name>, <string-name><surname>Briner</surname> <given-names>N</given-names></string-name>, <string-name><surname>Watson</surname> <given-names>W</given-names></string-name>, <string-name><surname>Miller</surname> <given-names>D</given-names></string-name>, <string-name><surname>Primeau</surname> <given-names>R</given-names></string-name> (<year>2023</year>). Binary image transformation: Github repository.</mixed-citation>
</ref>
<ref id="j_jds1122_ref_013">
<mixed-citation publication-type="journal"> <string-name><surname>Hand</surname> <given-names>DJ</given-names></string-name>, <string-name><surname>Christen</surname> <given-names>P</given-names></string-name>, <string-name><surname>Kirielle</surname> <given-names>N</given-names></string-name> (<year>2021</year>). <article-title>F*: An interpretable transformation of the f-measure</article-title>. <source><italic>Machine Learning</italic></source>, <volume>110</volume>(<issue>3</issue>): <fpage>451</fpage>–<lpage>456</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1007/s10994-021-05964-1" xlink:type="simple">https://doi.org/10.1007/s10994-021-05964-1</ext-link></mixed-citation>
</ref>
<ref id="j_jds1122_ref_014">
<mixed-citation publication-type="journal"> <string-name><surname>He</surname> <given-names>H</given-names></string-name>, <string-name><surname>Garcia</surname> <given-names>EA</given-names></string-name> (<year>2009</year>). <article-title>Learning from imbalanced data</article-title>. <source><italic>IEEE Transactions on Knowledge and Data Engineering</italic></source>, <volume>21</volume>(<issue>9</issue>): <fpage>1263</fpage>–<lpage>1284</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/TKDE.2008.239" xlink:type="simple">https://doi.org/10.1109/TKDE.2008.239</ext-link></mixed-citation>
</ref>
<ref id="j_jds1122_ref_015">
<mixed-citation publication-type="chapter"> <string-name><surname>He</surname> <given-names>K</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>X</given-names></string-name>, <string-name><surname>Ren</surname> <given-names>S</given-names></string-name>, <string-name><surname>Sun</surname> <given-names>J</given-names></string-name> (<year>2016</year>a). <chapter-title>Deep residual learning for image recognition</chapter-title>. In: <source><italic>Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition</italic></source>, <fpage>770</fpage>–<lpage>778</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1122_ref_016">
<mixed-citation publication-type="chapter"> <string-name><surname>He</surname> <given-names>K</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>X</given-names></string-name>, <string-name><surname>Ren</surname> <given-names>S</given-names></string-name>, <string-name><surname>Sun</surname> <given-names>J</given-names></string-name> (<year>2016</year>b). <chapter-title>Identity mappings in deep residual networks</chapter-title>. In: <source><italic>Proceedings, Part IV 14</italic></source>. <conf-name>Computer Vision–ECCV 2016: 14th European Conference</conf-name>. <conf-loc>Amsterdam, The Netherlands</conf-loc>. <conf-date>October 11–14, 2016</conf-date>, <fpage>630</fpage>–<lpage>645</lpage>. <publisher-name>Springer</publisher-name>.</mixed-citation>
</ref>
<ref id="j_jds1122_ref_017">
<mixed-citation publication-type="journal"> <string-name><surname>Hossin</surname> <given-names>M</given-names></string-name>, <string-name><surname>Sulaiman</surname> <given-names>MN</given-names></string-name> (<year>2015</year>). <article-title>A review on evaluation metrics for data classification evaluations</article-title>. <source><italic>International Journal of Data Mining &amp; Knowledge Management Process</italic></source>, <volume>5</volume>(<issue>2</issue>): <fpage>1</fpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.5121/ijdkp.2015.5201" xlink:type="simple">https://doi.org/10.5121/ijdkp.2015.5201</ext-link></mixed-citation>
</ref>
<ref id="j_jds1122_ref_018">
<mixed-citation publication-type="journal"> <string-name><surname>Iqbal</surname> <given-names>MI</given-names></string-name>, <string-name><surname>Mukta</surname> <given-names>MSH</given-names></string-name>, <string-name><surname>Hasan</surname> <given-names>AR</given-names></string-name>, <string-name><surname>Islam</surname> <given-names>S</given-names></string-name> (<year>2022</year>). <article-title>A dynamic weighted tabular method for convolutional neural networks</article-title>. <source><italic>IEEE Access</italic></source>, <volume>10</volume>: <fpage>134183</fpage>–<lpage>134198</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/ACCESS.2022.3231102" xlink:type="simple">https://doi.org/10.1109/ACCESS.2022.3231102</ext-link></mixed-citation>
</ref>
<ref id="j_jds1122_ref_019">
<mixed-citation publication-type="other"> <string-name><surname>Koonce</surname> <given-names>B</given-names></string-name> (<year>2021</year>). <italic>ResNet 50</italic>, 63–72. Apress, Berkeley, CA</mixed-citation>
</ref>
<ref id="j_jds1122_ref_020">
<mixed-citation publication-type="chapter"> <string-name><surname>Krizhevsky</surname> <given-names>A</given-names></string-name>, <string-name><surname>Sutskever</surname> <given-names>I</given-names></string-name>, <string-name><surname>Hinton</surname> <given-names>GE</given-names></string-name> (<year>2012</year>). <chapter-title>Imagenet classification with deep convolutional neural networks</chapter-title>. <source><italic>Advances in neural information processing systems</italic></source>, (<string-name><given-names>F</given-names> <surname>Pereira</surname></string-name>, <string-name><given-names>CJ</given-names> <surname>Burges</surname></string-name>, <string-name><given-names>L</given-names> <surname>Bottou</surname></string-name>, <string-name><given-names>KQ</given-names> <surname>Weinberger</surname></string-name>, eds.) <volume>25</volume>.</mixed-citation>
</ref>
<ref id="j_jds1122_ref_021">
<mixed-citation publication-type="journal"> <string-name><surname>Krupski</surname> <given-names>J</given-names></string-name>, <string-name><surname>Graniszewski</surname> <given-names>W</given-names></string-name>, <string-name><surname>Iwanowski</surname> <given-names>M</given-names></string-name> (<year>2021</year>). <article-title>Data transformation schemes for cnn-based network traffic analysis: A survey</article-title>. <source><italic>Electronics</italic></source>, <volume>10</volume>(<issue>16</issue>): <fpage>2042</fpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.3390/electronics10162042" xlink:type="simple">https://doi.org/10.3390/electronics10162042</ext-link></mixed-citation>
</ref>
<ref id="j_jds1122_ref_022">
<mixed-citation publication-type="chapter"> <string-name><surname>Ling</surname> <given-names>CX</given-names></string-name>, <string-name><surname>Huang</surname> <given-names>J</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>H</given-names></string-name> (<year>2003</year>). <chapter-title>Auc: A better measure than accuracy in comparing learning algorithms</chapter-title>. In: <source><italic>Advances in Artificial Intelligence: 16th Conference of the Canadian Society for Computational Studies of Intelligence</italic></source> (<string-name><given-names>Y</given-names> <surname>Xiang</surname></string-name>, (<string-name><given-names>B</given-names> <surname>Chaib-Draa</surname></string-name>, eds.), volume <volume>16</volume> of <series><italic>Proceedings</italic></series>, <conf-loc>AI 2003, Halifax, Canada, June 11–13, 2003</conf-loc>, <fpage>329</fpage>–<lpage>341</lpage>. <publisher-name>Springer</publisher-name>.</mixed-citation>
</ref>
<ref id="j_jds1122_ref_023">
<mixed-citation publication-type="chapter"> <string-name><surname>Moskalenko</surname> <given-names>A</given-names></string-name>, <string-name><surname>Moskalenko</surname> <given-names>V</given-names></string-name>, <string-name><surname>Shaiekhov</surname> <given-names>A</given-names></string-name>, <string-name><surname>Zaretskyi</surname> <given-names>M</given-names></string-name> (<year>2020</year>). <chapter-title>Multi-layer model and training method for information-extreme malware traffic detector</chapter-title>. In: <source><italic>CMIS</italic></source>, <fpage>288</fpage>–<lpage>299</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1122_ref_024">
<mixed-citation publication-type="chapter"> <string-name><surname>Noroozi</surname> <given-names>M</given-names></string-name>, <string-name><surname>Favaro</surname> <given-names>P</given-names></string-name> (<year>2016</year>). <chapter-title>Unsupervised learning of visual representations by solving jigsaw puzzles</chapter-title>. In: <source><italic>European Conference on Computer Vision</italic></source>, <fpage>69</fpage>–<lpage>84</lpage>. <publisher-name>Springer</publisher-name>.</mixed-citation>
</ref>
<ref id="j_jds1122_ref_025">
<mixed-citation publication-type="journal"> <string-name><surname>Rabbah</surname> <given-names>J</given-names></string-name>, <string-name><surname>Ridouani</surname> <given-names>M</given-names></string-name>, <string-name><surname>Hassouni</surname> <given-names>L</given-names></string-name> (<year>2022</year>). <article-title>A new churn prediction model based on deep insight features transformation for convolution neural network architecture and stacknet</article-title>. <source><italic>International Journal of Web-Based Learning and Teaching Technologies (IJWLTT)</italic></source>, <volume>17</volume>(<issue>1</issue>): <fpage>1</fpage>–<lpage>18</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.4018/ijwltt.300342" xlink:type="simple">https://doi.org/10.4018/ijwltt.300342</ext-link></mixed-citation>
</ref>
<ref id="j_jds1122_ref_026">
<mixed-citation publication-type="other"> <string-name><surname>Seger</surname> <given-names>C</given-names></string-name> (<year>2018</year>). An investigation of categorical variable encoding techniques in machine learning: Binary versus one-hot and feature hashing.</mixed-citation>
</ref>
<ref id="j_jds1122_ref_027">
<mixed-citation publication-type="chapter"> <string-name><surname>Sharafaldin</surname> <given-names>I</given-names></string-name>, <string-name><surname>Lashkari</surname> <given-names>AH</given-names></string-name>, <string-name><surname>Hakak</surname> <given-names>S</given-names></string-name>, <string-name><surname>Ghorbani</surname> <given-names>AA</given-names></string-name> (<year>2019</year>). <chapter-title>Developing realistic distributed denial of service (ddos) attack dataset and taxonomy</chapter-title>. In: <source><italic>2019 International Carnahan Conference on Security Technology (ICCST)</italic></source>, <fpage>1</fpage>–<lpage>8</lpage>. <publisher-name>IEEE</publisher-name>.</mixed-citation>
</ref>
<ref id="j_jds1122_ref_028">
<mixed-citation publication-type="journal"> <string-name><surname>Sharma</surname> <given-names>A</given-names></string-name>, <string-name><surname>Vans</surname> <given-names>E</given-names></string-name>, <string-name><surname>Shigemizu</surname> <given-names>D</given-names></string-name>, <string-name><surname>Boroevich</surname> <given-names>KA</given-names></string-name>, <string-name><surname>Tsunoda</surname> <given-names>T</given-names></string-name> (<year>2019</year>). <article-title>Deepinsight: A methodology to transform a non-image data to an image for convolution neural network architecture</article-title>. <source><italic>Scientific Reports</italic></source>, <volume>9</volume>(<issue>1</issue>): <fpage>11399</fpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1038/s41598-019-47765-6" xlink:type="simple">https://doi.org/10.1038/s41598-019-47765-6</ext-link></mixed-citation>
</ref>
<ref id="j_jds1122_ref_029">
<mixed-citation publication-type="other"> <string-name><surname>Simon</surname> <given-names>M</given-names></string-name>, <string-name><surname>Rodner</surname> <given-names>E</given-names></string-name>, <string-name><surname>Denzler</surname> <given-names>J</given-names></string-name> (<year>2016</year>). Imagenet pre-trained models with batch normalization. arXiv preprint: <uri>https://arxiv.org/abs/1612.01452</uri></mixed-citation>
</ref>
<ref id="j_jds1122_ref_030">
<mixed-citation publication-type="other"> <string-name><surname>Simonyan</surname> <given-names>K</given-names></string-name>, <string-name><surname>Zisserman</surname> <given-names>A</given-names></string-name> (<year>2014</year>). Very deep convolutional networks for large-scale image recognition. arXiv preprint: <uri>https://arxiv.org/abs/1409.1556</uri></mixed-citation>
</ref>
<ref id="j_jds1122_ref_031">
<mixed-citation publication-type="chapter"> <string-name><surname>Sun</surname> <given-names>B</given-names></string-name>, <string-name><surname>Yang</surname> <given-names>L</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>W</given-names></string-name>, <string-name><surname>Lin</surname> <given-names>M</given-names></string-name>, <string-name><surname>Dong</surname> <given-names>P</given-names></string-name>, <string-name><surname>Young</surname> <given-names>C</given-names></string-name>, <etal>et al.</etal> (<year>2019</year>). <chapter-title>Supertml: Two-dimensional word embedding for the precognition on structured tabular data</chapter-title>. In: <source><italic>Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops</italic></source>. <fpage>2973</fpage>–<lpage>2981</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1122_ref_032">
<mixed-citation publication-type="chapter"> <string-name><surname>Szegedy</surname> <given-names>C</given-names></string-name>, <string-name><surname>Vanhoucke</surname> <given-names>V</given-names></string-name>, <string-name><surname>Ioffe</surname> <given-names>S</given-names></string-name>, <string-name><surname>Shlens</surname> <given-names>J</given-names></string-name>, <string-name><surname>Wojna</surname> <given-names>Z</given-names></string-name> (<year>2016</year>). <chapter-title>Rethinking the inception architecture for computer vision</chapter-title>. In: <source><italic>Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition</italic></source>, <fpage>2818</fpage>–<lpage>2826</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1122_ref_033">
<mixed-citation publication-type="journal"> <string-name><surname>Taheri</surname> <given-names>A</given-names></string-name>, <string-name><surname>Ebrahimnezhad</surname> <given-names>H</given-names></string-name>, <string-name><surname>Sedaaghi</surname> <given-names>MH</given-names></string-name> (<year>2022</year>). <article-title>Prediction of the critical temperature of superconducting materials using image regression and ensemble deep learning</article-title>. <source><italic>Materials Today Communications</italic></source>, <volume>33</volume>: <fpage>104743</fpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1016/j.mtcomm.2022.104743" xlink:type="simple">https://doi.org/10.1016/j.mtcomm.2022.104743</ext-link></mixed-citation>
</ref>
<ref id="j_jds1122_ref_034">
<mixed-citation publication-type="chapter"> <string-name><surname>Wang</surname> <given-names>W</given-names></string-name>, <string-name><surname>Zhu</surname> <given-names>M</given-names></string-name>, <string-name><surname>Zeng</surname> <given-names>X</given-names></string-name>, <string-name><surname>Ye</surname> <given-names>X</given-names></string-name>, <string-name><surname>Sheng</surname> <given-names>Y</given-names></string-name> (<year>2017</year>). <chapter-title>Malware traffic classification using convolutional neural network for representation learning</chapter-title>. In: <source><italic>2017 International Conference on Information Networking (ICOIN)</italic></source>, <fpage>712</fpage>–<lpage>717</lpage>. <publisher-name>IEEE</publisher-name>.</mixed-citation>
</ref>
<ref id="j_jds1122_ref_035">
<mixed-citation publication-type="other"> <string-name><surname>Wolberg</surname> <given-names>W</given-names></string-name>, <string-name><surname>Mangasarian</surname> <given-names>O</given-names></string-name>, <string-name><surname>Street</surname> <given-names>N</given-names></string-name>, <string-name><surname>Street</surname> <given-names>W</given-names></string-name> (<year>1995</year>). Breast Cancer Wisconsin (Diagnostic). UCI Machine Learning Repository. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.24432/C5DW2B" xlink:type="simple">https://doi.org/10.24432/C5DW2B</ext-link></mixed-citation>
</ref>
<ref id="j_jds1122_ref_036">
<mixed-citation publication-type="chapter"> <string-name><surname>Xie</surname> <given-names>S</given-names></string-name>, <string-name><surname>Girshick</surname> <given-names>R</given-names></string-name>, <string-name><surname>Dollár</surname> <given-names>P</given-names></string-name>, <string-name><surname>Tu</surname> <given-names>Z</given-names></string-name>, <string-name><surname>He</surname> <given-names>K</given-names></string-name> (<year>2017</year>). <chapter-title>Aggregated residual transformations for deep neural networks</chapter-title>. In: <source><italic>Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition</italic></source>, <fpage>1492</fpage>–<lpage>1500</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1122_ref_037">
<mixed-citation publication-type="journal"> <string-name><surname>Zhu</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Brettin</surname> <given-names>T</given-names></string-name>, <string-name><surname>Xia</surname> <given-names>F</given-names></string-name>, <string-name><surname>Partin</surname> <given-names>A</given-names></string-name>, <string-name><surname>Shukla</surname> <given-names>M</given-names></string-name>, <string-name><surname>Yoo</surname> <given-names>H</given-names></string-name>, <etal>et al.</etal> (<year>2021</year>). <article-title>Converting tabular data into images for deep learning with convolutional neural networks</article-title>. <source><italic>Scientific Reports</italic></source>, <volume>11</volume>(<issue>1</issue>): <fpage>11325</fpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1038/s41598-021-90923-y" xlink:type="simple">https://doi.org/10.1038/s41598-021-90923-y</ext-link></mixed-citation>
</ref>
</ref-list>
</back>
</article>
