default search action
Shyue-Liang Wang
Shyue-Liang Leon Wang – Leon S. L. Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2021
- [j52]Dominik Slezak, Tzung-Pei Hong, Leon S. L. Wang:
Preface: Information Granulation in Data Science and Scalable Computing. Fundam. Informaticae 182(2) (2021) - [c84]Tzung-Pei Hong, Wei-Chun Peng, Ja-Hwung Su, Shyue-Liang Wang:
Fuzzy Adaptive Focal Loss for Imbalanced Datasets. IST 2021: 1-5 - 2020
- [j51]Tzung-Pei Hong, Cheng-Yu Lin, Wei-Ming Huang, Katherine Shu-Min Li, Shyue-Liang Leon Wang, Jerry Chun-Wei Lin:
Using Tree Structure to Mine High Temporal Fuzzy Utility Itemsets. IEEE Access 8: 153692-153706 (2020) - [j50]Yu-Chuan Tsai, Shyue-Liang Wang, I-Hsien Ting, Tzung-Pei Hong:
Flexible sensitive K-anonymization on transactions. World Wide Web 23(4): 2391-2406 (2020) - [c83]Tzung-Pei Hong, Ming-Jhe Hu, Tank-Kai Yin, Shyue-Liang Wang:
Extracting Multi-Scale Rotation-Invariant Features in Convolution Neural Networks. IEEE BigData 2020: 5360-5365 - [c82]Jerry Chun-Wei Lin, Gautam Srivastava, Yuanfa Li, Tzung-Pei Hong, Shyue-Liang Wang:
Mining High-Utility Sequential Patterns in Uncertain Databases. IEEE BigData 2020: 5373-5380 - [c81]Tzung-Pei Hong, Cheng-Yu Lin, Wei-Ming Huang, Shu-Min Li, Shyue-Liang Wang, Jerry Chun-Wei Lin:
One-Phase Temporal Fuzzy Utility Mining. FUZZ-IEEE 2020: 1-5
2010 – 2019
- 2019
- [c80]Tzung-Pei Hong, Cheng-Yu Lin, Wei-Ming Huang, Shu-Min Li, Shyue-Liang Wang, Jerry Chun-Wei Lin:
Mining Temporal Fuzzy Utility Itemsets by Tree Structure. IEEE BigData 2019: 2659-2663 - [c79]Jerry Chun-Wei Lin, Yuanfa Li, Philippe Fournier-Viger, Youcef Djenouri, Shyue-Liang Leon Wang:
Mining High-Utility Sequential Patterns from Big Datasets. IEEE BigData 2019: 2674-2680 - 2018
- [c78]Yu-Chuan Tsai, Shyue-Liang Wang, I-Hsien Ting, Tzung-Pei Hong:
Flexible Anonymization of Transactions with Sensitive Items. BESC 2018: 201-206 - [c77]Wensheng Gan, Jerry Chun-Wei Lin, Han-Chieh Chao, Shyue-Liang Wang, Philip S. Yu:
Privacy Preserving Utility Mining: A Survey. IEEE BigData 2018: 2617-2626 - [c76]Tzung-Pei Hong, Chia-Che Li, Shyue-Liang Wang, Jerry Chun-Wei Lin:
Reducing Database Scan in Maintaining Erasable Itemsets from Product Deletion. IEEE BigData 2018: 2627-2632 - [c75]Tzung-Pei Hong, Yu-Chiao Yang, Ja-Hwung Su, Shyue-Liang Wang:
Recognition and Counting of Motorcycles by Fusing Support Vector Machine and Deep Learning. ICS 2018: 157-162 - [c74]Aída Cristina Gálvez, Melissa Castañeda, Giovanny Tarazona, Jorge Mario Calvo, Leon S. L. Wang:
Model of Integration of Business Intelligence and Knowledge Management. KMO 2018: 511-522 - [c73]Tzung-Pei Hong, Chia-Che Li, Shyue-Liang Wang, Chun-Wei Lin:
Maintenance of Erasable Itemsets for Product Deletion. MISNC 2018: 18:1-18:4 - [i1]Wensheng Gan, Jerry Chun-Wei Lin, Han-Chieh Chao, Shyue-Liang Wang, Philip S. Yu:
Privacy Preserving Utility Mining: A Survey. CoRR abs/1811.07389 (2018) - 2017
- [j49]Tzung-Pei Hong, Been-Chian Chien, Wen-Yang Lin, Shyue-Liang Wang:
Editorial. Intell. Data Anal. 21(S1): S1-S3 (2017) - [j48]Shyue-Liang Wang, Min-Jye Hsiu, Yu-Chuan Tsai, I-Hsien Ting, Tzung-Pei Hong:
Analysis of privacy and utility tradeoffs in anonymized mobile context streams. Intell. Data Anal. 21(S1): S21-S39 (2017) - [j47]Tzung-Pei Hong, Yuan-Ching Peng, Wen-Yang Lin, Shyue-Liang Wang:
Empirical comparison of level-wise hierarchical multi-population genetic algorithm. J. Inf. Telecommun. 1(1): 66-78 (2017) - [j46]Wen-Yang Lin, Hsin-Chang Yang, Tzung-Pei Hong, Leon S. L. Wang:
Special issue on intelligent analytics and management of mobile data and social media. Soft Comput. 21(15): 4159-4160 (2017) - [j45]Shyue-Liang Wang, Yu-Chuan Tsai, Tzung-Pei Hong, Hung-Yu Kao:
k--anonymization of multiple shortest paths. Soft Comput. 21(15): 4215-4226 (2017) - [c72]I-Hsien Ting, Wun Sheng Liou, Dario Liberona, Shyue-Liang Wang, Giovanny Mauricio Tarazona Bermúdez:
Towards the detection of cyberbullying based on social network mining techniques. BESC 2017: 1-2 - [c71]Tzung-Pei Hong, Lu-Hung Chen, Shyue-Liang Wang, Chun-Wei Lin, Bay Vo:
Quasi-erasable itemset mining. IEEE BigData 2017: 1816-1820 - [c70]Tzung-Pei Hong, Yuan-Ching Peng, Wen-Yang Lin, Shyue-Liang Wang:
Migration Effect of Hierarchical Multi-Population Genetic Algorithm. CYBCONF 2017: 1-4 - [c69]Chih-Hung Chao, Yi-Chung Tseng, Shyue-Liang Wang:
Performance Analysis of a Propagation Territory-based Routing in MANETs with Obstacles. MISNC 2017: 34:1-34:7 - [c68]Tzung-Pei Hong, Jen-Hao Hsu, Guo-Cheng Lan, Kung-Jiuan Yang, Shyue-Liang Wang, Jerry Chun-Wei Lin:
High Utility Partial Periodic Pattern Mining. MISNC 2017: 35:1-35:4 - [c67]Tzung-Pei Hong, Jen-Hao Hsu, Kung-Jiuan Yang, Guo-Cheng Lan, Jerry Chun-Wei Lin, Shyue-Liang Wang:
Mining high utility partial periodic pattern by GPA. SMC 2017: 820-824 - 2016
- [j44]Jerry Chun-Wei Lin, Lu Yang, Philippe Fournier-Viger, Jimmy Ming-Tai Wu, Tzung-Pei Hong, Shyue-Liang Leon Wang, Justin Zhan:
Mining high-utility itemsets based on particle swarm optimization. Eng. Appl. Artif. Intell. 55: 320-330 (2016) - [j43]Shyue-Liang Wang, Jia-Wei Chen, I-Hsien Ting, Tzung-Pei Hong:
K, P)-Shortest Path Algorithm in the Cloud Maintaining Neighborhood Privacy. J. Web Eng. 15(1&2): 29-44 (2016) - [c66]Chih-Hong Huang, Hsing-Lung Lien, Shyue-Liang Leon Wang:
An Empirical Case Study of Internet Usage on Student Performance based on Fuzzy Association Rules. MISNC 2016: 7 - [c65]Chih-Hung Chao, Yi-Chung Tseng, Shyue-Liang Wang:
Complexity Analysis of a Propagation Territory-based Routing in MANET with Obstacles. MISNC 2016: 41 - [c64]Yu-Chuan Tsai, Shyue-Liang Wang, Cheng-Yu Song, I-Hsien Ting:
Privacy and Utility Effects of k-anonymity on Association Rule Hiding. MISNC 2016: 42 - [c63]Hsin-Chang Yang, Cathy S. Lin, Han-Wei Hsiao, Wen-Sheng Chen, Mei-Li Kao, Yuh-Tay Lin, Leon S. L. Wang:
Toward Construction of Open Election Data Model: A Case Study of Taiwan's Election Data. MISNC 2016: 51 - [c62]I-Hsien Ting, Zhenjiang Zhang, Shyue-Liang Leon Wang:
A Study of The Effect of Spiral of Silence between Different Social Networking Platforms. MISNC 2016: 55 - [c61]Tzung-Pei Hong, Yu-Yang Liu, Min-Thai Wu, Chun-Hao Chen, Shyue-Liang Leon Wang:
Genetic-fuzzy mining with MapReduce. SMC 2016: 3294-3298 - [e8]Gang Li, Yves Demazeau, Guandong Xu, Paul Wang, Leon S. L. Wang, Guanfeng Liu:
2016 International Conference on Behavioral, Economic and Socio-cultural Computing, BESC 2016, Durham, NC, USA, November 11-13, 2016. IEEE 2016, ISBN 978-1-5090-6164-8 [contents] - 2015
- [j42]Chun-Wei Lin, Tzung-Pei Hong, Kuo-Tung Yang, Shyue-Liang Wang:
The GA-based algorithms for optimizing hiding sensitive itemsets through transaction deletion. Appl. Intell. 42(2): 210-230 (2015) - [j41]Guo-Cheng Lan, Tzung-Pei Hong, Yi-Hsin Lin, Shyue-Liang Wang:
Fuzzy utility mining with upper-bound measure. Appl. Soft Comput. 30: 767-777 (2015) - [j40]Yu-Chuan Tsai, Shyue-Liang Wang, Hung-Yu Kao, Tzung-Pei Hong:
Edge types vs privacy in K-anonymization of shortest paths. Appl. Soft Comput. 31: 348-359 (2015) - [c60]Shyue-Liang Wang, Min-Jye Hsiu, I-Hsien Ting, Tzung-Pei Hong:
Toward Analyzing Privacy and Utility of Mobile User Data. ASE BD&SI 2015: 21:1-21:6 - [c59]Yu-Chuan Tsai, Shyue-Liang Wang, Tzung-Pei Hong, Hung-Yu Kao:
Extending [K 1 , K 2 ] Anonymization of Shortest Paths for Social Networks. MISNC 2015: 187-199 - [c58]Jerry Chun-Wei Lin, Lu Yang, Philippe Fournier-Viger, Jimmy Ming-Tai Wu, Tzung-Pei Hong, Shyue-Liang Leon Wang:
A Swarm-Based Approach to Mine High-Utility Itemsets. MISNC 2015: 572-581 - [e7]Leon S. L. Wang, Shiro Uesugi, I-Hsien Ting, Koji Okuhara, Kai Wang:
Multidisciplinary Social Networks Research - Second International Conference, MISNC 2015, Matsuyama, Japan, September 1-3, 2015. Proceedings. Communications in Computer and Information Science 540, Springer 2015, ISBN 978-3-662-48318-3 [contents] - 2014
- [j39]Shyue-Liang Wang, Yu-Chuan Tsai, Hung-Yu Kao, Tzung-Pei Hong:
On anonymizing transactions with sensitive items. Appl. Intell. 41(4): 1043-1058 (2014) - [j38]I-Hsien Ting, Shyue-Liang Wang, Po-Jen Chen:
Key Users and Box Office Analysis in an Interest Based Virtual Community. Comput. Informatics 33(3): 570-590 (2014) - [j37]Guo-Cheng Lan, Tzung-Pei Hong, Vincent S. Tseng, Shyue-Liang Wang:
Applying the maximum utility measure in high utility sequential pattern mining. Expert Syst. Appl. 41(11): 5071-5081 (2014) - [j36]Shyue-Liang Wang, Zheng-Ze Tsai, I-Hsien Ting, Tzung-Pei Hong:
K-anonymous path privacy on social graphs. J. Intell. Fuzzy Syst. 26(3): 1191-1199 (2014) - [j35]Tzung-Pei Hong, Yan-Liang Liou, Shyue-Liang Wang, Bay Vo:
Feature selection and replacement by clustering attributes. Vietnam. J. Comput. Sci. 1(1): 47-55 (2014) - [c57]Chun-Hao Chen, Guo-Cheng Lan, Tzung-Pei Hong, Shyue-Liang Wang, Yui-Kai Lin:
A Projection-Based Approach for Mining Highly Coherent Association Rules. ECC (1) 2014: 69-78 - [c56]Guo-Cheng Lan, Tzung-Pei Hong, Yu-Chieh Tseng, Shyue-Liang Wang:
Utility Knowledge Fusion in a Multi-site Environment. MISNC 2014: 171-178 - [c55]Yu-Chuan Tsai, Shyue-Liang Wang, Tzung-Pei Hong, Hung-Yu Kao:
[K1, K2]-anonymization of Shortest Paths. MoMM 2014: 317-321 - [c54]Guo-Cheng Lan, Tzung-Pei Hong, Yi-Hsin Lin, Shyue-Liang Wang:
Fast discovery of high fuzzy utility itemsets. SMC 2014: 2764-2767 - [e6]Jeng-Shyang Pan, Václav Snásel, Emilio Corchado, Ajith Abraham, Shyue-Liang Wang:
Intelligent Data analysis and its Applications, Volume I - Proceeding of the First Euro-China Conference on Intelligent Data Analysis and Applications, ECC 2014, June 13-15, 2014, Shenzhen, China. Advances in Intelligent Systems and Computing 297, Springer 2014, ISBN 978-3-319-07775-8 [contents] - [e5]Jeng-Shyang Pan, Václav Snásel, Emilio Corchado, Ajith Abraham, Shyue-Liang Wang:
Intelligent Data analysis and its Applications, Volume II - Proceeding of the First Euro-China Conference on Intelligent Data Analysis and Applications, June 13-15, 2014, Shenzhen, China. Advances in Intelligent Systems and Computing 298, Springer 2014, ISBN 978-3-319-07772-7 [contents] - [e4]Lorna Uden, Leon S. L. Wang, Juan Manuel Corchado Rodríguez, Hsin-Chang Yang, I-Hsien Ting:
The 8th International Conference on Knowledge Management in Organizations, Social and Big Data Computing for Knowledge Management, KMO 2013, Kaohsiung, Taiwan, 9-13 September 2013. Springer Proceedings in Complexity, Springer 2014, ISBN 978-94-007-7286-1 [contents] - [e3]Shyue-Liang Leon Wang, Jason J. June, Chung-Hong Lee, Koji Okuhara, Hsin-Chang Yang:
Multidisciplinary Social Networks Research - International Conference, MISNC 2014, Kaohsiung, Taiwan, September 13-14, 2014. Proceedings. Communications in Computer and Information Science 473, Springer 2014, ISBN 978-3-662-45070-3 [contents] - [e2]Shyue-Liang Leon Wang, Yu-Hui Tao, Liming Chen, Chung-Nan Lee:
Proceedings of the 12th International Conference on Advances in Mobile Computing and Multimedia, Kaohsiung, Taiwan, December 8-10, 2014. ACM 2014, ISBN 978-1-4503-3008-4 [contents] - 2013
- [j34]Tzung-Pei Hong, Chun-Wei Lin, Kuo-Tung Yang, Shyue-Liang Wang:
Using TF-IDF to hide sensitive itemsets. Appl. Intell. 38(4): 502-510 (2013) - [j33]Shyue-Liang Wang, Yu-Chuan Tsai, Hung-Yu Kao, I-Hsien Ting, Tzung-Pei Hong:
Shortest Paths Anonymization on Weighted Graphs. Int. J. Softw. Eng. Knowl. Eng. 23(1): 65-80 (2013) - [j32]Shyue-Liang Wang, Chung-Yi Chen, I-Hsien Ting, Tzung-Pei Hong:
Anonymous Spatial Query on Non-Uniform Data. Int. J. Data Warehous. Min. 9(4): 44-61 (2013) - [j31]Chun-Wei Lin, Tzung-Pei Hong, Chia-Ching Chang, Shyue-Liang Wang:
A Greedy-based Approach for Hiding Sensitive Itemsets by Transaction Insertion. J. Inf. Hiding Multim. Signal Process. 4(4): 201-214 (2013) - [c53]I-Hsien Ting, Shyue-Liang Wang, Hsing-Miao Chi, Jyun-Sing Wu:
Content matters: a study of hate groups detection based on social networks analysis and web mining. ASONAM 2013: 1196-1201 - [c52]Leon S. L. Wang:
Recent Studies in Privacy Preservation. iiWAS 2013: 3 - [c51]Shyue-Liang Wang, Jia-Wei Chen, I-Hsien Ting, Tzung-Pei Hong:
Sensitive and Neighborhood Privacy on Shortest Paths in the Cloud. iiWAS 2013: 555 - [c50]Shyue-Liang Wang, Ching-Chuan Shih, I-Hsien Ting, Tzung-Pei Hong:
Degree Anonymization for K-Shortest-Path Privacy. SMC 2013: 1093-1097 - [c49]Guo-Cheng Lan, Tzung-Pei Hong, Hong-Yu Lee, Shyue-Liang Wang, Chun-Wei Tsai:
Enhancing the Efficiency in Mining Weighted Frequent Itemsets. SMC 2013: 1104-1108 - 2012
- [j30]Tzung-Pei Hong, Ya-Fang Tung, Shyue-Liang Wang, Yu-Lung Wu, Min-Thai Wu:
A multi-level ant-colony mining algorithm for membership functions. Inf. Sci. 182(1): 3-14 (2012) - [j29]I-Hsing Ting, Pei-Shan Chang, Shyue-Liang Wang:
Understanding Microblog Users for Social Recommendation Based on Social Networks Analysis. J. Univers. Comput. Sci. 18(4): 554-576 (2012) - [c48]Hsiao-Hsuan Lu, I-Hsien Ting, Shyue-Liang Wang:
A Novel Search Engine Based on Social Relationships in Online Social Networking Website. ASONAM 2012: 1111-1116 - [c47]Tzung-Pei Hong, Chun-Wei Lin, Tsung-Ching Lin, Shyue-Liang Wang:
Incremental multiple fuzzy frequent pattern tree. FUZZ-IEEE 2012: 1-5 - [c46]Guo-Cheng Lan, Tzung-Pei Hong, Vincent S. Tseng, Shyue-Liang Wang:
An improved approach for sequential utility pattern mining. GrC 2012: 226-230 - [c45]Yu-Chuan Tsai, Shyue-Liang Wang, Hung-Yu Kao, Tzung-Pei Hong:
Confining Edge Types in K-anonymization of Shortest Paths. IBICA 2012: 318-322 - [c44]Shyue-Liang Wang, Chung-Yi Chen, I-Hsien Ting, Tzung-Pei Hong:
Anonymous spatial query on non-uniform data. iiWAS 2012: 126-131 - [c43]Shyue-Liang Wang, Chung-Yi Chen, I-Hsien Ting, Tzung-Pei Hong:
Multi-layer partition for query location anonymization. SMC 2012: 378-383 - 2011
- [j28]Tzung-Pei Hong, Cho-Han Lee, Shyue-Liang Wang:
Effective utility mining with the measure of average utility. Expert Syst. Appl. 38(7): 8259-8265 (2011) - [j27]Shyue-Liang Wang, Jyun-Da Chen, Paul A. Stirpe, Tzung-Pei Hong:
Risk-neutral evaluation of information security investment on data centers. J. Intell. Inf. Syst. 36(3): 329-345 (2011) - [c42]Shyue-Liang Wang, Zheng-Ze Tsai, Tzung-Pei Hong, I-Hsien Ting:
Anonymizing Shortest Paths on Social Network Graphs. ACIIDS (1) 2011: 129-136 - [c41]Pei-Shan Chang, I-Hsien Ting, Shyue-Liang Wang:
Towards Social Recommendation System Based on the Data from Microblogs. ASONAM 2011: 672-677 - [c40]Tzung-Pei Hong, Chun-Wei Lin, Chia-Ching Chang, Shyue-Liang Wang:
Hiding sensitive itemsets by inserting dummy transactions. GrC 2011: 246-249 - [c39]Shyue-Liang Wang, Yu-Chuan Tsai, Hung-Yu Kao, Tzung-Pei Hong:
K-anonymity on sensitive transaction items. GrC 2011: 723-727 - [c38]Shyue-Liang Wang, Zheng-Ze Tsai, Tzung-Pei Hong, I-Hsien Ting, Yu-Chuan Tsai:
Anonymizing Multiple K-anonymous Shortest Paths for Social Graphs. IBICA 2011: 195-198 - [c37]Chun-Wei Lin, Tzung-Pei Hong, Hong-Yu Lee, Shyue-Liang Wang:
Maintenance of Pre-large FUSP Trees in Dynamic Databases. IBICA 2011: 199-202 - [c36]Tzung-Pei Hong, Chun-Wei Lin, Kuo-Tung Yang, Shyue-Liang Wang:
A Heuristic Data-Sanitization Approach Based on TF-IDF. IEA/AIE (1) 2011: 156-164 - [c35]Tzung-Pei Hong, Chun-Wei Lin, Kuo-Tung Yang, Shyue-Liang Wang:
A lattice-based data sanitization approach. SMC 2011: 2325-2329 - [e1]Tzung-Pei Hong, Yasuo Kudo, Mineichi Kudo, Tsau Young Lin, Been-Chian Chien, Shyue-Liang Wang, Masahiro Inuiguchi, Guilong Liu:
2011 IEEE International Conference on Granular Computing, GrC-2011, Kaohsiung, Taiwan, November 8-10, 2011. IEEE Computer Society 2011, ISBN 978-1-4577-0372-0 [contents] - 2010
- [j26]Shyue-Liang Wang, Ting-Zheng Lai, Tzung-Pei Hong, Yu-Lung Wu:
Hiding collaborative recommendation association rules on horizontally partitioned data. Intell. Data Anal. 14(1): 47-67 (2010) - [c34]Shyue-Liang Wang, Tzung-Pei Hong, Yu-Chuan Tsai, Hung-Yu Kao:
Hiding Sensitive Association Rules on Stars. GrC 2010: 505-508 - [c33]Shyue-Liang Wang, Yu-Chuan Tsai, Hung-Yu Kao, Tzung-Pei Hong:
Anonymizing Set-Valued Social Data. GreenCom/CPSCom 2010: 809-812 - [c32]Shyue-Liang Wang, Tzung-Pei Hong, Yu-Chuan Tsai, Hung-Yu Kao:
Multi-table association rules hiding. ISDA 2010: 1298-1302
2000 – 2009
- 2009
- [j25]Tzung-Pei Hong, Chyan-Yuan Horng, Chih-Hung Wu, Shyue-Liang Wang:
An improved data mining approach using predictive itemsets. Expert Syst. Appl. 36(1): 72-80 (2009) - [j24]Shyue-Liang Wang:
Maintenance of sanitizing informative association rules. Expert Syst. Appl. 36(2): 4006-4012 (2009) - [j23]Tzung-Pei Hong, Yan-Liang Liou, Shyue-Liang Wang:
Fuzzy rough sets with hierarchical quantitative attributes. Expert Syst. Appl. 36(3): 6790-6799 (2009) - [j22]Tzung-Pei Hong, Yi-Ying Wu, Shyue-Liang Wang:
An effective mining approach for up-to-date patterns. Expert Syst. Appl. 36(6): 9747-9752 (2009) - [j21]Tzung-Pei Hong, Ya-Fang Tung, Shyue-Liang Wang, Min-Thai Wu, Yu-Lung Wu:
An ACS-based framework for fuzzy data mining. Expert Syst. Appl. 36(9): 11844-11852 (2009) - [c31]Shyue-Liang Wang, Ting-Zheng Lai, Tzung-Pei Hong, Yu-Lung Wu:
Hiding Predictive Association Rules on Horizontally Distributed Data. IEA/AIE 2009: 133-141 - [c30]Tzung-Pei Hong, Cho-Han Lee, Shyue-Liang Wang:
An Incremental Mining Algorithm for High Average-Utility Itemsets. ISPAN 2009: 421-425 - [c29]Tzung-Pei Hong, Cho-Han Lee, Shyue-Liang Wang:
Mining High Average-Utility Itemsets. SMC 2009: 2526-2530 - 2008
- [j20]Tzung-Pei Hong, Chun-E Lin, Jiann-Horng Lin, Shyue-Liang Wang:
Learning cross-level certain and possible rules by rough sets. Expert Syst. Appl. 34(3): 1698-1706 (2008) - [j19]Shyue-Liang Wang, Rajeev Maskey, Ayat Jafari, Tzung-Pei Hong:
Efficient sanitization of informative association rules. Expert Syst. Appl. 35(1-2): 442-450 (2008) - [c28]Tzung-Pei Hong, Yi-Ying Wu, Shyue-Liang Wang:
Mining Up-to-date Knowledge from Log Data. GrC 2008: 286-291 - [c27]Shyue-Liang Wang, Ting-Zheng Lai, Tzung-Pei Hong, Yu-Lung Wu:
Efficient Hiding of Collaborative Recommendation Association Rules with Updates. ICMLA 2008: 737-740 - [p2]Shyue-Liang Wang, Ju-Wen Shen, Tzung-Pei Hong:
Incremental Discovery of Fuzzy Functional Dependencies. Handbook of Research on Fuzzy Information Processing in Databases 2008: 615-633 - 2007
- [j18]Shyue-Liang Wang, Dipen Patel, Ayat Jafari, Tzung-Pei Hong:
Hiding collaborative recommendation association rules. Appl. Intell. 27(1): 67-77 (2007) - [j17]Tzung-Pei Hong, Tzu-Ting Wang, Shyue-Liang Wang:
Mining fuzzy β-certain and β-possible rules from quantitative data based on the variable precision rough-set model. Expert Syst. Appl. 32(1): 223-232 (2007) - [j16]Shyue-Liang Wang, Bhavesh Parikh, Ayat Jafari:
Hiding informative association rule sets. Expert Syst. Appl. 33(2): 316-323 (2007) - [j15]Shyue-Liang Wang, Kuan-Wei Huang, Tien-Chin Wang, Tzung-Pei Hong:
Maintenance of informative ruler sets for predictions. Intell. Data Anal. 11(3): 279-292 (2007) - [c26]Tzung-Pei Hong, Min-Thai Wu, Ya-Fang Tung, Shyue-Liang Wang:
Using escape operations in gene-set genetic algorithms. SMC 2007: 3907-3911 - 2006
- [j14]Tzung-Pei Hong, Kuei-Ying Lin, Shyue-Liang Wang:
Mining fuzzy sequential patterns from quantitative transactions. Soft Comput. 10(10): 925-932 (2006) - [c25]Shyue-Liang Wang, Rajeev Maskey, Ayat Jafari:
One scan sanitization of informative association rules. IRI 2006: 516-521 - [c24]Tzung-Pei Hong, Yan-Liang Liou, Shyue-Liang Wang:
Learning with Hierarchical Quantitative Attributes by Fuzzy Rough Sets. JCIS 2006 - 2005
- [c23]Shyue-Liang Wang, Ayat Jafari:
Using unknowns for hiding sensitive predictive association rules. IRI 2005: 223-228 - [c22]Shyue-Liang Wang, Ayat Jafari:
Hiding sensitive predictive association rules. SMC 2005: 164-169 - [c21]Shyue-Liang Wang, Kuan-Wei Huang, Tien-Chin Wang, Tzung-Pei Hong:
Maintenance of discovered informative rule sets: incremental deletion. SMC 2005: 170-175 - [p1]Shyue-Liang Wang, Wei-Shuo Lo, Tzung-Pei Hong:
Discovery of Fuzzy Multiple-Level Web Browsing Patterns. Classification and Clustering for Knowledge Discovery 2005: 251-266 - 2004
- [j13]