Gang Li

Orcid: 0000-0003-1583-641X

Affiliations:
  • Deakin University, School of Information Technology, TULIP Lab, Melbourne, Australia


According to our database1, Gang Li authored at least 259 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Automated subway touch button detection using image process.
J. Big Data, December, 2024

Kernel-based iVAT with adaptive cluster extraction.
Knowl. Inf. Syst., November, 2024

Bit Reduction for Locality-Sensitive Hashing.
IEEE Trans. Neural Networks Learn. Syst., September, 2024

Contrastive Learning for Joint Normal Estimation and Point Cloud Filtering.
IEEE Trans. Vis. Comput. Graph., August, 2024

Cost-Effective Company Response Policy for Product Co-Creation in Company-Sponsored Online Community.
IEEE Trans. Syst. Man Cybern. Syst., July, 2024

Effective interpretable learning for large-scale categorical data.
Data Min. Knowl. Discov., July, 2024

DRAPE: optimizing private data release under adjustable privacy-utility equilibrium.
Inf. Technol. Manag., June, 2024

Image change combined with CNN power subway vent valve state monitoring.
Signal Image Video Process., April, 2024

Automation and Orchestration of Zero Trust Architecture: Potential Solutions and Challenges.
Mach. Intell. Res., April, 2024

Refining Codes for Locality Sensitive Hashing.
IEEE Trans. Knowl. Data Eng., March, 2024

Emotion-cognitive reasoning integrated BERT for sentiment analysis of online public opinions on emergencies.
Inf. Process. Manag., March, 2024

Understanding Residents' Behavior for Smart City Management by Sequential and Periodic Pattern Mining.
IEEE Trans. Comput. Soc. Syst., February, 2024

Distributed Differentially Private Ranking Aggregation.
IEEE Trans. Comput. Soc. Syst., February, 2024

A Knowledge Graph-Based Survey on Distributed Ledger Technology for IoT Verticals.
ACM Comput. Surv., February, 2024

Property graph representation learning for node classification.
Knowl. Inf. Syst., January, 2024

Improving neural network's robustness on tabular data with D-layers.
Data Min. Knowl. Discov., January, 2024

Mitigating the Impact of a False Message Through Sequential Release of Clarifying Messages.
IEEE Trans. Netw. Sci. Eng., 2024

Minimizing Malware Propagation in Internet of Things Networks: An Optimal Control Using Feedback Loop Approach.
IEEE Trans. Inf. Forensics Secur., 2024

Cost-Effective Hybrid Control Strategies for Dynamical Propaganda War Game.
IEEE Trans. Inf. Forensics Secur., 2024

The evolution of the flip-it game in cybersecurity: Insights from the past to the future.
J. King Saud Univ. Comput. Inf. Sci., 2024

Detecting Change Intervals with Isolation Distributional Kernel.
J. Artif. Intell. Res., 2024

Understanding global aggregation and optimization of federated learning.
Future Gener. Comput. Syst., 2024

A computer vision-based concept model to recommend domestic overseas-like travel experiences: A design science study.
Decis. Support Syst., 2024

Robust Zero Trust Architecture: Joint Blockchain based Federated learning and Anomaly Detection based Framework.
CoRR, 2024

Quantum Federated Learning Experiments in the Cloud with Data Encoding.
CoRR, 2024

Optimal Control of Malware Propagation in IoT Networks.
CoRR, 2024

Performance analysis and evaluation of postquantum secure blockchained federated learning.
Comput. Networks, 2024

PFL-DKD: Modeling decoupled knowledge fusion with distillation for improving personalized federated learning.
Comput. Networks, 2024

Robust Representation Learning for Image Clustering.
Proceedings of the Knowledge Science, Engineering and Management, 2024

Detecting Change Intervalswith Isolation Distributional Kernel (Abstract Reprint).
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

StraightPCF: Straight Point Cloud Filtering.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

A Data-Encoding Approach to Quantum Federated Learning: Experimenting with Cloud Challenges.
Proceedings of the 8th Asia-Pacific Workshop on Networking, 2024

SumSurvey: An Abstractive Dataset of Scientific Survey Papers for Long Document Summarization.
Proceedings of the Findings of the Association for Computational Linguistics, 2024

2023
Mixed Graph Neural Network-Based Fake News Detection for Sustainable Vehicular Social Networks.
IEEE Trans. Intell. Transp. Syst., December, 2023

IEEE International Conference on High Performance Switching and Routing (IEEE HPSR 2023).
IEEE Commun. Mag., October, 2023

Advancing reliability assessment of venue-reference social media data for enhanced domestic tourism development.
J. Inf. Technol. Tour., September, 2023

Differential privacy in edge computing-based smart city Applications:Security issues, solutions and future directions.
Array, September, 2023

Causal Optimal Transport for Treatment Effect Estimation.
IEEE Trans. Neural Networks Learn. Syst., August, 2023

The impact of isolation kernel on agglomerative hierarchical clustering algorithms.
Pattern Recognit., July, 2023

Interpretable tabular data generation.
Knowl. Inf. Syst., July, 2023

Impulsive Artificial Defense Against Advanced Persistent Threat.
IEEE Trans. Inf. Forensics Secur., 2023

SparkAC: Fine-Grained Access Control in Spark for Secure Data Sharing and Analytics.
IEEE Trans. Dependable Secur. Comput., 2023

PADP-FedMeta: A personalized and adaptive differentially private federated meta learning mechanism for AIoT.
J. Syst. Archit., 2023

Improving Federated Aggregation with Deep Unfolding Networks.
CoRR, 2023

Quantum Federated Learning: Analysis, Design and Implementation Challenges.
CoRR, 2023

Performance Analysis and Evaluation of Post Quantum Secure Blockchain Federated Learning.
CoRR, 2023

Decentralized Quantum Federated Learning for Metaverse: Analysis, Design and Implementation.
CoRR, 2023

Secure Communication Model For Quantum Federated Learning: A Post Quantum Cryptography (PQC) Framework.
CoRR, 2023

Post Quantum Secure Blockchain-based Federated Learning for Mobile Edge Computing.
CoRR, 2023

Digital Privacy Under Attack: Challenges and Enablers.
CoRR, 2023

Leveraging Generative Models for Combating Adversarial Attacks on Tabular Datasets.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2023

An Improved Visual Assessment with Data-Dependent Kernel for Stream Clustering.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2023

Toward Explainable Recommendation via Counterfactual Reasoning.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2023

Kernel-Based Feature Extraction for Time Series Clustering.
Proceedings of the Knowledge Science, Engineering and Management, 2023

Do We Need an Encoder-Decoder to Model Dynamical Systems on Networks?
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

Fed4ReID: Federated Learning with Data Augmentation for Person Re-identification Service in Edge Computing.
Proceedings of the IEEE International Conference on Web Services, 2023

Secure Communication Model for Quantum Federated Learning: A Proof of Concept.
Proceedings of the First Tiny Papers Track at ICLR 2023, 2023

MEG: Masked Ensemble Tabular Data Generator.
Proceedings of the IEEE International Conference on Data Mining, 2023

HFMRE: Constructing Huffman Tree in Bags to Find Excellent Instances for Distantly Supervised Relation Extraction.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2023, 2023

Learning Stable Task-Level Manifold for Few-Shot Learning.
Proceedings of the International Conference on Digital Image Computing: Techniques and Applications, 2023

IterativePFN: True Iterative Point Cloud Filtering.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

2022
Deep treatment-adaptive network for causal inference.
VLDB J., 2022

Utility-preserving differentially private skyline query.
Expert Syst. Appl., 2022

Detecting Change Intervals with Isolation Distributional Kernel.
CoRR, 2022

A Survey of Distributed Ledger Technology for IoT Verticals.
CoRR, 2022

Guest Editorial: 26th IEEE symposium on computers and communications (ISCC 2021) selected papers.
Comput. Networks, 2022

GANBLR++: Incorporating Capacity to Generate Numeric Attributes and Leveraging Unrestricted Bayesian Networks.
Proceedings of the 2022 SIAM International Conference on Data Mining, 2022

Discretization Inspired Defence Algorithm Against Adversarial Attacks on Tabular Data.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2022

Streaming Hierarchical Clustering Based on Point-Set Kernel.
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022

FAIR-BFL: Flexible and Incentive Redesign for Blockchain-based Federated Learning.
Proceedings of the 51st International Conference on Parallel Processing, 2022

Image Anomaly Detection With Semantic- Enhanced Augmentation and Distributional Kernel.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

2021
Towards Revealing Parallel Adversarial Attack on Politician Socialnet of Graph Structure.
Secur. Commun. Networks, 2021

Robustness Assessment of Asynchronous Advantage Actor-Critic Based on Dynamic Skewness and Sparseness Computation: A Parallel Computing View.
J. Comput. Sci. Technol., 2021

FakeFilter: A cross-distribution Deepfake detection system with domain adaptation.
J. Comput. Secur., 2021

Adversarial retraining attack of asynchronous advantage actor-critic based pathfinding.
Int. J. Intell. Syst., 2021

Predictive classification of ICU readmission using weight decay random forest.
Future Gener. Comput. Syst., 2021

Redesigning compound TCP with cognitive edge intelligence for WiFi-based IoT.
Future Gener. Comput. Syst., 2021

Low complexity sparse beamspace DOA estimation via single measurement vectors for uniform circular array.
EURASIP J. Adv. Signal Process., 2021

An end-to-end text spotter with text relation networks.
Cybersecur., 2021

NFDD: A Dynamic Malicious Document Detection Method Without Manual Feature Dictionary.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

A Novel Security Framework for Edge Computing based UAV Delivery System.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Protecting Reward Function of Reinforcement Learning via Minimal and Non-catastrophic Adversarial Trajectory.
Proceedings of the 40th International Symposium on Reliable Distributed Systems, 2021

Neighbours and Kinsmen: Hateful Users Detection with Graph Neural Network.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2021

Aspect and Opinion Terms Co-extraction Using Position-Aware Attention and Auxiliary Labels.
Proceedings of the Knowledge Science, Engineering and Management, 2021

Landscape-Enhanced Graph Attention Network for Rumor Detection.
Proceedings of the Knowledge Science, Engineering and Management, 2021

Adaptive Smooth L1 Loss: A Better Way to Regress Scene Texts with Extreme Aspect Ratios.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

UTANSA: Static Approach for Multi-Language Malicious Web Scripts Detection.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

FUNC-ESIM: A Dual Pairwise Attention Network for Cross-version Binary Function Matching.
Proceedings of the International Joint Conference on Neural Networks, 2021

Detecting Malicious PDF Documents Using Semi-Supervised Machine Learning.
Proceedings of the Advances in Digital Forensics XVII, 2021

An Edge based Federated Learning Framework for Person Re-identification in UAV Delivery Service.
Proceedings of the 2021 IEEE International Conference on Web Services, 2021

GANBLR: A Tabular Data Generation Model.
Proceedings of the IEEE International Conference on Data Mining, 2021

Hilbert Sinkhorn Divergence for Optimal Transport.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

A Blockchain-aided Self-Sovereign Identity Framework for Edge-based UAV Delivery System.
Proceedings of the 21st IEEE/ACM International Symposium on Cluster, 2021

2020
Private rank aggregation under local differential privacy.
Int. J. Intell. Syst., 2020

Differentially private model publishing in cyber physical systems.
Future Gener. Comput. Syst., 2020

Private collaborative filtering under untrusted recommender server.
Future Gener. Comput. Syst., 2020

Feedback-based metric learning for activity recognition.
Expert Syst. Appl., 2020

Multivariable data imputation for the analysis of incomplete credit data.
Expert Syst. Appl., 2020

Endoscopy report mining for intelligent gastric cancer screening.
Expert Syst. J. Knowl. Eng., 2020

A homogeneous ensemble method for predicting gastric cancer based on gastroscopy reports.
Expert Syst. J. Knowl. Eng., 2020

New advancement in information technologies for industry 4.0.
Enterp. Inf. Syst., 2020

Constructing Optimal Sparse Decision Tree for Analying I-SIG System Attack.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020

CES2Vec: A Confidentiality-Oriented Word Embedding for Confidential Information Detection.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

Bias-regularised Neural-Network Metamodelling of Insurance Portfolio Risk.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Exploring Data Correlation between Feature Pairs for Generating Constraint-based Adversarial Examples.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020

HeterSupervise: Package-level Android Malware Analysis Based on Heterogeneous Graph.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

Similarity of Binaries Across Optimization Levels and Obfuscation.
Proceedings of the Computer Security - ESORICS 2020, 2020

GuardSpark++: Fine-Grained Purpose-Aware Access Control for Secure Data Sharing and Analysis in Spark.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Application of SVR optimized by Modified Simulated Annealing (MSA-SVR) air conditioning load prediction model.
J. Ind. Inf. Integr., 2019

Malicious documents detection for business process management based on multi-layer abstract model.
Future Gener. Comput. Syst., 2019

Industry 4.0 and big data innovations.
Enterp. Inf. Syst., 2019

Bidirectional RNN-based Few-shot Training for Detecting Multi-stage Attack.
CoRR, 2019

Foreword to the Special Issue of the 8th International Conference on Applications and Techniques for Information Security (ATIS 2017).
Concurr. Comput. Pract. Exp., 2019

Fast Valuation of Large Portfolios of Variable Annuities via Transfer Learning.
Proceedings of the PRICAI 2019: Trends in Artificial Intelligence, 2019

Duo Attention with Deep Learning on Tomato Yield Prediction and Factor Interpretation.
Proceedings of the PRICAI 2019: Trends in Artificial Intelligence, 2019

A Two-Stage Model Based on BERT for Short Fake News Detection.
Proceedings of the Knowledge Science, Engineering and Management, 2019

Deep Neighbor Embedding for Evaluation of Large Portfolios of Variable Annuities.
Proceedings of the Knowledge Science, Engineering and Management, 2019

Android Malware Family Classification Based on Sensitive Opcode Sequence.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

A Unified Malicious Documents Detection Model Based on Two Layers of Abstraction.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

Identification of Botnet Attacks Using Hybrid Machine Learning Models.
Proceedings of the Hybrid Intelligent Systems, 2019

Polynomial Representation for Persistence Diagram.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019

2018
An overview of protection of privacy in multibiometrics.
Multim. Tools Appl., 2018

A Novel Approach for Information Discovery in Wireless Sensor Grids.
J. Netw. Syst. Manag., 2018

Answering differentially private queries for continual datasets release.
Future Gener. Comput. Syst., 2018

Context-aware personalized path inference from large-scale GPS snippets.
Expert Syst. Appl., 2018

Using Node Identifiers and Community Prior for Graph-Based Classification.
Data Sci. Eng., 2018

A Training-based Identification Approach to VIN Adversarial Examples.
CoRR, 2018

Gradient Band-based Adversarial Training for Generalized Attack Immunity of A3C Path Finding.
CoRR, 2018

Advances in Processing, Mining, and Learning Complex Data: From Foundations to Real-World Applications.
Complex., 2018

Domestic Violence Crisis Identification From Facebook Posts Based on Deep Learning.
IEEE Access, 2018

IEEE Access Special Section: Curbing Crowdturfing in Online Social Networks.
IEEE Access, 2018

ALDD: A Hybrid Traffic-User Behavior Detection Method for Application Layer DDoS.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Mining Human Periodic Behaviors Using Mobility Intention and Relative Entropy.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2018

MRDroid: A Multi-act Classification Model for Android Malware Risk Assessment.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

Group Outlying Aspects Mining.
Proceedings of the Knowledge Science, Engineering and Management, 2018

Sentiment Embedded Semantic Space for More Accurate Sentiment Analysis.
Proceedings of the Knowledge Science, Engineering and Management, 2018

URefFlow: A Unified Android Malware Detection Model Based on Reflective Calls.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

Automatic Hotel Photo Quality Assessment Based on Visual Features.
Proceedings of the Information and Communication Technologies in Tourism 2018, 2018

Multi-View Group Anomaly Detection.
Proceedings of the 27th ACM International Conference on Information and Knowledge Management, 2018

2017
Differential Privacy and Applications
Advances in Information Security 69, Springer, ISBN: 978-3-319-62002-2, 2017

Tracking millions of query intents with StarrySky and its applications.
Web Intell., 2017

Differentially Private Data Publishing and Analysis: A Survey.
IEEE Trans. Knowl. Data Eng., 2017

Erratum to: Preference Relation-based Markov Random Fields for Recommender Systems.
Mach. Learn., 2017

Preference Relation-based Markov Random Fields for Recommender Systems.
Mach. Learn., 2017

Book review "Analytics in smart tourism design"; Zheng Xiang, Daniel R. Fesenmaier; ISBN 978-3-319-44262-4, 978-3-319-44263-1, Springer, 2017, 328 pp., $302.71.
J. Inf. Technol. Tour., 2017

Boosting imbalanced data learning with Wiener process oversampling.
Frontiers Comput. Sci., 2017

Curbing collusive cyber-gossips for business brand management.
Enterp. Inf. Syst., 2017

PrivMin: Differentially Private MinHash for Jaccard Similarity Computation.
CoRR, 2017

New advances in securing cyberspace and curbing crowdturfing.
Concurr. Comput. Pract. Exp., 2017

FEPDF: A Robust Feature Extractor for Malicious PDF Detection.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

WarnFi: Non-invasive wifi-based abnormal activity sensing using non-parametric model.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

NotiFi: A ubiquitous WiFi-based abnormal activity detection system.
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017

Learning Robust Low-Rank Approximation for Crowdsourcing on Riemannian Manifold.
Proceedings of the International Conference on Computational Science, 2017

Reviewing Geotagging Research in Tourism.
Proceedings of the Information and Communication Technologies in Tourism 2017, 2017

Differentially private query learning: From data publishing to model publishing.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

Combining Node Identifier Features and Community Priors for Within-Network Classification.
Proceedings of the Web and Big Data - First International Joint Conference, 2017

2016
Privacy-preserving topic model for tagging recommender systems.
Knowl. Inf. Syst., 2016

A differentially private algorithm for location data release.
Knowl. Inf. Syst., 2016

Exploring probabilistic follow relationship to prevent collusive peer-to-peer piracy.
Knowl. Inf. Syst., 2016

Energy Efficient Sleep Schedule with Service Coverage Guarantee in Wireless Sensor Networks.
J. Netw. Syst. Manag., 2016

Book Review "Advances in Crowdsourcing".
J. Inf. Technol. Tour., 2016

Securing cyberspace.
Concurr. Comput. Pract. Exp., 2016

Design and evaluation of coordinated in-network caching model for content centric networking.
Comput. Networks, 2016

WiN: Non-invasive Abnormal Activity Detection Leveraging Fine-Grained WiFi Signals.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Riemannian optimization with subspace tracking for low-rank recovery.
Proceedings of the 2016 International Joint Conference on Neural Networks, 2016

Opportunistic Probe: An Efficient Adaptive Detection Model for Collaborative Intrusion Detection.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

WiseFi: Activity Localization and Recognition on Commodity Off-the-Shelf WiFi Devices.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

2015
Privacy preserving data release for tagging recommender systems.
Web Intell., 2015

Correlated Differential Privacy: Hiding Information in Non-IID Data Set.
IEEE Trans. Inf. Forensics Secur., 2015

Characterizing Compactness of Geometrical Clusters Using Fuzzy Measures.
IEEE Trans. Fuzzy Syst., 2015

Recover Fault Services via Complex Service-to-Node Mappings in Wireless Sensor Networks.
J. Netw. Syst. Manag., 2015

Big data related technologies, challenges and future prospects.
J. Inf. Technol. Tour., 2015

A survey of recommendation techniques based on offline data processing.
Concurr. Comput. Pract. Exp., 2015

Fast and energy efficient data storage for information discovery in multi-dimensional WSNs.
Proceedings of the International Telecommunication Networks and Applications Conference, 2015

Novel Approach for Information Discovery in Autonomous Wireless Sensor Networks.
Proceedings of the Future Network Systems and Security - First International Conference, 2015

Lingo: Linearized Grassmannian Optimization for Nuclear Norm Minimization.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015

2014
Modelling personal preferences for Top-N movie recommendations.
Web Intell. Agent Syst., 2014

Privacy preserving collaborative filtering for KNN attack resisting.
Soc. Netw. Anal. Min., 2014

The maximum imputation framework for neighborhood-based collaborative filtering.
Soc. Netw. Anal. Min., 2014

Context-Aware Service Ranking in Wireless Sensor Networks.
J. Netw. Syst. Manag., 2014

Bloom filter-based workflow management to enable QoS guarantee in wireless sensor networks.
J. Netw. Comput. Appl., 2014

Interaction relationships of caches in agent-based HD video surveillance: Discovery and utilization.
J. Netw. Comput. Appl., 2014

A block-aware hybrid data dissemination with hotspot elimination in wireless sensor network.
J. Netw. Comput. Appl., 2014

Special issue on behavior data security issues in network information propagation.
Future Gener. Comput. Syst., 2014

Privacy Preserving in Location Data Release: A Differential Privacy Approach.
Proceedings of the PRICAI 2014: Trends in Artificial Intelligence, 2014

Deferentially Private Tagging Recommendation Based on Topic Model.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2014

Fuzzy measures of pixel cluster compactness.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2014

Ordinal Random Fields for Recommender Systems.
Proceedings of the Sixth Asian Conference on Machine Learning, 2014

2013
Lazy Collaborative Filtering for Data Sets With Missing Values.
IEEE Trans. Cybern., 2013

A learning method for Top-N recommendations with incomplete data.
Soc. Netw. Anal. Min., 2013

Semantic trajectory-based event detection and event pattern mining.
Knowl. Inf. Syst., 2013

A Policy-Based Web Service Redundancy Detection in Wireless Sensor Networks.
J. Netw. Syst. Manag., 2013

Privacy Preserving for Tagging Recommender Systems.
Proceedings of the 2013 IEEE/WIC/ACM International Conferences on Web Intelligence, 2013

Recommendation Techniques Based on Off-Line Data Processing a Multifaceted Survey.
Proceedings of the Ninth International Conference on Semantics, Knowledge and Grids, 2013

Contrasting Permission Patterns between Clean and Malicious Android Applications.
Proceedings of the Security and Privacy in Communication Networks, 2013

Top-N Recommendations by Learning User Preference Dynamics.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2013

An adaptive approach to information discovery in multi-dimensional wireless sensor networks.
Proceedings of the Seventh International Conference on Sensing Technology, 2013

Information discovery in multidimensional wireless sensor networks.
Proceedings of the International Conference on Information Networking 2013, 2013

Differential privacy for neighborhood-based collaborative filtering.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

AdaM: adaptive-maximum imputation for neighborhood-based collaborative filtering.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
K-Complex Detection Using a Hybrid-Synergic Machine Learning Method.
IEEE Trans. Syst. Man Cybern. Part C, 2012

Improving the speed and stability of the k-nearest neighbors method.
Pattern Recognit. Lett., 2012

Guest Editorial.
J. Networks, 2012

Learning User Preference Patterns for Top-N Recommendations.
Proceedings of the 2012 IEEE/WIC/ACM International Conferences on Web Intelligence, 2012

Hierarchical Workflow Management in Wireless Sensor Network.
Proceedings of the PRICAI 2012: Trends in Artificial Intelligence, 2012

Improving Top-N Recommendations with User Consuming Profiles.
Proceedings of the PRICAI 2012: Trends in Artificial Intelligence, 2012

A fuzzy decision support method for customer preferences analysis based on Choquet Integral.
Proceedings of the FUZZ-IEEE 2012, 2012

The efficient imputation method for neighborhood-based collaborative filtering.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

Learning Rating Patterns for Top-N Recommendations.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012

An Agent Collaboration-Based Data Hierarchical Caching Approach for HD Video Surveillance.
Proceedings of the Agents and Data Mining Interaction - 8th International Workshop, 2012

2011
Learning Choquet-Integral-Based Metrics for Semisupervised Clustering.
IEEE Trans. Fuzzy Syst., 2011

Using local density information to improve IB algorithms.
Pattern Recognit. Lett., 2011

Multi-granularity context model for dynamic Web service composition.
J. Netw. Comput. Appl., 2011

CARSA: A context-aware reasoning-based service agent model for AI planning of web service composition.
J. Netw. Comput. Appl., 2011

Integrating instance-level and attribute-level knowledge into document clustering.
Comput. Sci. Inf. Syst., 2011

Reasoning-Based Context-Aware Workflow Management in Wireless Sensor Network.
Proceedings of the Service-Oriented Computing - ICSOC 2011 Workshops, 2011

An Analysis on Human Personality and Hotel Web Design: a Kohonen Network Approach.
Proceedings of the Information and Communication Technologies in Tourism 2011, 2011

Mining Frequent Agent Action Patterns for Effective Multi-agent-Based Web Service Composition.
Proceedings of the Agents and Data Mining Interaction, 2011

2010
Empirical Analysis of Customer Behaviors in Chinese E-Commerce.
J. Networks, 2010

Clustering with Instance and Attribute Level Side Information.
Int. J. Comput. Intell. Syst., 2010

Information discovery in mission-critical wireless sensor networks.
Comput. Networks, 2010

Text document clustering with metric learning.
Proceedings of the Proceeding of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval, 2010

Text clustering with important words using normalization.
Proceedings of the 2010 Joint International Conference on Digital Libraries, 2010

2009
Energy-Efficient Medium Access Control in Wireless Sensor Networks.
Proceedings of the Guide to Wireless Sensor Networks, 2009

Improving the QoS for information discovery in autonomic wireless sensor networks.
Pervasive Mob. Comput., 2009

Acoustic feature selection for automatic emotion recognition from speech.
Inf. Process. Manag., 2009

Mining Frequent Itemsets in Distorted Databases with Granular Computing.
Int. J. Pattern Recognit. Artif. Intell., 2009

Journal ranking based on social information.
Proceedings of the 2009 Joint International Conference on Digital Libraries, 2009

Facilitating dynamic web service composition with fine-granularity context management.
Proceedings of the 2009 IEEE International Conference on Granular Computing, 2009

Study on Ensemble Classification Methods towards Spam Filtering.
Proceedings of the Advanced Data Mining and Applications, 5th International Conference, 2009

2008
The Density-Based Agglomerative Information Bottleneck.
Proceedings of the PRICAI 2008: Trends in Artificial Intelligence, 2008

The Density Connectivity Information Bottleneck.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Medical Knowledge Discovery from a Regional Asthma Dataset.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence, 2008

The Crossroads Approach to Information Discovery in Wireless Sensor Networks.
Proceedings of the Distributed Computing and Networking, 9th International Conference, 2008

Exploiting Affinity Propagation for Energy-Efficient Information Discovery in Sensor Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
An effective non-parametric method for globally clustering genes from expression profiles.
Medical Biol. Eng. Comput., 2007

Understanding Research Field Evolving and Trend with Dynamic Bayesian Networks.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2007

A Causal Analysis for the Expenditure Data of Business Travelers.
Proceedings of the Advanced Data Mining and Applications, Third International Conference, 2007

Acoustic Features Extraction for Emotion Recognition.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

2006
Determine the Optimal Parameter for Information Bottleneck Method.
Proceedings of the PRICAI 2006: Trends in Artificial Intelligence, 2006

Learning from facial aging patterns for automatic age estimation.
Proceedings of the 14th ACM International Conference on Multimedia, 2006

Abnormal Behavior Detection for Early Warning of Terrorist Attack.
Proceedings of the AI 2006: Advances in Artificial Intelligence, 2006

Integrating Local One-Class Classifiers for Image Retrieval.
Proceedings of the Advanced Data Mining and Applications, Second International Conference, 2006

Finding the Optimal Cardinality Value for Information Bottleneck Method.
Proceedings of the Advanced Data Mining and Applications, Second International Conference, 2006

2005
Dependency Bagging.
Proceedings of the Rough Sets, 2005

Evolving Insight into High-Dimensional Data.
Proceedings of the Advances in Intelligent Computing, 2005

Study of Ensemble Strategies in Discovering Linear Causal Models.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Second International Conference, 2005

2004
What Will Affect Software Reuse: A Causal Model Analysis.
Int. J. Softw. Eng. Knowl. Eng., 2004

Software Warehouse: Its Design, Management And Application.
Int. J. Softw. Eng. Knowl. Eng., 2004

The Discovery of Generalized Causal Models with Mixed Variables Using MML Criterion.
Proceedings of the Fourth SIAM International Conference on Data Mining, 2004

Accelerating Linear Causal Model Discovery Using Hoeffding Bounds.
Proceedings of the PRICAI 2004: Trends in Artificial Intelligence, 2004

On the Size of Training Set and the Benefit from Ensemble.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2004

Identifying Markov Blankets Using Lasso Estimation.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2004

Ensembling MML Causal Discovery.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2004

2002
An Improved Approach for the Discovery of Causal Models via MML.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2002

Linear Causal Model Discovery Using the MML criterion.
Proceedings of the 2002 IEEE International Conference on Data Mining (ICDM 2002), 2002

An Empirical Study of Encoding Schemes and Search Strategies in Discovering Causal Networks.
Proceedings of the Machine Learning: ECML 2002, 2002

2001
Evolutionary Structure Learning Algorithm for Bayesian Network and Penalized Mutual Information Metric.
Proceedings of the 2001 IEEE International Conference on Data Mining, 29 November, 2001

Inexact Field Learning: An Approach to Induce High Quality Rules from Low Quality Data.
Proceedings of the 2001 IEEE International Conference on Data Mining, 29 November, 2001


  Loading...