Lior Rokach
Orcid: 0000-0002-6956-3341Affiliations:
- Ben-Gurion University, Beersheba, Israel
According to our database1,
Lior Rokach
authored at least 335 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on twitter.com
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Neural Comput. Appl., July, 2024
Automated algorithm selection using meta-learning and pre-trained deep convolution neural networks.
Inf. Fusion, May, 2024
Improving severity classification of Hebrew PET-CT pathology reports using test-time augmentation.
J. Biomed. Informatics, January, 2024
Iterative Feature eXclusion (IFX): Mitigating feature starvation in gradient boosted decision trees.
Knowl. Based Syst., 2024
BagStacking: An Integrated Ensemble Learning Approach for Freezing of Gait Detection in Parkinson's Disease.
CoRR, 2024
Proceedings of the ECAI 2024 - 27th European Conference on Artificial Intelligence, 19-24 October 2024, Santiago de Compostela, Spain, 2024
TTTS: Tree Test Time Simulation for Enhancing Decision Tree Robustness against Adversarial Examples.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
Artif. Intell. Medicine, December, 2023
DeepCAN: Hybrid Method for Road Type Classification Using Vehicle Sensor Data for Smart Autonomous Mobility.
IEEE Trans. Intell. Transp. Syst., November, 2023
Enhancing social network hate detection using back translation and GPT-3 augmentations during training and test-time.
Inf. Fusion, November, 2023
Expert Syst. Appl., November, 2023
Dataset, November, 2023
Pretrained transformer models for predicting the withdrawal of drugs from the market.
Bioinform., August, 2023
Inf. Sci., May, 2023
AMFPMC - An improved method of detecting multiple types of drug-drug interactions using only known drug-drug interactions.
CoRR, 2023
Silent Killer: Optimizing Backdoor Trigger Yields a Stealthy and Powerful Data Poisoning Attack.
CoRR, 2023
Proceedings of the 31st ACM Conference on User Modeling, Adaptation and Personalization, 2023
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023
2022
BMC Bioinform., December, 2022
Proceedings of the Recommender Systems Handbook, 2022
Virtual Breathalyzer: Towards the Detection of Intoxication Using Motion Sensors of Commercial Wearable Devices.
Sensors, 2022
Contextual security awareness: A context-based approach for assessing the security awareness of users.
Knowl. Based Syst., 2022
Integrated prediction intervals and specific value predictions for regression problems using neural networks.
Knowl. Based Syst., 2022
Knowl. Inf. Syst., 2022
J. Mach. Learn. Res., 2022
Enhancing real-world adversarial patches through 3D modeling of complex target scenes.
Neurocomputing, 2022
A deep learning framework for predicting burglaries based on multiple contextual factors.
Expert Syst. Appl., 2022
Expert Syst. Appl., 2022
Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain.
ACM Comput. Surv., 2022
Comput. Commun., 2022
Explainable machine learning for chronic lymphocytic leukemia treatment prediction using only inexpensive tests.
Comput. Biol. Medicine, 2022
Bioinform., 2022
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2022
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022
2021
Comput. Environ. Urban Syst., 2021
A Machine-Learning Model for Automatic Detection of Movement Compensations in Stroke Patients.
IEEE Trans. Emerg. Top. Comput., 2021
Knowl. Based Syst., 2021
Isolation forests and landmarking-based representations for clustering algorithm recommendation using meta-learning.
Inf. Sci., 2021
Inf. Sci., 2021
Expert Syst. Appl., 2021
Bioinform., 2021
ICU Survival Prediction Incorporating Test-Time Augmentation to Improve the Accuracy of Ensemble-Based Models.
IEEE Access, 2021
Sequence Squeezing: A Defense Method Against Adversarial Examples for API Call-Based RNN Variants.
Proceedings of the International Joint Conference on Neural Networks, 2021
Proceedings of the International Joint Conference on Neural Networks, 2021
Pay Attention: Improving Classification of PE Malware Using Attention Mechanisms Based on System Call Analysis.
Proceedings of the International Joint Conference on Neural Networks, 2021
TRIO: Task-agnostic dataset representation optimized for automatic algorithm selection.
Proceedings of the IEEE International Conference on Data Mining, 2021
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021
2020
Sensors, 2020
Explainable decision forest: Transforming a decision forest into an interpretable tree.
Inf. Fusion, 2020
A practical tutorial on bagging and boosting based ensembles for machine learning: Algorithms, software tools, performance study, practical perspectives and opportunities.
Inf. Fusion, 2020
IACR Cryptol. ePrint Arch., 2020
Comparison of state-of-the-art deep learning APIs for image multi-label classification using semantic metrics.
Expert Syst. Appl., 2020
Machine learning and operation research based method for promotion optimization of products with no price elasticity history.
Electron. Commer. Res. Appl., 2020
CoRR, 2020
A framework for optimizing COVID-19 testing policy using a Multi Armed Bandit approach.
CoRR, 2020
CoRR, 2020
PIVEN: A Deep Neural Network for Prediction Intervals with Specific Value Prediction.
CoRR, 2020
IEEE Access, 2020
Proceedings of the 43rd International ACM SIGIR conference on research and development in Information Retrieval, 2020
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2020
DeepLine: AutoML Tool for Pipelines Generation using Deep Reinforcement Learning and Hierarchical Actions Filtering.
Proceedings of the KDD '20: The 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2020
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020
Adversarial Vulnerability of Deep Learning Models in Analyzing Next Generation Sequencing Data.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Inf. Process. Manag., 2019
Choosing the right word: Using bidirectional LSTM tagger for writing support systems.
Eng. Appl. Artif. Intell., 2019
ACM Comput. Surv., 2019
CoRR, 2019
CoRR, 2019
Semantic Comparison of State-of-the-Art Deep Learning Methods for Image Multi-Label Classification.
CoRR, 2019
Detecting drug-drug interactions using artificial neural networks and classic graph similarity measures.
CoRR, 2019
CoRR, 2019
Volatile memory analysis using the MinHash method for efficient and secured detection of malware in private cloud.
Comput. Secur., 2019
Sec-Lib: Protecting Scholarly Digital Libraries From Infected Papers Using Active Machine Learning Framework.
IEEE Access, 2019
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019
Ensemble Learning - Pattern Classification Using Ensemble Methods, 2<sup>nd</sup> Edition
Series in Machine Perception and Artificial Intelligence 85, WorldScientific, ISBN: 9789811201974, 2019
2018
New Rev. Hypermedia Multim., 2018
Knowl. Based Syst., 2018
Int. J. Intell. Syst., 2018
Low Resource Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers.
CoRR, 2018
Identifying Informational vs. Conversational Questions on Community Question Answering Archives.
Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining, 2018
Proceedings of the 26th Conference on User Modeling, Adaptation and Personalization, 2018
Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2018
Simulating User Activity for Assessing Effect of Sampling on DB Activity Monitoring Anomaly Detection.
Proceedings of the Policy-Based Autonomic Data Governance [extended papers from the Second International Workshop on Policy-based Autonomic Data Governance, 2018
Proceedings of the 27th ACM International Conference on Information and Knowledge Management, 2018
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2018
2017
J. Assoc. Inf. Sci. Technol., 2017
Fast-CBUS: A fast clustering-based undersampling method for addressing the class imbalance problem.
Neurocomputing, 2017
Expert Syst. Appl., 2017
Predicting Relevance Scores for Triples from Type-Like Relations using Neural Embedding - The Cabbage Triple Scorer at WSDM Cup 2017.
CoRR, 2017
CoRR, 2017
Generic Black-Box End-to-End Attack against RNNs and Other API Calls Based Malware Classifiers.
CoRR, 2017
Proceedings of the 25th Conference on User Modeling, Adaptation and Personalization, 2017
Proceedings of the 25th Conference on User Modeling, Adaptation and Personalization, 2017
Proceedings of the A Systems Approach to Cyber Security, 2017
Proceedings of the 22nd International Conference on Intelligent User Interfaces, 2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
Proceedings of the Information Systems Security and Privacy, 2017
2016
ACM Trans. Intell. Syst. Technol., 2016
ACM Trans. Inf. Syst. Secur., 2016
Pervasive Mob. Comput., 2016
Knowl. Based Syst., 2016
ALDROID: efficient update of Android anti-virus software using designated active learning methods.
Knowl. Inf. Syst., 2016
J. Assoc. Inf. Sci. Technol., 2016
SFEM: Structural feature extraction methodology for the detection of malicious office documents using machine learning methods.
Expert Syst. Appl., 2016
Unsupervised Commonsense Knowledge Enrichment for Domain-Specific Sentiment Analysis.
Cogn. Comput., 2016
Identifying Attack Propagation Patterns in Honeypots Using Markov Chains Modeling and Complex Networks Analysis.
Proceedings of the 2016 IEEE International Conference on Software Science, 2016
Proceedings of the Poster Track of the 10th ACM Conference on Recommender Systems (RecSys 2016), 2016
Proceedings of the 10th ACM Conference on Recommender Systems, 2016
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016
Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, 2016
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016
Proceedings of the Availability, Reliability, and Security in Information Systems, 2016
2015
Proceedings of the Recommender Systems Handbook, 2015
J. Assoc. Inf. Sci. Technol., 2015
Intell. Data Anal., 2015
Expert Syst. Appl., 2015
The Importance of Pronouns to Sentiment Analysis: Online Cancer Survivor Network Case Study.
Proceedings of the 24th International Conference on World Wide Web Companion, 2015
Search Problems in the Domain of Multiplication: Case Study on Anomaly Detection Using Markov Chains.
Proceedings of the Eighth Annual Symposium on Combinatorial Search, 2015
Proceedings of the 2015 International ACM Recommender Systems Challenge, 2015
Proceedings of the 9th ACM Conference on Recommender Systems, 2015
Proceedings of the 9th ACM Conference on Recommender Systems, 2015
pcStream: A Stream Clustering Algorithm for Dynamically Detecting and Managing Temporal Contexts.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2015
Proceedings of the 2015 International Conference on The Theory of Information Retrieval, 2015
Fast Item-Based Collaborative Filtering.
Proceedings of the ICAART 2015, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
2014
Series in Machine Perception and Artificial Intelligence 81, WorldScientific, ISBN: 978-981-4590-09-9, 2014
Springer Briefs in Electrical and Computer Engineering, Springer, ISBN: 978-1-4939-0539-3, 2014
Proceedings of the Interactive Knowledge Discovery and Data Mining in Biomedical Informatics, 2014
IEEE Trans. Syst. Man Cybern. Syst., 2014
IEEE Trans. Knowl. Data Eng., 2014
J. Comput. Sci. Technol., 2014
Inf. Sci., 2014
Expert Syst. Appl., 2014
Mobile malware detection through analysis of deviations in application network behavior.
Comput. Secur., 2014
Proceedings of the 37th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2014
Proceedings of the Eighth ACM Conference on Recommender Systems, 2014
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014
Proceedings of the Group Decision and Negotiation. A Process-Oriented View, 2014
Proceedings of the Semantic Web Evaluation Challenge, 2014
Proceedings of the Semantic Web Evaluation Challenge, 2014
Proceedings of the Computational Linguistics and Intelligent Text Processing, 2014
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2014
2013
User Model. User Adapt. Interact., 2013
ACM Trans. Intell. Syst. Technol., 2013
J. Assoc. Inf. Sci. Technol., 2013
Parsimonious citer-based measures: The artificial intelligence domain as a case study.
J. Assoc. Inf. Sci. Technol., 2013
Inf. Sci., 2013
Inf. Sci., 2013
A GIS-based decision support system for hotel room rate estimation and temporal price prediction: The hotel brokers' context.
Decis. Support Syst., 2013
Improving Sentiment Analysis in an Online Cancer Survivor Community Using Dynamic Sentiment Lexicon.
Proceedings of the 2013 International Conference on Social Intelligence and Technology, 2013
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013
Proceedings of the Social Computing, Behavioral-Cultural Modeling and Prediction, 2013
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013
Proceedings of the Seventh ACM Conference on Recommender Systems, 2013
Proceedings of the Seventh ACM Conference on Recommender Systems, 2013
Proceedings of the Multiple Classifier Systems, 11th International Workshop, 2013
Proceedings of the Multiple Classifier Systems, 11th International Workshop, 2013
Proceedings of the 13th ACM/IEEE-CS Joint Conference on Digital Libraries, 2013
Proceedings of the 2013 Workshop on Computational Models of Narrative, 2013
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013
2013 international workshop on computational scientometrics: theory and applications.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013
Proceedings of the 2013 IEEE International Conference on Big Data (IEEE BigData 2013), 2013
Proceedings of the IEEE International Congress on Big Data, 2013
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013
Proceedings of the Availability, Reliability, and Security in Information Systems and HCI, 2013
2012
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-2053-8, 2012
IEEE Trans. Syst. Man Cybern. Part C, 2012
IEEE Trans. Syst. Man Cybern. Part C, 2012
IEEE Trans. Syst. Man Cybern. Part C, 2012
Detecting unknown computer worm activity via support vector machines and active learning.
Pattern Anal. Appl., 2012
J. Mach. Learn. Res., 2012
Automatic discovery of the root causes for quality drift in high dimensionality manufacturing processes.
J. Intell. Manuf., 2012
J. Assoc. Inf. Sci. Technol., 2012
Inf. Sci., 2012
CoRR, 2012
Diffusion Ensemble Classifiers.
Proceedings of the IJCCI 2012 - Proceedings of the 4th International Joint Conference on Computational Intelligence, Barcelona, Spain, 5, 2012
Proceedings of the 12th IEEE International Conference on Data Mining, 2012
Proceedings of the 20th European Symposium on Artificial Neural Networks, 2012
Proceedings of the 20th European Symposium on Artificial Neural Networks, 2012
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012
Proceedings of the Active Media Technology - 8th International Conference, 2012
2011
Proceedings of the Recommender Systems Handbook, 2011
Who is going to win the next Association for the Advancement of Artificial Intelligence Fellowship Award? Evaluating researchers by mining bibliographic data.
J. Assoc. Inf. Sci. Technol., 2011
Link Prediction in Social Networks Using Computationally Efficient Topological Features.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Proceedings of the 2011 ACM Conference on Recommender Systems, 2011
Proceedings of the 2011 ACM Conference on Recommender Systems, 2011
Proceedings of the 6th International Conference on Knowledge Capture (K-CAP 2011), 2011
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011
Proceedings of the 11th International Conference on Innovative Internet Community Services (I<sup>2</sup>CS 2011), 2011
MindDesktop - Computer Accessibility for Severely Handicapped.
Proceedings of the ICEIS 2011, 2011
Developing a Price Management Decision Support System for Hotel Brokers using Free and Open Source Tools.
Proceedings of the ICEIS 2011, 2011
Proceedings of the Data Mining Workshops (ICDMW), 2011
Poster: applying unsupervised context-based analysis for detecting unauthorized data disclosure.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Proceedings of the Data Mining and Knowledge Discovery Handbook, 2nd ed., 2010
Proceedings of the Data Mining and Knowledge Discovery Handbook, 2nd ed., 2010
Proceedings of the Data Mining and Knowledge Discovery Handbook, 2nd ed., 2010
Proceedings of the Data Mining and Knowledge Discovery Handbook, 2nd ed., 2010
Proceedings of the Data Mining and Knowledge Discovery Handbook, 2nd ed., 2010
Proceedings of the Data Mining and Knowledge Discovery Handbook, 2nd ed., 2010
Proceedings of the Data Mining and Knowledge Discovery Handbook, 2nd ed., 2010
Auto-Sign: an automatic signature generator for high-speed malware filtering devices.
J. Comput. Virol., 2010
IEEE Trans. Knowl. Data Eng., 2010
Proceedings of the 2010 Workshop on Collaborative Methods for Security and Privacy, 2010
Proceedings of the 2010 ACM Conference on Recommender Systems, 2010
Proceedings of the Mobile Computing, Applications, and Services, 2010
Proceedings of the 10th International Conference on Innovative Internet Community Services (I<sup>2</sup>CS), 2010
GEO-SPADE - A Generic Google Earth-based Framework for Analyzing and Exploring Spatio-temporal Data.
Proceedings of the ICEIS 2010 - Proceedings of the 12th International Conference on Enterprise Information Systems, Volume 5, HCI, Funchal, Madeira, Portugal, June 8, 2010
Proceedings of the Enterprise Information Systems - 12th International Conference, 2010
Proceedings of the 2010 IEEE International Conference on Granular Computing, 2010
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010
M-score: estimating the potential damage of data leakage incident by assigning misuseability weight.
Proceedings of the 2010 ACM workshop on Insider threats, Insider Threats '10, Chicago, 2010
Proceedings of the 2010 ACM workshop on Insider threats, Insider Threats '10, Chicago, 2010
Proceedings of the Geospatial Thinking, 2010
2009
Series in Machine Perception and Artificial Intelligence 75, WorldScientific, ISBN: 978-981-4468-31-2, 2009
Proceedings of the Encyclopedia of Data Warehousing and Mining, Second Edition (4 Volumes), 2009
Proceedings of the Encyclopedia of Data Warehousing and Mining, Second Edition (4 Volumes), 2009
Proceedings of the Encyclopedia of Artificial Intelligence (3 Volumes), 2009
Taxonomy for characterizing ensemble methods in classification tasks: A review and annotated bibliography.
Comput. Stat. Data Anal., 2009
Comput. Stat. Data Anal., 2009
Ensemble methods for improving the performance of neighborhood-based collaborative filtering.
Proceedings of the 2009 ACM Conference on Recommender Systems, 2009
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009
Proceedings of the Enterprise Information Systems, 11th International Conference, 2009
Proceedings of the Database Technologies: Concepts, 2009
2008
Proceedings of the Soft Computing for Knowledge Discovery and Data Mining, 2008
Proceedings of the Soft Computing for Knowledge Discovery and Data Mining, 2008
Pattern Recognit., 2008
Mining manufacturing databases to discover the effect of operation sequence on the product quality.
J. Intell. Manuf., 2008
Int. J. Intell. Syst. Technol. Appl., 2008
An evolutionary algorithm for constructing a decision forest: Combining the classification of disjoints decision trees.
Int. J. Intell. Syst., 2008
Pessimistic cost-sensitive active learning of decision trees for profit maximizing targeting campaigns.
Data Min. Knowl. Discov., 2008
Comput. Stat. Data Anal., 2008
Proceedings of the Protecting Persons While Protecting the People, 2008
Anytime AHP Method for Preferences Elicitation in Stereotype-Based Recommender System.
Proceedings of the ICEIS 2008, 2008
2007
Series in Machine Perception and Artificial Intelligence 69, WorldScientific, ISBN: 978-981-4474-18-4, 2007
Int. J. Pattern Recognit. Artif. Intell., 2007
Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, 2007
Proceedings of the Advances in Intelligent Web Mastering, Proceedings of the 5th Atlantic Web Intelligence Conference - AWIC 2007, Fontainebleau, France, June 25, 2007
2006
A Decision Tree Framework for Semi-Automatic Extraction of Product Attributes from the Web.
Proceedings of the Advances in Web Intelligence and Data Mining, 2006
Proceedings of the Advances in Web Intelligence and Data Mining, 2006
Proceedings of the Advances in Web Intelligence and Data Mining, 2006
Pattern Anal. Appl., 2006
Data Mining for Improving the Quality of Manufacturing: A Feature Set Decomposition Approach.
J. Intell. Manuf., 2006
Int. J. Pattern Recognit. Artif. Intell., 2006
Automatic Discovery of Regular Expression Patterns Representing Negated Findings in Medical Narrative Reports.
Proceedings of the Next Generation Information Technologies and Systems, 2006
Automatic Identification of Negated Concepts in Narrative Clinical Reports.
Proceedings of the ICEIS 2006, 2006
Proceedings of the Workshops Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 2006
2005
Decomposition Methodology for Knowledge Discovery and Data Mining - Theory and Applications
Series in Machine Perception and Artificial Intelligence 61, WorldScientific, ISBN: 978-981-256-079-7, 2005
IEEE Trans. Syst. Man Cybern. Part C, 2005
Int. J. Comput. Intell. Appl., 2005
Proceedings of the 2005 IEEE International Conference on Granular Computing, 2005
Clustering Methods.
Proceedings of the Data Mining and Knowledge Discovery Handbook., 2005
Decision Trees.
Proceedings of the Data Mining and Knowledge Discovery Handbook., 2005
Ensemble Methods for Classifiers.
Proceedings of the Data Mining and Knowledge Discovery Handbook., 2005
Decomposition Methodology for Knowledge Discovery and Data Mining.
Proceedings of the Data Mining and Knowledge Discovery Handbook., 2005
Introduction to Supervised Methods.
Proceedings of the Data Mining and Knowledge Discovery Handbook., 2005
Introduction to Knowledge Discovery in Databases.
Proceedings of the Data Mining and Knowledge Discovery Handbook., 2005
2004
Proceedings of the MEDINFO 2004, 2004
Proceedings of the Flexible Query Answering Systems, 6th International Conference, 2004
2003
Proceedings of the Foundations of Intelligent Systems, 14th International Symposium, 2003
2002
Proceedings of the Foundations of Information and Knowledge Systems, 2002
2001
Proceedings of the 2001 IEEE International Conference on Data Mining, 29 November, 2001