Peng Su

Orcid: 0000-0003-2636-3486

Affiliations:
  • Dali University, School of Mathematics and Computer Science, China
  • Shandong Jianzhu University, School of Management Engineering, China
  • Chinese Academy of Sciences, Institute of Automation, Beijing, China (PhD 2011)


According to our database1, Peng Su authored at least 11 papers between 2009 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2019
Behavior Action Mining.
IEEE Access, 2019

2015
Power-function-based observation-weighting method for mining actionable behavioral rules.
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015

An observation-weighting method for mining actionable behavioral rules.
Proceedings of the Seventh International Conference on Advanced Computational Intelligence, 2015

2013
An empirical study of cost-sensitive learning in cultural modeling.
Inf. Syst. E Bus. Manag., 2013

A new pruning method for resolving conflicts in actionable behavioral rules.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

2012
Mining actionable behavioral rules.
Decis. Support Syst., 2012

2011
Mining actionable behavioral rules from group data.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

2010
Employing cost-sensitive learning in cultural modeling.
Proceedings of 2010 IEEE International Conference on Service Operations and Logistics, 2010

2009
Performance Evaluation of Machine Learning Methods in Cultural Modeling.
J. Comput. Sci. Technol., 2009

Handling Class Imbalance Problem in Cultural Modeling.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

Performance evaluation of classification methods in cultural modeling.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009


  Loading...