default search action
Shyue-Liang Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j52]Dominik Slezak, Tzung-Pei Hong, Leon S. L. Wang:
Preface: Information Granulation in Data Science and Scalable Computing. Fundam. Informaticae 182(2) (2021) - [c84]Tzung-Pei Hong, Wei-Chun Peng, Ja-Hwung Su, Shyue-Liang Wang:
Fuzzy Adaptive Focal Loss for Imbalanced Datasets. IST 2021: 1-5 - 2020
- [j51]Tzung-Pei Hong, Cheng-Yu Lin, Wei-Ming Huang, Katherine Shu-Min Li, Shyue-Liang Leon Wang, Jerry Chun-Wei Lin:
Using Tree Structure to Mine High Temporal Fuzzy Utility Itemsets. IEEE Access 8: 153692-153706 (2020) - [j50]Yu-Chuan Tsai, Shyue-Liang Wang, I-Hsien Ting, Tzung-Pei Hong:
Flexible sensitive K-anonymization on transactions. World Wide Web 23(4): 2391-2406 (2020) - [c83]Tzung-Pei Hong, Ming-Jhe Hu, Tank-Kai Yin, Shyue-Liang Wang:
Extracting Multi-Scale Rotation-Invariant Features in Convolution Neural Networks. IEEE BigData 2020: 5360-5365 - [c82]Jerry Chun-Wei Lin, Gautam Srivastava, Yuanfa Li, Tzung-Pei Hong, Shyue-Liang Wang:
Mining High-Utility Sequential Patterns in Uncertain Databases. IEEE BigData 2020: 5373-5380 - [c81]Tzung-Pei Hong, Cheng-Yu Lin, Wei-Ming Huang, Shu-Min Li, Shyue-Liang Wang, Jerry Chun-Wei Lin:
One-Phase Temporal Fuzzy Utility Mining. FUZZ-IEEE 2020: 1-5
2010 – 2019
- 2019
- [c80]Tzung-Pei Hong, Cheng-Yu Lin, Wei-Ming Huang, Shu-Min Li, Shyue-Liang Wang, Jerry Chun-Wei Lin:
Mining Temporal Fuzzy Utility Itemsets by Tree Structure. IEEE BigData 2019: 2659-2663 - [c79]Jerry Chun-Wei Lin, Yuanfa Li, Philippe Fournier-Viger, Youcef Djenouri, Shyue-Liang Leon Wang:
Mining High-Utility Sequential Patterns from Big Datasets. IEEE BigData 2019: 2674-2680 - 2018
- [c78]Yu-Chuan Tsai, Shyue-Liang Wang, I-Hsien Ting, Tzung-Pei Hong:
Flexible Anonymization of Transactions with Sensitive Items. BESC 2018: 201-206 - [c77]Wensheng Gan, Jerry Chun-Wei Lin, Han-Chieh Chao, Shyue-Liang Wang, Philip S. Yu:
Privacy Preserving Utility Mining: A Survey. IEEE BigData 2018: 2617-2626 - [c76]Tzung-Pei Hong, Chia-Che Li, Shyue-Liang Wang, Jerry Chun-Wei Lin:
Reducing Database Scan in Maintaining Erasable Itemsets from Product Deletion. IEEE BigData 2018: 2627-2632 - [c75]Tzung-Pei Hong, Yu-Chiao Yang, Ja-Hwung Su, Shyue-Liang Wang:
Recognition and Counting of Motorcycles by Fusing Support Vector Machine and Deep Learning. ICS 2018: 157-162 - [c74]Aída Cristina Gálvez, Melissa Castañeda, Giovanny Tarazona, Jorge Mario Calvo, Leon S. L. Wang:
Model of Integration of Business Intelligence and Knowledge Management. KMO 2018: 511-522 - [c73]Tzung-Pei Hong, Chia-Che Li, Shyue-Liang Wang, Chun-Wei Lin:
Maintenance of Erasable Itemsets for Product Deletion. MISNC 2018: 18:1-18:4 - [i1]Wensheng Gan, Jerry Chun-Wei Lin, Han-Chieh Chao, Shyue-Liang Wang, Philip S. Yu:
Privacy Preserving Utility Mining: A Survey. CoRR abs/1811.07389 (2018) - 2017
- [j49]Tzung-Pei Hong, Been-Chian Chien, Wen-Yang Lin, Shyue-Liang Wang:
Editorial. Intell. Data Anal. 21(S1): S1-S3 (2017) - [j48]Shyue-Liang Wang, Min-Jye Hsiu, Yu-Chuan Tsai, I-Hsien Ting, Tzung-Pei Hong:
Analysis of privacy and utility tradeoffs in anonymized mobile context streams. Intell. Data Anal. 21(S1): S21-S39 (2017) - [j47]Tzung-Pei Hong, Yuan-Ching Peng, Wen-Yang Lin, Shyue-Liang Wang:
Empirical comparison of level-wise hierarchical multi-population genetic algorithm. J. Inf. Telecommun. 1(1): 66-78 (2017) - [j46]Wen-Yang Lin, Hsin-Chang Yang, Tzung-Pei Hong, Leon S. L. Wang:
Special issue on intelligent analytics and management of mobile data and social media. Soft Comput. 21(15): 4159-4160 (2017) - [j45]Shyue-Liang Wang, Yu-Chuan Tsai, Tzung-Pei Hong, Hung-Yu Kao:
k--anonymization of multiple shortest paths. Soft Comput. 21(15): 4215-4226 (2017) - [c72]I-Hsien Ting, Wun Sheng Liou, Dario Liberona, Shyue-Liang Wang, Giovanny Mauricio Tarazona Bermúdez:
Towards the detection of cyberbullying based on social network mining techniques. BESC 2017: 1-2 - [c71]Tzung-Pei Hong, Lu-Hung Chen, Shyue-Liang Wang, Chun-Wei Lin, Bay Vo:
Quasi-erasable itemset mining. IEEE BigData 2017: 1816-1820 - [c70]Tzung-Pei Hong, Yuan-Ching Peng, Wen-Yang Lin, Shyue-Liang Wang:
Migration Effect of Hierarchical Multi-Population Genetic Algorithm. CYBCONF 2017: 1-4 - [c69]Chih-Hung Chao, Yi-Chung Tseng, Shyue-Liang Wang:
Performance Analysis of a Propagation Territory-based Routing in MANETs with Obstacles. MISNC 2017: 34:1-34:7 - [c68]Tzung-Pei Hong, Jen-Hao Hsu, Guo-Cheng Lan, Kung-Jiuan Yang, Shyue-Liang Wang, Jerry Chun-Wei Lin:
High Utility Partial Periodic Pattern Mining. MISNC 2017: 35:1-35:4 - [c67]Tzung-Pei Hong, Jen-Hao Hsu, Kung-Jiuan Yang, Guo-Cheng Lan, Jerry Chun-Wei Lin, Shyue-Liang Wang:
Mining high utility partial periodic pattern by GPA. SMC 2017: 820-824 - 2016
- [j44]Jerry Chun-Wei Lin, Lu Yang, Philippe Fournier-Viger, Jimmy Ming-Tai Wu, Tzung-Pei Hong, Shyue-Liang Leon Wang, Justin Zhan:
Mining high-utility itemsets based on particle swarm optimization. Eng. Appl. Artif. Intell. 55: 320-330 (2016) - [j43]Shyue-Liang Wang, Jia-Wei Chen, I-Hsien Ting, Tzung-Pei Hong:
K, P)-Shortest Path Algorithm in the Cloud Maintaining Neighborhood Privacy. J. Web Eng. 15(1&2): 29-44 (2016) - [c66]Chih-Hong Huang, Hsing-Lung Lien, Shyue-Liang Leon Wang:
An Empirical Case Study of Internet Usage on Student Performance based on Fuzzy Association Rules. MISNC 2016: 7 - [c65]Chih-Hung Chao, Yi-Chung Tseng, Shyue-Liang Wang:
Complexity Analysis of a Propagation Territory-based Routing in MANET with Obstacles. MISNC 2016: 41 - [c64]Yu-Chuan Tsai, Shyue-Liang Wang, Cheng-Yu Song, I-Hsien Ting:
Privacy and Utility Effects of k-anonymity on Association Rule Hiding. MISNC 2016: 42 - [c63]Hsin-Chang Yang, Cathy S. Lin, Han-Wei Hsiao, Wen-Sheng Chen, Mei-Li Kao, Yuh-Tay Lin, Leon S. L. Wang:
Toward Construction of Open Election Data Model: A Case Study of Taiwan's Election Data. MISNC 2016: 51 - [c62]I-Hsien Ting, Zhenjiang Zhang, Shyue-Liang Leon Wang:
A Study of The Effect of Spiral of Silence between Different Social Networking Platforms. MISNC 2016: 55 - [c61]Tzung-Pei Hong, Yu-Yang Liu, Min-Thai Wu, Chun-Hao Chen, Shyue-Liang Leon Wang:
Genetic-fuzzy mining with MapReduce. SMC 2016: 3294-3298 - [e8]Gang Li, Yves Demazeau, Guandong Xu, Paul Wang, Leon S. L. Wang, Guanfeng Liu:
2016 International Conference on Behavioral, Economic and Socio-cultural Computing, BESC 2016, Durham, NC, USA, November 11-13, 2016. IEEE 2016, ISBN 978-1-5090-6164-8 [contents] - 2015
- [j42]Chun-Wei Lin, Tzung-Pei Hong, Kuo-Tung Yang, Shyue-Liang Wang:
The GA-based algorithms for optimizing hiding sensitive itemsets through transaction deletion. Appl. Intell. 42(2): 210-230 (2015) - [j41]Guo-Cheng Lan, Tzung-Pei Hong, Yi-Hsin Lin, Shyue-Liang Wang:
Fuzzy utility mining with upper-bound measure. Appl. Soft Comput. 30: 767-777 (2015) - [j40]Yu-Chuan Tsai, Shyue-Liang Wang, Hung-Yu Kao, Tzung-Pei Hong:
Edge types vs privacy in K-anonymization of shortest paths. Appl. Soft Comput. 31: 348-359 (2015) - [c60]Shyue-Liang Wang, Min-Jye Hsiu, I-Hsien Ting, Tzung-Pei Hong:
Toward Analyzing Privacy and Utility of Mobile User Data. ASE BD&SI 2015: 21:1-21:6 - [c59]Yu-Chuan Tsai, Shyue-Liang Wang, Tzung-Pei Hong, Hung-Yu Kao:
Extending [K 1 , K 2 ] Anonymization of Shortest Paths for Social Networks. MISNC 2015: 187-199 - [c58]Jerry Chun-Wei Lin, Lu Yang, Philippe Fournier-Viger, Jimmy Ming-Tai Wu, Tzung-Pei Hong, Shyue-Liang Leon Wang:
A Swarm-Based Approach to Mine High-Utility Itemsets. MISNC 2015: 572-581 - [e7]Leon S. L. Wang, Shiro Uesugi, I-Hsien Ting, Koji Okuhara, Kai Wang:
Multidisciplinary Social Networks Research - Second International Conference, MISNC 2015, Matsuyama, Japan, September 1-3, 2015. Proceedings. Communications in Computer and Information Science 540, Springer 2015, ISBN 978-3-662-48318-3 [contents] - 2014
- [j39]Shyue-Liang Wang, Yu-Chuan Tsai, Hung-Yu Kao, Tzung-Pei Hong:
On anonymizing transactions with sensitive items. Appl. Intell. 41(4): 1043-1058 (2014) - [j38]I-Hsien Ting, Shyue-Liang Wang, Po-Jen Chen:
Key Users and Box Office Analysis in an Interest Based Virtual Community. Comput. Informatics 33(3): 570-590 (2014) - [j37]Guo-Cheng Lan, Tzung-Pei Hong, Vincent S. Tseng, Shyue-Liang Wang:
Applying the maximum utility measure in high utility sequential pattern mining. Expert Syst. Appl. 41(11): 5071-5081 (2014) - [j36]Shyue-Liang Wang, Zheng-Ze Tsai, I-Hsien Ting, Tzung-Pei Hong:
K-anonymous path privacy on social graphs. J. Intell. Fuzzy Syst. 26(3): 1191-1199 (2014) - [j35]Tzung-Pei Hong, Yan-Liang Liou, Shyue-Liang Wang, Bay Vo:
Feature selection and replacement by clustering attributes. Vietnam. J. Comput. Sci. 1(1): 47-55 (2014) - [c57]Chun-Hao Chen, Guo-Cheng Lan, Tzung-Pei Hong, Shyue-Liang Wang, Yui-Kai Lin:
A Projection-Based Approach for Mining Highly Coherent Association Rules. ECC (1) 2014: 69-78 - [c56]Guo-Cheng Lan, Tzung-Pei Hong, Yu-Chieh Tseng, Shyue-Liang Wang:
Utility Knowledge Fusion in a Multi-site Environment. MISNC 2014: 171-178 - [c55]Yu-Chuan Tsai, Shyue-Liang Wang, Tzung-Pei Hong, Hung-Yu Kao:
[K1, K2]-anonymization of Shortest Paths. MoMM 2014: 317-321 - [c54]Guo-Cheng Lan, Tzung-Pei Hong, Yi-Hsin Lin, Shyue-Liang Wang:
Fast discovery of high fuzzy utility itemsets. SMC 2014: 2764-2767 - [e6]Jeng-Shyang Pan, Václav Snásel, Emilio Corchado, Ajith Abraham, Shyue-Liang Wang:
Intelligent Data analysis and its Applications, Volume I - Proceeding of the First Euro-China Conference on Intelligent Data Analysis and Applications, ECC 2014, June 13-15, 2014, Shenzhen, China. Advances in Intelligent Systems and Computing 297, Springer 2014, ISBN 978-3-319-07775-8 [contents] - [e5]Jeng-Shyang Pan, Václav Snásel, Emilio Corchado, Ajith Abraham, Shyue-Liang Wang:
Intelligent Data analysis and its Applications, Volume II - Proceeding of the First Euro-China Conference on Intelligent Data Analysis and Applications, June 13-15, 2014, Shenzhen, China. Advances in Intelligent Systems and Computing 298, Springer 2014, ISBN 978-3-319-07772-7 [contents] - [e4]Lorna Uden, Leon S. L. Wang, Juan Manuel Corchado Rodríguez, Hsin-Chang Yang, I-Hsien Ting:
The 8th International Conference on Knowledge Management in Organizations, Social and Big Data Computing for Knowledge Management, KMO 2013, Kaohsiung, Taiwan, 9-13 September 2013. Springer Proceedings in Complexity, Springer 2014, ISBN 978-94-007-7286-1 [contents] - [e3]Shyue-Liang Leon Wang, Jason J. June, Chung-Hong Lee, Koji Okuhara, Hsin-Chang Yang:
Multidisciplinary Social Networks Research - International Conference, MISNC 2014, Kaohsiung, Taiwan, September 13-14, 2014. Proceedings. Communications in Computer and Information Science 473, Springer 2014, ISBN 978-3-662-45070-3 [contents] - [e2]Shyue-Liang Leon Wang, Yu-Hui Tao, Liming Chen, Chung-Nan Lee:
Proceedings of the 12th International Conference on Advances in Mobile Computing and Multimedia, Kaohsiung, Taiwan, December 8-10, 2014. ACM 2014, ISBN 978-1-4503-3008-4 [contents] - 2013
- [j34]Tzung-Pei Hong, Chun-Wei Lin, Kuo-Tung Yang, Shyue-Liang Wang:
Using TF-IDF to hide sensitive itemsets. Appl. Intell. 38(4): 502-510 (2013) - [j33]Shyue-Liang Wang, Yu-Chuan Tsai, Hung-Yu Kao, I-Hsien Ting, Tzung-Pei Hong:
Shortest Paths Anonymization on Weighted Graphs. Int. J. Softw. Eng. Knowl. Eng. 23(1): 65-80 (2013) - [j32]Shyue-Liang Wang, Chung-Yi Chen, I-Hsien Ting, Tzung-Pei Hong:
Anonymous Spatial Query on Non-Uniform Data. Int. J. Data Warehous. Min. 9(4): 44-61 (2013) - [j31]Chun-Wei Lin, Tzung-Pei Hong, Chia-Ching Chang, Shyue-Liang Wang:
A Greedy-based Approach for Hiding Sensitive Itemsets by Transaction Insertion. J. Inf. Hiding Multim. Signal Process. 4(4): 201-214 (2013) - [c53]I-Hsien Ting, Shyue-Liang Wang, Hsing-Miao Chi, Jyun-Sing Wu:
Content matters: a study of hate groups detection based on social networks analysis and web mining. ASONAM 2013: 1196-1201 - [c52]Leon S. L. Wang:
Recent Studies in Privacy Preservation. iiWAS 2013: 3 - [c51]Shyue-Liang Wang, Jia-Wei Chen, I-Hsien Ting, Tzung-Pei Hong:
Sensitive and Neighborhood Privacy on Shortest Paths in the Cloud. iiWAS 2013: 555 - [c50]Shyue-Liang Wang, Ching-Chuan Shih, I-Hsien Ting, Tzung-Pei Hong:
Degree Anonymization for K-Shortest-Path Privacy. SMC 2013: 1093-1097 - [c49]Guo-Cheng Lan, Tzung-Pei Hong, Hong-Yu Lee, Shyue-Liang Wang, Chun-Wei Tsai:
Enhancing the Efficiency in Mining Weighted Frequent Itemsets. SMC 2013: 1104-1108 - 2012
- [j30]Tzung-Pei Hong, Ya-Fang Tung, Shyue-Liang Wang, Yu-Lung Wu, Min-Thai Wu:
A multi-level ant-colony mining algorithm for membership functions. Inf. Sci. 182(1): 3-14 (2012) - [j29]I-Hsing Ting, Pei-Shan Chang, Shyue-Liang Wang:
Understanding Microblog Users for Social Recommendation Based on Social Networks Analysis. J. Univers. Comput. Sci. 18(4): 554-576 (2012) - [c48]Hsiao-Hsuan Lu, I-Hsien Ting, Shyue-Liang Wang:
A Novel Search Engine Based on Social Relationships in Online Social Networking Website. ASONAM 2012: 1111-1116 - [c47]Tzung-Pei Hong, Chun-Wei Lin, Tsung-Ching Lin, Shyue-Liang Wang:
Incremental multiple fuzzy frequent pattern tree. FUZZ-IEEE 2012: 1-5 - [c46]Guo-Cheng Lan, Tzung-Pei Hong, Vincent S. Tseng, Shyue-Liang Wang:
An improved approach for sequential utility pattern mining. GrC 2012: 226-230 - [c45]Yu-Chuan Tsai, Shyue-Liang Wang, Hung-Yu Kao, Tzung-Pei Hong:
Confining Edge Types in K-anonymization of Shortest Paths. IBICA 2012: 318-322 - [c44]Shyue-Liang Wang, Chung-Yi Chen, I-Hsien Ting, Tzung-Pei Hong:
Anonymous spatial query on non-uniform data. iiWAS 2012: 126-131 - [c43]Shyue-Liang Wang, Chung-Yi Chen, I-Hsien Ting, Tzung-Pei Hong:
Multi-layer partition for query location anonymization. SMC 2012: 378-383 - 2011
- [j28]Tzung-Pei Hong, Cho-Han Lee, Shyue-Liang Wang:
Effective utility mining with the measure of average utility. Expert Syst. Appl. 38(7): 8259-8265 (2011) - [j27]Shyue-Liang Wang, Jyun-Da Chen, Paul A. Stirpe, Tzung-Pei Hong:
Risk-neutral evaluation of information security investment on data centers. J. Intell. Inf. Syst. 36(3): 329-345 (2011) - [c42]Shyue-Liang Wang, Zheng-Ze Tsai, Tzung-Pei Hong, I-Hsien Ting:
Anonymizing Shortest Paths on Social Network Graphs. ACIIDS (1) 2011: 129-136 - [c41]Pei-Shan Chang, I-Hsien Ting, Shyue-Liang Wang:
Towards Social Recommendation System Based on the Data from Microblogs. ASONAM 2011: 672-677 - [c40]Tzung-Pei Hong, Chun-Wei Lin, Chia-Ching Chang, Shyue-Liang Wang:
Hiding sensitive itemsets by inserting dummy transactions. GrC 2011: 246-249 - [c39]Shyue-Liang Wang, Yu-Chuan Tsai, Hung-Yu Kao, Tzung-Pei Hong:
K-anonymity on sensitive transaction items. GrC 2011: 723-727 - [c38]Shyue-Liang Wang, Zheng-Ze Tsai, Tzung-Pei Hong, I-Hsien Ting, Yu-Chuan Tsai:
Anonymizing Multiple K-anonymous Shortest Paths for Social Graphs. IBICA 2011: 195-198 - [c37]Chun-Wei Lin, Tzung-Pei Hong, Hong-Yu Lee, Shyue-Liang Wang:
Maintenance of Pre-large FUSP Trees in Dynamic Databases. IBICA 2011: 199-202 - [c36]Tzung-Pei Hong, Chun-Wei Lin, Kuo-Tung Yang, Shyue-Liang Wang:
A Heuristic Data-Sanitization Approach Based on TF-IDF. IEA/AIE (1) 2011: 156-164 - [c35]Tzung-Pei Hong, Chun-Wei Lin, Kuo-Tung Yang, Shyue-Liang Wang:
A lattice-based data sanitization approach. SMC 2011: 2325-2329 - [e1]Tzung-Pei Hong, Yasuo Kudo, Mineichi Kudo, Tsau Young Lin, Been-Chian Chien, Shyue-Liang Wang, Masahiro Inuiguchi, Guilong Liu:
2011 IEEE International Conference on Granular Computing, GrC-2011, Kaohsiung, Taiwan, November 8-10, 2011. IEEE Computer Society 2011, ISBN 978-1-4577-0372-0 [contents] - 2010
- [j26]Shyue-Liang Wang, Ting-Zheng Lai, Tzung-Pei Hong, Yu-Lung Wu:
Hiding collaborative recommendation association rules on horizontally partitioned data. Intell. Data Anal. 14(1): 47-67 (2010) - [c34]Shyue-Liang Wang, Tzung-Pei Hong, Yu-Chuan Tsai, Hung-Yu Kao:
Hiding Sensitive Association Rules on Stars. GrC 2010: 505-508 - [c33]Shyue-Liang Wang, Yu-Chuan Tsai, Hung-Yu Kao, Tzung-Pei Hong:
Anonymizing Set-Valued Social Data. GreenCom/CPSCom 2010: 809-812 - [c32]Shyue-Liang Wang, Tzung-Pei Hong, Yu-Chuan Tsai, Hung-Yu Kao:
Multi-table association rules hiding. ISDA 2010: 1298-1302
2000 – 2009
- 2009
- [j25]Tzung-Pei Hong, Chyan-Yuan Horng, Chih-Hung Wu, Shyue-Liang Wang:
An improved data mining approach using predictive itemsets. Expert Syst. Appl. 36(1): 72-80 (2009) - [j24]Shyue-Liang Wang:
Maintenance of sanitizing informative association rules. Expert Syst. Appl. 36(2): 4006-4012 (2009) - [j23]Tzung-Pei Hong, Yan-Liang Liou, Shyue-Liang Wang:
Fuzzy rough sets with hierarchical quantitative attributes. Expert Syst. Appl. 36(3): 6790-6799 (2009) - [j22]Tzung-Pei Hong, Yi-Ying Wu, Shyue-Liang Wang:
An effective mining approach for up-to-date patterns. Expert Syst. Appl. 36(6): 9747-9752 (2009) - [j21]Tzung-Pei Hong, Ya-Fang Tung, Shyue-Liang Wang, Min-Thai Wu, Yu-Lung Wu:
An ACS-based framework for fuzzy data mining. Expert Syst. Appl. 36(9): 11844-11852 (2009) - [c31]Shyue-Liang Wang, Ting-Zheng Lai, Tzung-Pei Hong, Yu-Lung Wu:
Hiding Predictive Association Rules on Horizontally Distributed Data. IEA/AIE 2009: 133-141 - [c30]Tzung-Pei Hong, Cho-Han Lee, Shyue-Liang Wang:
An Incremental Mining Algorithm for High Average-Utility Itemsets. ISPAN 2009: 421-425 - [c29]Tzung-Pei Hong, Cho-Han Lee, Shyue-Liang Wang:
Mining High Average-Utility Itemsets. SMC 2009: 2526-2530 - 2008
- [j20]Tzung-Pei Hong, Chun-E Lin, Jiann-Horng Lin, Shyue-Liang Wang:
Learning cross-level certain and possible rules by rough sets. Expert Syst. Appl. 34(3): 1698-1706 (2008) - [j19]Shyue-Liang Wang, Rajeev Maskey, Ayat Jafari, Tzung-Pei Hong:
Efficient sanitization of informative association rules. Expert Syst. Appl. 35(1-2): 442-450 (2008) - [c28]Tzung-Pei Hong, Yi-Ying Wu, Shyue-Liang Wang:
Mining Up-to-date Knowledge from Log Data. GrC 2008: 286-291 - [c27]Shyue-Liang Wang, Ting-Zheng Lai, Tzung-Pei Hong, Yu-Lung Wu:
Efficient Hiding of Collaborative Recommendation Association Rules with Updates. ICMLA 2008: 737-740 - [p2]Shyue-Liang Wang, Ju-Wen Shen, Tzung-Pei Hong:
Incremental Discovery of Fuzzy Functional Dependencies. Handbook of Research on Fuzzy Information Processing in Databases 2008: 615-633 - 2007
- [j18]Shyue-Liang Wang, Dipen Patel, Ayat Jafari, Tzung-Pei Hong:
Hiding collaborative recommendation association rules. Appl. Intell. 27(1): 67-77 (2007) - [j17]Tzung-Pei Hong, Tzu-Ting Wang, Shyue-Liang Wang:
Mining fuzzy β-certain and β-possible rules from quantitative data based on the variable precision rough-set model. Expert Syst. Appl. 32(1): 223-232 (2007) - [j16]Shyue-Liang Wang, Bhavesh Parikh, Ayat Jafari:
Hiding informative association rule sets. Expert Syst. Appl. 33(2): 316-323 (2007) - [j15]Shyue-Liang Wang, Kuan-Wei Huang, Tien-Chin Wang, Tzung-Pei Hong:
Maintenance of informative ruler sets for predictions. Intell. Data Anal. 11(3): 279-292 (2007) - [c26]Tzung-Pei Hong, Min-Thai Wu, Ya-Fang Tung, Shyue-Liang Wang:
Using escape operations in gene-set genetic algorithms. SMC 2007: 3907-3911 - 2006
- [j14]Tzung-Pei Hong, Kuei-Ying Lin, Shyue-Liang Wang:
Mining fuzzy sequential patterns from quantitative transactions. Soft Comput. 10(10): 925-932 (2006) - [c25]Shyue-Liang Wang, Rajeev Maskey, Ayat Jafari:
One scan sanitization of informative association rules. IRI 2006: 516-521 - [c24]Tzung-Pei Hong, Yan-Liang Liou, Shyue-Liang Wang:
Learning with Hierarchical Quantitative Attributes by Fuzzy Rough Sets. JCIS 2006 - 2005
- [c23]Shyue-Liang Wang, Ayat Jafari:
Using unknowns for hiding sensitive predictive association rules. IRI 2005: 223-228 - [c22]Shyue-Liang Wang, Ayat Jafari:
Hiding sensitive predictive association rules. SMC 2005: 164-169 - [c21]Shyue-Liang Wang, Kuan-Wei Huang, Tien-Chin Wang, Tzung-Pei Hong:
Maintenance of discovered informative rule sets: incremental deletion. SMC 2005: 170-175 - [p1]Shyue-Liang Wang, Wei-Shuo Lo, Tzung-Pei Hong:
Discovery of Fuzzy Multiple-Level Web Browsing Patterns. Classification and Clustering for Knowledge Discovery 2005: 251-266 - 2004
- [j13]Tzung-Pei Hong, Chan-Sheng Kuo, Shyue-Liang Wang:
A fuzzy AprioriTid mining algorithm with reduced computational time. Appl. Soft Comput. 5(1): 1-10 (2004) - [j12]Wei-Shuo Lo, Tzung-Pei Hong, Shyue-Liang Wang, Yu-Hui Tao:
Semantic Web and Multiple-Agents in SCM. Int. J. Electron. Bus. Manag. 2(2): 122-130 (2004) - [c20]Shyue-Liang Wang, Yu-Huei Lee, Steve Billis, Ayat Jafari:
Hiding sensitive items in privacy preserving association rule mining. SMC (4) 2004: 3239-3244 - [c19]Shyue-Liang Wang, Mei-Hwa Wang, Wen-Yang Lin, Tzung-Pei Hong:
Adjustable discovery of adaptive-support association rules for collaborative recommendation systems. SMC (4) 2004: 3250-3254 - 2003
- [j11]Tzung-Pei Hong, Kuei-Ying Lin, Shyue-Liang Wang:
Fuzzy data mining for interesting generalized association rules. Fuzzy Sets Syst. 138(2): 255-269 (2003) - [c18]Shyue-Liang Wang, Mei-Hwa Wang, Wen-Yang Lin, Tzung-Pei Hong:
Efficient generation of Adaptive-Support Association Rules. SMC 2003: 894-899 - [c17]Shyue-Liang Wang, Kuan-Wei Huang, Tien-Chin Wang, Tzung-Pei Hong:
Maintenance of discovered informative rule sets: incremental insertion. SMC 2003: 2394-2399 - [c16]Tzung-Pei Hong, Chun-E Lin, Jiann-Horng Lin, Shyue-Liang Wang:
Learning a coverage set of multiple-level certain and possible rules by rough sets. SMC 2003: 2605-2610 - [c15]Wei-Shuo Lo, Tzung-Pei Hong, Shyue-Liang Wang:
A top-down fuzzy cross-level Web-mining approach. SMC 2003: 2684-2689 - 2002
- [j10]Tzung-Pei Hong, Li-Huei Tseng, Shyue-Liang Wang:
Learning rules from incomplete training examples by rough sets. Expert Syst. Appl. 22(4): 285-293 (2002) - [j9]Tzung-Pei Hong, Kuei-Ying Lin, Shyue-Liang Wang:
Mining linguistic browsing patterns in the world wide web. Soft Comput. 6(5): 329-336 (2002) - [c14]Shyue-Liang Wang, Wei-Shuo Lo, Tzung-Pei Hong:
Discovery of Fuzzy Multiple-Level Web Browsing Patterns. FSKD 2002: 636-640 - [c13]Tzung-Pei Hong, Ming-Jer Chiang, Shyue-Liang Wang:
Mining from quantitative data with linguistic minimum supports and confidences. FUZZ-IEEE 2002: 494-499 - [c12]Shyue-Liang Wang, Chun-Yin Kuo, Tzung-Pei Hong:
Mining fuzzy similar sequential patterns from quantitative data. SMC (2) 2002: 5 - 2001
- [j8]Shyue-Liang Wang, Jenn-Shing Tsai, Tzung-Pei Hong:
Discovering functional dependencies from similarity-based fuzzy relational databases. Intell. Data Anal. 5(2): 131-149 (2001) - [j7]Shyue-Liang Wang, Tzung-Pei Hong, Wen-Yang Lin:
Answering Null Queries by Analogical Reasoning on Similarity-based Fuzzy Relational Databases. J. Adv. Comput. Intell. Intell. Informatics 5(3): 163-171 (2001) - [j6]Tzung-Pei Hong, Tzu-Ting Wang, Shyue-Liang Wang:
A Fuzzy CDS-based Scheduling Algorithm for More Than Two Machine Centers. J. Adv. Comput. Intell. Intell. Informatics 5(4): 239-245 (2001) - [j5]Tzung-Pei Hong, Tzu-Ting Wang, Shyue-Liang Wang:
A palmer-based continuous fuzzy flexible flow-shop scheduling algorithm. Soft Comput. 5(6): 426-433 (2001) - [c11]Tzung-Pei Hong, Chan-Sheng Kuo, Shyue-Liang Wang:
A Fuzzy AprioriTid Algorithm With Reduced Computational Time. FUZZ-IEEE 2001: 360-363 - 2000
- [j4]Tzung-Pei Hong, Shyue-Liang Wang:
Determining appropriate membership functions to simplify fuzzy induction. Intell. Data Anal. 4(1): 51-66 (2000) - [j3]Tzung-Pei Hong, Tzu-Ting Wang, Shyue-Liang Wang:
Knowledge acquisition from quantitative data using the rough-set theory. Intell. Data Anal. 4(3-4): 289-304 (2000) - [j2]Shyue-Liang Wang, Tzung-Pei Hong:
Incomplete Input Inference on Fuzzy Production Systems Supported by Petri Nets. Int. J. Artif. Intell. Tools 9(4): 537-549 (2000) - [c10]Tzung-Pei Hong, Tzu-Ting Wang, Shyue-Liang Wang:
Palmer-based flexible flow-shop scheduling for continuous fuzzy domains. FUZZ-IEEE 2000: 363-368 - [c9]Shyue-Liang Wang, Tzung-Pei Hong:
Mining approximate dependency to answer null queries on similarity-based fuzzy relational databases. FUZZ-IEEE 2000: 615-620 - [c8]Shyue-Liang Wang, Jenn-Shing Tsai, Tzung-Pei Hong:
Mining Functional Dependencies from Fuzzy Relational Databases. SAC (1) 2000: 490-493 - [c7]Tzung-Pei Hong, Chan-Sheng Kuo, Sheng-Chai Chi, Shyue-Liang Wang:
Mining Fuzzy Rules from Quantitative Data Based on the AprioriTid Algorithm. SAC (1) 2000: 534-536 - [c6]Tzung-Pei Hong, Chan-Lon Wang, Shyue-Liang Wang:
A heuristic Gupta-based flexible flow-shop scheduling algorithm. SMC 2000: 319-322 - [c5]Shyue-Liang Wang, Ju-Wen Shen, Tzung-Pei Hong:
Mining fuzzy functional dependencies from quantitative data. SMC 2000: 3600-3605
1990 – 1999
- 1999
- [j1]Shyue-Liang Wang, Yu-Jane Tsai:
Null Queries with Compound Fuzzy Attributes. J. Adv. Comput. Intell. Intell. Informatics 3(6): 509-514 (1999) - [c4]Shyue-Liang Wang, Yi-Huey Wu:
A Fuzzy Knowledge Representation and Acquisition Scheme for Diagnostic Systems. IEA/AIE 1999: 13-22 - [c3]Shyue-Liang Wang, Jenn-Shing Tsai:
Discovery of approximate dependencies from proximity-based fuzzy databases. KES 1999: 234-237 - 1998
- [c2]Shyue-Liang Wang, Yu-Jane Tsai:
Null queries with interval-valued ambiguous attributes. SMC 1998: 2150-2153 - 1996
- [c1]Shyue-Liang Wang:
Characteristics of Query Responses on Fuzzy Object-Oriented Databases. IEA/AIE 1996: 111-116
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint