Author of the publication

The GA-based algorithms for optimizing hiding sensitive itemsets through transaction deletion.

, , , and . Appl. Intell., 42 (2): 210-230 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Parallel Perceptron Learning Algorithm., and . ICPP (3), page 288-289. CRC Press, (1991)Learning coverage rules from incomplete data based on rough sets., , and . SMC (4), page 3226-3231. IEEE, (2004)Maintenance of multiple-level association rules for record modification., , and . SMC (4), page 3140-3145. IEEE, (2004)An Overview of Mining Fuzzy Association Rules., and . Fuzzy Sets and Their Extensions: Representation, Aggregation and Models, volume 220 of Studies in Fuzziness and Soft Computing, Springer, (2008)Cluster-based genetic segmentation of time series with DWT., , , and . Pattern Recognit. Lett., 30 (13): 1190-1197 (2009)A Function-Based Classifier Learning Scheme Using Genetic Programming., , and . PAKDD, volume 2336 of Lecture Notes in Computer Science, page 92-103. Springer, (2002)Fuzzy scheduling on two-machine flow shop., and . J. Intell. Fuzzy Syst., 6 (4): 471-481 (1998)Incomplete Input Inference on Fuzzy Production Systems Supported by Petri Nets., and . Int. J. Artif. Intell. Tools, 9 (4): 537-549 (2000)A Nearly Optimal Back-Propagation Learning Algorithm on a Bus-Based Architecture., and . Parallel Process. Lett., 8 (3): 297-306 (1998)An Improved Knowledge-Acquisition Strategy Based on Genetic Programming., , and . Cybern. Syst., 39 (7): 672-685 (2008)