Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Improved EMASK Algorithm for Privacy-Preserving Frequent Pattern Mining., , , and . CIS (1), volume 3801 of Lecture Notes in Computer Science, page 752-757. Springer, (2005)An Efficient Incremental Algorithm for Frequent Itemsets Mining in Distorted Databases with Granular Computing., and . Web Intelligence, page 913-918. IEEE Computer Society, (2006)An incremental rule extracting algorithm based on Pawlak reduction., , and . SMC (6), page 5964-5968. IEEE, (2004)A Dynamic Incremental Rule Extracting Algorithm Based on the Improved Discernibility Matrix., , , and . IRI, page 93-97. IEEE Systems, Man, and Cybernetics Society, (2003)Feature selection with spatial path coding for multimedia analysis., , , , and . Inf. Sci., (2014)Constrained Preference Embedding for Item Recommendation., , , and . IJCAI, page 2139-2145. IJCAI/AAAI Press, (2016)Semantic modeling project: building vernacular house of southeast China., , , and . VRCAI, page 412-418. ACM, (2004)Recommendation Algorithms for Optimizing Hit Rate, User Satisfaction and Website Revenue., , and . IJCAI, page 1820-1826. AAAI Press, (2015)LBMF: Log-Bilinear Matrix Factorization for Recommender Systems., , and . PAKDD (1), volume 9651 of Lecture Notes in Computer Science, page 502-513. Springer, (2016)Using decision boundary to analyze classifiers., and . ISKE, page 302-307. IEEE, (2008)