Kevin Chiew

According to our database1, Kevin Chiew authored at least 38 papers between 2008 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Interactive Rare-Category-of-Interest Mining from Large Datasets.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2018
Evaluation of local community metrics: from an experimental perspective.
J. Intell. Inf. Syst., 2018

Rare category exploration with noisy labels.
Expert Syst. Appl., 2018

2017
Joint affinity aware grouping and virtual machine placement.
Microprocess. Microsystems, 2017

2016
A formalized framework for incorporating expert labels in crowdsourcing environment.
J. Intell. Inf. Syst., 2016

Rare category exploration via wavelet analysis: Theory and applications.
Expert Syst. Appl., 2016

2015
<i>X</i>-Region: A framework for location privacy preservation in mobile peer-to-peer networks.
Int. J. Commun. Syst., 2015

Rare Category Detection Forest.
Proceedings of the Knowledge Science, Engineering and Management, 2015

Rare Category Exploration on Linear Time Complexity.
Proceedings of the Database Systems for Advanced Applications, 2015

2014
On RFID False Authentications.
Proceedings of the Big Data and Internet of Things: A Roadmap for Smart Environments, 2014

Mining regional co-location patterns with kNNG.
J. Intell. Inf. Syst., 2014

Toward seed-insensitive solutions to local community detection.
J. Intell. Inf. Syst., 2014

Prior-free rare category detection: More effective and efficient solutions.
Expert Syst. Appl., 2014

Unsupervised analysis of top-k core members in poly-relational networks.
Expert Syst. Appl., 2014

Rare category exploration.
Expert Syst. Appl., 2014

Recovering Missing Labels of Crowdsourcing Workers.
Proceedings of the 2014 SIAM International Conference on Data Mining, 2014

Rare Category Detection on O(dN) Time Complexity.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2014

Learning from Crowds under Experts' Supervision.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2014

Towards effective and efficient mining of arbitrary shaped clusters.
Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, 2014

2013
CLOVER: a faster prior-free approach to rare-category detection.
Knowl. Inf. Syst., 2013

EDA: an enhanced dual-active algorithm for location privacy preservation inmobile P2P networks.
J. Zhejiang Univ. Sci. C, 2013

Browse with a social web directory.
Proceedings of the 36th International ACM SIGIR conference on research and development in Information Retrieval, 2013

Commodity query by snapping.
Proceedings of the 36th International ACM SIGIR conference on research and development in Information Retrieval, 2013

Discovery of Regional Co-location Patterns with <i>k</i>-Nearest Neighbor Graph.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2013

Protecting Software as a Service in the Clouds by Validation.
Proceedings of the Service-Oriented Computing - ICSOC 2012 Workshops, 2013

GMAC: A Seed-Insensitive Approach to Local Community Detection.
Proceedings of the Data Warehousing and Knowledge Discovery, 2013

AAGA: Affinity-Aware Grouping for Allocation of Virtual Machines.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

2012
Scheduling and routing of autonomous moving objects on a mesh topology.
Oper. Res., 2012

Spatial co-location pattern discovery without thresholds.
Knowl. Inf. Syst., 2012

An Approach to Automated Runtime Verification for Timed Systems: Applications to Web Services.
J. Softw., 2012

Design and Implementation of a Secure Prototype for EPCglobal Network Services.
Proceedings of the Radio Frequency Identification System Security, 2012

SALS: semantics-aware location sharing based on cloaking zone in mobile social networks.
Proceedings of the First ACM SIGSPATIAL International Workshop on Mobile Geographic Information Systems, 2012

2010
Privacy Disclosure Analysis and Control for 2D Contingency Tables Containing Inaccurate Data.
Proceedings of the Privacy in Statistical Databases, 2010

Time cost evaluation for executing RFID authentication protocols.
Proceedings of the 2010 Internet of Things (IOT), IoT for a green Planet, Tokyo, Japan, November 29, 2010

An Approach to Image Spam Filtering Based on Base64 Encoding and N-Gram Feature Extraction.
Proceedings of the 22nd IEEE International Conference on Tools with Artificial Intelligence, 2010

2009
Scheduling and Routing of AMOs in an Intelligent Transport System.
IEEE Trans. Intell. Transp. Syst., 2009

Multistage Off-Line Permutation Packet Routing on a Mesh: An Approach with Elementary Mathematics.
J. Comput. Sci. Technol., 2009

2008
Data Mining with Privacy Preserving in Industrial Systems.
Proceedings of the Advances of Computational Intelligence in Industrial Systems, 2008


  Loading...