Shyue-Liang Wang

Orcid: 0000-0001-9197-4350

According to our database1, Shyue-Liang Wang authored at least 137 papers between 1996 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Preface: Information Granulation in Data Science and Scalable Computing.
Fundam. Informaticae, 2021

Fuzzy Adaptive Focal Loss for Imbalanced Datasets.
Proceedings of the IEEE International Conference on Imaging Systems and Techniques, 2021

2020
Flexible sensitive K-anonymization on transactions.
World Wide Web, 2020

Using Tree Structure to Mine High Temporal Fuzzy Utility Itemsets.
IEEE Access, 2020

One-Phase Temporal Fuzzy Utility Mining.
Proceedings of the 29th IEEE International Conference on Fuzzy Systems, 2020

Mining High-Utility Sequential Patterns in Uncertain Databases.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

Extracting Multi-Scale Rotation-Invariant Features in Convolution Neural Networks.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

2019
Mining High-Utility Sequential Patterns from Big Datasets.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

Mining Temporal Fuzzy Utility Itemsets by Tree Structure.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
Maintenance of Erasable Itemsets for Product Deletion.
Proceedings of the 5th Multidisciplinary International Social Networks Conference, 2018

Model of Integration of Business Intelligence and Knowledge Management.
Proceedings of the Knowledge Management in Organizations - 13th International Conference, 2018

Recognition and Counting of Motorcycles by Fusing Support Vector Machine and Deep Learning.
Proceedings of the New Trends in Computer Technologies and Applications, 2018

Reducing Database Scan in Maintaining Erasable Itemsets from Product Deletion.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

Privacy Preserving Utility Mining: A Survey.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

Flexible Anonymization of Transactions with Sensitive Items.
Proceedings of the 5th International Conference on Behavioral, 2018

2017
k<sup>-</sup>-anonymization of multiple shortest paths.
Soft Comput., 2017

Special issue on intelligent analytics and management of mobile data and social media.
Soft Comput., 2017

Empirical comparison of level-wise hierarchical multi-population genetic algorithm.
J. Inf. Telecommun., 2017

Analysis of privacy and utility tradeoffs in anonymized mobile context streams.
Intell. Data Anal., 2017

Editorial.
Intell. Data Anal., 2017

Mining high utility partial periodic pattern by GPA.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

High Utility Partial Periodic Pattern Mining.
Proceedings of the 4th Multidisciplinary International Social Networks Conference, 2017

Performance Analysis of a Propagation Territory-based Routing in MANETs with Obstacles.
Proceedings of the 4th Multidisciplinary International Social Networks Conference, 2017

Migration Effect of Hierarchical Multi-Population Genetic Algorithm.
Proceedings of the 3rd IEEE International Conference on Cybernetics, 2017

Quasi-erasable itemset mining.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

Towards the detection of cyberbullying based on social network mining techniques.
Proceedings of the 2017 International Conference on Behavioral, 2017

2016
K, P)-Shortest Path Algorithm in the Cloud Maintaining Neighborhood Privacy.
J. Web Eng., 2016

Mining high-utility itemsets based on particle swarm optimization.
Eng. Appl. Artif. Intell., 2016

Genetic-fuzzy mining with MapReduce.
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016

Toward Construction of Open Election Data Model: A Case Study of Taiwan's Election Data.
Proceedings of the The 3rd Multidisciplinary International Social Networks Conference on SocialInformatics 2016, 2016

Privacy and Utility Effects of k-anonymity on Association Rule Hiding.
Proceedings of the The 3rd Multidisciplinary International Social Networks Conference on SocialInformatics 2016, 2016

A Study of The Effect of Spiral of Silence between Different Social Networking Platforms.
Proceedings of the The 3rd Multidisciplinary International Social Networks Conference on SocialInformatics 2016, 2016

An Empirical Case Study of Internet Usage on Student Performance based on Fuzzy Association Rules.
Proceedings of the The 3rd Multidisciplinary International Social Networks Conference on SocialInformatics 2016, 2016

Complexity Analysis of a Propagation Territory-based Routing in MANET with Obstacles.
Proceedings of the The 3rd Multidisciplinary International Social Networks Conference on SocialInformatics 2016, 2016

2015
Edge types vs privacy in K-anonymization of shortest paths.
Appl. Soft Comput., 2015

Fuzzy utility mining with upper-bound measure.
Appl. Soft Comput., 2015

The GA-based algorithms for optimizing hiding sensitive itemsets through transaction deletion.
Appl. Intell., 2015

Extending [K 1 , K 2 ] Anonymization of Shortest Paths for Social Networks.
Proceedings of the Multidisciplinary Social Networks Research, 2015

A Swarm-Based Approach to Mine High-Utility Itemsets.
Proceedings of the Multidisciplinary Social Networks Research, 2015

Toward Analyzing Privacy and Utility of Mobile User Data.
Proceedings of the ASE BigData & SocialInformatics 2015, 2015

2014
Feature selection and replacement by clustering attributes.
Vietnam. J. Comput. Sci., 2014

K-anonymous path privacy on social graphs.
J. Intell. Fuzzy Syst., 2014

Applying the maximum utility measure in high utility sequential pattern mining.
Expert Syst. Appl., 2014

Key Users and Box Office Analysis in an Interest Based Virtual Community.
Comput. Informatics, 2014

On anonymizing transactions with sensitive items.
Appl. Intell., 2014

Fast discovery of high fuzzy utility itemsets.
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014

[K1, K2]-anonymization of Shortest Paths.
Proceedings of the 12th International Conference on Advances in Mobile Computing and Multimedia, 2014

Utility Knowledge Fusion in a Multi-site Environment.
Proceedings of the Multidisciplinary Social Networks Research - International Conference, 2014

A Projection-Based Approach for Mining Highly Coherent Association Rules.
Proceedings of the Intelligent Data analysis and its Applications, Volume I, 2014

2013
A Greedy-based Approach for Hiding Sensitive Itemsets by Transaction Insertion.
J. Inf. Hiding Multim. Signal Process., 2013

Anonymous Spatial Query on Non-Uniform Data.
Int. J. Data Warehous. Min., 2013

Shortest Paths Anonymization on Weighted Graphs.
Int. J. Softw. Eng. Knowl. Eng., 2013

Using TF-IDF to hide sensitive itemsets.
Appl. Intell., 2013

Degree Anonymization for K-Shortest-Path Privacy.
Proceedings of the IEEE International Conference on Systems, 2013

Enhancing the Efficiency in Mining Weighted Frequent Itemsets.
Proceedings of the IEEE International Conference on Systems, 2013

Sensitive and Neighborhood Privacy on Shortest Paths in the Cloud.
Proceedings of the 15th International Conference on Information Integration and Web-based Applications & Services, 2013

Recent Studies in Privacy Preservation.
Proceedings of the 15th International Conference on Information Integration and Web-based Applications & Services, 2013

Content matters: a study of hate groups detection based on social networks analysis and web mining.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
Understanding Microblog Users for Social Recommendation Based on Social Networks Analysis.
J. Univers. Comput. Sci., 2012

A multi-level ant-colony mining algorithm for membership functions.
Inf. Sci., 2012

Multi-layer partition for query location anonymization.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2012

Confining Edge Types in K-anonymization of Shortest Paths.
Proceedings of the 2012 Third International Conference on Innovations in Bio-Inspired Computing and Applications, 2012

An improved approach for sequential utility pattern mining.
Proceedings of the 2012 IEEE International Conference on Granular Computing, 2012

Incremental multiple fuzzy frequent pattern tree.
Proceedings of the FUZZ-IEEE 2012, 2012

A Novel Search Engine Based on Social Relationships in Online Social Networking Website.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012

2011
Risk-neutral evaluation of information security investment on data centers.
J. Intell. Inf. Syst., 2011

Effective utility mining with the measure of average utility.
Expert Syst. Appl., 2011

A lattice-based data sanitization approach.
Proceedings of the IEEE International Conference on Systems, 2011

A Heuristic Data-Sanitization Approach Based on TF-IDF.
Proceedings of the Modern Approaches in Applied Intelligence, 2011

Anonymizing Multiple K-anonymous Shortest Paths for Social Graphs.
Proceedings of the Second International Conference on Innovations in Bio-inspired Computing and Applications, 2011

Maintenance of Pre-large FUSP Trees in Dynamic Databases.
Proceedings of the Second International Conference on Innovations in Bio-inspired Computing and Applications, 2011

K-anonymity on sensitive transaction items.
Proceedings of the 2011 IEEE International Conference on Granular Computing, 2011

Hiding sensitive itemsets by inserting dummy transactions.
Proceedings of the 2011 IEEE International Conference on Granular Computing, 2011

Towards Social Recommendation System Based on the Data from Microblogs.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2011

Anonymizing Shortest Paths on Social Network Graphs.
Proceedings of the Intelligent Information and Database Systems, 2011

2010
Hiding collaborative recommendation association rules on horizontally partitioned data.
Intell. Data Anal., 2010

Multi-table association rules hiding.
Proceedings of the 10th International Conference on Intelligent Systems Design and Applications, 2010

Anonymizing Set-Valued Social Data.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

Hiding Sensitive Association Rules on Stars.
Proceedings of the 2010 IEEE International Conference on Granular Computing, 2010

2009
Maintenance of sanitizing informative association rules.
Expert Syst. Appl., 2009

An effective mining approach for up-to-date patterns.
Expert Syst. Appl., 2009

An ACS-based framework for fuzzy data mining.
Expert Syst. Appl., 2009

Fuzzy rough sets with hierarchical quantitative attributes.
Expert Syst. Appl., 2009

An improved data mining approach using predictive itemsets.
Expert Syst. Appl., 2009

Mining High Average-Utility Itemsets.
Proceedings of the IEEE International Conference on Systems, 2009

An Incremental Mining Algorithm for High Average-Utility Itemsets.
Proceedings of the 10th International Symposium on Pervasive Systems, 2009

Hiding Predictive Association Rules on Horizontally Distributed Data.
Proceedings of the Next-Generation Applied Intelligence, 2009

2008
Efficient sanitization of informative association rules.
Expert Syst. Appl., 2008

Learning cross-level certain and possible rules by rough sets.
Expert Syst. Appl., 2008

Efficient Hiding of Collaborative Recommendation Association Rules with Updates.
Proceedings of the Seventh International Conference on Machine Learning and Applications, 2008

Mining Up-to-date Knowledge from Log Data.
Proceedings of the 2008 IEEE International Conference on Granular Computing, 2008

Incremental Discovery of Fuzzy Functional Dependencies.
Proceedings of the Handbook of Research on Fuzzy Information Processing in Databases, 2008

2007
Maintenance of informative ruler sets for predictions.
Intell. Data Anal., 2007

Hiding informative association rule sets.
Expert Syst. Appl., 2007

Mining fuzzy β-certain and β-possible rules from quantitative data based on the variable precision rough-set model.
Expert Syst. Appl., 2007

Hiding collaborative recommendation association rules.
Appl. Intell., 2007

Using escape operations in gene-set genetic algorithms.
Proceedings of the IEEE International Conference on Systems, 2007

2006
Mining fuzzy sequential patterns from quantitative transactions.
Soft Comput., 2006

Learning with Hierarchical Quantitative Attributes by Fuzzy Rough Sets.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006

One scan sanitization of informative association rules.
Proceedings of the 2006 IEEE International Conference on Information Reuse and Integration, 2006

2005
Discovery of Fuzzy Multiple-Level Web Browsing Patterns.
Proceedings of the Classification and Clustering for Knowledge Discovery, 2005

Hiding sensitive predictive association rules.
Proceedings of the IEEE International Conference on Systems, 2005

Maintenance of discovered informative rule sets: incremental deletion.
Proceedings of the IEEE International Conference on Systems, 2005

Using unknowns for hiding sensitive predictive association rules.
Proceedings of the 2005 IEEE International Conference on Information Reuse and Integration, 2005

2004
Semantic Web and Multiple-Agents in SCM.
Int. J. Electron. Bus. Manag., 2004

A fuzzy AprioriTid mining algorithm with reduced computational time.
Appl. Soft Comput., 2004

Adjustable discovery of adaptive-support association rules for collaborative recommendation systems.
Proceedings of the IEEE International Conference on Systems, 2004

Hiding sensitive items in privacy preserving association rule mining.
Proceedings of the IEEE International Conference on Systems, 2004

2003
Fuzzy data mining for interesting generalized association rules.
Fuzzy Sets Syst., 2003

Efficient generation of Adaptive-Support Association Rules.
Proceedings of the IEEE International Conference on Systems, 2003

Maintenance of discovered informative rule sets: incremental insertion.
Proceedings of the IEEE International Conference on Systems, 2003

A top-down fuzzy cross-level Web-mining approach.
Proceedings of the IEEE International Conference on Systems, 2003

Learning a coverage set of multiple-level certain and possible rules by rough sets.
Proceedings of the IEEE International Conference on Systems, 2003

2002
Mining linguistic browsing patterns in the world wide web.
Soft Comput., 2002

Learning rules from incomplete training examples by rough sets.
Expert Syst. Appl., 2002

Mining fuzzy similar sequential patterns from quantitative data.
Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, Yasmine Hammamet, Tunisia, October 6-9, 2002, 2002

Mining from quantitative data with linguistic minimum supports and confidences.
Proceedings of the 2002 IEEE International Conference on Fuzzy Systems, 2002

Discovery of Fuzzy Multiple-Level Web Browsing Patterns.
Proceedings of the FSDK'02, 2002

2001
A palmer-based continuous fuzzy flexible flow-shop scheduling algorithm.
Soft Comput., 2001

Answering Null Queries by Analogical Reasoning on Similarity-based Fuzzy Relational Databases.
J. Adv. Comput. Intell. Intell. Informatics, 2001

A Fuzzy CDS-based Scheduling Algorithm for More Than Two Machine Centers.
J. Adv. Comput. Intell. Intell. Informatics, 2001

Discovering functional dependencies from similarity-based fuzzy relational databases.
Intell. Data Anal., 2001

A Fuzzy AprioriTid Algorithm With Reduced Computational Time.
Proceedings of the 10th IEEE International Conference on Fuzzy Systems, 2001

2000
Incomplete Input Inference on Fuzzy Production Systems Supported by Petri Nets.
Int. J. Artif. Intell. Tools, 2000

Knowledge acquisition from quantitative data using the rough-set theory.
Intell. Data Anal., 2000

Determining appropriate membership functions to simplify fuzzy induction.
Intell. Data Anal., 2000

Mining fuzzy functional dependencies from quantitative data.
Proceedings of the IEEE International Conference on Systems, 2000

A heuristic Gupta-based flexible flow-shop scheduling algorithm.
Proceedings of the IEEE International Conference on Systems, 2000

Mining Functional Dependencies from Fuzzy Relational Databases.
Proceedings of the Applied Computing 2000, 2000

Mining Fuzzy Rules from Quantitative Data Based on the AprioriTid Algorithm.
Proceedings of the Applied Computing 2000, 2000

Mining approximate dependency to answer null queries on similarity-based fuzzy relational databases.
Proceedings of the Ninth IEEE International Conference on Fuzzy Systems, 2000

Palmer-based flexible flow-shop scheduling for continuous fuzzy domains.
Proceedings of the Ninth IEEE International Conference on Fuzzy Systems, 2000

1999
Null Queries with Compound Fuzzy Attributes.
J. Adv. Comput. Intell. Intell. Informatics, 1999

Discovery of approximate dependencies from proximity-based fuzzy databases.
Proceedings of the Third International Conference on Knowledge-Based Intelligent Information Engineering Systems, 1999

A Fuzzy Knowledge Representation and Acquisition Scheme for Diagnostic Systems.
Proceedings of the Multiple Approaches to Intelligent Systems, 1999

1998
Null queries with interval-valued ambiguous attributes.
Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, 1998

1996
Characteristics of Query Responses on Fuzzy Object-Oriented Databases.
Proceedings of the Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, 1996


  Loading...