國立成功大學 |
2015-06 |
Edge types vs privacy in K-anonymization of shortest paths
|
Tsai, Yu-Chuan; Wang, Shyue-Liang; Kao, Hung-Yu; Hong, Tzung-Pei |
國立成功大學 |
2014-12 |
On anonymizing transactions with sensitive items
|
Wang, Shyue-Liang; Tsai, Yu-Chuan; Kao, Hung-Yu; Hong, Tzung-Pei |
國立成功大學 |
2014-09-01 |
Applying the maximum utility measure in high utility sequential pattern mining
|
Lan, Guo-Cheng; Hong, Tzung-Pei; Tseng, Vincent S.; Wang, Shyue-Liang |
國立成功大學 |
2013-02-01 |
SHORTEST PATHS ANONYMIZATION ON WEIGHTED GRAPHS
|
Wang, Shyue-Liang; Tsai, Yu-Chuan; Kao, Hung-Yu; Ting, I-Hsien; Hong, Tzung-Pei |
國立高雄大學 |
2012-01-01 |
A Multi-level Ant-colony Mining Algorithm for Membership Functions
|
Hong, Tzung-Pei; Tung, Ya-Fang; Wang, Shyue-Liang; Wu, Yu-Lung; Wu, Min-Thai |
國立高雄大學 |
2012 |
Understanding Microblog Users for Social Recommendation Based on Social Networks Analysis
|
Ting, I-Hsien; Chang, Pei-Shang; Wang, Shyue-Liang |
國立高雄大學 |
2011-12 |
Extending Suppression for Anonymization on Set-Valued Data
|
Wang, Shyue-Liang; Tsai, Yu-Chuan; Kao, Hung-Yu; 洪宗貝 |
國立高雄大學 |
2011-12 |
Anonymizing Multiple K-anonymous Shortest Paths For Social Graphs
|
Wang, Shyue-Liang;Tsai, Zheng-Ze; 洪宗貝; 丁一賢; Tsai, Yu-Chuan |
國立高雄大學 |
2011-12 |
Maintenance of Pre-large FUSP Trees in Dynamic Databases
|
Lin, Chun-Wei; 洪宗貝; Lee, Hong-Yu; Wang, Shyue-Liang |
國立高雄大學 |
2011-11 |
K-anonymity on Sensitive Transaction Items
|
Wang, Shyue-Liang; Tsai, Yu-Chuan; Kao, Hung-Yu; 洪宗貝 |
國立高雄大學 |
2011-11 |
Hiding the Sensitvie Itemsets by Inserting Dummy Transactions
|
洪宗貝; Lin, Chun-Wei; Chang, Chia-Ching; Wang, Shyue-Liang |
國立高雄大學 |
2011-10 |
A Lattice-based Data Sanitization Approach
|
洪宗貝; Lin, Chun-Wei; Yang, Kuo-Tung; Wang, Shyue-Liang |
國立高雄大學 |
2011-07-25 |
Towards Social Recommendation System Based on The Data from Microblogs
|
Jang, Pei-Shan;Ting, I-Hsien;Wang, Shyue-Liang |
國立高雄大學 |
2011-07-25 |
Academic Conference Network in Taiwan via Social Networks Analysis
|
Wang, Shyue-Liang; 丁一賢 |
國立高雄大學 |
2011-06 |
A Heuristic Data-Sanitization Approach Based on TF-IDF
|
Hong, Tzung-Pei; Lin, Chun-Wei; Yang, Kuo-Tung; Wang, Shyue-Liang |
國立高雄大學 |
2011-04 |
Anonymizing Shortest Paths on Social Network Graphs
|
Wang, Shyue-Liang; Tsai, Zheng-Ze; Hong, Tzung-Pei; Ting, I-Hsien |
國立高雄大學 |
2011 |
Mining a Complete Set of Fuzzy Multiple-Level Rules
|
Hong, Tzung-Pei; Chiu, Chu-Tien; Wang, Shyue-Liang; Lin, Kuei-Ying |
國立高雄大學 |
2011 |
Effective Utility Mining with the Measure of Average Utility
|
Hong, Tzung-Pei; Lee, Cho-Han; Wang, Shyue-Liang |
國立高雄大學 |
2010-12 |
Anonymizing Set-valued Social Data
|
Wang, Shyue-Liang; Tsai, Yu-Chuan; Kao, Hung-Yu; Hong, Tzung-Pei |
國立高雄大學 |
2010-12 |
Anonymizing Set-Valued Social Data
|
Wang, Shyue-Liang; Tsai, Yu-Chuan; Kao, Hung-Yu; Hong, Tzung-Pei |
國立高雄大學 |
2010-11 |
Multi-table Association Rules Hiding
|
Wang, Shyue-Liang; Hong, Tzung-Pei; Tsai, Yu-Chuan; Kao, Hung-Yu |
國立高雄大學 |
2010-08 |
Hiding Sensitive Association Rules on Stars
|
Wang, Shyue-Liang; Hong, Tzung-Pei; Tsai, Yu-Chuan; Kao, Hung-Yu |
國立高雄大學 |
2009-12 |
An Incremental Mining Algorithm for High Average-Utility Itemsets
|
Hong, Tzung-Pei; Lee, Cho-Han; Wang, Shyue-Liang |
國立高雄大學 |
2009-10 |
Mining High Average-Utility Itemsets
|
Hong, Tzung-Pei; Lee, Cho-Han; Wang, Shyue-Liang |
國立高雄大學 |
2009-06 |
Probabilistic Analysis of Information Center Insecurity
|
Wang, Shyue-Liang; Chen, Jyun-Da; Paul A. Stirpe; Hong, Tzung-Pei |