-
2
-
-
84929471718
-
Incremental learning for v-support vector regression
-
Bin G, Sheng VS, Wang Z, Ho D, Osman S, Li S (2015a) Incremental learning for v-support vector regression. Neural Netw 67:140–150
-
(2015)
Neural Netw
, vol.67
, pp. 140-150
-
-
Bin, G.1
Sheng, V.S.2
Wang, Z.3
Ho, D.4
Osman, S.5
Li, S.6
-
3
-
-
85028203782
-
Incremental support vector learning for ordinal regression
-
Bin G, Sheng VS, Tay KY, Romano W, Li S (2015b) Incremental support vector learning for ordinal regression. IEEE Trans Neural Netw Learn Syst 26(7):1403–1416
-
(2015)
IEEE Trans Neural Netw Learn Syst
, vol.26
, Issue.7
, pp. 1403-1416
-
-
Bin, G.1
Sheng, V.S.2
Tay, K.Y.3
Romano, W.4
Li, S.5
-
4
-
-
0032024433
-
A graph distance metric based on the maximal common subgraph
-
Bunke H, Shearer K (1998) A graph distance metric based on the maximal common subgraph. Pattern Recognit Lett 19(3–4):255–259
-
(1998)
Pattern Recognit Lett
, vol.19
, Issue.3-4
, pp. 255-259
-
-
Bunke, H.1
Shearer, K.2
-
7
-
-
84921701101
-
Color image analysis by quaternion-type moments
-
Chen B, Shu H, Coatrieux G, Chen G, Sun X, Coatrieux J-L (2015) Color image analysis by quaternion-type moments. J Math Imaging Vis 51(1):124–144
-
(2015)
J Math Imaging Vis
, vol.51
, Issue.1
, pp. 124-144
-
-
Chen, B.1
Shu, H.2
Coatrieux, G.3
Chen, G.4
Sun, X.5
Coatrieux, J.-L.6
-
8
-
-
77954728128
-
K-isomorphism: privacy preserving network publication against structural attacks
-
Indianapolis, Indiana, USA, June
-
Cheng J, Fu W C, Liu J (2010) K-isomorphism: privacy preserving network publication against structural attacks. In: ACM SIGMOD international conference on management of data, SIGMOD 2010, Indianapolis, Indiana, USA, June, pp 459–470
-
(2010)
ACM SIGMOD international conference on management of data, SIGMOD
, vol.2010
, pp. 459-470
-
-
Cheng, J.1
Fu, W.C.2
Liu, J.3
-
10
-
-
84919663898
-
Overlapping community detection using neighborhood ratio matrix
-
Eustace J, Wang X (2015) Overlapping community detection using neighborhood ratio matrix. Phys A 421:510–521
-
(2015)
Phys A
, vol.421
, pp. 510-521
-
-
Eustace, J.1
Wang, X.2
-
11
-
-
0037062448
-
Community structure in social and biological networks
-
Girvan M, Newman MEJ (2002) Community structure in social and biological networks. Proc Natl Acad Sci 99(12):7821–7826
-
(2002)
Proc Natl Acad Sci
, vol.99
, Issue.12
, pp. 7821-7826
-
-
Girvan, M.1
Newman, M.E.J.2
-
13
-
-
84916883747
-
A variable threshold-value authentication architecture for wireless mesh networks
-
Guo P, Wang J, Li B, Lee S (2014) A variable threshold-value authentication architecture for wireless mesh networks. J Internet Technol 15(6):929–936
-
(2014)
J Internet Technol
, vol.15
, Issue.6
, pp. 929-936
-
-
Guo, P.1
Wang, J.2
Li, B.3
Lee, S.4
-
14
-
-
85044138147
-
Edge partitioning approach for protecting sensitive relationships in social network
-
Guoting F, Yonglong L, Dandan S, Taochun W, Xiaoyao Z (2016) Edge partitioning approach for protecting sensitive relationships in social network. J Comput Appl 36(1):207–211
-
(2016)
J Comput Appl
, vol.36
, Issue.1
, pp. 207-211
-
-
Guoting, F.1
Yonglong, L.2
Dandan, S.3
Taochun, W.4
Xiaoyao, Z.5
-
15
-
-
84865624038
-
An efficient k-anonymization algorithm with low information loss
-
Huda MN, Yamada S, Sonehara N (2013) An efficient k-anonymization algorithm with low information loss. Lect Notes Electr Eng 156:249–254
-
(2013)
Lect Notes Electr Eng
, vol.156
, pp. 249-254
-
-
Huda, M.N.1
Yamada, S.2
Sonehara, N.3
-
16
-
-
84886021495
-
Fast similar subgraph search with maximum common connected subgraph constraints
-
Hu H, Li G, Feng J (2013) Fast similar subgraph search with maximum common connected subgraph constraints. In: IEEE International Congress on big data, pp 181–188
-
(2013)
IEEE International Congress on big data
, pp. 181-188
-
-
Hu, H.1
Li, G.2
Feng, J.3
-
19
-
-
84891780582
-
Visualized book recommender system using matrix clustering
-
Kuo JJ, Chang JS, Zhang YJ (2013) Visualized book recommender system using matrix clustering. J Educ Media Libr Sci 51(1):5–35
-
(2013)
J Educ Media Libr Sci
, vol.51
, Issue.1
, pp. 5-35
-
-
Kuo, J.J.1
Chang, J.S.2
Zhang, Y.J.3
-
20
-
-
84907558944
-
Uncovering the overlapping community structure of complex networks by maximal cliques
-
Li J, Wang X (2014) Uncovering the overlapping community structure of complex networks by maximal cliques. Phys A 415:398–406
-
(2014)
Phys A
, vol.415
, pp. 398-406
-
-
Li, J.1
Wang, X.2
-
21
-
-
80052706869
-
A generalization based approach for anonymizing weighted social network graphs
-
In: Springer, Berlin
-
Liu X, Yang X (2011) A generalization based approach for anonymizing weighted social network graphs. In: International conference on web-age information management. Springer, Berlin, pp 118–130
-
(2011)
International conference on web-age information management
, pp. 118-130
-
-
Liu, X.1
Yang, X.2
-
22
-
-
84944512081
-
An efficient and scalable density-based clustering algorithm for datasets with complex structures
-
Lv Y, Ma T, Tang M et al (2016) An efficient and scalable density-based clustering algorithm for datasets with complex structures. Neurocomputing 171:9–22
-
(2016)
Neurocomputing
, vol.171
, pp. 9-22
-
-
Lv, Y.1
Ma, T.2
Tang, M.3
-
23
-
-
84945485084
-
KDVEM: a k-degree anonymity with vertex and edge modification algorithm
-
Ma T, Zhang Y, Cao J et al (2015a) KDVEM: a k-degree anonymity with vertex and edge modification algorithm. Computing 97(12):1165–1184
-
(2015)
Computing
, vol.97
, Issue.12
, pp. 1165-1184
-
-
Ma, T.1
Zhang, Y.2
Cao, J.3
-
24
-
-
84926455204
-
Social network and tag sources based augmenting collaborative recommender system
-
Ma T, Zhou J, Tang M, Tian Y, Al-Dhelaan A, Al-Rodhaan M, Lee S (2015b) Social network and tag sources based augmenting collaborative recommender system. IEICE Trans 98(D(4)):902–910
-
(2015)
IEICE Trans
, vol.98
, Issue.D4
, pp. 902-910
-
-
Ma, T.1
Zhou, J.2
Tang, M.3
Tian, Y.4
Al-Dhelaan, A.5
Al-Rodhaan, M.6
Lee, S.7
-
25
-
-
84971658592
-
LED: a fast overlapping communities detection algorithm based on structural clustering
-
Ma T, Wang Y, Tang M et al (2016a) LED: a fast overlapping communities detection algorithm based on structural clustering. Neurocomputing 207:488–500
-
(2016)
Neurocomputing
, vol.207
, pp. 488-500
-
-
Ma, T.1
Wang, Y.2
Tang, M.3
-
26
-
-
84956732869
-
Detect structural-connected communities based on BSCHEF in C-DBLP
-
Ma T, Rong H, Ying C, Tian Y, Al-Dhelaan A, Al-Rodhaan M (2016b) Detect structural-connected communities based on BSCHEF in C-DBLP. Concurr Comput Pract Exp 28(2):311–330
-
(2016)
Concurr Comput Pract Exp
, vol.28
, Issue.2
, pp. 311-330
-
-
Ma, T.1
Rong, H.2
Ying, C.3
Tian, Y.4
Al-Dhelaan, A.5
Al-Rodhaan, M.6
-
28
-
-
84934996790
-
Community detection for graph-based similarity: application to protein binding pockets classification
-
Mallek S, Boukhris I, Elouedi Z (2015) Community detection for graph-based similarity: application to protein binding pockets classification. Pattern Recognit Lett 62:49–54
-
(2015)
Pattern Recognit Lett
, vol.62
, pp. 49-54
-
-
Mallek, S.1
Boukhris, I.2
Elouedi, Z.3
-
29
-
-
0019909679
-
Backtrack search algorithms and the maximal common subgraph problem
-
Mcgregor JJ (1982) Backtrack search algorithms and the maximal common subgraph problem. Softw Pract Exp 12(1):23–34
-
(1982)
Softw Pract Exp
, vol.12
, Issue.1
, pp. 23-34
-
-
Mcgregor, J.J.1
-
31
-
-
85044146735
-
Anonymization in social networks: a survey on the issues of data privacy in social network sites
-
Praveena A, Smys S (2016) Anonymization in social networks: a survey on the issues of data privacy in social network sites. Int J Eng Comput Sci 5(3):15912–15918
-
(2016)
Int J Eng Comput Sci
, vol.5
, Issue.3
, pp. 15912-15918
-
-
Praveena, A.1
Smys, S.2
-
32
-
-
84938356327
-
Ambiguity in social network data for presence, sensitive-attribute, degree and relationship privacy protection
-
e0130693
-
Rajaei M, Haghjoo MS, Miyaneh EK (2015) Ambiguity in social network data for presence, sensitive-attribute, degree and relationship privacy protection. PLoS ONE 10(6):e0130693
-
(2015)
PLoS ONE
, vol.10
, Issue.6
-
-
Rajaei, M.1
Haghjoo, M.S.2
Miyaneh, E.K.3
-
33
-
-
0036663707
-
Maximum common subgraph isomorphism algorithms for the matching of chemical structures
-
Raymond JW, Willett P (2002) Maximum common subgraph isomorphism algorithms for the matching of chemical structures. J Comput Aided Mol Des 16(7):521–533
-
(2002)
J Comput Aided Mol Des
, vol.16
, Issue.7
, pp. 521-533
-
-
Raymond, J.W.1
Willett, P.2
-
34
-
-
0016870630
-
An algorithm for subgraph isomorphism
-
Ullmann JR (1976) An algorithm for subgraph isomorphism. J ACM 23(23):31–42
-
(1976)
J ACM
, vol.23
, Issue.23
, pp. 31-42
-
-
Ullmann, J.R.1
-
36
-
-
84911495921
-
High utility K-anonymization for social network publishing
-
Wang Y, Xie L, Zheng B et al (2014) High utility K-anonymization for social network publishing. Knowl Inf Syst 41(3):697–725
-
(2014)
Knowl Inf Syst
, vol.41
, Issue.3
, pp. 697-725
-
-
Wang, Y.1
Xie, L.2
Zheng, B.3
-
37
-
-
84961291654
-
A rapid learning algorithm for vehicle classification
-
Wen X, Shao L, Xue Y, Wei F (2015) A rapid learning algorithm for vehicle classification. Inf Sci 295(1):395–406
-
(2015)
Inf Sci
, vol.295
, Issue.1
, pp. 395-406
-
-
Wen, X.1
Shao, L.2
Xue, Y.3
Wei, F.4
-
39
-
-
84966687511
-
A personalized sensitive label-preserving model and algorithm based on utility in social network data publishing
-
Xie Y, Zheng M, Liu L (2016) A personalized sensitive label-preserving model and algorithm based on utility in social network data publishing. LNCS 9567:1–11
-
(2016)
LNCS
, vol.9567
, pp. 1-11
-
-
Xie, Y.1
Zheng, M.2
Liu, L.3
-
41
-
-
84906519157
-
A secure K-automorphism privacy preserving approach with high data utility in social networks
-
Yang J, Wang B, Yang X et al (2014) A secure K-automorphism privacy preserving approach with high data utility in social networks. Secur Commun Netw 7(9):1399–1411
-
(2014)
Secur Commun Netw
, vol.7
, Issue.9
, pp. 1399-1411
-
-
Yang, J.1
Wang, B.2
Yang, X.3
-
42
-
-
84956860357
-
A combined model of clustering and classification methods for preserving privacy in social networks against inference and neighborhood attacks
-
Zaghian A, Bagheri A (2016) A combined model of clustering and classification methods for preserving privacy in social networks against inference and neighborhood attacks. Int J Secur Appl 10(1):95–102
-
(2016)
Int J Secur Appl
, vol.10
, Issue.1
, pp. 95-102
-
-
Zaghian, A.1
Bagheri, A.2
-
43
-
-
76749101527
-
Binary matrix factorization for analyzing gene expression data
-
Zhang ZY, Li T, Ding C et al (2010) Binary matrix factorization for analyzing gene expression data. Data Min Knowl Discov 20(1):28–52
-
(2010)
Data Min Knowl Discov
, vol.20
, Issue.1
, pp. 28-52
-
-
Zhang, Z.Y.1
Li, T.2
Ding, C.3
-
44
-
-
84903450035
-
Protecting encrypted data against inference attacks in outsourced databases
-
Zhang XL, Tang Y (2014) Protecting encrypted data against inference attacks in outsourced databases. Appl Mech Mater 571–572:621–625
-
(2014)
Appl Mech Mater
, vol.571-572
, pp. 621-625
-
-
Zhang, X.L.1
Tang, Y.2
-
45
-
-
84921899998
-
Image segmentation by generalized hierarchical fuzzy C-means algorithm
-
Zheng Y, Jeon B, Danhua X, Jonathan Wu QM, Zhang H (2015) Image segmentation by generalized hierarchical fuzzy C-means algorithm. J Intell Fuzzy Syst 28(2):961–973
-
(2015)
J Intell Fuzzy Syst
, vol.28
, Issue.2
, pp. 961-973
-
-
Zheng, Y.1
Jeon, B.2
Danhua, X.3
Jonathan Wu, Q.M.4
Zhang, H.5
|