Author of the publication

A Divide-and-Conquer Discretization Algorithm.

, , , and . FSKD (1), volume 3613 of Lecture Notes in Computer Science, page 1277-1286. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed Gridflow Model and Implementation., , and . NPC, volume 3779 of Lecture Notes in Computer Science, page 84-87. Springer, (2005)A hierarchical model for test-cost-sensitive decision systems., and . Inf. Sci., 179 (14): 2442-2452 (2009)Real-time control of individual agents for crowd simulation., , , , , and . Multim. Tools Appl., 54 (2): 397-414 (2011)Adversarial attack and defense technologies in natural language processing: A survey., , , and . Neurocomputing, (2022)An Effective Approach to Handling Noise and Drift in Electronic Noses., , and . ADC, volume 8506 of Lecture Notes in Computer Science, page 223-230. Springer, (2014)Privacy-Preservation in Distributed Deep Neural Networks via Encryption of Selected Gradients., , , and . HPCC/DSS/SmartCity, page 816-823. IEEE, (2020)A Novel DGA Domain Adversarial Sample Generation Method By Geometric Perturbation., , , and . AISS, page 29:1-29:10. ACM, (2021)The M-Relative Reduct Problem., , , and . RSKT, volume 4062 of Lecture Notes in Computer Science, page 170-175. Springer, (2006)Knowledge Reduction in Inconsistent Decision Tables., , , and . ADMA, volume 4093 of Lecture Notes in Computer Science, page 626-635. Springer, (2006)Unknown Attack Detection Based on Zero-Shot Learning., , , , and . IEEE Access, (2020)