Author of the publication

Mining h-Dimensional Enhanced Semantic Association Rule Based on Immune-Based Gene Expression Programming.

, , , , , , and . WISE Workshops, volume 4256 of Lecture Notes in Computer Science, page 49-60. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Necessary and sufficient conditions for robust oscillatory stability., , , and . Int. J. Systems Science, 38 (2): 179-185 (2007)Robust Reputation-Based Cooperative Spectrum Sensing via Imperfect Common Control Channel., , , , and . IEEE Trans. Vehicular Technology, 67 (5): 3950-3963 (2018)Echo hiding based stereo audio watermarking against pitch-scaling attacks., and . SIN, page 37-42. ACM, (2011)Dual-Domain Audio Watermarking Algorithm Based on Flexible Segmentation and Adaptive Embedding., , , and . IEEE Access, (2019)Guest Editorial: AI and Machine Learning Solution Cyber Intelligence Technologies: New Methodologies and Applications., , , and . IEEE Trans. Ind. Informatics, 16 (10): 6626-6631 (2020)Channel Estimation of Dual-Hop MIMO Relay System via Parallel Factor Analysis., , and . IEEE Trans. Wirel. Commun., 11 (6): 2224-2233 (2012)Random Matching Pursuit for Image Watermarking., , , , and . IEEE Trans. Circuits Syst. Video Technol., 29 (3): 625-639 (2019)Protection of Big Data Privacy., , , , and . IEEE Access, (2016)Simultaneous Benefit Maximization of Conflicting Opinions: Modeling and Analysis., , , , and . IEEE Syst. J., 14 (2): 1623-1634 (2020)A Survey on Energy Internet: Architecture, Approach, and Emerging Technologies., , , , , , , and . IEEE Syst. J., 12 (3): 2403-2416 (2018)