Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Nouvelle représentation concise exacte des motifs corrélés rares : Application à la détection d'intrusions., , and . CoRR, (2011)Hybrid Microaggregation for Privacy-Preserving Data Mining., , and . CoRR, (2018)Yet Another Approach for Completing Missing Values., and . CLA, volume 4923 of Lecture Notes in Computer Science, page 155-169. Springer, (2006)On the efficient stability computation for the selection of interesting formal concepts., and . Inf. Sci., (2019)An Extension of Classical Functional Dependency: Dynamic Fuzzy Functional Dependency., , and . Inf. Sci., 119 (3-4): 219-234 (1999)Discovering Multi-stage Attacks Using Closed Multi-dimensional Sequential Pattern Mining., and . DEXA (2), volume 8056 of Lecture Notes in Computer Science, page 450-457. Springer, (2013)Extracting Compact and Information Lossless Set of Fuzzy Association Rules., and . FUZZ-IEEE, page 1-6. IEEE, (2007)IGB: A New Informative Generic Base of Association Rules., , , and . PAKDD, volume 3518 of Lecture Notes in Computer Science, page 81-90. Springer, (2005)Hybrid microaggregation for privacy preserving data mining., , and . J. Ambient Intell. Humaniz. Comput., 11 (1): 23-38 (2020)Détection efficace des traverses minimales d'un hypergraphe par élimination de la redondance., , and . EGC, volume RNTI-E-24 of Revue des Nouvelles Technologies de l'Information, page 169-174. Hermann-Éditions, (2013)