Author of the publication

Unsupervised analysis of top-k core members in poly-relational networks.

, , , , and . Expert Syst. Appl., 41 (13): 5689-5701 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy Disclosure Analysis and Control for 2D Contingency Tables Containing Inaccurate Data., , , and . Privacy in Statistical Databases, volume 6344 of Lecture Notes in Computer Science, page 1-16. Springer, (2010)EDA: an enhanced dual-active algorithm for location privacy preservation inmobile P2P networks., , , , and . Journal of Zhejiang University - Science C, 14 (5): 356-373 (2013)Rare category exploration., , , , and . Expert Syst. Appl., 41 (9): 4197-4210 (2014)Discovery of Regional Co-location Patterns with k-Nearest Neighbor Graph., , , , and . PAKDD (1), volume 7818 of Lecture Notes in Computer Science, page 174-186. Springer, (2013)Evaluation of local community metrics: from an experimental perspective., , , and . J. Intell. Inf. Syst., 51 (1): 1-22 (2018)Joint affinity aware grouping and virtual machine placement., , , , , , and . Microprocess. Microsystems, (2017)Rare Category Detection Forest., , , and . KSEM, volume 9403 of Lecture Notes in Computer Science, page 612-618. Springer, (2015)Rare category exploration with noisy labels., , , , and . Expert Syst. Appl., (2018)SALS: semantics-aware location sharing based on cloaking zone in mobile social networks., , , and . MobiGIS, page 49-56. ACM, (2012)Rare category exploration via wavelet analysis: Theory and applications., , , , , and . Expert Syst. Appl., (2016)