Author of the publication

A novel approach for hiding sensitive utility and frequent itemsets.

, , and . Intell. Data Anal., 22 (6): 1259-1278 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trustworthiness calculation of composite Web service output data based on how provenance., , , , and . ICCSE, page 279-284. IEEE, (2016)Characters Verification via Siamese Convolutional Neural Network., , , , and . SPAC, page 417-420. IEEE, (2018)A novel approach for hiding sensitive utility and frequent itemsets., , and . Intell. Data Anal., 22 (6): 1259-1278 (2018)The Morphologies of the Semiconductor Oxides and Their Gas-Sensing Properties., , , and . Sensors, 17 (12): 2779 (2017)Automatic Detection of Prosody Phrase Boundaries for Text-to-Speech System., , , and . IWPT, Tsinghua University Press, (2001)Research of Evaluation on Cultivated Land Fertility in Xinjiang Desert Oasis Based on GIS Technology - - Taking No. 22 State Farm as the Example., , and . CCTA (2), volume 345 of IFIP Advances in Information and Communication Technology, page 290-299. Springer, (2010)The Soil Heavy Metal Information Accurate Collection and Evaluation about Lycium Barbarum Cultivation in Western China., , , , , and . CCTA (1), volume 419 of IFIP Advances in Information and Communication Technology, page 289-299. Springer, (2013)Music Style Classification with Compared Methods in XGB and BPNN., , , , and . ICIS, page 403-407. IEEE, (2019)一种基于DTW聚类的水文时间序列相似性挖掘方法 (DTW Clustering-based Similarity Mining Method for Hydrological Time Series)., , , , and . 计算机科学, 43 (2): 245-249 (2016)Cryptographic Cloud Storage with Public Verifiability: Ensuring Data Security of the YML Framework., , and . Intell. Autom. Soft Comput., 19 (2): 111-121 (2013)