Author of the publication

Ranking and Selecting Association Rules Based on Dominance Relationship.

, , , and . ICTAI, page 658-665. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hybrid microaggregation for privacy preserving data mining., , and . J. Ambient Intell. Humaniz. Comput., 11 (1): 23-38 (2020)Tmd-Miner : Une nouvelle approche pour la détection des diffuseurs dans un système communautaire., , and . EGC, volume RNTI-E-23 of Revue des Nouvelles Technologies de l'Information, page 423-428. Hermann-Éditions, (2012)Détection efficace des traverses minimales d'un hypergraphe par élimination de la redondance., , and . EGC, volume RNTI-E-24 of Revue des Nouvelles Technologies de l'Information, page 169-174. Hermann-Éditions, (2013)Nouvelle représentation concise exacte des motifs corrélés rares : Application à la détection d'intrusions., , and . CoRR, (2011)On the efficient stability computation for the selection of interesting formal concepts., and . Inf. Sci., (2019)An Extension of Classical Functional Dependency: Dynamic Fuzzy Functional Dependency., , and . Inf. Sci., 119 (3-4): 219-234 (1999)Extracting Compact and Information Lossless Set of Fuzzy Association Rules., and . FUZZ-IEEE, page 1-6. IEEE, (2007)Discovering Multi-stage Attacks Using Closed Multi-dimensional Sequential Pattern Mining., and . DEXA (2), volume 8056 of Lecture Notes in Computer Science, page 450-457. Springer, (2013)Hybrid Microaggregation for Privacy-Preserving Data Mining., , and . CoRR, (2018)IGB: A New Informative Generic Base of Association Rules., , , and . PAKDD, volume 3518 of Lecture Notes in Computer Science, page 81-90. Springer, (2005)