callback( { "result":{ "query":"Xindong* Wu :filter:author:Xindong* Wu", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"77.37" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"0" }, "hits":{ "@total":"683", "@computed":"683", "@sent":"683", "@first":"0", "hit":[{ "@score":"6", "@id":"3470", "info":{"authors":{"author":[{"@pid":"256/7433","text":"Shaojing Sheng"},{"@pid":"123/0825","text":"Zan Zhang"},{"@pid":"23/5823-6","text":"Peng Zhou 0006"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"An effective algorithm for genealogical graph partitioning.","venue":"Appl. Intell.","volume":"54","number":"2","pages":"1798-1817","year":"2024","type":"Journal Articles","access":"closed","key":"journals/apin/ShengZ0024","doi":"10.1007/S10489-023-05265-1","ee":"https://doi.org/10.1007/s10489-023-05265-1","url":"https://dblp.org/rec/journals/apin/ShengZ0024"}, "url":"URL#3470" }, { "@score":"8", "@id":"3700", "info":{"authors":{"author":[{"@pid":"66/10594","text":"Song Deng"},{"@pid":"342/6747","text":"Qianliang Li"},{"@pid":"353/4865","text":"Renjie Dai"},{"@pid":"41/8845","text":"Siming Wei"},{"@pid":"52/328-56","text":"Di Wu 0056"},{"@pid":"65/425-7","text":"Yi He 0007"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"A Chinese power text classification algorithm based on deep active learning.","venue":"Appl. Soft Comput.","volume":"150","pages":"111067","year":"2024","type":"Journal Articles","access":"closed","key":"journals/asc/DengLDWWHW24","doi":"10.1016/J.ASOC.2023.111067","ee":"https://doi.org/10.1016/j.asoc.2023.111067","url":"https://dblp.org/rec/journals/asc/DengLDWWHW24"}, "url":"URL#3700" }, { "@score":"8", "@id":"8361", "info":{"authors":{"author":[{"@pid":"289/7731","text":"Lingfeng Zhong"},{"@pid":"25/5536-1","text":"Jia Wu 0001"},{"@pid":"69/5902","text":"Qian Li"},{"@pid":"69/7742-1","text":"Hao Peng 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"A Comprehensive Survey on Automatic Knowledge Graph Construction.","venue":"ACM Comput. Surv.","volume":"56","number":"4","pages":"94:1-94:62","year":"2024","type":"Journal Articles","access":"closed","key":"journals/csur/ZhongWLPW24","doi":"10.1145/3618295","ee":"https://doi.org/10.1145/3618295","url":"https://dblp.org/rec/journals/csur/ZhongWLPW24"}, "url":"URL#8361" }, { "@score":"6", "@id":"11137", "info":{"authors":{"author":[{"@pid":"256/7433","text":"Shaojing Sheng"},{"@pid":"254/1356","text":"Xianjie Guo"},{"@pid":"52/2586","text":"Kui Yu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Local causal structure learning with missing data.","venue":"Expert Syst. Appl.","volume":"238","number":"Part A","pages":"121831","year":"2024","type":"Journal Articles","access":"closed","key":"journals/eswa/ShengGYW24","doi":"10.1016/J.ESWA.2023.121831","ee":"https://doi.org/10.1016/j.eswa.2023.121831","url":"https://dblp.org/rec/journals/eswa/ShengGYW24"}, "url":"URL#11137" }, { "@score":"6", "@id":"11885", "info":{"authors":{"author":[{"@pid":"67/4972-6","text":"Yi Zhu 0006"},{"@pid":"364/4698","text":"Yishuai Geng"},{"@pid":"87/6284-10","text":"Yun Li 0010"},{"@pid":"138/2494","text":"Jipeng Qiang"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Representation learning: serial-autoencoder for personalized recommendation.","venue":"Frontiers Comput. Sci.","volume":"18","number":"4","year":"2024","type":"Journal Articles","access":"closed","key":"journals/fcsc/ZhuGLQW24","doi":"10.1007/S11704-023-2441-1","ee":"https://doi.org/10.1007/s11704-023-2441-1","url":"https://dblp.org/rec/journals/fcsc/ZhuGLQW24"}, "url":"URL#11885" }, { "@score":"12", "@id":"14617", "info":{"authors":{"author":[{"@pid":"87/10304","text":"Dianlong You"},{"@pid":"23/3100","text":"Hongtao Wu"},{"@pid":"03/7559","text":"Jiale Liu"},{"@pid":"314/3649","text":"Huigui Yan"},{"@pid":"87/5241","text":"Chuan Ma"},{"@pid":"11/1266-7","text":"Zhen Chen 0007"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Continuous causal structure learning from incremental instances and feature spaces.","venue":"Inf. Fusion","volume":"101","pages":"101975","year":"2024","type":"Journal Articles","access":"closed","key":"journals/inffus/YouWLYMCW24","doi":"10.1016/J.INFFUS.2023.101975","ee":"https://doi.org/10.1016/j.inffus.2023.101975","url":"https://dblp.org/rec/journals/inffus/YouWLYMCW24"}, "url":"URL#14617" }, { "@score":"6", "@id":"32623", "info":{"authors":{"author":[{"@pid":"67/4972-6","text":"Yi Zhu 0006"},{"@pid":"364/4698","text":"Yishuai Geng"},{"@pid":"87/6284-10","text":"Yun Li 0010"},{"@pid":"138/2494","text":"Jipeng Qiang"},{"@pid":"51/7436","text":"Yunhao Yuan"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Self-Adaptive Deep Asymmetric Network for Imbalanced Recommendation.","venue":"IEEE Trans. Emerg. Top. Comput. Intell.","volume":"8","number":"1","pages":"968-980","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tetci/ZhuGLQYW24","doi":"10.1109/TETCI.2023.3300740","ee":"https://doi.org/10.1109/TETCI.2023.3300740","url":"https://dblp.org/rec/journals/tetci/ZhuGLQYW24"}, "url":"URL#32623" }, { "@score":"6", "@id":"36675", "info":{"authors":{"author":[{"@pid":"97/5351","text":"Huiting Liu"},{"@pid":"50/671","text":"Yu Zhang"},{"@pid":"60/3675-1","text":"Peipei Li 0001"},{"@pid":"12/654","text":"Cheng Qian"},{"@pid":"93/4324-10","text":"Peng Zhao 0010"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"DeepCPR: Deep Path Reasoning Using Sequence of User-Preferred Attributes for Conversational Recommendation.","venue":"ACM Trans. Knowl. Discov. Data","volume":"18","number":"1","pages":"15:1-15:22","year":"2024","type":"Journal Articles","access":"closed","key":"journals/tkdd/LiuZLQZW24","doi":"10.1145/3610775","ee":"https://doi.org/10.1145/3610775","url":"https://dblp.org/rec/journals/tkdd/LiuZLQZW24"}, "url":"URL#36675" }, { "@score":"6", "@id":"75581", "info":{"authors":{"author":[{"@pid":"138/2494","text":"Jipeng Qiang"},{"@pid":"195/9186","text":"Shiyu Zhu"},{"@pid":"87/6284-10","text":"Yun Li 0010"},{"@pid":"67/4972-6","text":"Yi Zhu 0006"},{"@pid":"51/7436","text":"Yunhao Yuan"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Natural language watermarking via paraphraser-based lexical substitution.","venue":"Artif. Intell.","volume":"317","pages":"103859","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ai/QiangZLZYW23","doi":"10.1016/J.ARTINT.2023.103859","ee":"https://doi.org/10.1016/j.artint.2023.103859","url":"https://dblp.org/rec/journals/ai/QiangZLZYW23"}, "url":"URL#75581" }, { "@score":"6", "@id":"121116", "info":{"authors":{"author":[{"@pid":"97/5351","text":"Huiting Liu"},{"@pid":"64/8180","text":"Kun Cai"},{"@pid":"60/3675-1","text":"Peipei Li 0001"},{"@pid":"12/654","text":"Cheng Qian"},{"@pid":"93/4324-10","text":"Peng Zhao 0010"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"REDRL: A review-enhanced Deep Reinforcement Learning model for interactive recommendation.","venue":"Expert Syst. Appl.","volume":"213","number":"Part","pages":"118926","year":"2023","type":"Journal Articles","access":"closed","key":"journals/eswa/LiuCLQZW23","doi":"10.1016/J.ESWA.2022.118926","ee":"https://doi.org/10.1016/j.eswa.2022.118926","url":"https://dblp.org/rec/journals/eswa/LiuCLQZW23"}, "url":"URL#121116" }, { "@score":"6", "@id":"122272", "info":{"authors":{"author":[{"@pid":"76/1584","text":"Xin Zhang"},{"@pid":"69/5538-1","text":"Chunxia Zhang 0001"},{"@pid":"247/1761","text":"Jingtao Guo"},{"@pid":"82/3044","text":"Cheng Peng"},{"@pid":"06/3613","text":"Zhendong Niu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Graph attention network with dynamic representation of relations for knowledge graph completion.","venue":"Expert Syst. Appl.","volume":"219","pages":"119616","year":"2023","type":"Journal Articles","access":"closed","key":"journals/eswa/ZhangZGPNW23","doi":"10.1016/J.ESWA.2023.119616","ee":"https://doi.org/10.1016/j.eswa.2023.119616","url":"https://dblp.org/rec/journals/eswa/ZhangZGPNW23"}, "url":"URL#122272" }, { "@score":"6", "@id":"123692", "info":{"authors":{"author":[{"@pid":"62/2168","text":"Xiaojian Liu"},{"@pid":"67/4972-6","text":"Yi Zhu 0006"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Joint user profiling with hierarchical attention networks.","venue":"Frontiers Comput. Sci.","volume":"17","number":"3","pages":"173608","year":"2023","type":"Journal Articles","access":"closed","key":"journals/fcsc/LiuZW23","doi":"10.1007/S11704-022-1437-6","ee":"https://doi.org/10.1007/s11704-022-1437-6","url":"https://dblp.org/rec/journals/fcsc/LiuZW23"}, "url":"URL#123692" }, { "@score":"6", "@id":"123709", "info":{"authors":{"author":[{"@pid":"138/2494","text":"Jipeng Qiang"},{"@pid":"48/1294","text":"Feng Zhang"},{"@pid":"87/6284-10","text":"Yun Li 0010"},{"@pid":"51/7436","text":"Yunhao Yuan"},{"@pid":"67/4972-6","text":"Yi Zhu 0006"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Unsupervised statistical text simplification using pre-trained language modeling for initialization.","venue":"Frontiers Comput. Sci.","volume":"17","number":"1","pages":"171303","year":"2023","type":"Journal Articles","access":"closed","key":"journals/fcsc/QiangZLYZW23","doi":"10.1007/S11704-022-1244-0","ee":"https://doi.org/10.1007/s11704-022-1244-0","url":"https://dblp.org/rec/journals/fcsc/QiangZLYZW23"}, "url":"URL#123709" }, { "@score":"6", "@id":"123758", "info":{"authors":{"author":[{"@pid":"67/4972-6","text":"Yi Zhu 0006"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"138/2494","text":"Jipeng Qiang"},{"@pid":"51/7436","text":"Yunhao Yuan"},{"@pid":"87/6284-10","text":"Yun Li 0010"}]},"title":"Representation learning via an integrated autoencoder for unsupervised domain adaptation.","venue":"Frontiers Comput. Sci.","volume":"17","number":"5","pages":"175334","year":"2023","type":"Journal Articles","access":"closed","key":"journals/fcsc/ZhuWQYL23","doi":"10.1007/S11704-022-1349-5","ee":"https://doi.org/10.1007/s11704-022-1349-5","url":"https://dblp.org/rec/journals/fcsc/ZhuWQYL23"}, "url":"URL#123758" }, { "@score":"6", "@id":"146851", "info":{"authors":{"author":[{"@pid":"277/2289","text":"Xindong Wu 0003"},{"@pid":"07/6455-1","text":"Chong Shen 0001"},{"@pid":"82/7328","text":"Donghua Zhao"},{"@pid":"62/3432-7","text":"Chenguang Wang 0007"},{"@pid":"177/5090","text":"Huiliang Cao"},{"@pid":"52/6788","text":"Jun Tang"},{"@pid":"95/3736-5","text":"Jun Liu 0005"}]},"title":"Robust Orientation Method Based on Atmospheric Polarization Model for Complex Weather.","venue":"IEEE Internet Things J.","volume":"10","number":"6, March 15","pages":"5268-5279","year":"2023","type":"Journal Articles","access":"closed","key":"journals/iotj/WuSZWCTL23","doi":"10.1109/JIOT.2022.3222079","ee":"https://doi.org/10.1109/JIOT.2022.3222079","url":"https://dblp.org/rec/journals/iotj/WuSZWCTL23"}, "url":"URL#146851" }, { "@score":"8", "@id":"149228", "info":{"authors":{"author":[{"@pid":"87/10304","text":"Dianlong You"},{"@pid":"225/7494","text":"Siqi Dong"},{"@pid":"342/5384","text":"Shina Niu"},{"@pid":"314/3649","text":"Huigui Yan"},{"@pid":"11/1266-7","text":"Zhen Chen 0007"},{"@pid":"19/2104","text":"Shunfu Jin"},{"@pid":"52/328-56","text":"Di Wu 0056"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Local causal structure learning for streaming features.","venue":"Inf. Sci.","volume":"647","pages":"119502","year":"2023","type":"Journal Articles","access":"closed","key":"journals/isci/YouDNYCJWW23","doi":"10.1016/J.INS.2023.119502","ee":"https://doi.org/10.1016/j.ins.2023.119502","url":"https://dblp.org/rec/journals/isci/YouDNYCJWW23"}, "url":"URL#149228" }, { "@score":"8", "@id":"149229", "info":{"authors":{"author":[{"@pid":"87/10304","text":"Dianlong You"},{"@pid":"342/5384","text":"Shina Niu"},{"@pid":"225/7494","text":"Siqi Dong"},{"@pid":"314/3649","text":"Huigui Yan"},{"@pid":"11/1266-7","text":"Zhen Chen 0007"},{"@pid":"52/328-56","text":"Di Wu 0056"},{"@pid":"71/3634","text":"Limin Shen"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Counterfactual explanation generation with minimal feature boundary.","venue":"Inf. Sci.","volume":"625","pages":"342-366","year":"2023","type":"Journal Articles","access":"closed","key":"journals/isci/YouNDYCWSW23","doi":"10.1016/J.INS.2023.01.012","ee":"https://doi.org/10.1016/j.ins.2023.01.012","url":"https://dblp.org/rec/journals/isci/YouNDYCWSW23"}, "url":"URL#149229" }, { "@score":"6", "@id":"171530", "info":{"authors":{"author":[{"@pid":"97/5351","text":"Huiting Liu"},{"@pid":"49/6574","text":"Yi Chen"},{"@pid":"60/3675-1","text":"Pei-Pei Li 0001"},{"@pid":"93/4324-10","text":"Peng Zhao 0010"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Enhancing review-based user representation on learned social graph for recommendation.","venue":"Knowl. Based Syst.","volume":"266","pages":"110438","year":"2023","type":"Journal Articles","access":"closed","key":"journals/kbs/LiuCLZW23","doi":"10.1016/J.KNOSYS.2023.110438","ee":"https://doi.org/10.1016/j.knosys.2023.110438","url":"https://dblp.org/rec/journals/kbs/LiuCLZW23"}, "url":"URL#171530" }, { "@score":"6", "@id":"171546", "info":{"authors":{"author":[{"@pid":"97/5351","text":"Huiting Liu"},{"@pid":"181/2817","text":"Lei Wang"},{"@pid":"60/3675-1","text":"Peipei Li 0001"},{"@pid":"12/654","text":"Cheng Qian"},{"@pid":"93/4324-10","text":"Peng Zhao 0010"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Relation-propagation meta-learning on an explicit preference graph for cold-start recommendation.","venue":"Knowl. Based Syst.","volume":"272","pages":"110579","year":"2023","type":"Journal Articles","access":"closed","key":"journals/kbs/LiuW0QZ023","doi":"10.1016/J.KNOSYS.2023.110579","ee":"https://doi.org/10.1016/j.knosys.2023.110579","url":"https://dblp.org/rec/journals/kbs/LiuW0QZ023"}, "url":"URL#171546" }, { "@score":"6", "@id":"187608", "info":{"authors":{"author":[{"@pid":"03/2933","text":"Changqin Huang"},{"@pid":"181/2821-65","text":"Ming Li 0065"},{"@pid":"61/5002","text":"Feilong Cao"},{"@pid":"49/6628","text":"Hamido Fujita"},{"@pid":"l/ZhaoLi-7","text":"Zhao Li 0007"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Are Graph Convolutional Networks With Random Weights Feasible?","venue":"IEEE Trans. Pattern Anal. Mach. Intell.","volume":"45","number":"3","pages":"2751-2768","year":"2023","type":"Journal Articles","access":"closed","key":"journals/pami/HuangLCFLW23","doi":"10.1109/TPAMI.2022.3183143","ee":"https://doi.org/10.1109/TPAMI.2022.3183143","url":"https://dblp.org/rec/journals/pami/HuangLCFLW23"}, "url":"URL#187608" }, { "@score":"6", "@id":"191265", "info":{"authors":{"author":[{"@pid":"181/2821-65","text":"Ming Li 0065"},{"@pid":"37/1629","text":"Lin Zhang"},{"@pid":"72/5436","text":"Lixin Cui"},{"@pid":"26/1137-1","text":"Lu Bai 0001"},{"@pid":"181/2856-8","text":"Zhao Li 0008"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"BLoG: Bootstrapped graph representation learning with local and global regularization for recommendation.","venue":"Pattern Recognit.","volume":"144","pages":"109874","year":"2023","type":"Journal Articles","access":"closed","key":"journals/pr/LiZCBLW23","doi":"10.1016/J.PATCOG.2023.109874","ee":"https://doi.org/10.1016/j.patcog.2023.109874","url":"https://dblp.org/rec/journals/pr/LiZCBLW23"}, "url":"URL#191265" }, { "@score":"6", "@id":"227603", "info":{"authors":{"author":[{"@pid":"67/4972-6","text":"Yi Zhu 0006"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"87/6284-10","text":"Yun Li 0010"},{"@pid":"138/2494","text":"Jipeng Qiang"},{"@pid":"51/7436","text":"Yunhao Yuan"}]},"title":"Self-Adaptive Imbalanced Domain Adaptation With Deep Sparse Autoencoder.","venue":"IEEE Trans. Artif. Intell.","volume":"4","number":"5","pages":"1293-1304","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tai/ZhuWLQY23","doi":"10.1109/TAI.2022.3196813","ee":"https://doi.org/10.1109/TAI.2022.3196813","url":"https://dblp.org/rec/journals/tai/ZhuWLQY23"}, "url":"URL#227603" }, { "@score":"6", "@id":"229081", "info":{"authors":{"author":[{"@pid":"250/6473","text":"Zhaolong Ling"},{"@pid":"50/3402","text":"Bo Li"},{"@pid":"56/5142-1","text":"Yiwen Zhang 0001"},{"@pid":"95/2628","text":"Qingren Wang"},{"@pid":"52/2586","text":"Kui Yu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Causal Feature Selection With Efficient Spouses Discovery.","venue":"IEEE Trans. Big Data","volume":"9","number":"2","pages":"555-568","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tbd/LingLZWYW23","doi":"10.1109/TBDATA.2022.3178472","ee":"https://doi.org/10.1109/TBDATA.2022.3178472","url":"https://dblp.org/rec/journals/tbd/LingLZWYW23"}, "url":"URL#229081" }, { "@score":"6", "@id":"233918", "info":{"authors":{"author":[{"@pid":"194/4619","text":"Lei Sang"},{"@pid":"09/0-1","text":"Min Xu 0001"},{"@pid":"138/4249","text":"Shengsheng Qian"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Adversarial Heterogeneous Graph Neural Network for Robust Recommendation.","venue":"IEEE Trans. Comput. Soc. Syst.","volume":"10","number":"5","pages":"2660-2671","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tcss/SangXQW23","doi":"10.1109/TCSS.2023.3268683","ee":"https://doi.org/10.1109/TCSS.2023.3268683","url":"https://dblp.org/rec/journals/tcss/SangXQW23"}, "url":"URL#233918" }, { "@score":"8", "@id":"235353", "info":{"authors":{"author":[{"@pid":"46/8700","text":"Youxi Wu"},{"@pid":"55/7775","text":"Qian Hu"},{"@pid":"87/660-87","text":"Yan Li 0087"},{"@pid":"64/1967-15","text":"Lei Guo 0015"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"OPP-Miner: Order-Preserving Sequential Pattern Mining for Time Series.","venue":"IEEE Trans. Cybern.","volume":"53","number":"5","pages":"3288-3300","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tcyb/WuHLGZW23","doi":"10.1109/TCYB.2022.3169327","ee":"https://doi.org/10.1109/TCYB.2022.3169327","url":"https://dblp.org/rec/journals/tcyb/WuHLGZW23"}, "url":"URL#235353" }, { "@score":"12", "@id":"237020", "info":{"authors":{"author":[{"@pid":"63/6340","text":"Gongqing Wu"},{"@pid":"340/3453","text":"Zhenya Lu"},{"@pid":"311/8749","text":"Xingrui Zhuo"},{"@pid":"123/7150","text":"Xianyu Bao"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Semantic Fusion Enhanced Event Detection via Multi-Graph Attention Network with Skip Connection.","venue":"IEEE Trans. Emerg. Top. Comput. Intell.","volume":"7","number":"3","pages":"931-941","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tetci/WuLZBW23","doi":"10.1109/TETCI.2022.3229414","ee":"https://doi.org/10.1109/TETCI.2022.3229414","url":"https://dblp.org/rec/journals/tetci/WuLZBW23"}, "url":"URL#237020" }, { "@score":"8", "@id":"241669", "info":{"authors":{"author":[{"@pid":"66/10594","text":"Song Deng"},{"@pid":"286/0865","text":"Jiantang Zhang"},{"@pid":"52/328-56","text":"Di Wu 0056"},{"@pid":"65/425-7","text":"Yi He 0007"},{"@pid":"44/9956","text":"Xiangpeng Xie"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"A Quantitative Risk Assessment Model for Distribution Cyber-Physical System Under Cyberattack.","venue":"IEEE Trans. Ind. Informatics","volume":"19","number":"3","pages":"2899-2908","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tii/DengZWHXW23","doi":"10.1109/TII.2022.3169456","ee":"https://doi.org/10.1109/TII.2022.3169456","url":"https://dblp.org/rec/journals/tii/DengZWHXW23"}, "url":"URL#241669" }, { "@score":"6", "@id":"249050", "info":{"authors":{"author":[{"@pid":"42/4142","text":"Xin Jiang"},{"@pid":"212/1520","text":"Zhengxin Yu"},{"@pid":"304/3940","text":"Chao Hai"},{"@pid":"78/6365-1","text":"Hongbo Liu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"45/5296","text":"Tomás Ward"}]},"title":"DNformer: Temporal Link Prediction with Transfer Learning in Dynamic Networks.","venue":"ACM Trans. Knowl. Discov. Data","volume":"17","number":"3","pages":"43:1-43:21","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkdd/JiangYHLWW23","doi":"10.1145/3551892","ee":"https://doi.org/10.1145/3551892","url":"https://dblp.org/rec/journals/tkdd/JiangYHLWW23"}, "url":"URL#249050" }, { "@score":"6", "@id":"249062", "info":{"authors":{"author":[{"@pid":"13/7007-2","text":"Lei Li 0002"},{"@pid":"53/3245","text":"Zhiyuan Liu"},{"@pid":"123/0825","text":"Zan Zhang"},{"@pid":"72/5816","text":"Huanhuan Chen"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Three-way Preference Completion via Preference Graph.","venue":"ACM Trans. Knowl. Discov. Data","volume":"17","number":"6","pages":"89:1-89:19","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkdd/LiLZCW23","doi":"10.1145/3580368","ee":"https://doi.org/10.1145/3580368","url":"https://dblp.org/rec/journals/tkdd/LiLZCW23"}, "url":"URL#249062" }, { "@score":"6", "@id":"249065", "info":{"authors":{"author":[{"@pid":"13/7007-2","text":"Lei Li 0002"},{"@pid":"338/3803","text":"Mengjiao Yan"},{"@pid":"268/5443","text":"Zhenchao Tao"},{"@pid":"72/5816","text":"Huanhuan Chen"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Semi-Supervised Graph Pattern Matching and Rematching for Expert Community Location.","venue":"ACM Trans. Knowl. Discov. Data","volume":"17","number":"1","pages":"6:1-6:26","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkdd/LiYTCW23","doi":"10.1145/3532623","ee":"https://doi.org/10.1145/3532623","url":"https://dblp.org/rec/journals/tkdd/LiYTCW23"}, "url":"URL#249065" }, { "@score":"8", "@id":"249121", "info":{"authors":{"author":[{"@pid":"46/8700","text":"Youxi Wu"},{"@pid":"87/7674","text":"Mingjie Chen"},{"@pid":"87/660-87","text":"Yan Li 0087"},{"@pid":"72/2590","text":"Jing Liu"},{"@pid":"181/2856-8","text":"Zhao Li 0008"},{"@pid":"247/9049","text":"Jinyan Li"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"ONP-Miner: One-off Negative Sequential Pattern Mining.","venue":"ACM Trans. Knowl. Discov. Data","volume":"17","number":"3","pages":"37:1-37:24","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkdd/WuCLLLLW23","doi":"10.1145/3549940","ee":"https://doi.org/10.1145/3549940","url":"https://dblp.org/rec/journals/tkdd/WuCLLLLW23"}, "url":"URL#249121" }, { "@score":"12", "@id":"249123", "info":{"authors":{"author":[{"@pid":"63/6340","text":"Gongqing Wu"},{"@pid":"311/8749","text":"Xingrui Zhuo"},{"@pid":"123/7150","text":"Xianyu Bao"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"59/1501","text":"Richang Hong"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Crowdsourcing Truth Inference via Reliability-Driven Multi-View Graph Embedding.","venue":"ACM Trans. Knowl. Discov. Data","volume":"17","number":"5","pages":"65:1-65:26","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkdd/WuZBHHW23","doi":"10.1145/3565576","ee":"https://doi.org/10.1145/3565576","url":"https://dblp.org/rec/journals/tkdd/WuZBHHW23"}, "url":"URL#249123" }, { "@score":"12", "@id":"249125", "info":{"authors":{"author":[{"@pid":"63/6340","text":"Gongqing Wu"},{"@pid":"311/8770","text":"Liangzhu Zhou"},{"@pid":"245/8160","text":"Jiazhu Xia"},{"@pid":"13/7007-2","text":"Lei Li 0002"},{"@pid":"123/7150","text":"Xianyu Bao"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Crowdsourcing Truth Inference Based on Label Confidence Clustering.","venue":"ACM Trans. Knowl. Discov. Data","volume":"17","number":"4","pages":"46:1-46:20","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkdd/WuZXLBW23","doi":"10.1145/3556545","ee":"https://doi.org/10.1145/3556545","url":"https://dblp.org/rec/journals/tkdd/WuZXLBW23"}, "url":"URL#249125" }, { "@score":"6", "@id":"249136", "info":{"authors":{"author":[{"@pid":"123/0825","text":"Zan Zhang"},{"@pid":"61/2115-3","text":"Lin Liu 0003"},{"@pid":"20/1583","text":"Jiuyong Li"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Integrating Global and Local Feature Selection for Multi-Label Learning.","venue":"ACM Trans. Knowl. Discov. Data","volume":"17","number":"1","pages":"4:1-4:37","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkdd/ZhangLLW23","doi":"10.1145/3532190","ee":"https://doi.org/10.1145/3532190","url":"https://dblp.org/rec/journals/tkdd/ZhangLLW23"}, "url":"URL#249136" }, { "@score":"12", "@id":"249139", "info":{"authors":{"author":[{"@pid":"123/0825","text":"Zan Zhang"},{"@pid":"87/5809","text":"Zhe Zhang"},{"@pid":"274/8523","text":"Jialu Yao"},{"@pid":"61/2115-3","text":"Lin Liu 0003"},{"@pid":"20/1583","text":"Jiuyong Li"},{"@pid":"63/6340","text":"Gongqing Wu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Multi-Label Feature Selection Via Adaptive Label Correlation Estimation.","venue":"ACM Trans. Knowl. Discov. Data","volume":"17","number":"9","pages":"134:1-134:28","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkdd/ZhangZYLLWW23","doi":"10.1145/3604560","ee":"https://doi.org/10.1145/3604560","url":"https://dblp.org/rec/journals/tkdd/ZhangZYLLWW23"}, "url":"URL#249139" }, { "@score":"6", "@id":"249483", "info":{"authors":{"author":[{"@pid":"60/3675-1","text":"Pei-Pei Li 0001"},{"@pid":"80/2587","text":"Haixiang Zhang"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"High-Dimensional Multi-Label Data Stream Classification With Concept Drifting Detection.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"35","number":"8","pages":"8085-8099","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkde/LiZHW23","doi":"10.1109/TKDE.2022.3200068","ee":"https://doi.org/10.1109/TKDE.2022.3200068","url":"https://dblp.org/rec/journals/tkde/LiZHW23"}, "url":"URL#249483" }, { "@score":"8", "@id":"249487", "info":{"authors":{"author":[{"@pid":"87/660-87","text":"Yan Li 0087"},{"@pid":"84/8092","text":"Chang Zhang"},{"@pid":"17/2703-61","text":"Jie Li 0061"},{"@pid":"62/1539-4","text":"Wei Song 0004"},{"@pid":"326/7121","text":"Zhenlian Qi"},{"@pid":"46/8700","text":"Youxi Wu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"MCoR-Miner: Maximal Co-Occurrence Nonoverlapping Sequential Rule Mining.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"35","number":"9","pages":"9531-9546","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkde/LiZLSQWW23","doi":"10.1109/TKDE.2023.3241213","ee":"https://doi.org/10.1109/TKDE.2023.3241213","url":"https://dblp.org/rec/journals/tkde/LiZLSQWW23"}, "url":"URL#249487" }, { "@score":"6", "@id":"249508", "info":{"authors":{"author":[{"@pid":"123/4939","text":"Yaojin Lin"},{"@pid":"53/8773","text":"Haoyang Liu"},{"@pid":"72/4751","text":"Hong Zhao"},{"@pid":"30/2395","text":"Qinghua Hu"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Hierarchical Feature Selection Based on Label Distribution Learning.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"35","number":"6","pages":"5964-5976","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkde/LinLZHZW23","doi":"10.1109/TKDE.2022.3177246","ee":"https://doi.org/10.1109/TKDE.2022.3177246","url":"https://dblp.org/rec/journals/tkde/LinLZHZW23"}, "url":"URL#249508" }, { "@score":"6", "@id":"249512", "info":{"authors":{"author":[{"@pid":"250/6473","text":"Zhaolong Ling"},{"@pid":"22/1805","text":"Ying Li"},{"@pid":"56/5142-1","text":"Yiwen Zhang 0001"},{"@pid":"52/2586","text":"Kui Yu"},{"@pid":"23/5823-6","text":"Peng Zhou 0006"},{"@pid":"50/3402","text":"Bo Li"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"A Light Causal Feature Selection Approach to High-Dimensional Data.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"35","number":"8","pages":"7639-7650","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkde/LingLZYZLW23","doi":"10.1109/TKDE.2022.3218786","ee":"https://doi.org/10.1109/TKDE.2022.3218786","url":"https://dblp.org/rec/journals/tkde/LingLZYZLW23"}, "url":"URL#249512" }, { "@score":"6", "@id":"249797", "info":{"authors":{"author":[{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"72/2833-4","text":"Tingting Jiang 0004"},{"@pid":"67/4972-6","text":"Yi Zhu 0006"},{"@pid":"151/4309","text":"Chenyang Bu"}]},"title":"Knowledge Graph for China's Genealogy11.A shorter version of this paper won the Best Paper Award at IEEE ICKG 2020 (the 11th IEEE International Conference on Knowledge Graph, ickg 2020.bigke.org).","venue":"IEEE Trans. Knowl. Data Eng.","volume":"35","number":"1","pages":"634-646","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkde/WuJZB23","doi":"10.1109/TKDE.2021.3073745","ee":"https://doi.org/10.1109/TKDE.2021.3073745","url":"https://dblp.org/rec/journals/tkde/WuJZB23"}, "url":"URL#249797" }, { "@score":"8", "@id":"249809", "info":{"authors":{"author":[{"@pid":"46/8700","text":"Youxi Wu"},{"@pid":"197/2231","text":"Xiaoqian Zhao"},{"@pid":"87/660-87","text":"Yan Li 0087"},{"@pid":"64/1967-15","text":"Lei Guo 0015"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"76/2649","text":"Philippe Fournier-Viger"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"OPR-Miner: Order-Preserving Rule Mining for Time Series.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"35","number":"11","pages":"11722-11735","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkde/WuZLGZFW23","doi":"10.1109/TKDE.2022.3224963","ee":"https://doi.org/10.1109/TKDE.2022.3224963","url":"https://dblp.org/rec/journals/tkde/WuZLGZFW23"}, "url":"URL#249809" }, { "@score":"12", "@id":"249812", "info":{"authors":{"author":[{"@pid":"63/6340","text":"Gongqing Wu"},{"@pid":"311/8749","text":"Xingrui Zhuo"},{"@pid":"311/8770","text":"Liangzhu Zhou"},{"@pid":"123/7150","text":"Xianyu Bao"},{"@pid":"59/1501","text":"Richang Hong"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"TIRA: Truth Inference via Reliability Aggregation on Object-Source Graph.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"35","number":"11","pages":"11967-11981","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkde/WuZZBHW23","doi":"10.1109/TKDE.2022.3225308","ee":"https://doi.org/10.1109/TKDE.2022.3225308","url":"https://dblp.org/rec/journals/tkde/WuZZBHW23"}, "url":"URL#249812" }, { "@score":"6", "@id":"249856", "info":{"authors":{"author":[{"@pid":"95/9222","text":"Xiaojun Xue"},{"@pid":"69/5538-1","text":"Chunxia Zhang 0001"},{"@pid":"06/3613","text":"Zhendong Niu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Multi-Level Attention Map Network for Multimodal Sentiment Analysis.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"35","number":"5","pages":"5105-5118","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkde/XueZNW23","doi":"10.1109/TKDE.2022.3155290","ee":"https://doi.org/10.1109/TKDE.2022.3155290","url":"https://dblp.org/rec/journals/tkde/XueZNW23"}, "url":"URL#249856" }, { "@score":"6", "@id":"249899", "info":{"authors":{"author":[{"@pid":"87/10304","text":"Dianlong You"},{"@pid":"181/2842","text":"Yang Wang"},{"@pid":"314/0188","text":"Jiawei Xiao"},{"@pid":"123/4939","text":"Yaojin Lin"},{"@pid":"275/4104","text":"Maosheng Pan"},{"@pid":"11/1266-7","text":"Zhen Chen 0007"},{"@pid":"71/3634","text":"Limin Shen"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Online Multi-Label Streaming Feature Selection With Label Correlation.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"35","number":"3","pages":"2901-2915","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkde/YouWXLPCSW23","doi":"10.1109/TKDE.2021.3113514","ee":"https://doi.org/10.1109/TKDE.2021.3113514","url":"https://dblp.org/rec/journals/tkde/YouWXLPCSW23"}, "url":"URL#249899" }, { "@score":"8", "@id":"249900", "info":{"authors":{"author":[{"@pid":"87/10304","text":"Dianlong You"},{"@pid":"314/0188","text":"Jiawei Xiao"},{"@pid":"181/2842","text":"Yang Wang"},{"@pid":"314/3649","text":"Huigui Yan"},{"@pid":"52/328-56","text":"Di Wu 0056"},{"@pid":"11/1266-7","text":"Zhen Chen 0007"},{"@pid":"71/3634","text":"Limin Shen"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Online Learning From Incomplete and Imbalanced Data Streams.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"35","number":"10","pages":"10650-10665","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkde/YouXWYWCSW23","doi":"10.1109/TKDE.2023.3250472","ee":"https://doi.org/10.1109/TKDE.2023.3250472","url":"https://dblp.org/rec/journals/tkde/YouXWYWCSW23"}, "url":"URL#249900" }, { "@score":"8", "@id":"249970", "info":{"authors":{"author":[{"@pid":"01/1504-2","text":"Yuhong Zhang 0002"},{"@pid":"52/7944","text":"Jianqing Wu"},{"@pid":"52/2586","text":"Kui Yu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Independent Relation Representation With Line Graph for Cross-Lingual Entity Alignment.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"35","number":"11","pages":"11503-11514","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tkde/ZhangWYW23","doi":"10.1109/TKDE.2022.3232138","ee":"https://doi.org/10.1109/TKDE.2022.3232138","url":"https://dblp.org/rec/journals/tkde/ZhangWYW23"}, "url":"URL#249970" }, { "@score":"6", "@id":"252814", "info":{"authors":{"author":[{"@pid":"87/10304","text":"Dianlong You"},{"@pid":"157/8924","text":"Ruiqi Li"},{"@pid":"184/2053","text":"Shunpan Liang"},{"@pid":"214/9721","text":"Miaomiao Sun"},{"@pid":"289/7743","text":"Xinju Ou"},{"@pid":"24/3698","text":"Fuyong Yuan"},{"@pid":"71/3634","text":"Limin Shen"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Online Causal Feature Selection for Streaming Features.","venue":"IEEE Trans. Neural Networks Learn. Syst.","volume":"34","number":"3","pages":"1563-1577","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tnn/YouLLSOYSW23","doi":"10.1109/TNNLS.2021.3105585","ee":"https://doi.org/10.1109/TNNLS.2021.3105585","url":"https://dblp.org/rec/journals/tnn/YouLLSOYSW23"}, "url":"URL#252814" }, { "@score":"6", "@id":"252945", "info":{"authors":{"author":[{"@pid":"23/5823-8","text":"Peng Zhou 0008"},{"@pid":"00/1035","text":"Ni Wang"},{"@pid":"41/3875","text":"Shu Zhao"},{"@pid":"32/4846","text":"Yanping Zhang"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Difficult Novel Class Detection in Semisupervised Streaming Data.","venue":"IEEE Trans. Neural Networks Learn. Syst.","volume":"34","number":"10","pages":"6872-6886","year":"2023","type":"Journal Articles","access":"closed","key":"journals/tnn/ZhouWZZW23","doi":"10.1109/TNNLS.2022.3213682","ee":"https://doi.org/10.1109/TNNLS.2022.3213682","url":"https://dblp.org/rec/journals/tnn/ZhouWZZW23"}, "url":"URL#252945" }, { "@score":"8", "@id":"305593", "info":{"authors":{"author":[{"@pid":"42/8699","text":"Ru Wang"},{"@pid":"269/3667","text":"Bingbing Dong"},{"@pid":"37/11301","text":"Tianyang Li"},{"@pid":"19/5921","text":"Meng Wu"},{"@pid":"151/4309","text":"Chenyang Bu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"User Interaction-Aware Knowledge Graphs for Recommender Systems.","venue":"DEXA","pages":"18-32","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/dexa/WangDLWBW23","doi":"10.1007/978-3-031-39821-6_2","ee":"https://doi.org/10.1007/978-3-031-39821-6_2","url":"https://dblp.org/rec/conf/dexa/WangDLWBW23"}, "url":"URL#305593" }, { "@score":"6", "@id":"306698", "info":{"authors":{"author":[{"@pid":"01/1504-2","text":"Yuhong Zhang 0002"},{"@pid":"36/7513","text":"Dan Lu"},{"@pid":"151/4309","text":"Chenyang Bu"},{"@pid":"52/2586","text":"Kui Yu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Cross-Knowledge Graph Relation Completion for Non-isomorphic Cross-lingual Entity Alignment.","venue":"DMSVIVA","pages":"24-31","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/dms/0002LBY023","doi":"10.18293/DMSVIVA2023-051","ee":"https://doi.org/10.18293/DMSVIVA2023-051","url":"https://dblp.org/rec/conf/dms/0002LBY023"}, "url":"URL#306698" }, { "@score":"6", "@id":"348208", "info":{"authors":{"author":[{"@pid":"94/6045","text":"Jiajing Zhu"},{"@pid":"25/5687","text":"Yongguo Liu"},{"@pid":"228/2517","text":"Chuanbiao Wen"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"DGDFS: Dependence Guided Discriminative Feature Selection for Predicting Adverse Drug-Drug Interaction : Extended Abstract.","venue":"ICDE","pages":"3841-3842","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/icde/ZhuLW023","doi":"10.1109/ICDE55515.2023.00347","ee":"https://doi.org/10.1109/ICDE55515.2023.00347","url":"https://dblp.org/rec/conf/icde/ZhuLW023"}, "url":"URL#348208" }, { "@score":"6", "@id":"348536", "info":{"authors":{"author":[{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"77/5283","text":"Elena Baralis"},{"@pid":"21/25","text":"Ruqian Lu"},{"@pid":"k/VipinKumar","text":"Vipin Kumar"},{"@pid":"99/3158","text":"Leszek Rutkowski"},{"@pid":"181/2702","text":"Jie Tang"}]},"title":"On Computing Paradigms - Where Will Large Language Models Be Going.","venue":"ICDM","pages":"1577-1582","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdm/00010BLKRT23","doi":"10.1109/ICDM58522.2023.00211","ee":"https://doi.org/10.1109/ICDM58522.2023.00211","url":"https://dblp.org/rec/conf/icdm/00010BLKRT23"}, "url":"URL#348536" }, { "@score":"6", "@id":"348640", "info":{"authors":{"author":[{"@pid":"h/FeiHuang","text":"Fei Huang"},{"@pid":"181/2826","text":"Yi Deng"},{"@pid":"94/4084","text":"Chen Zhang"},{"@pid":"237/9663","text":"Menghao Guo"},{"@pid":"128/0235","text":"Kai Zhan"},{"@pid":"250/0580","text":"Shanxin Sun"},{"@pid":"122/5931","text":"Jinling Jiang"},{"@pid":"123/5522-1","text":"Zeyi Sun 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"KOSA: KO Enhanced Salary Analytics based on Knowledge Graph and LLM Capabilities.","venue":"ICDM","pages":"499-505","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdm/HuangDZGZSJS023","doi":"10.1109/ICDMW60847.2023.00071","ee":"https://doi.org/10.1109/ICDMW60847.2023.00071","url":"https://dblp.org/rec/conf/icdm/HuangDZGZSJS023"}, "url":"URL#348640" }, { "@score":"6", "@id":"348924", "info":{"authors":{"author":[{"@pid":"125/0228","text":"Xiaoyu Zhu"},{"@pid":"151/4309","text":"Chenyang Bu"},{"@pid":"269/3667","text":"Bingbing Dong"},{"@pid":"233/6456","text":"Shengwei Ji"},{"@pid":"65/425","text":"Yi He"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"IKGN: Intention-aware Knowledge Graph Network for POI Recommendation.","venue":"ICDM","pages":"908-917","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdm/ZhuBDJH023","doi":"10.1109/ICDM58522.2023.00100","ee":"https://doi.org/10.1109/ICDM58522.2023.00100","url":"https://dblp.org/rec/conf/icdm/ZhuBDJH023"}, "url":"URL#348924" }, { "@score":"6", "@id":"373751", "info":{"authors":{"author":[{"@pid":"65/425","text":"Yi He"},{"@pid":"250/8948","text":"Christian Schreckenberger"},{"@pid":"50/5895","text":"Heiner Stuckenschmidt"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Towards Utilitarian Online Learning - A Review of Online Algorithms in Open Feature Space.","venue":"IJCAI","pages":"6647-6655","year":"2023","type":"Conference and Workshop Papers","access":"open","key":"conf/ijcai/HeSS023","doi":"10.24963/IJCAI.2023/745","ee":"https://doi.org/10.24963/ijcai.2023/745","url":"https://dblp.org/rec/conf/ijcai/HeSS023"}, "url":"URL#373751" }, { "@score":"6", "@id":"375164", "info":{"authors":{"author":[{"@pid":"353/7426","text":"Zexian Xie"},{"@pid":"60/3675-1","text":"Peipei Li 0001"},{"@pid":"122/5931","text":"Jinling Jiang"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Semi-supervised Multi-Label Learning with Missing Labels via Correlation Information.","venue":"IJCNN","pages":"1-8","year":"2023","type":"Conference and Workshop Papers","access":"closed","key":"conf/ijcnn/XieLJW23","doi":"10.1109/IJCNN54540.2023.10191722","ee":"https://doi.org/10.1109/IJCNN54540.2023.10191722","url":"https://dblp.org/rec/conf/ijcnn/XieLJW23"}, "url":"URL#375164" }, { "@score":"6", "@id":"441116", "info":{"authors":{"author":[{"@pid":"36/4372","text":"Victor S. Sheng"},{"@pid":"19/2558","text":"Chindo Hicks"},{"@pid":"97/7211","text":"Charles Ling"},{"@pid":"262/3261","text":"Vijay Raghavan"},{"@pid":"369/3671","text":"Xindong Wu"}]},"title":"IEEE International Conference on Knowledge Graph, ICKG 2023, Shanghai, China, December 1-2, 2023","venue":"ICKG","publisher":"IEEE","year":"2023","type":"Editorship","key":"conf/icbk/2023","doi":"10.1109/ICKG59574.2023","ee":"https://doi.org/10.1109/ICKG59574.2023","url":"https://dblp.org/rec/conf/icbk/2023"}, "url":"URL#441116" }, { "@score":"6", "@id":"441210", "info":{"authors":{"author":[{"@pid":"51/1742","text":"Guihai Chen"},{"@pid":"k/LatifurKhan","text":"Latifur Khan"},{"@pid":"95/6947-1","text":"Xiaofeng Gao 0001"},{"@pid":"q/MeikangQiu","text":"Meikang Qiu"},{"@pid":"p/WitoldPedrycz","text":"Witold Pedrycz"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"IEEE International Conference on Data Mining, ICDM 2023, Shanghai, China, December 1-4, 2023","venue":"ICDM","publisher":"IEEE","year":"2023","type":"Editorship","key":"conf/icdm/2023","doi":"10.1109/ICDM58522.2023","ee":"https://doi.org/10.1109/ICDM58522.2023","url":"https://dblp.org/rec/conf/icdm/2023"}, "url":"URL#441210" }, { "@score":"8", "@id":"448396", "info":{"authors":{"author":[{"@pid":"87/660-87","text":"Yan Li 0087"},{"@pid":"84/8092","text":"Chang Zhang"},{"@pid":"17/2703","text":"Jie Li"},{"@pid":"62/1539","text":"Wei Song"},{"@pid":"326/7121","text":"Zhenlian Qi"},{"@pid":"46/8700","text":"Youxi Wu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Maximal co-occurrence nonoverlapping sequential rule mining.","venue":"CoRR","volume":"abs/2301.12630","year":"2023","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2301-12630","doi":"10.48550/ARXIV.2301.12630","ee":"https://doi.org/10.48550/arXiv.2301.12630","url":"https://dblp.org/rec/journals/corr/abs-2301-12630"}, "url":"URL#448396" }, { "@score":"8", "@id":"451264", "info":{"authors":{"author":[{"@pid":"289/7731","text":"Lingfeng Zhong"},{"@pid":"25/5536-1","text":"Jia Wu 0001"},{"@pid":"69/5902","text":"Qian Li"},{"@pid":"69/7742-1","text":"Hao Peng 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"A Comprehensive Survey on Automatic Knowledge Graph Construction.","venue":"CoRR","volume":"abs/2302.05019","year":"2023","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2302-05019","doi":"10.48550/ARXIV.2302.05019","ee":"https://doi.org/10.48550/arXiv.2302.05019","url":"https://dblp.org/rec/journals/corr/abs-2302-05019"}, "url":"URL#451264" }, { "@score":"6", "@id":"486217", "info":{"authors":{"author":[{"@pid":"91/8171","text":"Shirui Pan"},{"@pid":"251/5530","text":"Linhao Luo"},{"@pid":"61/5568","text":"Yufei Wang"},{"@pid":"65/4423","text":"Chen Chen"},{"@pid":"343/7016","text":"Jiapu Wang"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Unifying Large Language Models and Knowledge Graphs: A Roadmap.","venue":"CoRR","volume":"abs/2306.08302","year":"2023","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2306-08302","doi":"10.48550/ARXIV.2306.08302","ee":"https://doi.org/10.48550/arXiv.2306.08302","url":"https://dblp.org/rec/journals/corr/abs-2306-08302"}, "url":"URL#486217" }, { "@score":"10", "@id":"487241", "info":{"authors":{"author":[{"@pid":"250/6473","text":"Zhaolong Ling"},{"@pid":"45/8340","text":"Jingxuan Wu"},{"@pid":"56/5142","text":"Yiwen Zhang"},{"@pid":"23/5823-8","text":"Peng Zhou 0008"},{"@pid":"143/0523","text":"Xingyu Wu"},{"@pid":"52/2586","text":"Kui Yu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Fair Causal Feature Selection.","venue":"CoRR","volume":"abs/2306.10336","year":"2023","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2306-10336","doi":"10.48550/ARXIV.2306.10336","ee":"https://doi.org/10.48550/arXiv.2306.10336","url":"https://dblp.org/rec/journals/corr/abs-2306-10336"}, "url":"URL#487241" }, { "@score":"6", "@id":"487775", "info":{"authors":{"author":[{"@pid":"228/4749","text":"Linyao Yang"},{"@pid":"13/3715","text":"Hongyang Chen"},{"@pid":"181/2856-8","text":"Zhao Li 0008"},{"@pid":"44/10861","text":"Xiao Ding"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"ChatGPT is not Enough: Enhancing Large Language Models with Knowledge Graphs for Fact-aware Language Modeling.","venue":"CoRR","volume":"abs/2306.11489","year":"2023","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2306-11489","doi":"10.48550/ARXIV.2306.11489","ee":"https://doi.org/10.48550/arXiv.2306.11489","url":"https://dblp.org/rec/journals/corr/abs-2306-11489"}, "url":"URL#487775" }, { "@score":"6", "@id":"503718", "info":{"authors":{"author":[{"@pid":"21/8331","text":"Ahmed Abdeen Hamed"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Improving Detection of ChatGPT-Generated Fake Science Using Real Publication Text: Introducing xFakeBibs a Supervised-Learning Network Algorithm.","venue":"CoRR","volume":"abs/2308.11767","year":"2023","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2308-11767","doi":"10.48550/ARXIV.2308.11767","ee":"https://doi.org/10.48550/arXiv.2308.11767","url":"https://dblp.org/rec/journals/corr/abs-2308-11767"}, "url":"URL#503718" }, { "@score":"8", "@id":"515748", "info":{"authors":{"author":[{"@pid":"46/8700","text":"Youxi Wu"},{"@pid":"320/1625","text":"Yufei Meng"},{"@pid":"87/660-87","text":"Yan Li 0087"},{"@pid":"64/1967-15","text":"Lei Guo 0015"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"76/2649","text":"Philippe Fournier-Viger"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Top-k contrast order-preserving pattern mining for time series classification.","venue":"CoRR","volume":"abs/2310.02612","year":"2023","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2310-02612","doi":"10.48550/ARXIV.2310.02612","ee":"https://doi.org/10.48550/arXiv.2310.02612","url":"https://dblp.org/rec/journals/corr/abs-2310-02612"}, "url":"URL#515748" }, { "@score":"8", "@id":"529366", "info":{"authors":{"author":[{"@pid":"85/7620","text":"Meng Geng"},{"@pid":"46/8700","text":"Youxi Wu"},{"@pid":"87/660","text":"Yan Li"},{"@pid":"72/2590","text":"Jing Liu"},{"@pid":"76/2649","text":"Philippe Fournier-Viger"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Repetitive nonoverlapping sequential pattern mining.","venue":"CoRR","volume":"abs/2311.09667","year":"2023","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2311-09667","doi":"10.48550/ARXIV.2311.09667","ee":"https://doi.org/10.48550/arXiv.2311.09667","url":"https://dblp.org/rec/journals/corr/abs-2311-09667"}, "url":"URL#529366" }, { "@score":"8", "@id":"566919", "info":{"authors":{"author":[{"@pid":"87/660-87","text":"Yan Li 0087"},{"@pid":"01/2775","text":"Lei Yu"},{"@pid":"72/2590","text":"Jing Liu"},{"@pid":"64/1967-15","text":"Lei Guo 0015"},{"@pid":"46/8700","text":"Youxi Wu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"NetDPO: (delta, gamma)-approximate pattern matching with gap constraints under one-off condition.","venue":"Appl. Intell.","volume":"52","number":"11","pages":"12155-12174","year":"2022","type":"Journal Articles","access":"closed","key":"journals/apin/LiYLGWW22","doi":"10.1007/S10489-021-03000-2","ee":"https://doi.org/10.1007/s10489-021-03000-2","url":"https://dblp.org/rec/journals/apin/LiYLGWW22"}, "url":"URL#566919" }, { "@score":"8", "@id":"566923", "info":{"authors":{"author":[{"@pid":"87/660-87","text":"Yan Li 0087"},{"@pid":"71/208","text":"Shuai Zhang"},{"@pid":"64/1967-15","text":"Lei Guo 0015"},{"@pid":"72/2590","text":"Jing Liu"},{"@pid":"46/8700","text":"Youxi Wu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"NetNMSP: Nonoverlapping maximal sequential pattern mining.","venue":"Appl. Intell.","volume":"52","number":"9","pages":"9861-9884","year":"2022","type":"Journal Articles","access":"closed","key":"journals/apin/LiZGLWW22","doi":"10.1007/S10489-021-02912-3","ee":"https://doi.org/10.1007/s10489-021-02912-3","url":"https://dblp.org/rec/journals/apin/LiZGLWW22"}, "url":"URL#566923" }, { "@score":"8", "@id":"567284", "info":{"authors":{"author":[{"@pid":"36/7524","text":"Yuehua Wang"},{"@pid":"46/8700","text":"Youxi Wu"},{"@pid":"87/660-87","text":"Yan Li 0087"},{"@pid":"43/2875","text":"Fang Yao"},{"@pid":"76/2649","text":"Philippe Fournier-Viger"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Self-adaptive nonoverlapping sequential pattern mining.","venue":"Appl. Intell.","volume":"52","number":"6","pages":"6646-6661","year":"2022","type":"Journal Articles","access":"closed","key":"journals/apin/WangWLYFW22","doi":"10.1007/S10489-021-02763-Y","ee":"https://doi.org/10.1007/s10489-021-02763-y","url":"https://dblp.org/rec/journals/apin/WangWLYFW22"}, "url":"URL#567284" }, { "@score":"6", "@id":"569003", "info":{"authors":{"author":[{"@pid":"97/5351","text":"Huiting Liu"},{"@pid":"33/85","text":"Qian Liu"},{"@pid":"60/3675-1","text":"Peipei Li 0001"},{"@pid":"93/4324-10","text":"Peng Zhao 0010"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"A deep selective learning network for cross-domain recommendation.","venue":"Appl. Soft Comput.","volume":"125","pages":"109160","year":"2022","type":"Journal Articles","access":"closed","key":"journals/asc/LiuLLZW22","doi":"10.1016/J.ASOC.2022.109160","ee":"https://doi.org/10.1016/j.asoc.2022.109160","url":"https://dblp.org/rec/journals/asc/LiuLLZW22"}, "url":"URL#569003" }, { "@score":"6", "@id":"571444", "info":{"authors":{"author":[{"@pid":"256/6591","text":"Xiulin Zheng"},{"@pid":"60/3675-1","text":"Pei-Pei Li 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Data Stream Classification Based on Extreme Learning Machine: A Review.","venue":"Big Data Res.","volume":"30","pages":"100356","year":"2022","type":"Journal Articles","access":"closed","key":"journals/bdr/ZhengLW22","doi":"10.1016/J.BDR.2022.100356","ee":"https://doi.org/10.1016/j.bdr.2022.100356","url":"https://dblp.org/rec/journals/bdr/ZhengLW22"}, "url":"URL#571444" }, { "@score":"6", "@id":"597083", "info":{"authors":{"author":[{"@pid":"13/7007-2","text":"Lei Li 0002"},{"@pid":"281/6902","text":"Minghe Xue"},{"@pid":"123/0825","text":"Zan Zhang"},{"@pid":"72/5816","text":"Huanhuan Chen"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Certainty-based Preference Completion.","venue":"Data Intell.","volume":"4","number":"1","pages":"112-133","year":"2022","type":"Journal Articles","access":"open","key":"journals/dint/LiXZCW22","doi":"10.1162/DINT_A_00115","ee":"https://doi.org/10.1162/dint_a_00115","url":"https://dblp.org/rec/journals/dint/LiXZCW22"}, "url":"URL#597083" }, { "@score":"6", "@id":"607766", "info":{"authors":{"author":[{"@pid":"23/5823-8","text":"Peng Zhou 0008"},{"@pid":"40/5434","text":"Yunyun Zhang"},{"@pid":"60/3675-1","text":"Peipei Li 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"General assembly framework for online streaming feature selection via Rough Set models.","venue":"Expert Syst. Appl.","volume":"204","pages":"117520","year":"2022","type":"Journal Articles","access":"closed","key":"journals/eswa/ZhouZLW22","doi":"10.1016/J.ESWA.2022.117520","ee":"https://doi.org/10.1016/j.eswa.2022.117520","url":"https://dblp.org/rec/journals/eswa/ZhouZLW22"}, "url":"URL#607766" }, { "@score":"8", "@id":"616257", "info":{"authors":{"author":[{"@pid":"46/8700","text":"Youxi Wu"},{"@pid":"329/3810","text":"Bojing Jian"},{"@pid":"87/660-87","text":"Yan Li 0087"},{"@pid":"30/3790-1","text":"He Jiang 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"NetNDP: Nonoverlapping (delta, gamma)-approximate pattern matching.","venue":"Intell. Data Anal.","volume":"26","number":"6","pages":"1661-1682","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ida/WuJLJW22","doi":"10.3233/IDA-216325","ee":"https://doi.org/10.3233/IDA-216325","url":"https://dblp.org/rec/journals/ida/WuJLJW22"}, "url":"URL#616257" }, { "@score":"8", "@id":"626427", "info":{"authors":{"author":[{"@pid":"82/2177","text":"Hai-Hui Huang"},{"@pid":"76/1703","text":"Naiqi Wu"},{"@pid":"l/YongLiang1","text":"Yong Liang 0001"},{"@pid":"115/8976","text":"Xindong Peng"},{"@pid":"54/838","text":"Jun Shu"}]},"title":"SLNL: A novel method for gene selection and phenotype classification.","venue":"Int. J. Intell. Syst.","volume":"37","number":"9","pages":"6283-6304","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijis/HuangWLPS22","doi":"10.1002/INT.22844","ee":"https://doi.org/10.1002/int.22844","url":"https://dblp.org/rec/journals/ijis/HuangWLPS22"}, "url":"URL#626427" }, { "@score":"8", "@id":"639893", "info":{"authors":{"author":[{"@pid":"46/8700","text":"Youxi Wu"},{"@pid":"224/2091","text":"Zhu Yuan"},{"@pid":"87/660-87","text":"Yan Li 0087"},{"@pid":"64/1967-15","text":"Lei Guo 0015"},{"@pid":"76/2649","text":"Philippe Fournier-Viger"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"NWP-Miner: Nonoverlapping weak-gap sequential pattern mining.","venue":"Inf. Sci.","volume":"588","pages":"124-141","year":"2022","type":"Journal Articles","access":"closed","key":"journals/isci/WuYLGFW22","doi":"10.1016/J.INS.2021.12.064","ee":"https://doi.org/10.1016/j.ins.2021.12.064","url":"https://dblp.org/rec/journals/isci/WuYLGFW22"}, "url":"URL#639893" }, { "@score":"6", "@id":"640024", "info":{"authors":{"author":[{"@pid":"87/10304","text":"Dianlong You"},{"@pid":"214/9721","text":"Miaomiao Sun"},{"@pid":"184/2053","text":"Shunpan Liang"},{"@pid":"157/8924","text":"Ruiqi Li"},{"@pid":"181/2842","text":"Yang Wang"},{"@pid":"314/0188","text":"Jiawei Xiao"},{"@pid":"24/3698","text":"Fuyong Yuan"},{"@pid":"71/3634","text":"Limin Shen"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Online feature selection for multi-source streaming features.","venue":"Inf. Sci.","volume":"590","pages":"267-295","year":"2022","type":"Journal Articles","access":"closed","key":"journals/isci/YouSLLWXYSW22","doi":"10.1016/J.INS.2022.01.008","ee":"https://doi.org/10.1016/j.ins.2022.01.008","url":"https://dblp.org/rec/journals/isci/YouSLLWXYSW22"}, "url":"URL#640024" }, { "@score":"6", "@id":"681362", "info":{"authors":{"author":[{"@pid":"94/6045","text":"Jiajing Zhu"},{"@pid":"25/5687","text":"Yongguo Liu"},{"@pid":"02/6428-19","text":"Yun Zhang 0019"},{"@pid":"05/1539-14","text":"Zhi Chen 0014"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Multi-Attribute Discriminative Representation Learning for Prediction of Adverse Drug-Drug Interaction.","venue":"IEEE Trans. Pattern Anal. Mach. Intell.","volume":"44","number":"12","pages":"10129-10144","year":"2022","type":"Journal Articles","access":"closed","key":"journals/pami/ZhuLZCW22","doi":"10.1109/TPAMI.2021.3135841","ee":"https://doi.org/10.1109/TPAMI.2021.3135841","url":"https://dblp.org/rec/journals/pami/ZhuLZCW22"}, "url":"URL#681362" }, { "@score":"6", "@id":"684282", "info":{"authors":{"author":[{"@pid":"72/2833-4","text":"Tingting Jiang 0004"},{"@pid":"151/4309","text":"Chenyang Bu"},{"@pid":"67/4972-6","text":"Yi Zhu 0006"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Combining embedding-based and symbol-based methods for entity alignment.","venue":"Pattern Recognit.","volume":"124","pages":"108433","year":"2022","type":"Journal Articles","access":"closed","key":"journals/pr/JiangBZW22","doi":"10.1016/J.PATCOG.2021.108433","ee":"https://doi.org/10.1016/j.patcog.2021.108433","url":"https://dblp.org/rec/journals/pr/JiangBZW22"}, "url":"URL#684282" }, { "@score":"6", "@id":"684746", "info":{"authors":{"author":[{"@pid":"67/4972-6","text":"Yi Zhu 0006"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"138/2494","text":"Jipeng Qiang"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"01/1504-2","text":"Yuhong Zhang 0002"},{"@pid":"60/3675-1","text":"Pei-Pei Li 0001"}]},"title":"Representation learning with deep sparse auto-encoder for multi-task learning.","venue":"Pattern Recognit.","volume":"129","pages":"108742","year":"2022","type":"Journal Articles","access":"closed","key":"journals/pr/ZhuWQHZL22","doi":"10.1016/J.PATCOG.2022.108742","ee":"https://doi.org/10.1016/j.patcog.2022.108742","url":"https://dblp.org/rec/journals/pr/ZhuWQHZL22"}, "url":"URL#684746" }, { "@score":"6", "@id":"722674", "info":{"authors":{"author":[{"@pid":"05/4746-6","text":"He Li 0006"},{"@pid":"80/5460","text":"Jianbin Huang"},{"@pid":"71/9839","text":"Hang Yuan"},{"@pid":"00/1740","text":"Jiangtao Cui"},{"@pid":"81/9706","text":"Xiaoke Ma"},{"@pid":"77/6919","text":"Shaojie Qiao"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"A Two-Phase Method to Balance the Result of Distributed Graph Repartitioning.","venue":"IEEE Trans. Big Data","volume":"8","number":"6","pages":"1580-1591","year":"2022","type":"Journal Articles","access":"closed","key":"journals/tbd/LiHYCMQW22","doi":"10.1109/TBDATA.2021.3070194","ee":"https://doi.org/10.1109/TBDATA.2021.3070194","url":"https://dblp.org/rec/journals/tbd/LiHYCMQW22"}, "url":"URL#722674" }, { "@score":"6", "@id":"722736", "info":{"authors":{"author":[{"@pid":"72/7503-3","text":"Shuai Yang 0003"},{"@pid":"w/HaoWang-8","text":"Hao Wang 0008"},{"@pid":"52/2586","text":"Kui Yu"},{"@pid":"98/7299","text":"Fuyuan Cao"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Towards Efficient Local Causal Structure Learning.","venue":"IEEE Trans. Big Data","volume":"8","number":"6","pages":"1592-1609","year":"2022","type":"Journal Articles","access":"closed","key":"journals/tbd/YangWYCW22","doi":"10.1109/TBDATA.2021.3062937","ee":"https://doi.org/10.1109/TBDATA.2021.3062937","url":"https://dblp.org/rec/journals/tbd/YangWYCW22"}, "url":"URL#722736" }, { "@score":"8", "@id":"729410", "info":{"authors":{"author":[{"@pid":"46/8700","text":"Youxi Wu"},{"@pid":"36/7524","text":"Yuehua Wang"},{"@pid":"87/660-87","text":"Yan Li 0087"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Top-k Self-Adaptive Contrast Sequential Pattern Mining.","venue":"IEEE Trans. Cybern.","volume":"52","number":"11","pages":"11819-11833","year":"2022","type":"Journal Articles","access":"closed","key":"journals/tcyb/WuWLZW22","doi":"10.1109/TCYB.2021.3082114","ee":"https://doi.org/10.1109/TCYB.2021.3082114","url":"https://dblp.org/rec/journals/tcyb/WuWLZW22"}, "url":"URL#729410" }, { "@score":"6", "@id":"729497", "info":{"authors":{"author":[{"@pid":"72/7503-3","text":"Shuai Yang 0003"},{"@pid":"52/2586","text":"Kui Yu"},{"@pid":"98/7299","text":"Fuyuan Cao"},{"@pid":"w/HaoWang-8","text":"Hao Wang 0008"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Dual-Representation-Based Autoencoder for Domain Adaptation.","venue":"IEEE Trans. Cybern.","volume":"52","number":"8","pages":"7464-7477","year":"2022","type":"Journal Articles","access":"closed","key":"journals/tcyb/YangYCWW22","doi":"10.1109/TCYB.2020.3040763","ee":"https://doi.org/10.1109/TCYB.2020.3040763","url":"https://dblp.org/rec/journals/tcyb/YangYCWW22"}, "url":"URL#729497" }, { "@score":"6", "@id":"731088", "info":{"authors":{"author":[{"@pid":"13/7007-2","text":"Lei Li 0002"},{"@pid":"15/5712","text":"Ping Ding"},{"@pid":"72/5816","text":"Huanhuan Chen"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Frequent Pattern Mining in Big Social Graphs.","venue":"IEEE Trans. Emerg. Top. Comput. Intell.","volume":"6","number":"3","pages":"638-648","year":"2022","type":"Journal Articles","access":"closed","key":"journals/tetci/LiDCW22","doi":"10.1109/TETCI.2021.3067017","ee":"https://doi.org/10.1109/TETCI.2021.3067017","url":"https://dblp.org/rec/journals/tetci/LiDCW22"}, "url":"URL#731088" }, { "@score":"6", "@id":"731089", "info":{"authors":{"author":[{"@pid":"13/7007-2","text":"Lei Li 0002"},{"@pid":"18/2122","text":"Lan Jiang"},{"@pid":"151/4309","text":"Chenyang Bu"},{"@pid":"67/4972-6","text":"Yi Zhu 0006"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Interval-Valued Intuitionistic Fuzzy Decision With Graph Pattern in Big Graph.","venue":"IEEE Trans. Emerg. Top. Comput. Intell.","volume":"6","number":"5","pages":"1057-1067","year":"2022","type":"Journal Articles","access":"closed","key":"journals/tetci/LiJBZW22","doi":"10.1109/TETCI.2022.3141062","ee":"https://doi.org/10.1109/TETCI.2022.3141062","url":"https://dblp.org/rec/journals/tetci/LiJBZW22"}, "url":"URL#731089" }, { "@score":"6", "@id":"731607", "info":{"authors":{"author":[{"@pid":"94/6045","text":"Jiajing Zhu"},{"@pid":"25/5687","text":"Yongguo Liu"},{"@pid":"02/6428-19","text":"Yun Zhang 0019"},{"@pid":"05/1539-14","text":"Zhi Chen 0014"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Adaptive Regularized Multiattribute Fuzzy Distance Learning for Predicting Adverse Drug-Drug Interaction.","venue":"IEEE Trans. Fuzzy Syst.","volume":"30","number":"12","pages":"5297-5311","year":"2022","type":"Journal Articles","access":"closed","key":"journals/tfs/ZhuLZCW22","doi":"10.1109/TFUZZ.2022.3173379","ee":"https://doi.org/10.1109/TFUZZ.2022.3173379","url":"https://dblp.org/rec/journals/tfs/ZhuLZCW22"}, "url":"URL#731607" }, { "@score":"6", "@id":"741751", "info":{"authors":{"author":[{"@pid":"66/10594","text":"Song Deng"},{"@pid":"276/2797","text":"Qingyuan Cai"},{"@pid":"64/5459","text":"Zi Zhang"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"User Behavior Analysis Based on Stacked Autoencoder and Clustering in Complex Power Grid Environment.","venue":"IEEE Trans. Intell. Transp. Syst.","volume":"23","number":"12","pages":"25521-25535","year":"2022","type":"Journal Articles","access":"closed","key":"journals/tits/DengCZW22","doi":"10.1109/TITS.2021.3076607","ee":"https://doi.org/10.1109/TITS.2021.3076607","url":"https://dblp.org/rec/journals/tits/DengCZW22"}, "url":"URL#741751" }, { "@score":"6", "@id":"744300", "info":{"authors":{"author":[{"@pid":"123/4939","text":"Yaojin Lin"},{"@pid":"30/2395","text":"Qinghua Hu"},{"@pid":"71/10082","text":"Jinghua Liu"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"MULFE: Multi-Label Learning via Label-Specific Feature Space Ensemble.","venue":"ACM Trans. Knowl. Discov. Data","volume":"16","number":"1","pages":"5:1-5:24","year":"2022","type":"Journal Articles","access":"closed","key":"journals/tkdd/LinHLZW22","doi":"10.1145/3451392","ee":"https://doi.org/10.1145/3451392","url":"https://dblp.org/rec/journals/tkdd/LinHLZW22"}, "url":"URL#744300" }, { "@score":"6", "@id":"744302", "info":{"authors":{"author":[{"@pid":"250/6473","text":"Zhaolong Ling"},{"@pid":"52/2586","text":"Kui Yu"},{"@pid":"61/2115-3","text":"Lin Liu 0003"},{"@pid":"20/1583","text":"Jiuyong Li"},{"@pid":"56/5142-1","text":"Yiwen Zhang 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"PSL: An Algorithm for Partial Bayesian Network Structure Learning.","venue":"ACM Trans. Knowl. Discov. Data","volume":"16","number":"5","pages":"93:1-93:25","year":"2022","type":"Journal Articles","access":"closed","key":"journals/tkdd/LingYLLZW22","doi":"10.1145/3508071","ee":"https://doi.org/10.1145/3508071","url":"https://dblp.org/rec/journals/tkdd/LingYLLZW22"}, "url":"URL#744302" }, { "@score":"6", "@id":"744306", "info":{"authors":{"author":[{"@pid":"271/5672","text":"Guliu Liu"},{"@pid":"13/7007-2","text":"Lei Li 0002"},{"@pid":"01/1235-1","text":"Guanfeng Liu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Social Group Query Based on Multi-Fuzzy-Constrained Strong Simulation.","venue":"ACM Trans. Knowl. Discov. Data","volume":"16","number":"3","pages":"54:1-54:27","year":"2022","type":"Journal Articles","access":"closed","key":"journals/tkdd/LiuLLW22","doi":"10.1145/3481640","ee":"https://doi.org/10.1145/3481640","url":"https://dblp.org/rec/journals/tkdd/LiuLLW22"}, "url":"URL#744306" }, { "@score":"8", "@id":"744312", "info":{"authors":{"author":[{"@pid":"81/5434","text":"Pengfei Ma"},{"@pid":"46/8700","text":"Youxi Wu"},{"@pid":"87/660-87","text":"Yan Li 0087"},{"@pid":"64/1967-15","text":"Lei Guo 0015"},{"@pid":"30/3790-1","text":"He Jiang 0001"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"HW-Forest: Deep Forest with Hashing Screening and Window Screening.","venue":"ACM Trans. Knowl. Discov. Data","volume":"16","number":"6","pages":"123:1-123:24","year":"2022","type":"Journal Articles","access":"closed","key":"journals/tkdd/MaWLGJZW22","doi":"10.1145/3532193","ee":"https://doi.org/10.1145/3532193","url":"https://dblp.org/rec/journals/tkdd/MaWLGJZW22"}, "url":"URL#744312" }, { "@score":"8", "@id":"744346", "info":{"authors":{"author":[{"@pid":"46/8700","text":"Youxi Wu"},{"@pid":"309/6451","text":"Lanfang Luo"},{"@pid":"87/660-87","text":"Yan Li 0087"},{"@pid":"64/1967-15","text":"Lei Guo 0015"},{"@pid":"76/2649","text":"Philippe Fournier-Viger"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"NTP-Miner: Nonoverlapping Three-Way Sequential Pattern Mining.","venue":"ACM Trans. Knowl. Discov. Data","volume":"16","number":"3","pages":"51:1-51:21","year":"2022","type":"Journal Articles","access":"closed","key":"journals/tkdd/WuLLGFZW22","doi":"10.1145/3480245","ee":"https://doi.org/10.1145/3480245","url":"https://dblp.org/rec/journals/tkdd/WuLLGFZW22"}, "url":"URL#744346" }, { "@score":"6", "@id":"744373", "info":{"authors":{"author":[{"@pid":"23/5823-8","text":"Peng Zhou 0008"},{"@pid":"41/3875","text":"Shu Zhao"},{"@pid":"151/4567","text":"Yuan-Ting Yan"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Online Scalable Streaming Feature Selection via Dynamic Decision.","venue":"ACM Trans. Knowl. Discov. Data","volume":"16","number":"5","pages":"87:1-87:20","year":"2022","type":"Journal Articles","access":"closed","key":"journals/tkdd/ZhouZYW22","doi":"10.1145/3502737","ee":"https://doi.org/10.1145/3502737","url":"https://dblp.org/rec/journals/tkdd/ZhouZYW22"}, "url":"URL#744373" }, { "@score":"6", "@id":"744613", "info":{"authors":{"author":[{"@pid":"138/2494","text":"Jipeng Qiang"},{"@pid":"q/ZQian","text":"Zhenyu Qian"},{"@pid":"87/6284-10","text":"Yun Li 0010"},{"@pid":"51/7436","text":"Yunhao Yuan"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Short Text Topic Modeling Techniques, Applications, and Performance: A Survey.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"34","number":"3","pages":"1427-1445","year":"2022","type":"Journal Articles","access":"closed","key":"journals/tkde/QiangQLYW22","doi":"10.1109/TKDE.2020.2992485","ee":"https://doi.org/10.1109/TKDE.2020.2992485","url":"https://dblp.org/rec/journals/tkde/QiangQLYW22"}, "url":"URL#744613" }, { "@score":"6", "@id":"744670", "info":{"authors":{"author":[{"@pid":"93/6765-1","text":"Meng Wang 0001"},{"@pid":"170/5786","text":"Weijie Fu"},{"@pid":"59/1007","text":"Xiangnan He 0001"},{"@pid":"122/3198","text":"Shijie Hao"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"A Survey on Large-Scale Machine Learning.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"34","number":"6","pages":"2574-2594","year":"2022","type":"Journal Articles","access":"closed","key":"journals/tkde/WangFHHW22","doi":"10.1109/TKDE.2020.3015777","ee":"https://doi.org/10.1109/TKDE.2020.3015777","url":"https://dblp.org/rec/journals/tkde/WangFHHW22"}, "url":"URL#744670" }, { "@score":"8", "@id":"744697", "info":{"authors":{"author":[{"@pid":"52/328-56","text":"Di Wu 0056"},{"@pid":"53/5106-1","text":"Xin Luo 0001"},{"@pid":"97/7820-1","text":"Mingsheng Shang 0001"},{"@pid":"65/425-7","text":"Yi He 0007"},{"@pid":"05/3838-1","text":"Guoyin Wang 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"A Data-Characteristic-Aware Latent Factor Model for Web Services QoS Prediction.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"34","number":"6","pages":"2525-2538","year":"2022","type":"Journal Articles","access":"closed","key":"journals/tkde/WuLSHWW22","doi":"10.1109/TKDE.2020.3014302","ee":"https://doi.org/10.1109/TKDE.2020.3014302","url":"https://dblp.org/rec/journals/tkde/WuLSHWW22"}, "url":"URL#744697" }, { "@score":"6", "@id":"744799", "info":{"authors":{"author":[{"@pid":"94/6045","text":"Jiajing Zhu"},{"@pid":"25/5687","text":"Yongguo Liu"},{"@pid":"228/2517","text":"Chuanbiao Wen"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"DGDFS: Dependence Guided Discriminative Feature Selection for Predicting Adverse Drug-Drug Interaction.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"34","number":"1","pages":"271-285","year":"2022","type":"Journal Articles","access":"closed","key":"journals/tkde/ZhuLWW22","doi":"10.1109/TKDE.2020.2978055","ee":"https://doi.org/10.1109/TKDE.2020.2978055","url":"https://dblp.org/rec/journals/tkde/ZhuLWW22"}, "url":"URL#744799" }, { "@score":"8", "@id":"745658", "info":{"authors":{"author":[{"@pid":"46/8700","text":"Youxi Wu"},{"@pid":"31/3878","text":"Xiaohui Wang"},{"@pid":"87/660-87","text":"Yan Li 0087"},{"@pid":"64/1967-15","text":"Lei Guo 0015"},{"@pid":"l/ZhaoLi-7","text":"Zhao Li 0007"},{"@pid":"86/1953-1","text":"Ji Zhang 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"OWSP-Miner: Self-adaptive One-off Weak-gap Strong Pattern Mining.","venue":"ACM Trans. Manag. Inf. Syst.","volume":"13","number":"3","pages":"25:1-25:23","year":"2022","type":"Journal Articles","access":"closed","key":"journals/tmis/WuWLGLZW22","doi":"10.1145/3476247","ee":"https://doi.org/10.1145/3476247","url":"https://dblp.org/rec/journals/tmis/WuWLGLZW22"}, "url":"URL#745658" }, { "@score":"8", "@id":"745659", "info":{"authors":{"author":[{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"97/6864","text":"Minghui Wu"}]},"title":"The Evolution of Search: Three Computing Paradigms.","venue":"ACM Trans. Manag. Inf. Syst.","volume":"13","number":"2","pages":"20:1-20:20","year":"2022","type":"Journal Articles","access":"closed","key":"journals/tmis/WuZW22","doi":"10.1145/3495214","ee":"https://doi.org/10.1145/3495214","url":"https://dblp.org/rec/journals/tmis/WuZW22"}, "url":"URL#745659" }, { "@score":"6", "@id":"800865", "info":{"authors":{"author":[{"@pid":"20/3894-6","text":"Jun Wu 0006"},{"@pid":"307/7883","text":"QingGuo Yan"},{"@pid":"332/5241","text":"Qinwei Dong"},{"@pid":"332/4264","text":"Xianguang Zha"},{"@pid":"27/1570","text":"Lin Cui"},{"@pid":"56/2567","text":"Xindong Zhao"},{"@pid":"76/2897","text":"Wei Dai"},{"@pid":"79/3712","text":"Chong Luo"}]},"title":"Task-driven Dialogue System based on Dynamic Intention Capture.","venue":"DSA","pages":"859-864","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/dsa/WuYDZCZDL22","doi":"10.1109/DSA56465.2022.00121","ee":"https://doi.org/10.1109/DSA56465.2022.00121","url":"https://dblp.org/rec/conf/dsa/WuYDZCZDL22"}, "url":"URL#800865" }, { "@score":"6", "@id":"800902", "info":{"authors":{"author":[{"@pid":"47/2026","text":"Jun Zhao"},{"@pid":"307/7883","text":"QingGuo Yan"},{"@pid":"332/5241","text":"Qinwei Dong"},{"@pid":"332/4264","text":"Xianguang Zha"},{"@pid":"20/3894","text":"Jun Wu"},{"@pid":"307/8036","text":"ZeJia He"},{"@pid":"56/2567","text":"Xindong Zhao"},{"@pid":"61/6346","text":"Xiaowen Zhang"}]},"title":"Speech Instruction Recognition Method based on Stacking Ensemble Learning.","venue":"DSA","pages":"546-553","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/dsa/ZhaoYDZWHZZ22","doi":"10.1109/DSA56465.2022.00079","ee":"https://doi.org/10.1109/DSA56465.2022.00079","url":"https://dblp.org/rec/conf/dsa/ZhaoYDZWHZZ22"}, "url":"URL#800902" }, { "@score":"6", "@id":"831146", "info":{"authors":{"author":[{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"175/3324","text":"Hao Chen"},{"@pid":"151/4309","text":"Chenyang Bu"},{"@pid":"233/6456","text":"Shengwei Ji"},{"@pid":"123/0825","text":"Zan Zhang"},{"@pid":"36/4372","text":"Victor S. Sheng"}]},"title":"HUSS: A Heuristic Method for Understanding the Semantic Structure of Spreadsheets.","venue":"ICKG","pages":"329-336","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/icbk/WuCBJZS22","doi":"10.1109/ICKG55886.2022.00049","ee":"https://doi.org/10.1109/ICKG55886.2022.00049","url":"https://dblp.org/rec/conf/icbk/WuCBJZS22"}, "url":"URL#831146" }, { "@score":"8", "@id":"838554", "info":{"authors":{"author":[{"@pid":"151/4309","text":"Chenyang Bu"},{"@pid":"10/239","text":"Jiawei Zhang"},{"@pid":"153/2215","text":"Xingchen Yu"},{"@pid":"121/4234","text":"Le Wu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Which Companies are Likely to Invest: Knowledge-graph-based Recommendation for Investment Promotion.","venue":"ICDM","pages":"11-20","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdm/BuZYW022","doi":"10.1109/ICDM54844.2022.00011","ee":"https://doi.org/10.1109/ICDM54844.2022.00011","url":"https://dblp.org/rec/conf/icdm/BuZYW022"}, "url":"URL#838554" }, { "@score":"6", "@id":"838585", "info":{"authors":{"author":[{"@pid":"269/3667","text":"Bingbing Dong"},{"@pid":"123/0825","text":"Zan Zhang"},{"@pid":"65/1739","text":"Jiao Li"},{"@pid":"67/4972-6","text":"Yi Zhu 0006"},{"@pid":"151/4309","text":"Chenyang Bu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Hypernode: Entity Fusion for Data Traceability and Link Prediction.","venue":"ICDM","pages":"111-120","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdm/DongZL0B022","doi":"10.1109/ICDM54844.2022.00021","ee":"https://doi.org/10.1109/ICDM54844.2022.00021","url":"https://dblp.org/rec/conf/icdm/DongZL0B022"}, "url":"URL#838585" }, { "@score":"6", "@id":"933736", "info":{"authors":{"author":[{"@pid":"60/3675-1","text":"Peipei Li 0001"},{"@pid":"52/2586","text":"Kui Yu"},{"@pid":"c/NiteshVChawla","text":"Nitesh V. Chawla"},{"@pid":"f/RonenFeldman","text":"Ronen Feldman"},{"@pid":"181/2689","text":"Qing Li"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"IEEE International Conference on Knowledge Graph, ICKG 2022, Orlando, FL, USA, November 30 - Dec. 1, 2022","venue":"ICKG","publisher":"IEEE","year":"2022","type":"Editorship","key":"conf/icbk/2022","doi":"10.1109/ICKG55886.2022","ee":"https://doi.org/10.1109/ICKG55886.2022","url":"https://dblp.org/rec/conf/icbk/2022"}, "url":"URL#933736" }, { "@score":"6", "@id":"933830", "info":{"authors":{"author":[{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"r/SanjayRanka","text":"Sanjay Ranka"},{"@pid":"63/4711","text":"My T. Thai"},{"@pid":"w/TakashiWashio","text":"Takashi Washio"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"IEEE International Conference on Data Mining, ICDM 2022, Orlando, FL, USA, November 28 - Dec. 1, 2022","venue":"ICDM","publisher":"IEEE","year":"2022","type":"Editorship","key":"conf/icdm/2022","doi":"10.1109/ICDM54844.2022","ee":"https://doi.org/10.1109/ICDM54844.2022","url":"https://dblp.org/rec/conf/icdm/2022"}, "url":"URL#933830" }, { "@score":"8", "@id":"944019", "info":{"authors":{"author":[{"@pid":"46/8700","text":"Youxi Wu"},{"@pid":"55/7775","text":"Qian Hu"},{"@pid":"87/660-87","text":"Yan Li 0087"},{"@pid":"64/1967-15","text":"Lei Guo 0015"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"OPP-Miner: Order-preserving sequential pattern mining.","venue":"CoRR","volume":"abs/2202.03140","year":"2022","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2202-03140","ee":"https://arxiv.org/abs/2202.03140","url":"https://dblp.org/rec/journals/corr/abs-2202-03140"}, "url":"URL#944019" }, { "@score":"6", "@id":"947603", "info":{"authors":{"author":[{"@pid":"67/4972-6","text":"Yi Zhu 0006"},{"@pid":"256/9693","text":"Xinke Zhou"},{"@pid":"138/2494","text":"Jipeng Qiang"},{"@pid":"87/6284-10","text":"Yun Li 0010"},{"@pid":"51/7436","text":"Yunhao Yuan"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Prompt-Learning for Short Text Classification.","venue":"CoRR","volume":"abs/2202.11345","year":"2022","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2202-11345","ee":"https://arxiv.org/abs/2202.11345","url":"https://dblp.org/rec/journals/corr/abs-2202-11345"}, "url":"URL#947603" }, { "@score":"6", "@id":"953967", "info":{"authors":{"author":[{"@pid":"29/6204","text":"Yuling Li"},{"@pid":"52/2586","text":"Kui Yu"},{"@pid":"01/1504-2","text":"Yuhong Zhang 0002"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Learning Relation-Specific Representations for Few-shot Knowledge Graph Completion.","venue":"CoRR","volume":"abs/2203.11639","year":"2022","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2203-11639","doi":"10.48550/ARXIV.2203.11639","ee":"https://doi.org/10.48550/arXiv.2203.11639","url":"https://dblp.org/rec/journals/corr/abs-2203-11639"}, "url":"URL#953967" }, { "@score":"6", "@id":"959898", "info":{"authors":{"author":[{"@pid":"138/2494","text":"Jipeng Qiang"},{"@pid":"37/4190","text":"Yang Li"},{"@pid":"188/1352","text":"Chaowei Zhang"},{"@pid":"87/6284-10","text":"Yun Li 0010"},{"@pid":"51/7436","text":"Yunhao Yuan"},{"@pid":"67/4972-6","text":"Yi Zhu 0006"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Chinese Idiom Paraphrasing.","venue":"CoRR","volume":"abs/2204.07555","year":"2022","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2204-07555","doi":"10.48550/ARXIV.2204.07555","ee":"https://doi.org/10.48550/arXiv.2204.07555","url":"https://dblp.org/rec/journals/corr/abs-2204-07555"}, "url":"URL#959898" }, { "@score":"10", "@id":"961554", "info":{"authors":{"author":[{"@pid":"319/3075","text":"Yutong Qu"},{"@pid":"147/9092","text":"Wei Emma Zhang"},{"@pid":"y/JianYang1","text":"Jian Yang 0001"},{"@pid":"27/9060","text":"Lingfei Wu"},{"@pid":"25/5536-1","text":"Jia Wu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Embedding Knowledge for Document Summarization: A Survey.","venue":"CoRR","volume":"abs/2204.11190","year":"2022","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2204-11190","doi":"10.48550/ARXIV.2204.11190","ee":"https://doi.org/10.48550/arXiv.2204.11190","url":"https://dblp.org/rec/journals/corr/abs-2204-11190"}, "url":"URL#961554" }, { "@score":"8", "@id":"982353", "info":{"authors":{"author":[{"@pid":"46/8700","text":"Youxi Wu"},{"@pid":"87/7674","text":"Mingjie Chen"},{"@pid":"87/660-87","text":"Yan Li 0087"},{"@pid":"72/2590","text":"Jing Liu"},{"@pid":"l/ZhaoLi-7","text":"Zhao Li 0007"},{"@pid":"247/9049","text":"Jinyan Li"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"One-off Negative Sequential Pattern Mining.","venue":"CoRR","volume":"abs/2207.11950","year":"2022","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2207-11950","doi":"10.48550/ARXIV.2207.11950","ee":"https://doi.org/10.48550/arXiv.2207.11950","url":"https://dblp.org/rec/journals/corr/abs-2207-11950"}, "url":"URL#982353" }, { "@score":"8", "@id":"982354", "info":{"authors":{"author":[{"@pid":"81/5434","text":"Pengfei Ma"},{"@pid":"46/8700","text":"Youxi Wu"},{"@pid":"87/660-87","text":"Yan Li 0087"},{"@pid":"64/1967-15","text":"Lei Guo 0015"},{"@pid":"30/3790-1","text":"He Jiang 0001"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Deep Forest with Hashing Screening and Window Screening.","venue":"CoRR","volume":"abs/2207.11951","year":"2022","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2207-11951","doi":"10.48550/ARXIV.2207.11951","ee":"https://doi.org/10.48550/arXiv.2207.11951","url":"https://dblp.org/rec/journals/corr/abs-2207-11951"}, "url":"URL#982354" }, { "@score":"8", "@id":"990832", "info":{"authors":{"author":[{"@pid":"46/8700","text":"Youxi Wu"},{"@pid":"329/3810","text":"Bojing Jian"},{"@pid":"87/660-87","text":"Yan Li 0087"},{"@pid":"30/3790-1","text":"He Jiang 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Nonoverlapping (delta, gamma)-approximate pattern matching.","venue":"CoRR","volume":"abs/2209.02949","year":"2022","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2209-02949","doi":"10.48550/ARXIV.2209.02949","ee":"https://doi.org/10.48550/arXiv.2209.02949","url":"https://dblp.org/rec/journals/corr/abs-2209-02949"}, "url":"URL#990832" }, { "@score":"8", "@id":"993346", "info":{"authors":{"author":[{"@pid":"46/8700","text":"Youxi Wu"},{"@pid":"197/2231","text":"Xiaoqian Zhao"},{"@pid":"87/660-87","text":"Yan Li 0087"},{"@pid":"64/1967-15","text":"Lei Guo 0015"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"76/2649","text":"Philippe Fournier-Viger"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"OPR-Miner: Order-preserving rule mining for time series.","venue":"CoRR","volume":"abs/2209.08932","year":"2022","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2209-08932","doi":"10.48550/ARXIV.2209.08932","ee":"https://doi.org/10.48550/arXiv.2209.08932","url":"https://dblp.org/rec/journals/corr/abs-2209-08932"}, "url":"URL#993346" }, { "@score":"6", "@id":"997559", "info":{"authors":{"author":[{"@pid":"134/0827","text":"Fei Jie"},{"@pid":"213/1553","text":"Chunpai Wang"},{"@pid":"21/3047","text":"Feng Chen"},{"@pid":"13/7007-2","text":"Lei Li 0002"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Block-Structured Optimization for Subgraph Detection in Interdependent Networks.","venue":"CoRR","volume":"abs/2210.02702","year":"2022","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2210-02702","doi":"10.48550/ARXIV.2210.02702","ee":"https://doi.org/10.48550/arXiv.2210.02702","url":"https://dblp.org/rec/journals/corr/abs-2210-02702"}, "url":"URL#997559" }, { "@score":"6", "@id":"1072260", "info":{"authors":{"author":[{"@pid":"52/2586","text":"Kui Yu"},{"@pid":"254/1356","text":"Xianjie Guo"},{"@pid":"61/2115-3","text":"Lin Liu 0003"},{"@pid":"20/1583","text":"Jiuyong Li"},{"@pid":"w/HaoWang-8","text":"Hao Wang 0008"},{"@pid":"250/6473","text":"Zhaolong Ling"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Causality-based Feature Selection: Methods and Evaluations.","venue":"ACM Comput. Surv.","volume":"53","number":"5","pages":"111:1-111:36","year":"2021","type":"Journal Articles","access":"closed","key":"journals/csur/YuGLLWLW20","doi":"10.1145/3409382","ee":"https://doi.org/10.1145/3409382","url":"https://dblp.org/rec/journals/csur/YuGLLWLW20"}, "url":"URL#1072260" }, { "@score":"6", "@id":"1083041", "info":{"authors":{"author":[{"@pid":"97/5351","text":"Huiting Liu"},{"@pid":"304/7495","text":"Jindou Zhao"},{"@pid":"60/3675-1","text":"Peipei Li 0001"},{"@pid":"93/4324-10","text":"Peng Zhao 0010"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Shared-view and specific-view information extraction for recommendation.","venue":"Expert Syst. Appl.","volume":"186","pages":"115752","year":"2021","type":"Journal Articles","access":"closed","key":"journals/eswa/LiuZLZW21","doi":"10.1016/J.ESWA.2021.115752","ee":"https://doi.org/10.1016/j.eswa.2021.115752","url":"https://dblp.org/rec/journals/eswa/LiuZLZW21"}, "url":"URL#1083041" }, { "@score":"6", "@id":"1083367", "info":{"authors":{"author":[{"@pid":"194/4619","text":"Lei Sang"},{"@pid":"09/0-1","text":"Min Xu 0001"},{"@pid":"138/4249","text":"Shengsheng Qian"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Knowledge graph enhanced neural collaborative recommendation.","venue":"Expert Syst. Appl.","volume":"164","pages":"113992","year":"2021","type":"Journal Articles","access":"closed","key":"journals/eswa/SangXQW21","doi":"10.1016/J.ESWA.2020.113992","ee":"https://doi.org/10.1016/j.eswa.2020.113992","url":"https://dblp.org/rec/journals/eswa/SangXQW21"}, "url":"URL#1083367" }, { "@score":"8", "@id":"1083615", "info":{"authors":{"author":[{"@pid":"46/8700","text":"Youxi Wu"},{"@pid":"53/3724","text":"Rong Lei"},{"@pid":"87/660-87","text":"Yan Li 0087"},{"@pid":"64/1967-15","text":"Lei Guo 0015"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"HAOP-Miner: Self-adaptive high-average utility one-off sequential pattern mining.","venue":"Expert Syst. Appl.","volume":"184","pages":"115449","year":"2021","type":"Journal Articles","access":"closed","key":"journals/eswa/WuLLGW21","doi":"10.1016/J.ESWA.2021.115449","ee":"https://doi.org/10.1016/j.eswa.2021.115449","url":"https://dblp.org/rec/journals/eswa/WuLLGW21"}, "url":"URL#1083615" }, { "@score":"6", "@id":"1083765", "info":{"authors":{"author":[{"@pid":"67/4972-6","text":"Yi Zhu 0006"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"138/2494","text":"Jipeng Qiang"},{"@pid":"51/7436","text":"Yunhao Yuan"},{"@pid":"87/6284-10","text":"Yun Li 0010"}]},"title":"Representation learning with collaborative autoencoder for personalized recommendation.","venue":"Expert Syst. Appl.","volume":"186","pages":"115825","year":"2021","type":"Journal Articles","access":"closed","key":"journals/eswa/ZhuWQYL21","doi":"10.1016/J.ESWA.2021.115825","ee":"https://doi.org/10.1016/j.eswa.2021.115825","url":"https://dblp.org/rec/journals/eswa/ZhuWQYL21"}, "url":"URL#1083765" }, { "@score":"6", "@id":"1091606", "info":{"authors":{"author":[{"@pid":"96/1681","text":"Jin He"},{"@pid":"13/7007-2","text":"Lei Li 0002"},{"@pid":"59/2227-2","text":"Yan Wang 0002"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Hierarchical features-based targeted aspect extraction from online reviews.","venue":"Intell. Data Anal.","volume":"25","number":"1","pages":"205-223","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ida/HeLWW21","doi":"10.3233/IDA-194952","ee":"https://doi.org/10.3233/IDA-194952","url":"https://dblp.org/rec/journals/ida/HeLWW21"}, "url":"URL#1091606" }, { "@score":"6", "@id":"1091621", "info":{"authors":{"author":[{"@pid":"82/385-9","text":"Na Liu 0009"},{"@pid":"51/1316","text":"Fei Xie"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Suffix array for multi-pattern matching with variable length wildcards.","venue":"Intell. Data Anal.","volume":"25","number":"2","pages":"283-303","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ida/LiuXW21","doi":"10.3233/IDA-205087","ee":"https://doi.org/10.3233/IDA-205087","url":"https://dblp.org/rec/journals/ida/LiuXW21"}, "url":"URL#1091621" }, { "@score":"6", "@id":"1104330", "info":{"authors":{"author":[{"@pid":"269/3667","text":"Bingbing Dong"},{"@pid":"67/4972-6","text":"Yi Zhu 0006"},{"@pid":"13/7007-2","text":"Lei Li 0002"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Hybrid collaborative recommendation of co-embedded item attributes and graph features.","venue":"Neurocomputing","volume":"442","pages":"307-316","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijon/DongZLW21","doi":"10.1016/J.NEUCOM.2021.01.129","ee":"https://doi.org/10.1016/j.neucom.2021.01.129","url":"https://dblp.org/rec/journals/ijon/DongZLW21"}, "url":"URL#1104330" }, { "@score":"6", "@id":"1104827", "info":{"authors":{"author":[{"@pid":"97/5351","text":"Huiting Liu"},{"@pid":"76/4764","text":"Geng Chen"},{"@pid":"60/3675-1","text":"Pei-Pei Li 0001"},{"@pid":"93/4324-10","text":"Peng Zhao 0010"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Multi-label text classification via joint learning from label embedding and label correlation.","venue":"Neurocomputing","volume":"460","pages":"385-398","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijon/LiuCLZW21","doi":"10.1016/J.NEUCOM.2021.07.031","ee":"https://doi.org/10.1016/j.neucom.2021.07.031","url":"https://dblp.org/rec/journals/ijon/LiuCLZW21"}, "url":"URL#1104827" }, { "@score":"6", "@id":"1105129", "info":{"authors":{"author":[{"@pid":"194/4619","text":"Lei Sang"},{"@pid":"09/0-1","text":"Min Xu 0001"},{"@pid":"138/4249","text":"Shengsheng Qian"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Knowledge Graph enhanced Neural Collaborative Filtering with Residual Recurrent Network.","venue":"Neurocomputing","volume":"454","pages":"417-429","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijon/SangXQW21","doi":"10.1016/J.NEUCOM.2021.03.053","ee":"https://doi.org/10.1016/j.neucom.2021.03.053","url":"https://dblp.org/rec/journals/ijon/SangXQW21"}, "url":"URL#1105129" }, { "@score":"6", "@id":"1114052", "info":{"authors":{"author":[{"@pid":"97/5351","text":"Huiting Liu"},{"@pid":"41/4086","text":"Lingling Guo"},{"@pid":"60/3675-1","text":"Peipei Li 0001"},{"@pid":"93/4324-10","text":"Peng Zhao 0010"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Collaborative filtering with a deep adversarial and attention network for cross-domain recommendation.","venue":"Inf. Sci.","volume":"565","pages":"370-389","year":"2021","type":"Journal Articles","access":"closed","key":"journals/isci/LiuGLZW21","doi":"10.1016/J.INS.2021.02.009","ee":"https://doi.org/10.1016/j.ins.2021.02.009","url":"https://dblp.org/rec/journals/isci/LiuGLZW21"}, "url":"URL#1114052" }, { "@score":"6", "@id":"1137131", "info":{"authors":{"author":[{"@pid":"65/1739","text":"Jiao Li"},{"@pid":"151/4309","text":"Chenyang Bu"},{"@pid":"60/3675-1","text":"Pei-Pei Li 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"A coarse-to-fine collective entity linking method for heterogeneous information networks.","venue":"Knowl. Based Syst.","volume":"228","pages":"107286","year":"2021","type":"Journal Articles","access":"closed","key":"journals/kbs/LiBLW21","doi":"10.1016/J.KNOSYS.2021.107286","ee":"https://doi.org/10.1016/j.knosys.2021.107286","url":"https://dblp.org/rec/journals/kbs/LiBLW21"}, "url":"URL#1137131" }, { "@score":"8", "@id":"1137533", "info":{"authors":{"author":[{"@pid":"46/8700","text":"Youxi Wu"},{"@pid":"85/7620","text":"Meng Geng"},{"@pid":"87/660-87","text":"Yan Li 0087"},{"@pid":"64/1967-15","text":"Lei Guo 0015"},{"@pid":"l/ZhaoLi-7","text":"Zhao Li 0007"},{"@pid":"76/2649","text":"Philippe Fournier-Viger"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"HANP-Miner: High average utility nonoverlapping sequential pattern mining.","venue":"Knowl. Based Syst.","volume":"229","pages":"107361","year":"2021","type":"Journal Articles","access":"closed","key":"journals/kbs/WuGLGLFZW21","doi":"10.1016/J.KNOSYS.2021.107361","ee":"https://doi.org/10.1016/j.knosys.2021.107361","url":"https://dblp.org/rec/journals/kbs/WuGLGLFZW21"}, "url":"URL#1137533" }, { "@score":"6", "@id":"1137708", "info":{"authors":{"author":[{"@pid":"76/2562","text":"Jiaoling Zheng"},{"@pid":"77/6919","text":"Shaojie Qiao"},{"@pid":"84/8629","text":"Nan Han"},{"@pid":"80/5460","text":"Jianbin Huang"},{"@pid":"74/3871","text":"Kun Yue"},{"@pid":"97/6589-1","text":"Qiang He 0001"},{"@pid":"258/7774","text":"Shengjie Min"},{"@pid":"300/8678","text":"Guanghua Ying"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Which, Who and How: Detecting fraudulent sale accumulation behavior from multi-dimensional sparse data.","venue":"Knowl. Based Syst.","volume":"228","pages":"107260","year":"2021","type":"Journal Articles","access":"closed","key":"journals/kbs/ZhengQHHYHMYW21","doi":"10.1016/J.KNOSYS.2021.107260","ee":"https://doi.org/10.1016/j.knosys.2021.107260","url":"https://dblp.org/rec/journals/kbs/ZhengQHHYHMYW21"}, "url":"URL#1137708" }, { "@score":"6", "@id":"1192277", "info":{"authors":{"author":[{"@pid":"138/2494","text":"Jipeng Qiang"},{"@pid":"220/2497","text":"Xinyu Lu"},{"@pid":"87/6284-10","text":"Yun Li 0010"},{"@pid":"51/7436","text":"Yunhao Yuan"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Chinese Lexical Simplification.","venue":"IEEE ACM Trans. Audio Speech Lang. Process.","volume":"29","pages":"1819-1828","year":"2021","type":"Journal Articles","access":"closed","key":"journals/taslp/QiangLLYW21","doi":"10.1109/TASLP.2021.3078361","ee":"https://doi.org/10.1109/TASLP.2021.3078361","url":"https://dblp.org/rec/journals/taslp/QiangLLYW21"}, "url":"URL#1192277" }, { "@score":"6", "@id":"1192278", "info":{"authors":{"author":[{"@pid":"138/2494","text":"Jipeng Qiang"},{"@pid":"87/6284-10","text":"Yun Li 0010"},{"@pid":"67/4972-6","text":"Yi Zhu 0006"},{"@pid":"51/7436","text":"Yunhao Yuan"},{"@pid":"15/5233-3","text":"Yang Shi 0003"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"LSBert: Lexical Simplification Based on BERT.","venue":"IEEE ACM Trans. Audio Speech Lang. Process.","volume":"29","pages":"3064-3076","year":"2021","type":"Journal Articles","access":"closed","key":"journals/taslp/QiangLZYSW21","doi":"10.1109/TASLP.2021.3111589","ee":"https://doi.org/10.1109/TASLP.2021.3111589","url":"https://dblp.org/rec/journals/taslp/QiangLZYSW21"}, "url":"URL#1192278" }, { "@score":"6", "@id":"1192370", "info":{"authors":{"author":[{"@pid":"02/6428-19","text":"Yun Zhang 0019"},{"@pid":"25/5687","text":"Yongguo Liu"},{"@pid":"94/6045","text":"Jiajing Zhu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"FSPRM: A Feature Subsequence Based Probability Representation Model for Chinese Word Embedding.","venue":"IEEE ACM Trans. Audio Speech Lang. Process.","volume":"29","pages":"1702-1716","year":"2021","type":"Journal Articles","access":"closed","key":"journals/taslp/ZhangLZW21","doi":"10.1109/TASLP.2021.3073868","ee":"https://doi.org/10.1109/TASLP.2021.3073868","url":"https://dblp.org/rec/journals/taslp/ZhangLZW21"}, "url":"URL#1192370" }, { "@score":"6", "@id":"1199547", "info":{"authors":{"author":[{"@pid":"250/6473","text":"Zhaolong Ling"},{"@pid":"52/2586","text":"Kui Yu"},{"@pid":"w/HaoWang-8","text":"Hao Wang 0008"},{"@pid":"13/7007-2","text":"Lei Li 0002"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Using Feature Selection for Local Causal Structure Learning.","venue":"IEEE Trans. Emerg. Top. Comput. Intell.","volume":"5","number":"4","pages":"530-540","year":"2021","type":"Journal Articles","access":"closed","key":"journals/tetci/LingYWLW21","doi":"10.1109/TETCI.2020.2978238","ee":"https://doi.org/10.1109/TETCI.2020.2978238","url":"https://dblp.org/rec/journals/tetci/LingYWLW21"}, "url":"URL#1199547" }, { "@score":"6", "@id":"1206429", "info":{"authors":{"author":[{"@pid":"233/6456","text":"Shengwei Ji"},{"@pid":"151/4309","text":"Chenyang Bu"},{"@pid":"13/7007-2","text":"Lei Li 0002"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Local Graph Edge Partitioning.","venue":"ACM Trans. Intell. Syst. Technol.","volume":"12","number":"5","pages":"61:1-61:25","year":"2021","type":"Journal Articles","access":"closed","key":"journals/tist/JiBLW21","doi":"10.1145/3466685","ee":"https://doi.org/10.1145/3466685","url":"https://dblp.org/rec/journals/tist/JiBLW21"}, "url":"URL#1206429" }, { "@score":"6", "@id":"1206444", "info":{"authors":{"author":[{"@pid":"77/6919","text":"Shaojie Qiao"},{"@pid":"84/8629","text":"Nan Han"},{"@pid":"80/5460","text":"Jianbin Huang"},{"@pid":"74/3871","text":"Kun Yue"},{"@pid":"51/5793","text":"Rui Mao 0001"},{"@pid":"59/2997","text":"Hongping Shu"},{"@pid":"97/6589-1","text":"Qiang He 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"A Dynamic Convolutional Neural Network Based Shared-Bike Demand Forecasting Model.","venue":"ACM Trans. Intell. Syst. Technol.","volume":"12","number":"6","pages":"70:1-70:24","year":"2021","type":"Journal Articles","access":"closed","key":"journals/tist/QiaoHHYMSHW21","doi":"10.1145/3447988","ee":"https://doi.org/10.1145/3447988","url":"https://dblp.org/rec/journals/tist/QiaoHHYMSHW21"}, "url":"URL#1206444" }, { "@score":"6", "@id":"1208739", "info":{"authors":{"author":[{"@pid":"73/4566","text":"Kai Liu"},{"@pid":"78/6365-1","text":"Hongbo Liu 0001"},{"@pid":"45/5296","text":"Tomas E. Ward"},{"@pid":"33/3535-3","text":"Hua Wang 0003"},{"@pid":"16/4505","text":"Yu Yang"},{"@pid":"36/2259-45","text":"Bo Zhang 0045"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Self-Adaptive Skeleton Approaches to Detect Self-Organized Coalitions From Brain Functional Networks Through Probabilistic Mixture Models.","venue":"ACM Trans. Knowl. Discov. Data","volume":"15","number":"5","pages":"87:1-87:26","year":"2021","type":"Journal Articles","access":"closed","key":"journals/tkdd/LiuLWWYZW21","doi":"10.1145/3447570","ee":"https://doi.org/10.1145/3447570","url":"https://dblp.org/rec/journals/tkdd/LiuLWWYZW21"}, "url":"URL#1208739" }, { "@score":"6", "@id":"1208795", "info":{"authors":{"author":[{"@pid":"67/4972-6","text":"Yi Zhu 0006"},{"@pid":"13/7007-2","text":"Lei Li 0002"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Stacked Convolutional Sparse Auto-Encoders for Representation Learning.","venue":"ACM Trans. Knowl. Discov. Data","volume":"15","number":"2","pages":"31:1-31:21","year":"2021","type":"Journal Articles","access":"closed","key":"journals/tkdd/ZhuLW21","doi":"10.1145/3434767","ee":"https://doi.org/10.1145/3434767","url":"https://dblp.org/rec/journals/tkdd/ZhuLW21"}, "url":"URL#1208795" }, { "@score":"6", "@id":"1208956", "info":{"authors":{"author":[{"@pid":"138/2494","text":"Jipeng Qiang"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Unsupervised Statistical Text Simplification.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"33","number":"4","pages":"1802-1806","year":"2021","type":"Journal Articles","access":"closed","key":"journals/tkde/QiangW21","doi":"10.1109/TKDE.2019.2947679","ee":"https://doi.org/10.1109/TKDE.2019.2947679","url":"https://dblp.org/rec/journals/tkde/QiangW21"}, "url":"URL#1208956" }, { "@score":"6", "@id":"1209045", "info":{"authors":{"author":[{"@pid":"05/3499-15","text":"Jing Zhang 0015"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Multi-Label Truth Inference for Crowdsourcing Using Mixture Models.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"33","number":"5","pages":"2083-2095","year":"2021","type":"Journal Articles","access":"closed","key":"journals/tkde/ZhangW21","doi":"10.1109/TKDE.2019.2951668","ee":"https://doi.org/10.1109/TKDE.2019.2951668","url":"https://dblp.org/rec/journals/tkde/ZhangW21"}, "url":"URL#1209045" }, { "@score":"6", "@id":"1210038", "info":{"authors":{"author":[{"@pid":"194/4619","text":"Lei Sang"},{"@pid":"09/0-1","text":"Min Xu 0001"},{"@pid":"138/4249","text":"Shengsheng Qian"},{"@pid":"299/6111","text":"Matt Martin"},{"@pid":"97/2005","text":"Peter Li"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Context-Dependent Propagating-Based Video Recommendation in Multimodal Heterogeneous Information Networks.","venue":"IEEE Trans. Multim.","volume":"23","pages":"2019-2032","year":"2021","type":"Journal Articles","access":"closed","key":"journals/tmm/SangXQMLW21","doi":"10.1109/TMM.2020.3007330","ee":"https://doi.org/10.1109/TMM.2020.3007330","url":"https://dblp.org/rec/journals/tmm/SangXQMLW21"}, "url":"URL#1210038" }, { "@score":"10", "@id":"1210201", "info":{"authors":{"author":[{"@pid":"65/425-7","text":"Yi He 0007"},{"@pid":"72/8498","text":"Baijun Wu"},{"@pid":"52/328-56","text":"Di Wu 0056"},{"@pid":"201/4232","text":"Ege Beyazit"},{"@pid":"34/1910-8","text":"Sheng Chen 0008"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Toward Mining Capricious Data Streams: A Generative Approach.","venue":"IEEE Trans. Neural Networks Learn. Syst.","volume":"32","number":"3","pages":"1228-1240","year":"2021","type":"Journal Articles","access":"closed","key":"journals/tnn/0007WWB0021","doi":"10.1109/TNNLS.2020.2981386","ee":"https://doi.org/10.1109/TNNLS.2020.2981386","url":"https://dblp.org/rec/journals/tnn/0007WWB0021"}, "url":"URL#1210201" }, { "@score":"6", "@id":"1210656", "info":{"authors":{"author":[{"@pid":"23/5823-8","text":"Peng Zhou 0008"},{"@pid":"60/3675-1","text":"Peipei Li 0001"},{"@pid":"41/3875","text":"Shu Zhao"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Feature Interaction for Streaming Feature Selection.","venue":"IEEE Trans. Neural Networks Learn. Syst.","volume":"32","number":"10","pages":"4691-4702","year":"2021","type":"Journal Articles","access":"closed","key":"journals/tnn/ZhouLZW21","doi":"10.1109/TNNLS.2020.3025922","ee":"https://doi.org/10.1109/TNNLS.2020.3025922","url":"https://dblp.org/rec/journals/tnn/ZhouLZW21"}, "url":"URL#1210656" }, { "@score":"6", "@id":"1211911", "info":{"authors":{"author":[{"@pid":"66/10594","text":"Song Deng"},{"@pid":"304/0316","text":"Fulin Chen"},{"@pid":"234/9561","text":"Xia Dong"},{"@pid":"118/3484","text":"Guangwei Gao"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Short-term Load Forecasting by Using Improved GEP and Abnormal Load Recognition.","venue":"ACM Trans. Internet Techn.","volume":"21","number":"4","pages":"95:1-95:28","year":"2021","type":"Journal Articles","access":"closed","key":"journals/toit/DengCDGW21","doi":"10.1145/3447513","ee":"https://doi.org/10.1145/3447513","url":"https://dblp.org/rec/journals/toit/DengCDGW21"}, "url":"URL#1211911" }, { "@score":"8", "@id":"1214378", "info":{"authors":{"author":[{"@pid":"59/1501","text":"Richang Hong"},{"@pid":"11/1735","text":"Yuan He"},{"@pid":"121/4234","text":"Le Wu"},{"@pid":"39/844","text":"Yong Ge"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Deep Attributed Network Embedding by Preserving Structure and Attribute Information.","venue":"IEEE Trans. Syst. Man Cybern. Syst.","volume":"51","number":"3","pages":"1434-1445","year":"2021","type":"Journal Articles","access":"closed","key":"journals/tsmc/HongHWGW21","doi":"10.1109/TSMC.2019.2897152","ee":"https://doi.org/10.1109/TSMC.2019.2897152","url":"https://dblp.org/rec/journals/tsmc/HongHWGW21"}, "url":"URL#1214378" }, { "@score":"6", "@id":"1214610", "info":{"authors":{"author":[{"@pid":"77/6919","text":"Shaojie Qiao"},{"@pid":"84/8629","text":"Nan Han"},{"@pid":"80/2651","text":"Yunjun Gao"},{"@pid":"37/548","text":"Rong-Hua Li"},{"@pid":"80/5460","text":"Jianbin Huang"},{"@pid":"87/6001","text":"Heli Sun"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Dynamic Community Evolution Analysis Framework for Large-Scale Complex Networks Based on Strong and Weak Events.","venue":"IEEE Trans. Syst. Man Cybern. Syst.","volume":"51","number":"10","pages":"6229-6243","year":"2021","type":"Journal Articles","access":"closed","key":"journals/tsmc/QiaoHGLHSW21","doi":"10.1109/TSMC.2019.2960085","ee":"https://doi.org/10.1109/TSMC.2019.2960085","url":"https://dblp.org/rec/journals/tsmc/QiaoHGLHSW21"}, "url":"URL#1214610" }, { "@score":"6", "@id":"1223633", "info":{"authors":{"author":[{"@pid":"65/425-7","text":"Yi He 0007"},{"@pid":"24/6114-1","text":"Xu Yuan 0001"},{"@pid":"34/1910-8","text":"Sheng Chen 0008"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Online Learning in Variable Feature Spaces under Incomplete Supervision.","venue":"AAAI","pages":"4106-4114","year":"2021","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/0007YC021","doi":"10.1609/AAAI.V35I5.16532","ee":"https://doi.org/10.1609/aaai.v35i5.16532","url":"https://dblp.org/rec/conf/aaai/0007YC021"}, "url":"URL#1223633" }, { "@score":"6", "@id":"1253178", "info":{"authors":{"author":[{"@pid":"134/0827","text":"Fei Jie"},{"@pid":"156/3558","text":"Yanxiang Huang"},{"@pid":"305/0152","text":"Qiangwei Bai"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"HAO Unity: A Graph-based System for Unifying Heterogeneous Data.","venue":"CIKM","pages":"4725-4729","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/cikm/JieHB021","doi":"10.1145/3459637.3481991","ee":"https://doi.org/10.1145/3459637.3481991","url":"https://dblp.org/rec/conf/cikm/JieHB021"}, "url":"URL#1253178" }, { "@score":"6", "@id":"1253506", "info":{"authors":{"author":[{"@pid":"305/0177","text":"Xiaona Xue"},{"@pid":"122/5931","text":"Jinling Jiang"},{"@pid":"189/3220","text":"Wenjian Zhang"},{"@pid":"156/3558","text":"Yanxiang Huang"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"A Chinese Knowledge Base Question Answering System.","venue":"CIKM","pages":"4813-4816","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/cikm/XueJZHW21","doi":"10.1145/3459637.3481970","ee":"https://doi.org/10.1145/3459637.3481970","url":"https://dblp.org/rec/conf/cikm/XueJZHW21"}, "url":"URL#1253506" }, { "@score":"6", "@id":"1295160", "info":{"authors":{"author":[{"@pid":"52/3898","text":"Ru Chen"},{"@pid":"271/5672","text":"Guliu Liu"},{"@pid":"67/4972-6","text":"Yi Zhu 0006"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"A Scheme for Kinship Reasoning based on Ontology.","venue":"ICBK","pages":"222-229","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/icbk/ChenL0021","doi":"10.1109/ICKG52313.2021.00038","ee":"https://doi.org/10.1109/ICKG52313.2021.00038","url":"https://dblp.org/rec/conf/icbk/ChenL0021"}, "url":"URL#1295160" }, { "@score":"6", "@id":"1369164", "info":{"authors":{"author":[{"@pid":"88/5135","text":"Yan Hong"},{"@pid":"151/4309","text":"Chenyang Bu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"High-Quality Noise Detection for Knowledge Graph Embedding with Rule-Based Triple Confidence.","venue":"PRICAI","pages":"572-585","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/pricai/HongBW21","doi":"10.1007/978-3-030-89188-6_43","ee":"https://doi.org/10.1007/978-3-030-89188-6_43","url":"https://dblp.org/rec/conf/pricai/HongBW21"}, "url":"URL#1369164" }, { "@score":"6", "@id":"1369196", "info":{"authors":{"author":[{"@pid":"289/7678","text":"Jianxuan Shao"},{"@pid":"151/4309","text":"Chenyang Bu"},{"@pid":"233/6456","text":"Shengwei Ji"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"A Weak Supervision Approach with Adversarial Training for Named Entity Recognition.","venue":"PRICAI","pages":"17-30","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/pricai/ShaoBJW21","doi":"10.1007/978-3-030-89363-7_2","ee":"https://doi.org/10.1007/978-3-030-89363-7_2","url":"https://dblp.org/rec/conf/pricai/ShaoBJW21"}, "url":"URL#1369196" }, { "@score":"8", "@id":"1395587", "info":{"authors":{"author":[{"@pid":"65/425-7","text":"Yi He 0007"},{"@pid":"34/1910-8","text":"Sheng Chen 0008"},{"@pid":"72/8498","text":"Baijun Wu"},{"@pid":"24/6114-1","text":"Xu Yuan 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Unsupervised Lifelong Learning with Curricula.","venue":"WWW","pages":"3534-3545","year":"2021","type":"Conference and Workshop Papers","access":"closed","key":"conf/www/00070WY021","doi":"10.1145/3442381.3449839","ee":"https://doi.org/10.1145/3442381.3449839","url":"https://dblp.org/rec/conf/www/00070WY021"}, "url":"URL#1395587" }, { "@score":"6", "@id":"1398522", "info":{"authors":{"author":[{"@pid":"b/JamesBailey","text":"James Bailey 0001"},{"@pid":"05/1558","text":"Pauli Miettinen"},{"@pid":"23/1879","text":"Yun Sing Koh"},{"@pid":"46/3391","text":"Dacheng Tao"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"IEEE International Conference on Data Mining, ICDM 2021, Auckland, New Zealand, December 7-10, 2021","venue":"ICDM","publisher":"IEEE","year":"2021","type":"Editorship","key":"conf/icdm/2021","doi":"10.1109/ICDM51629.2021","ee":"https://doi.org/10.1109/ICDM51629.2021","url":"https://dblp.org/rec/conf/icdm/2021"}, "url":"URL#1398522" }, { "@score":"6", "@id":"1411746", "info":{"authors":{"author":[{"@pid":"72/7503-3","text":"Shuai Yang 0003"},{"@pid":"w/HaoWang-8","text":"Hao Wang 0008"},{"@pid":"52/2586","text":"Kui Yu"},{"@pid":"98/7299","text":"Fuyuan Cao"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Towards Efficient Local Causal Structure Learning.","venue":"CoRR","volume":"abs/2103.00378","year":"2021","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2103-00378","ee":"https://arxiv.org/abs/2103.00378","url":"https://dblp.org/rec/journals/corr/abs-2103-00378"}, "url":"URL#1411746" }, { "@score":"6", "@id":"1415607", "info":{"authors":{"author":[{"@pid":"271/5672","text":"Guliu Liu"},{"@pid":"13/7007-2","text":"Lei Li 0002"},{"@pid":"01/1235-1","text":"Guanfeng Liu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Social Group Query Based on Multi-fuzzy-constrained Strong Simulation.","venue":"CoRR","volume":"abs/2103.09497","year":"2021","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2103-09497","ee":"https://arxiv.org/abs/2103.09497","url":"https://dblp.org/rec/journals/corr/abs-2103-09497"}, "url":"URL#1415607" }, { "@score":"6", "@id":"1491653", "info":{"authors":{"author":[{"@pid":"269/3667","text":"Bingbing Dong"},{"@pid":"67/4972-6","text":"Yi Zhu 0006"},{"@pid":"13/7007-2","text":"Lei Li 0002"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Hybrid Collaborative Recommendation via Dual-Autoencoder.","venue":"IEEE Access","volume":"8","pages":"46030-46040","year":"2020","type":"Journal Articles","access":"open","key":"journals/access/DongZLW20","doi":"10.1109/ACCESS.2020.2979255","ee":"https://doi.org/10.1109/ACCESS.2020.2979255","url":"https://dblp.org/rec/journals/access/DongZLW20"}, "url":"URL#1491653" }, { "@score":"6", "@id":"1494432", "info":{"authors":{"author":[{"@pid":"134/0827","text":"Fei Jie"},{"@pid":"213/1553","text":"Chunpai Wang"},{"@pid":"21/3047-1","text":"Feng Chen 0001"},{"@pid":"13/7007-2","text":"Lei Li 0002"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"A Framework for Subgraph Detection in Interdependent Networks via Graph Block-Structured Optimization.","venue":"IEEE Access","volume":"8","pages":"157800-157818","year":"2020","type":"Journal Articles","access":"open","key":"journals/access/JieWCLW20","doi":"10.1109/ACCESS.2020.3018497","ee":"https://doi.org/10.1109/ACCESS.2020.3018497","url":"https://dblp.org/rec/journals/access/JieWCLW20"}, "url":"URL#1494432" }, { "@score":"6", "@id":"1500551", "info":{"authors":{"author":[{"@pid":"07/6455-1","text":"Chong Shen 0001"},{"@pid":"277/2289","text":"Xindong Wu 0003"},{"@pid":"82/7328","text":"Donghua Zhao"},{"@pid":"15/1152","text":"Shan Li"},{"@pid":"177/5090","text":"Huiliang Cao"},{"@pid":"45/4066","text":"Huijun Zhao"},{"@pid":"52/6788","text":"Jun Tang"},{"@pid":"95/3736-5","text":"Jun Liu 0005"},{"@pid":"62/3432-7","text":"Chenguang Wang 0007"}]},"title":"Comprehensive Heading Error Processing Technique Using Image Denoising and Tilt-Induced Error Compensation for Polarization Compass.","venue":"IEEE Access","volume":"8","pages":"187222-187231","year":"2020","type":"Journal Articles","access":"open","key":"journals/access/ShenWZLCZTLW20","doi":"10.1109/ACCESS.2020.3028418","ee":"https://doi.org/10.1109/ACCESS.2020.3028418","url":"https://dblp.org/rec/journals/access/ShenWZLCZTLW20"}, "url":"URL#1500551" }, { "@score":"6", "@id":"1511192", "info":{"authors":{"author":[{"@pid":"96/1681","text":"Jin He"},{"@pid":"13/7007-2","text":"Lei Li 0002"},{"@pid":"59/2227-2","text":"Yan Wang 0002"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Targeted aspects oriented topic modeling for short texts.","venue":"Appl. Intell.","volume":"50","number":"8","pages":"2384-2399","year":"2020","type":"Journal Articles","access":"closed","key":"journals/apin/HeLWW20","doi":"10.1007/S10489-020-01672-W","ee":"https://doi.org/10.1007/s10489-020-01672-w","url":"https://dblp.org/rec/journals/apin/HeLWW20"}, "url":"URL#1511192" }, { "@score":"8", "@id":"1511306", "info":{"authors":{"author":[{"@pid":"271/6043","text":"Qiaoshuo Shi"},{"@pid":"184/4083","text":"Jinsong Shan"},{"@pid":"57/803","text":"Wenjie Yan"},{"@pid":"46/8700","text":"Youxi Wu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"NetNPG: Nonoverlapping pattern matching with general gap constraints.","venue":"Appl. Intell.","volume":"50","number":"6","pages":"1832-1845","year":"2020","type":"Journal Articles","access":"closed","key":"journals/apin/ShiSYWW20","doi":"10.1007/S10489-019-01616-Z","ee":"https://doi.org/10.1007/s10489-019-01616-z","url":"https://dblp.org/rec/journals/apin/ShiSYWW20"}, "url":"URL#1511306" }, { "@score":"8", "@id":"1511343", "info":{"authors":{"author":[{"@pid":"46/8700","text":"Youxi Wu"},{"@pid":"275/5636","text":"Jinquan Fan"},{"@pid":"87/660-87","text":"Yan Li 0087"},{"@pid":"64/1967-15","text":"Lei Guo 0015"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"NetDAP: (δ, γ) -approximate pattern matching with length constraints.","venue":"Appl. Intell.","volume":"50","number":"11","pages":"4094-4116","year":"2020","type":"Journal Articles","access":"closed","key":"journals/apin/WuFLGW20","doi":"10.1007/S10489-020-01778-1","ee":"https://doi.org/10.1007/s10489-020-01778-1","url":"https://dblp.org/rec/journals/apin/WuFLGW20"}, "url":"URL#1511343" }, { "@score":"6", "@id":"1512599", "info":{"authors":{"author":[{"@pid":"66/10594","text":"Song Deng"},{"@pid":"44/9956","text":"Xiangpeng Xie"},{"@pid":"81/1855","text":"Chang-An Yuan 0001"},{"@pid":"173/0918","text":"Lechan Yang"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Numerical sensitive data recognition based on hybrid gene expression programming for active distribution networks.","venue":"Appl. Soft Comput.","volume":"91","pages":"106213","year":"2020","type":"Journal Articles","access":"closed","key":"journals/asc/DengXYYW20","doi":"10.1016/J.ASOC.2020.106213","ee":"https://doi.org/10.1016/j.asoc.2020.106213","url":"https://dblp.org/rec/journals/asc/DengXYYW20"}, "url":"URL#1512599" }, { "@score":"6", "@id":"1550115", "info":{"authors":{"author":[{"@pid":"271/5672","text":"Guliu Liu"},{"@pid":"13/7007-2","text":"Lei Li 0002"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Multi-fuzzy-constrained graph pattern matching with big graph data.","venue":"Intell. Data Anal.","volume":"24","number":"4","pages":"941-958","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ida/LiuLW20","doi":"10.3233/IDA-194653","ee":"https://doi.org/10.3233/IDA-194653","url":"https://dblp.org/rec/journals/ida/LiuLW20"}, "url":"URL#1550115" }, { "@score":"6", "@id":"1554033", "info":{"authors":{"author":[{"@pid":"13/7007-2","text":"Lei Li 0002"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"72/5816","text":"Huanhuan Chen"},{"@pid":"52/564-1","text":"Chuan Zhou 0001"},{"@pid":"01/1235-1","text":"Guanfeng Liu 0001"},{"@pid":"216/8558","text":"Yongkang Jiang"}]},"title":"Weighted partial order oriented three-way decisions under score-based common voting rules.","venue":"Int. J. Approx. Reason.","volume":"123","pages":"41-54","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijar/LiWCZLJ20","doi":"10.1016/J.IJAR.2020.05.006","ee":"https://doi.org/10.1016/j.ijar.2020.05.006","url":"https://dblp.org/rec/journals/ijar/LiWCZLJ20"}, "url":"URL#1554033" }, { "@score":"6", "@id":"1563786", "info":{"authors":{"author":[{"@pid":"97/5351","text":"Huiting Liu"},{"@pid":"34/7628","text":"Huimin Liu"},{"@pid":"42/3586","text":"Qiang Ji"},{"@pid":"93/4324-10","text":"Peng Zhao 0010"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Collaborative deep recommendation with global and local item correlations.","venue":"Neurocomputing","volume":"385","pages":"278-291","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijon/LiuLJZW20","doi":"10.1016/J.NEUCOM.2019.12.087","ee":"https://doi.org/10.1016/j.neucom.2019.12.087","url":"https://dblp.org/rec/journals/ijon/LiuLJZW20"}, "url":"URL#1563786" }, { "@score":"6", "@id":"1572397", "info":{"authors":{"author":[{"@pid":"w/HaoWang-8","text":"Hao Wang 0008"},{"@pid":"250/6473","text":"Zhaolong Ling"},{"@pid":"52/2586","text":"Kui Yu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Towards efficient and effective discovery of Markov blankets for feature selection.","venue":"Inf. Sci.","volume":"509","pages":"227-242","year":"2020","type":"Journal Articles","access":"closed","key":"journals/isci/WangLYW20","doi":"10.1016/J.INS.2019.09.010","ee":"https://doi.org/10.1016/j.ins.2019.09.010","url":"https://dblp.org/rec/journals/isci/WangLYW20"}, "url":"URL#1572397" }, { "@score":"8", "@id":"1572650", "info":{"authors":{"author":[{"@pid":"94/6045","text":"Jiajing Zhu"},{"@pid":"25/5687","text":"Yongguo Liu"},{"@pid":"72/4250","text":"Hao Wu"},{"@pid":"05/1539-14","text":"Zhi Chen 0014"},{"@pid":"02/6428-19","text":"Yun Zhang 0019"},{"@pid":"81/2087","text":"Shangming Yang"},{"@pid":"228/5332","text":"Changhong Yang"},{"@pid":"42/3814","text":"Wen Yang"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"A no self-edge stochastic block model and a heuristic algorithm for balanced anti-community detection in networks.","venue":"Inf. Sci.","volume":"518","pages":"95-112","year":"2020","type":"Journal Articles","access":"closed","key":"journals/isci/ZhuLWCZYYYW20","doi":"10.1016/J.INS.2020.01.005","ee":"https://doi.org/10.1016/j.ins.2020.01.005","url":"https://dblp.org/rec/journals/isci/ZhuLWCZYYYW20"}, "url":"URL#1572650" }, { "@score":"8", "@id":"1593833", "info":{"authors":{"author":[{"@pid":"46/8700","text":"Youxi Wu"},{"@pid":"252/4847","text":"Changrui Zhu"},{"@pid":"87/660-87","text":"Yan Li 0087"},{"@pid":"64/1967-15","text":"Lei Guo 0015"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"NetNCSP: Nonoverlapping closed sequential pattern mining.","venue":"Knowl. Based Syst.","volume":"196","pages":"105812","year":"2020","type":"Journal Articles","access":"closed","key":"journals/kbs/WuZLGW20","doi":"10.1016/J.KNOSYS.2020.105812","ee":"https://doi.org/10.1016/j.knosys.2020.105812","url":"https://dblp.org/rec/journals/kbs/WuZLGW20"}, "url":"URL#1593833" }, { "@score":"6", "@id":"1593918", "info":{"authors":{"author":[{"@pid":"02/6428-19","text":"Yun Zhang 0019"},{"@pid":"25/5687","text":"Yongguo Liu"},{"@pid":"276/2026","text":"Rongjiang Jin"},{"@pid":"71/6308","text":"Jing Tao"},{"@pid":"205/7182","text":"Lidian Chen"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"GLLPA: A Graph Layout based Label Propagation Algorithm for community detection.","venue":"Knowl. Based Syst.","volume":"206","pages":"106363","year":"2020","type":"Journal Articles","access":"closed","key":"journals/kbs/ZhangLJTC020","doi":"10.1016/J.KNOSYS.2020.106363","ee":"https://doi.org/10.1016/j.knosys.2020.106363","url":"https://dblp.org/rec/journals/kbs/ZhangLJTC020"}, "url":"URL#1593918" }, { "@score":"6", "@id":"1655169", "info":{"authors":{"author":[{"@pid":"49/3103-3","text":"Qian Ma 0003"},{"@pid":"15/4208-2","text":"Yu Gu 0002"},{"@pid":"14/716","text":"Wang-Chien Lee"},{"@pid":"49/6363","text":"Ge Yu 0001"},{"@pid":"78/6365-1","text":"Hongbo Liu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"REMIAN: Real-Time and Error-Tolerant Missing Value Imputation.","venue":"ACM Trans. Knowl. Discov. Data","volume":"14","number":"6","pages":"77:1-77:38","year":"2020","type":"Journal Articles","access":"closed","key":"journals/tkdd/MaGLYLW20","doi":"10.1145/3412364","ee":"https://doi.org/10.1145/3412364","url":"https://dblp.org/rec/journals/tkdd/MaGLYLW20"}, "url":"URL#1655169" }, { "@score":"6", "@id":"1664407", "info":{"authors":{"author":[{"@pid":"74/3590","text":"Tao Sun"},{"@pid":"78/6365-1","text":"Hongbo Liu 0001"},{"@pid":"35/1723","text":"Seán F. McLoone"},{"@pid":"227/0291","text":"Shaoxiong Ji"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Time series indexing by dynamic covering with cross-range constraints.","venue":"VLDB J.","volume":"29","number":"6","pages":"1365-1384","year":"2020","type":"Journal Articles","access":"closed","key":"journals/vldb/SunLMJW20","doi":"10.1007/S00778-020-00614-9","ee":"https://doi.org/10.1007/s00778-020-00614-9","url":"https://dblp.org/rec/journals/vldb/SunLMJW20"}, "url":"URL#1664407" }, { "@score":"6", "@id":"1670085", "info":{"authors":{"author":[{"@pid":"138/2494","text":"Jipeng Qiang"},{"@pid":"87/6284-10","text":"Yun Li 0010"},{"@pid":"67/4972-6","text":"Yi Zhu 0006"},{"@pid":"51/7436","text":"Yunhao Yuan"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Lexical Simplification with Pretrained Encoders.","venue":"AAAI","pages":"8649-8656","year":"2020","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/QiangLZY020","doi":"10.1609/AAAI.V34I05.6389","ee":"https://doi.org/10.1609/aaai.v34i05.6389","url":"https://dblp.org/rec/conf/aaai/QiangLZY020"}, "url":"URL#1670085" }, { "@score":"10", "@id":"1711262", "info":{"authors":{"author":[{"@pid":"65/425-7","text":"Yi He 0007"},{"@pid":"72/8498","text":"Baijun Wu"},{"@pid":"52/328-56","text":"Di Wu 0056"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"On Partial Multi-Task Learning.","venue":"ECAI","pages":"1174-1181","year":"2020","type":"Conference and Workshop Papers","access":"open","key":"conf/ecai/0007WW020","doi":"10.3233/FAIA200216","ee":"https://doi.org/10.3233/FAIA200216","url":"https://dblp.org/rec/conf/ecai/0007WW020"}, "url":"URL#1711262" }, { "@score":"6", "@id":"1711314", "info":{"authors":{"author":[{"@pid":"201/4232","text":"Ege Beyazit"},{"@pid":"65/425-7","text":"Yi He 0007"},{"@pid":"82/4827","text":"Nian-Feng Tzeng"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Online Learning to Accelerate Neural Network Inference with Traveling Classifiers.","venue":"ECAI","pages":"1016-1023","year":"2020","type":"Conference and Workshop Papers","access":"open","key":"conf/ecai/Beyazit0T020","doi":"10.3233/FAIA200196","ee":"https://doi.org/10.3233/FAIA200196","url":"https://dblp.org/rec/conf/ecai/Beyazit0T020"}, "url":"URL#1711314" }, { "@score":"6", "@id":"1740216", "info":{"authors":{"author":[{"@pid":"204/2416","text":"Xiaoyi Fu"},{"@pid":"38/555","text":"Xu Jiang"},{"@pid":"250/4320","text":"Yunfei Qi"},{"@pid":"75/4287","text":"Meng Xu"},{"@pid":"289/7681","text":"Yuhang Song 0005"},{"@pid":"84/6889","text":"Jie Zhang"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"An Event-Centric Prediction System for COVID-19.","venue":"ICKG","pages":"195-202","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/icbk/FuJQXSZW20","doi":"10.1109/ICBK50248.2020.00037","ee":"https://doi.org/10.1109/ICBK50248.2020.00037","url":"https://dblp.org/rec/conf/icbk/FuJQXSZW20"}, "url":"URL#1740216" }, { "@score":"6", "@id":"1740276", "info":{"authors":{"author":[{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"72/2833-4","text":"Tingting Jiang 0004"},{"@pid":"67/4972-6","text":"Yi Zhu 0006"},{"@pid":"151/4309","text":"Chenyang Bu"}]},"title":"Knowledge Graph for China's Genealogy.","venue":"ICKG","pages":"529-535","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/icbk/WuJZB20","doi":"10.1109/ICBK50248.2020.00080","ee":"https://doi.org/10.1109/ICBK50248.2020.00080","url":"https://dblp.org/rec/conf/icbk/WuJZB20"}, "url":"URL#1740276" }, { "@score":"6", "@id":"1740278", "info":{"authors":{"author":[{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"256/7433","text":"Shaojing Sheng"},{"@pid":"23/5823-8","text":"Peng Zhou 0008"}]},"title":"Balanced Tree Partitioning with Succinct Logic.","venue":"ICKG","pages":"552-559","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/icbk/WuSZ20","doi":"10.1109/ICBK50248.2020.00083","ee":"https://doi.org/10.1109/ICBK50248.2020.00083","url":"https://dblp.org/rec/conf/icbk/WuSZ20"}, "url":"URL#1740278" }, { "@score":"6", "@id":"1747531", "info":{"authors":{"author":[{"@pid":"65/425-7","text":"Yi He 0007"},{"@pid":"24/6114-1","text":"Xu Yuan 0001"},{"@pid":"82/4827","text":"Nian-Feng Tzeng"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Active Learning with Multi-Granular Graph Auto-Encoder.","venue":"ICDM","pages":"1058-1063","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdm/0007YT020","doi":"10.1109/ICDM50108.2020.00125","ee":"https://doi.org/10.1109/ICDM50108.2020.00125","url":"https://dblp.org/rec/conf/icdm/0007YT020"}, "url":"URL#1747531" }, { "@score":"6", "@id":"1771822", "info":{"authors":{"author":[{"@pid":"201/4232","text":"Ege Beyazit"},{"@pid":"269/4626","text":"Doruk Tuncel"},{"@pid":"24/6114-1","text":"Xu Yuan 0001"},{"@pid":"82/4827","text":"Nian-Feng Tzeng"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Learning Interpretable Representations with Informative Entanglements.","venue":"IJCAI","pages":"1970-1976","year":"2020","type":"Conference and Workshop Papers","access":"open","key":"conf/ijcai/BeyazitTYT020","doi":"10.24963/IJCAI.2020/273","ee":"https://doi.org/10.24963/ijcai.2020/273","url":"https://dblp.org/rec/conf/ijcai/BeyazitTYT020"}, "url":"URL#1771822" }, { "@score":"6", "@id":"1771975", "info":{"authors":{"author":[{"@pid":"204/2416","text":"Xiaoyi Fu"},{"@pid":"84/6889","text":"Jie Zhang"},{"@pid":"64/4832","text":"Hao Yu"},{"@pid":"137/8316","text":"Jiachen Li"},{"@pid":"44/3371","text":"Dong Chen"},{"@pid":"10/1593","text":"Jie Yuan"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"A Speech-to-Knowledge-Graph Construction System.","venue":"IJCAI","pages":"5303-5305","year":"2020","type":"Conference and Workshop Papers","access":"open","key":"conf/ijcai/FuZYLCY020","doi":"10.24963/IJCAI.2020/777","ee":"https://doi.org/10.24963/ijcai.2020/777","url":"https://dblp.org/rec/conf/ijcai/FuZYLCY020"}, "url":"URL#1771975" }, { "@score":"6", "@id":"1813707", "info":{"authors":{"author":[{"@pid":"245/3442","text":"Jeevithan Alagurajah"},{"@pid":"24/6114-1","text":"Xu Yuan 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Scale invariant learning from trapezoidal data streams.","venue":"SAC","pages":"505-508","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/AlagurajahY020","doi":"10.1145/3341105.3375775","ee":"https://doi.org/10.1145/3341105.3375775","url":"https://dblp.org/rec/conf/sac/AlagurajahY020"}, "url":"URL#1813707" }, { "@score":"6", "@id":"1815747", "info":{"authors":{"author":[{"@pid":"65/425-7","text":"Yi He 0007"},{"@pid":"34/1910-8","text":"Sheng Chen 0008"},{"@pid":"47/3996","text":"Thu Nguyen"},{"@pid":"53/4373","text":"Bruce A. Wade"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Deep Matrix Tri-Factorization: Mining Vertex-wise Interactions in Multi-Space Attributed Graphs.","venue":"SDM","pages":"334-342","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/sdm/HeCNW020","doi":"10.1137/1.9781611976236.38","ee":"https://doi.org/10.1137/1.9781611976236.38","url":"https://dblp.org/rec/conf/sdm/HeCNW020"}, "url":"URL#1815747" }, { "@score":"6", "@id":"1840929", "info":{"authors":{"author":[{"@pid":"65/3446","text":"Claudia Plant"},{"@pid":"w/HaixunWang","text":"Haixun Wang"},{"@pid":"c/AlfredoCuzzocrea","text":"Alfredo Cuzzocrea"},{"@pid":"z/CZaniolo","text":"Carlo Zaniolo"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"20th IEEE International Conference on Data Mining, ICDM 2020, Sorrento, Italy, November 17-20, 2020","venue":"ICDM","publisher":"IEEE","year":"2020","type":"Editorship","key":"conf/icdm/2020","doi":"10.1109/ICDM50108.2020","ee":"https://doi.org/10.1109/ICDM50108.2020","url":"https://dblp.org/rec/conf/icdm/2020"}, "url":"URL#1840929" }, { "@score":"6", "@id":"1840930", "info":{"authors":{"author":[{"@pid":"46/6025","text":"Giuseppe Di Fatta"},{"@pid":"36/4372","text":"Victor S. Sheng"},{"@pid":"c/AlfredoCuzzocrea","text":"Alfredo Cuzzocrea"},{"@pid":"z/CZaniolo","text":"Carlo Zaniolo"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"20th International Conference on Data Mining Workshops, ICDM Workshops 2020, Sorrento, Italy, November 17-20, 2020","venue":"ICDM","publisher":"IEEE","year":"2020","type":"Editorship","key":"conf/icdm/2020w","doi":"10.1109/ICDMW51313.2020","ee":"https://doi.org/10.1109/ICDMW51313.2020","url":"https://dblp.org/rec/conf/icdm/2020w"}, "url":"URL#1840930" }, { "@score":"6", "@id":"1876003", "info":{"authors":{"author":[{"@pid":"138/2494","text":"Jipeng Qiang"},{"@pid":"87/6284-10","text":"Yun Li 0010"},{"@pid":"67/4972-6","text":"Yi Zhu 0006"},{"@pid":"51/7436","text":"Yunhao Yuan"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"LSBert: A Simple Framework for Lexical Simplification.","venue":"CoRR","volume":"abs/2006.14939","year":"2020","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2006-14939","ee":"https://arxiv.org/abs/2006.14939","url":"https://dblp.org/rec/journals/corr/abs-2006-14939"}, "url":"URL#1876003" }, { "@score":"6", "@id":"1884848", "info":{"authors":{"author":[{"@pid":"93/6765-1","text":"Meng Wang 0001"},{"@pid":"170/5786","text":"Weijie Fu"},{"@pid":"59/1007","text":"Xiangnan He 0001"},{"@pid":"122/3198","text":"Shijie Hao"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"A Survey on Large-scale Machine Learning.","venue":"CoRR","volume":"abs/2008.03911","year":"2020","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2008-03911","ee":"https://arxiv.org/abs/2008.03911","url":"https://dblp.org/rec/journals/corr/abs-2008-03911"}, "url":"URL#1884848" }, { "@score":"6", "@id":"1897317", "info":{"authors":{"author":[{"@pid":"138/2494","text":"Jipeng Qiang"},{"@pid":"220/2497","text":"Xinyu Lu"},{"@pid":"87/6284-10","text":"Yun Li 0010"},{"@pid":"51/7436","text":"Yunhao Yuan"},{"@pid":"15/5233-3","text":"Yang Shi 0003"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Chinese Lexical Simplification.","venue":"CoRR","volume":"abs/2010.07048","year":"2020","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2010-07048","ee":"https://arxiv.org/abs/2010.07048","url":"https://dblp.org/rec/journals/corr/abs-2010-07048"}, "url":"URL#1897317" }, { "@score":"6", "@id":"1910804", "info":{"authors":{"author":[{"@pid":"13/7007-2","text":"Lei Li 0002"},{"@pid":"281/6902","text":"Minghe Xue"},{"@pid":"72/5816","text":"Huanhuan Chen"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Trustworthy Preference Completion in Social Choice.","venue":"CoRR","volume":"abs/2012.07228","year":"2020","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-2012-07228","ee":"https://arxiv.org/abs/2012.07228","url":"https://dblp.org/rec/journals/corr/abs-2012-07228"}, "url":"URL#1910804" }, { "@score":"6", "@id":"1931015", "info":{"authors":{"author":[{"@pid":"97/5351","text":"Huiting Liu"},{"@pid":"23/5672","text":"Lili Wang"},{"@pid":"93/4324-10","text":"Peng Zhao 0010"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Document Specific Supervised Keyphrase Extraction With Strong Semantic Relations.","venue":"IEEE Access","volume":"7","pages":"167507-167520","year":"2019","type":"Journal Articles","access":"open","key":"journals/access/LiuWZW19b","doi":"10.1109/ACCESS.2019.2948891","ee":"https://doi.org/10.1109/ACCESS.2019.2948891","url":"https://dblp.org/rec/journals/access/LiuWZW19b"}, "url":"URL#1931015" }, { "@score":"6", "@id":"1937332", "info":{"authors":{"author":[{"@pid":"87/10304","text":"Dianlong You"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"71/3634","text":"Limin Shen"},{"@pid":"66/10594","text":"Song Deng"},{"@pid":"11/1266-7","text":"Zhen Chen 0007"},{"@pid":"87/5241","text":"Chuan Ma"},{"@pid":"25/4076","text":"Qiusheng Lian"}]},"title":"Online Feature Selection for Streaming Features Using Self-Adaption Sliding-Window Sampling.","venue":"IEEE Access","volume":"7","pages":"16088-16100","year":"2019","type":"Journal Articles","access":"open","key":"journals/access/YouWSDCML19","doi":"10.1109/ACCESS.2019.2894121","ee":"https://doi.org/10.1109/ACCESS.2019.2894121","url":"https://dblp.org/rec/journals/access/YouWSDCML19"}, "url":"URL#1937332" }, { "@score":"6", "@id":"1980808", "info":{"authors":{"author":[{"@pid":"138/2494","text":"Jipeng Qiang"},{"@pid":"87/6284-10","text":"Yun Li 0010"},{"@pid":"51/7436","text":"Yunhao Yuan"},{"@pid":"49/3283-10","text":"Wei Liu 0010"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"A practical algorithm for solving the sparseness problem of short text clustering.","venue":"Intell. Data Anal.","volume":"23","number":"3","pages":"701-716","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ida/QiangLYLW19","doi":"10.3233/IDA-184045","ee":"https://doi.org/10.3233/IDA-184045","url":"https://dblp.org/rec/journals/ida/QiangLYLW19"}, "url":"URL#1980808" }, { "@score":"6", "@id":"1993916", "info":{"authors":{"author":[{"@pid":"194/4619","text":"Lei Sang"},{"@pid":"09/0-1","text":"Min Xu 0001"},{"@pid":"138/4249","text":"Shengsheng Qian"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Multi-modal multi-view Bayesian semantic embedding for community question answering.","venue":"Neurocomputing","volume":"334","pages":"44-58","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijon/SangXQW19","doi":"10.1016/J.NEUCOM.2018.12.067","ee":"https://doi.org/10.1016/j.neucom.2018.12.067","url":"https://dblp.org/rec/journals/ijon/SangXQW19"}, "url":"URL#1993916" }, { "@score":"6", "@id":"1994369", "info":{"authors":{"author":[{"@pid":"67/4972-6","text":"Yi Zhu 0006"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"60/3675-1","text":"Peipei Li 0001"},{"@pid":"01/1504-2","text":"Yuhong Zhang 0002"},{"@pid":"38/5910","text":"Xuegang Hu"}]},"title":"Transfer learning with deep manifold regularized auto-encoders.","venue":"Neurocomputing","volume":"369","pages":"145-154","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijon/ZhuWLZH19","doi":"10.1016/J.NEUCOM.2019.08.078","ee":"https://doi.org/10.1016/j.neucom.2019.08.078","url":"https://dblp.org/rec/journals/ijon/ZhuWLZH19"}, "url":"URL#1994369" }, { "@score":"6", "@id":"2001686", "info":{"authors":{"author":[{"@pid":"23/5823-8","text":"Peng Zhou 0008"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"60/3675-1","text":"Pei-Pei Li 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Online streaming feature selection using adapted Neighborhood Rough Set.","venue":"Inf. Sci.","volume":"481","pages":"258-279","year":"2019","type":"Journal Articles","access":"closed","key":"journals/isci/ZhouHLW19","doi":"10.1016/J.INS.2018.12.074","ee":"https://doi.org/10.1016/j.ins.2018.12.074","url":"https://dblp.org/rec/journals/isci/ZhouHLW19"}, "url":"URL#2001686" }, { "@score":"6", "@id":"2009885", "info":{"authors":{"author":[{"@pid":"13/7007-2","text":"Lei Li 0002"},{"@pid":"250/2159","text":"Yuqi Chu"},{"@pid":"01/1235-1","text":"Guanfeng Liu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Multi-Objective Optimization-Based Networked Multi-Label Active Learning.","venue":"J. Database Manag.","volume":"30","number":"2","pages":"1-26","year":"2019","type":"Journal Articles","access":"closed","key":"journals/jdm/LiCLW19","doi":"10.4018/JDM.2019040101","ee":"https://doi.org/10.4018/JDM.2019040101","url":"https://dblp.org/rec/journals/jdm/LiCLW19"}, "url":"URL#2009885" }, { "@score":"8", "@id":"2022551", "info":{"authors":{"author":[{"@pid":"97/6864","text":"Minghui Wu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"On big wisdom.","venue":"Knowl. Inf. Syst.","volume":"58","number":"1","pages":"1-8","year":"2019","type":"Journal Articles","access":"closed","key":"journals/kais/WuW19","doi":"10.1007/S10115-018-1282-Y","ee":"https://doi.org/10.1007/s10115-018-1282-y","url":"https://dblp.org/rec/journals/kais/WuW19"}, "url":"URL#2022551" }, { "@score":"6", "@id":"2037825", "info":{"authors":{"author":[{"@pid":"23/5823-8","text":"Peng Zhou 0008"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"60/3675-1","text":"Pei-Pei Li 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"OFS-Density: A novel online streaming feature selection method.","venue":"Pattern Recognit.","volume":"86","pages":"48-61","year":"2019","type":"Journal Articles","access":"closed","key":"journals/pr/ZhouHLW19","doi":"10.1016/J.PATCOG.2018.08.009","ee":"https://doi.org/10.1016/j.patcog.2018.08.009","url":"https://dblp.org/rec/journals/pr/ZhouHLW19"}, "url":"URL#2037825" }, { "@score":"6", "@id":"2062333", "info":{"authors":{"author":[{"@pid":"154/0895","text":"Deepak Puthal"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"22/3939","text":"Surya Nepal"},{"@pid":"68/163-1","text":"Rajiv Ranjan 0001"},{"@pid":"06/2379","text":"Jinjun Chen"}]},"title":"SEEN: A Selective Encryption Method to Ensure Confidentiality for Big Sensing Data Streams.","venue":"IEEE Trans. Big Data","volume":"5","number":"3","pages":"379-392","year":"2019","type":"Journal Articles","access":"closed","key":"journals/tbd/PuthalWNRC19","doi":"10.1109/TBDATA.2017.2702172","ee":"https://doi.org/10.1109/TBDATA.2017.2702172","url":"https://dblp.org/rec/journals/tbd/PuthalWNRC19"}, "url":"URL#2062333" }, { "@score":"6", "@id":"2072273", "info":{"authors":{"author":[{"@pid":"250/6473","text":"Zhaolong Ling"},{"@pid":"52/2586","text":"Kui Yu"},{"@pid":"w/HaoWang-8","text":"Hao Wang 0008"},{"@pid":"61/2115-3","text":"Lin Liu 0003"},{"@pid":"59/622-3","text":"Wei Ding 0003"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"BAMB: A Balanced Markov Blanket Discovery Approach to Feature Selection.","venue":"ACM Trans. Intell. Syst. Technol.","volume":"10","number":"5","pages":"52:1-52:25","year":"2019","type":"Journal Articles","access":"closed","key":"journals/tist/LingYWLDW19","doi":"10.1145/3335676","ee":"https://doi.org/10.1145/3335676","url":"https://dblp.org/rec/journals/tist/LingYWLDW19"}, "url":"URL#2072273" }, { "@score":"6", "@id":"2073994", "info":{"authors":{"author":[{"@pid":"138/2494","text":"Jipeng Qiang"},{"@pid":"33/3675-1","text":"Ping Chen 0001"},{"@pid":"59/622-3","text":"Wei Ding 0003"},{"@pid":"51/6856-7","text":"Tong Wang 0007"},{"@pid":"51/1316","text":"Fei Xie"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Heterogeneous-Length Text Topic Modeling for Reader-Aware Multi-Document Summarization.","venue":"ACM Trans. Knowl. Discov. Data","volume":"13","number":"4","pages":"42:1-42:21","year":"2019","type":"Journal Articles","access":"closed","key":"journals/tkdd/QiangCDWXW19","doi":"10.1145/3333030","ee":"https://doi.org/10.1145/3333030","url":"https://dblp.org/rec/journals/tkdd/QiangCDWXW19"}, "url":"URL#2073994" }, { "@score":"8", "@id":"2074007", "info":{"authors":{"author":[{"@pid":"70/6155-5","text":"Huan Wang 0005"},{"@pid":"25/5536-1","text":"Jia Wu 0001"},{"@pid":"19/3768","text":"Wenbin Hu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Detecting and Assessing Anomalous Evolutionary Behaviors of Nodes in Evolving Social Networks.","venue":"ACM Trans. Knowl. Discov. Data","volume":"13","number":"1","pages":"12:1-12:24","year":"2019","type":"Journal Articles","access":"closed","key":"journals/tkdd/WangWHW19","doi":"10.1145/3299886","ee":"https://doi.org/10.1145/3299886","url":"https://dblp.org/rec/journals/tkdd/WangWHW19"}, "url":"URL#2074007" }, { "@score":"6", "@id":"2074108", "info":{"authors":{"author":[{"@pid":"21/25","text":"Ruqian Lu"},{"@pid":"00/1728","text":"Xiaolong Jin"},{"@pid":"76/2633","text":"Songmao Zhang"},{"@pid":"q/MeikangQiu","text":"Meikang Qiu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"A Study on Big Knowledge and Its Engineering Issues.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"31","number":"9","pages":"1630-1644","year":"2019","type":"Journal Articles","access":"closed","key":"journals/tkde/LuJZQ019","doi":"10.1109/TKDE.2018.2866863","ee":"https://doi.org/10.1109/TKDE.2018.2866863","url":"https://dblp.org/rec/journals/tkde/LuJZQ019"}, "url":"URL#2074108" }, { "@score":"6", "@id":"2074140", "info":{"authors":{"author":[{"@pid":"36/4372","text":"Victor S. Sheng"},{"@pid":"05/3499-15","text":"Jing Zhang 0015"},{"@pid":"29/1758-1","text":"Bin Gu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Majority Voting and Pairing with Multiple Noisy Labeling.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"31","number":"7","pages":"1355-1368","year":"2019","type":"Journal Articles","access":"closed","key":"journals/tkde/ShengZGW19","doi":"10.1109/TKDE.2017.2659740","ee":"https://doi.org/10.1109/TKDE.2017.2659740","url":"https://dblp.org/rec/journals/tkde/ShengZGW19"}, "url":"URL#2074140" }, { "@score":"6", "@id":"2075367", "info":{"authors":{"author":[{"@pid":"17/1876","text":"Zhong-Qiu Zhao"},{"@pid":"25/1888","text":"Peng Zheng"},{"@pid":"223/4104","text":"Shou-tao Xu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Object Detection With Deep Learning: A Review.","venue":"IEEE Trans. Neural Networks Learn. Syst.","volume":"30","number":"11","pages":"3212-3232","year":"2019","type":"Journal Articles","access":"closed","key":"journals/tnn/ZhaoZXW19","doi":"10.1109/TNNLS.2018.2876865","ee":"https://doi.org/10.1109/TNNLS.2018.2876865","url":"https://dblp.org/rec/journals/tnn/ZhaoZXW19"}, "url":"URL#2075367" }, { "@score":"6", "@id":"2076787", "info":{"authors":{"author":[{"@pid":"30/3790-1","text":"He Jiang 0001"},{"@pid":"150/3481","text":"Jingxuan Zhang"},{"@pid":"49/1510","text":"Xiaochen Li"},{"@pid":"85/6484","text":"Zhilei Ren"},{"@pid":"89/6793-1","text":"David Lo 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"17/6264","text":"Zhongxuan Luo"}]},"title":"Recommending New Features from Mobile App Descriptions.","venue":"ACM Trans. Softw. Eng. Methodol.","volume":"28","number":"4","pages":"22:1-22:29","year":"2019","type":"Journal Articles","access":"closed","key":"journals/tosem/JiangZLRLWL19","doi":"10.1145/3344158","ee":"https://doi.org/10.1145/3344158","url":"https://dblp.org/rec/journals/tosem/JiangZLRLWL19"}, "url":"URL#2076787" }, { "@score":"6", "@id":"2086062", "info":{"authors":{"author":[{"@pid":"201/4232","text":"Ege Beyazit"},{"@pid":"245/3442","text":"Jeevithan Alagurajah"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Online Learning from Data Streams with Varying Feature Spaces.","venue":"AAAI","pages":"3232-3239","year":"2019","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/BeyazitA019","doi":"10.1609/AAAI.V33I01.33013232","ee":"https://doi.org/10.1609/aaai.v33i01.33013232","url":"https://dblp.org/rec/conf/aaai/BeyazitA019"}, "url":"URL#2086062" }, { "@score":"8", "@id":"2105417", "info":{"authors":{"author":[{"@pid":"52/328-56","text":"Di Wu 0056"},{"@pid":"65/425-7","text":"Yi He 0007"},{"@pid":"53/5106-1","text":"Xin Luo 0001"},{"@pid":"97/7820-1","text":"Mingsheng Shang 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Online Feature Selection with Capricious Streaming Features: A General Framework.","venue":"IEEE BigData","pages":"683-688","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/bigdataconf/WuH0S019","doi":"10.1109/BIGDATA47090.2019.9006373","ee":"https://doi.org/10.1109/BigData47090.2019.9006373","url":"https://dblp.org/rec/conf/bigdataconf/WuH0S019"}, "url":"URL#2105417" }, { "@score":"6", "@id":"2162704", "info":{"authors":{"author":[{"@pid":"256/7433","text":"Shaojing Sheng"},{"@pid":"23/5823-8","text":"Peng Zhou 0008"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"CEPV: A Tree Structure Information Extraction and Visualization Tool for Big Knowledge Graph.","venue":"ICBK","pages":"221-228","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/icbk/ShengZ019","doi":"10.1109/ICBK.2019.00037","ee":"https://doi.org/10.1109/ICBK.2019.00037","url":"https://dblp.org/rec/conf/icbk/ShengZ019"}, "url":"URL#2162704" }, { "@score":"6", "@id":"2171238", "info":{"authors":{"author":[{"@pid":"233/6456","text":"Shengwei Ji"},{"@pid":"151/4309","text":"Chenyang Bu"},{"@pid":"13/7007-2","text":"Lei Li 0002"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Local Graph Edge Partitioning with a Two-Stage Heuristic Method.","venue":"ICDCS","pages":"228-237","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdcs/JiB0019","doi":"10.1109/ICDCS.2019.00031","ee":"https://doi.org/10.1109/ICDCS.2019.00031","url":"https://dblp.org/rec/conf/icdcs/JiB0019"}, "url":"URL#2171238" }, { "@score":"8", "@id":"2171845", "info":{"authors":{"author":[{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"25/5536-1","text":"Jia Wu 0001"},{"@pid":"204/2416","text":"Xiaoyi Fu"},{"@pid":"137/8316","text":"Jiachen Li"},{"@pid":"23/5823-8","text":"Peng Zhou 0008"},{"@pid":"38/555","text":"Xu Jiang"}]},"title":"Automatic Knowledge Graph Construction: A Report on the 2019 ICDM/ICBK Contest.","venue":"ICDM","pages":"1540-1545","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdm/0001WFLZJ19","doi":"10.1109/ICDM.2019.00204","ee":"https://doi.org/10.1109/ICDM.2019.00204","url":"https://dblp.org/rec/conf/icdm/0001WFLZJ19"}, "url":"URL#2171845" }, { "@score":"6", "@id":"2171971", "info":{"authors":{"author":[{"@pid":"134/0827","text":"Fei Jie"},{"@pid":"213/1553","text":"Chunpai Wang"},{"@pid":"21/3047-1","text":"Feng Chen 0001"},{"@pid":"13/7007-2","text":"Lei Li 0002"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Block-Structured Optimization for Anomalous Pattern Detection in Interdependent Networks.","venue":"ICDM","pages":"1138-1143","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdm/JieWCL019","doi":"10.1109/ICDM.2019.00137","ee":"https://doi.org/10.1109/ICDM.2019.00137","url":"https://dblp.org/rec/conf/icdm/JieWCL019"}, "url":"URL#2171971" }, { "@score":"10", "@id":"2198362", "info":{"authors":{"author":[{"@pid":"65/425-7","text":"Yi He 0007"},{"@pid":"72/8498","text":"Baijun Wu"},{"@pid":"52/328-56","text":"Di Wu 0056"},{"@pid":"201/4232","text":"Ege Beyazit"},{"@pid":"34/1910-8","text":"Sheng Chen 0008"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Online Learning from Capricious Data Streams: A Generative Approach.","venue":"IJCAI","pages":"2491-2497","year":"2019","type":"Conference and Workshop Papers","access":"open","key":"conf/ijcai/HeWWBC019","doi":"10.24963/IJCAI.2019/346","ee":"https://doi.org/10.24963/ijcai.2019/346","url":"https://dblp.org/rec/conf/ijcai/HeWWBC019"}, "url":"URL#2198362" }, { "@score":"6", "@id":"2237805", "info":{"authors":{"author":[{"@pid":"194/4619","text":"Lei Sang"},{"@pid":"09/0-1","text":"Min Xu 0001"},{"@pid":"138/4249","text":"Shengsheng Qian"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"AAANE: Attention-Based Adversarial Autoencoder for Multi-scale Network Embedding.","venue":"PAKDD","pages":"3-14","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/pakdd/SangXQW19","doi":"10.1007/978-3-030-16142-2_1","ee":"https://doi.org/10.1007/978-3-030-16142-2_1","url":"https://dblp.org/rec/conf/pakdd/SangXQW19"}, "url":"URL#2237805" }, { "@score":"8", "@id":"2237830", "info":{"authors":{"author":[{"@pid":"52/328-56","text":"Di Wu 0056"},{"@pid":"53/5106-1","text":"Xin Luo 0001"},{"@pid":"97/7820-1","text":"Mingsheng Shang 0001"},{"@pid":"65/425-7","text":"Yi He 0007"},{"@pid":"05/3838-1","text":"Guoyin Wang 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"A Data-Aware Latent Factor Model for Web Service QoS Prediction.","venue":"PAKDD","pages":"384-399","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/pakdd/WuLSHWW19","doi":"10.1007/978-3-030-16148-4_30","ee":"https://doi.org/10.1007/978-3-030-16148-4_30","url":"https://dblp.org/rec/conf/pakdd/WuLSHWW19"}, "url":"URL#2237830" }, { "@score":"6", "@id":"2240514", "info":{"authors":{"author":[{"@pid":"72/2833-4","text":"Tingting Jiang 0004"},{"@pid":"151/4309","text":"Chenyang Bu"},{"@pid":"67/4972-6","text":"Yi Zhu 0006"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Two-Stage Entity Alignment: Combining Hybrid Knowledge Graph Embedding with Similarity-Based Relation Alignment.","venue":"PRICAI","pages":"162-175","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/pricai/JiangBZ019","doi":"10.1007/978-3-030-29908-8_13","ee":"https://doi.org/10.1007/978-3-030-29908-8_13","url":"https://dblp.org/rec/conf/pricai/JiangBZ019"}, "url":"URL#2240514" }, { "@score":"6", "@id":"2275461", "info":{"authors":{"author":[{"@pid":"80/2651","text":"Yunjun Gao"},{"@pid":"m/RalfMoller","text":"Ralf Möller 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"r/KRamamohanarao","text":"Ramamohanarao Kotagiri"}]},"title":"2019 IEEE International Conference on Big Knowledge, ICBK 2019, Beijing, China, November 10-11, 2019","venue":"ICBK","publisher":"IEEE","year":"2019","type":"Editorship","key":"conf/icbk/2019","ee":"https://ieeexplore.ieee.org/xpl/conhome/8938595/proceeding","url":"https://dblp.org/rec/conf/icbk/2019"}, "url":"URL#2275461" }, { "@score":"6", "@id":"2275556", "info":{"authors":{"author":[{"@pid":"24/2006","text":"Jianyong Wang 0001"},{"@pid":"s/KyuseokShim","text":"Kyuseok Shim"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"2019 IEEE International Conference on Data Mining, ICDM 2019, Beijing, China, November 8-11, 2019","venue":"ICDM","publisher":"IEEE","year":"2019","type":"Editorship","key":"conf/icdm/2019","ee":"https://ieeexplore.ieee.org/xpl/conhome/8961330/proceeding","url":"https://dblp.org/rec/conf/icdm/2019"}, "url":"URL#2275556" }, { "@score":"6", "@id":"2292167", "info":{"authors":{"author":[{"@pid":"138/2494","text":"Jipeng Qiang"},{"@pid":"q/ZQian","text":"Zhenyu Qian"},{"@pid":"87/6284-10","text":"Yun Li 0010"},{"@pid":"51/7436","text":"Yunhao Yuan"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Short Text Topic Modeling Techniques, Applications, and Performance: A Survey.","venue":"CoRR","volume":"abs/1904.07695","year":"2019","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1904-07695","ee":"http://arxiv.org/abs/1904.07695","url":"https://dblp.org/rec/journals/corr/abs-1904-07695"}, "url":"URL#2292167" }, { "@score":"6", "@id":"2306145", "info":{"authors":{"author":[{"@pid":"138/2494","text":"Jipeng Qiang"},{"@pid":"87/6284-10","text":"Yun Li 0010"},{"@pid":"67/4972-6","text":"Yi Zhu 0006"},{"@pid":"51/7436","text":"Yunhao Yuan"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"A Simple BERT-Based Approach for Lexical Simplification.","venue":"CoRR","volume":"abs/1907.06226","year":"2019","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1907-06226","ee":"http://arxiv.org/abs/1907.06226","url":"https://dblp.org/rec/journals/corr/abs-1907-06226"}, "url":"URL#2306145" }, { "@score":"6", "@id":"2326031", "info":{"authors":{"author":[{"@pid":"52/2586","text":"Kui Yu"},{"@pid":"254/1356","text":"Xianjie Guo"},{"@pid":"61/2115-3","text":"Lin Liu 0003"},{"@pid":"20/1583","text":"Jiuyong Li"},{"@pid":"w/HaoWang-8","text":"Hao Wang 0008"},{"@pid":"250/6473","text":"Zhaolong Ling"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Causality-based Feature Selection: Methods and Evaluations.","venue":"CoRR","volume":"abs/1911.07147","year":"2019","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1911-07147","ee":"http://arxiv.org/abs/1911.07147","url":"https://dblp.org/rec/journals/corr/abs-1911-07147"}, "url":"URL#2326031" }, { "@score":"8", "@id":"2348374", "info":{"authors":{"author":[{"@pid":"46/8700","text":"Youxi Wu"},{"@pid":"34/8146","text":"Shasha Li"},{"@pid":"43/6883-3","text":"Jingyu Liu 0003"},{"@pid":"64/1967-15","text":"Lei Guo 0015"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"NETASPNO: Approximate Strict Pattern Matching Under Nonoverlapping Condition.","venue":"IEEE Access","volume":"6","pages":"24350-24361","year":"2018","type":"Journal Articles","access":"open","key":"journals/access/WuLLGW18","doi":"10.1109/ACCESS.2018.2832209","ee":"https://doi.org/10.1109/ACCESS.2018.2832209","url":"https://dblp.org/rec/journals/access/WuLLGW18"}, "url":"URL#2348374" }, { "@score":"6", "@id":"2354126", "info":{"authors":{"author":[{"@pid":"138/2494","text":"Jipeng Qiang"},{"@pid":"87/6284-10","text":"Yun Li 0010"},{"@pid":"51/7436","text":"Yunhao Yuan"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Short text clustering based on Pitman-Yor process mixture model.","venue":"Appl. Intell.","volume":"48","number":"7","pages":"1802-1812","year":"2018","type":"Journal Articles","access":"closed","key":"journals/apin/QiangLYW18","doi":"10.1007/S10489-017-1055-4","ee":"https://doi.org/10.1007/s10489-017-1055-4","url":"https://dblp.org/rec/journals/apin/QiangLYW18"}, "url":"URL#2354126" }, { "@score":"6", "@id":"2382618", "info":{"authors":{"author":[{"@pid":"95/2628","text":"Qingren Wang"},{"@pid":"36/4372","text":"Victor S. Sheng"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Document-specific keyphrase candidate search and ranking.","venue":"Expert Syst. Appl.","volume":"97","pages":"163-176","year":"2018","type":"Journal Articles","access":"closed","key":"journals/eswa/WangSW18","doi":"10.1016/J.ESWA.2017.12.031","ee":"https://doi.org/10.1016/j.eswa.2017.12.031","url":"https://dblp.org/rec/journals/eswa/WangSW18"}, "url":"URL#2382618" }, { "@score":"6", "@id":"2383319", "info":{"authors":{"author":[{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"23/5823-8","text":"Peng Zhou 0008"},{"@pid":"60/3675-1","text":"Pei-Pei Li 0001"},{"@pid":"02/736-21","text":"Jing Wang 0021"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"A survey on online feature selection with streaming features.","venue":"Frontiers Comput. Sci.","volume":"12","number":"3","pages":"479-493","year":"2018","type":"Journal Articles","access":"closed","key":"journals/fcsc/HuZLWW18","doi":"10.1007/S11704-016-5489-3","ee":"https://doi.org/10.1007/s11704-016-5489-3","url":"https://dblp.org/rec/journals/fcsc/HuZLWW18"}, "url":"URL#2383319" }, { "@score":"6", "@id":"2388399", "info":{"authors":{"author":[{"@pid":"97/5351","text":"Huiting Liu"},{"@pid":"23/5672","text":"Lili Wang"},{"@pid":"56/3744","text":"Zhizhong Liu"},{"@pid":"93/4324-10","text":"Peng Zhao 0010"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Efficient pattern matching with periodical wildcards in uncertain sequences.","venue":"Intell. Data Anal.","volume":"22","number":"4","pages":"829-842","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ida/LiuWLZW18","doi":"10.3233/IDA-173435","ee":"https://doi.org/10.3233/IDA-173435","url":"https://dblp.org/rec/journals/ida/LiuWLZW18"}, "url":"URL#2388399" }, { "@score":"6", "@id":"2388401", "info":{"authors":{"author":[{"@pid":"97/5351","text":"Huiting Liu"},{"@pid":"233/0426","text":"Liangquan Yang"},{"@pid":"233/0376","text":"Chao Ling"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Collaborative social deep learning for celebrity recommendation.","venue":"Intell. Data Anal.","volume":"22","number":"6","pages":"1375-1394","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ida/LiuYLW18","doi":"10.3233/IDA-173674","ee":"https://doi.org/10.3233/IDA-173674","url":"https://dblp.org/rec/journals/ida/LiuYLW18"}, "url":"URL#2388401" }, { "@score":"6", "@id":"2388422", "info":{"authors":{"author":[{"@pid":"175/5300","text":"Jiamiao Wang"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"13/7007-2","text":"Lei Li 0002"}]},"title":"A framework for semantic connection based topic evolution with DeepWalk.","venue":"Intell. Data Anal.","volume":"22","number":"1","pages":"211-237","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ida/WangWL18","doi":"10.3233/IDA-163282","ee":"https://doi.org/10.3233/IDA-163282","url":"https://dblp.org/rec/journals/ida/WangWL18"}, "url":"URL#2388422" }, { "@score":"6", "@id":"2408261", "info":{"authors":{"author":[{"@pid":"25/1888","text":"Peng Zheng"},{"@pid":"17/1876","text":"Zhong-Qiu Zhao"},{"@pid":"82/4977-6","text":"Jun Gao 0006"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"A set-level joint sparse representation for image set classification.","venue":"Inf. Sci.","volume":"448-449","pages":"75-90","year":"2018","type":"Journal Articles","access":"closed","key":"journals/isci/ZhengZGW18","doi":"10.1016/J.INS.2018.02.062","ee":"https://doi.org/10.1016/j.ins.2018.02.062","url":"https://dblp.org/rec/journals/isci/ZhengZGW18"}, "url":"URL#2408261" }, { "@score":"6", "@id":"2421711", "info":{"authors":{"author":[{"@pid":"13/7007-2","text":"Lei Li 0002"},{"@pid":"52/564-1","text":"Chuan Zhou 0001"},{"@pid":"47/3877-6","text":"Jianping He 0006"},{"@pid":"175/5300","text":"Jiamiao Wang"},{"@pid":"09/1365-33","text":"Xin Li 0033"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Collective semantic behavior extraction in social networks.","venue":"J. Comput. Sci.","volume":"28","pages":"236-244","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jocs/LiZHWLW18","doi":"10.1016/J.JOCS.2017.11.003","ee":"https://doi.org/10.1016/j.jocs.2017.11.003","url":"https://dblp.org/rec/journals/jocs/LiZHWLW18"}, "url":"URL#2421711" }, { "@score":"6", "@id":"2427506", "info":{"authors":{"author":{"@pid":"59/4107","text":"Xindong Wu 0001"}},"title":"Welcoming two new Co-Editors-in-Chief for KAIS.","venue":"Knowl. Inf. Syst.","volume":"54","number":"1","pages":"1-3","year":"2018","type":"Journal Articles","access":"closed","key":"journals/kais/Wu18","doi":"10.1007/S10115-018-1153-6","ee":"https://doi.org/10.1007/s10115-018-1153-6","url":"https://dblp.org/rec/journals/kais/Wu18"}, "url":"URL#2427506" }, { "@score":"6", "@id":"2438934", "info":{"authors":{"author":[{"@pid":"44/6570","text":"Dan Guo"},{"@pid":"198/7215","text":"Ermao Yuan"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Co-occurrence pattern mining based on a biological approximation scoring matrix.","venue":"Pattern Anal. Appl.","volume":"21","number":"4","pages":"977-996","year":"2018","type":"Journal Articles","access":"closed","key":"journals/paa/GuoYHW18","doi":"10.1007/S10044-017-0609-8","ee":"https://doi.org/10.1007/s10044-017-0609-8","url":"https://dblp.org/rec/journals/paa/GuoYHW18"}, "url":"URL#2438934" }, { "@score":"6", "@id":"2438951", "info":{"authors":{"author":[{"@pid":"82/385-9","text":"Na Liu 0009"},{"@pid":"51/1316","text":"Fei Xie"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Multi-pattern matching with variable-length wildcards using suffix tree.","venue":"Pattern Anal. Appl.","volume":"21","number":"4","pages":"1151-1165","year":"2018","type":"Journal Articles","access":"closed","key":"journals/paa/LiuXW18","doi":"10.1007/S10044-018-0733-0","ee":"https://doi.org/10.1007/s10044-018-0733-0","url":"https://dblp.org/rec/journals/paa/LiuXW18"}, "url":"URL#2438951" }, { "@score":"6", "@id":"2466927", "info":{"authors":{"author":[{"@pid":"51/5022-3","text":"Jun Huang 0003"},{"@pid":"28/4782","text":"Guorong Li"},{"@pid":"68/4388","text":"Qingming Huang"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Joint Feature Selection and Classification for Multilabel Learning.","venue":"IEEE Trans. Cybern.","volume":"48","number":"3","pages":"876-889","year":"2018","type":"Journal Articles","access":"closed","key":"journals/tcyb/HuangLHW18","doi":"10.1109/TCYB.2017.2663838","ee":"https://doi.org/10.1109/TCYB.2017.2663838","url":"https://dblp.org/rec/journals/tcyb/HuangLHW18"}, "url":"URL#2466927" }, { "@score":"6", "@id":"2466949", "info":{"authors":{"author":[{"@pid":"60/3675-1","text":"Pei-Pei Li 0001"},{"@pid":"88/7484","text":"Lu He"},{"@pid":"27/59","text":"Haiyan Wang"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"01/1504-2","text":"Yuhong Zhang 0002"},{"@pid":"13/7007-2","text":"Lei Li 0002"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Learning From Short Text Streams With Topic Drifts.","venue":"IEEE Trans. Cybern.","volume":"48","number":"9","pages":"2697-2711","year":"2018","type":"Journal Articles","access":"closed","key":"journals/tcyb/LiHWHZLW18","doi":"10.1109/TCYB.2017.2748598","ee":"https://doi.org/10.1109/TCYB.2017.2748598","url":"https://dblp.org/rec/journals/tcyb/LiHWHZLW18"}, "url":"URL#2466949" }, { "@score":"8", "@id":"2467060", "info":{"authors":{"author":[{"@pid":"46/8700","text":"Youxi Wu"},{"@pid":"191/5726","text":"Yao Tong"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"NOSEP: Nonoverlapping Sequence Pattern Mining With Gap Constraints.","venue":"IEEE Trans. Cybern.","volume":"48","number":"10","pages":"2809-2822","year":"2018","type":"Journal Articles","access":"open","key":"journals/tcyb/WuTZW18","doi":"10.1109/TCYB.2017.2750691","ee":"https://doi.org/10.1109/TCYB.2017.2750691","url":"https://dblp.org/rec/journals/tcyb/WuTZW18"}, "url":"URL#2467060" }, { "@score":"6", "@id":"2467079", "info":{"authors":{"author":[{"@pid":"00/5867","text":"Chao Yang"},{"@pid":"78/6365-1","text":"Hongbo Liu 0001"},{"@pid":"35/1723","text":"Seán F. McLoone"},{"@pid":"48/4856","text":"C. L. Philip Chen"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"A Novel Variable Precision Reduction Approach to Comprehensive Knowledge Systems.","venue":"IEEE Trans. Cybern.","volume":"48","number":"2","pages":"661-674","year":"2018","type":"Journal Articles","access":"closed","key":"journals/tcyb/YangLMCW18","doi":"10.1109/TCYB.2017.2648824","ee":"https://doi.org/10.1109/TCYB.2017.2648824","url":"https://dblp.org/rec/journals/tcyb/YangLMCW18"}, "url":"URL#2467079" }, { "@score":"6", "@id":"2473131", "info":{"authors":{"author":[{"@pid":"77/6919","text":"Shaojie Qiao"},{"@pid":"84/8629","text":"Nan Han"},{"@pid":"15/885-3","text":"Junfeng Wang 0003"},{"@pid":"37/548","text":"Rong-Hua Li"},{"@pid":"163/3253","text":"Louis Alberto Gutierrez"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Predicting Long-Term Trajectories of Connected Vehicles via the Prefix-Projection Technique.","venue":"IEEE Trans. Intell. Transp. Syst.","volume":"19","number":"7","pages":"2305-2315","year":"2018","type":"Journal Articles","access":"closed","key":"journals/tits/QiaoHWLGW18","doi":"10.1109/TITS.2017.2750075","ee":"https://doi.org/10.1109/TITS.2017.2750075","url":"https://dblp.org/rec/journals/tits/QiaoHWLGW18"}, "url":"URL#2473131" }, { "@score":"6", "@id":"2473666", "info":{"authors":{"author":[{"@pid":"60/3675-1","text":"Pei-Pei Li 0001"},{"@pid":"w/HaixunWang","text":"Haixun Wang"},{"@pid":"19/6359","text":"Hongsong Li"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Employing Semantic Context for Sparse Information Extraction Assessment.","venue":"ACM Trans. Knowl. Discov. Data","volume":"12","number":"5","pages":"54:1-54:36","year":"2018","type":"Journal Articles","access":"closed","key":"journals/tkdd/LiWLW18","doi":"10.1145/3201407","ee":"https://doi.org/10.1145/3201407","url":"https://dblp.org/rec/journals/tkdd/LiWLW18"}, "url":"URL#2473666" }, { "@score":"6", "@id":"2473697", "info":{"authors":{"author":[{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"a/CharuCAggarwal","text":"Charu C. Aggarwal"}]},"title":"Editorial: TKDD Special Issue on Interactive Data Exploration and Analytics.","venue":"ACM Trans. Knowl. Discov. Data","volume":"12","number":"1","pages":"1:1","year":"2018","type":"Journal Articles","access":"closed","key":"journals/tkdd/WuA18","doi":"10.1145/3181707","ee":"https://doi.org/10.1145/3181707","url":"https://dblp.org/rec/journals/tkdd/WuA18"}, "url":"URL#2473697" }, { "@score":"6", "@id":"2473811", "info":{"authors":{"author":[{"@pid":"77/6919","text":"Shaojie Qiao"},{"@pid":"84/8629","text":"Nan Han"},{"@pid":"80/2651","text":"Yunjun Gao"},{"@pid":"37/548","text":"Rong-Hua Li"},{"@pid":"80/5460","text":"Jianbin Huang"},{"@pid":"73/273","text":"Jun Guo"},{"@pid":"163/3253","text":"Louis Alberto Gutierrez"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"A Fast Parallel Community Discovery Model on Complex Networks Through Approximate Optimization.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"30","number":"9","pages":"1638-1651","year":"2018","type":"Journal Articles","access":"closed","key":"journals/tkde/QiaoHGLHGGW18","doi":"10.1109/TKDE.2018.2803818","ee":"https://doi.org/10.1109/TKDE.2018.2803818","url":"https://dblp.org/rec/journals/tkde/QiaoHGLHGGW18"}, "url":"URL#2473811" }, { "@score":"8", "@id":"2473848", "info":{"authors":{"author":[{"@pid":"25/5536-1","text":"Jia Wu 0001"},{"@pid":"91/8171","text":"Shirui Pan"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"71/964","text":"Chengqi Zhang"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Multi-Instance Learning with Discriminative Bag Mapping.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"30","number":"6","pages":"1065-1080","year":"2018","type":"Journal Articles","access":"closed","key":"journals/tkde/WuPZZW18","doi":"10.1109/TKDE.2017.2788430","ee":"https://doi.org/10.1109/TKDE.2017.2788430","url":"https://dblp.org/rec/journals/tkde/WuPZZW18"}, "url":"URL#2473848" }, { "@score":"6", "@id":"2475309", "info":{"authors":{"author":[{"@pid":"05/3499-15","text":"Jing Zhang 0015"},{"@pid":"36/4372","text":"Victor S. Sheng"},{"@pid":"75/4601-1","text":"Tao Li 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Improving Crowdsourced Label Quality Using Noise Correction.","venue":"IEEE Trans. Neural Networks Learn. Syst.","volume":"29","number":"5","pages":"1675-1688","year":"2018","type":"Journal Articles","access":"closed","key":"journals/tnn/ZhangSLW18","doi":"10.1109/TNNLS.2017.2677468","ee":"https://doi.org/10.1109/TNNLS.2017.2677468","url":"https://dblp.org/rec/journals/tnn/ZhangSLW18"}, "url":"URL#2475309" }, { "@score":"6", "@id":"2552532", "info":{"authors":{"author":{"@pid":"59/4107","text":"Xindong Wu 0001"}},"title":"Knowledge Graph for Public Security Analytics.","venue":"KDIR","pages":"17-31","year":"2018","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/ic3k/Wu18","url":"https://dblp.org/rec/conf/ic3k/Wu18"}, "url":"URL#2552532" }, { "@score":"6", "@id":"2554557", "info":{"authors":{"author":[{"@pid":"201/4232","text":"Ege Beyazit"},{"@pid":"214/6992","text":"Matin Hosseini"},{"@pid":"98/4656","text":"Anthony Maida"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Learning Simplified Decision Boundaries from Trapezoidal Data Streams.","venue":"ICANN","pages":"508-517","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/icann/BeyazitHMW18","doi":"10.1007/978-3-030-01418-6_50","ee":"https://doi.org/10.1007/978-3-030-01418-6_50","url":"https://dblp.org/rec/conf/icann/BeyazitHMW18"}, "url":"URL#2554557" }, { "@score":"6", "@id":"2557063", "info":{"authors":{"author":[{"@pid":"204/2416","text":"Xiaoyi Fu"},{"@pid":"55/955","text":"Xinqi Ren"},{"@pid":"58/2801","text":"Ole J. Mengshoel"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Stochastic Optimization for Market Return Prediction Using Financial Knowledge Graph.","venue":"ICBK","pages":"25-32","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/icbk/FuRMW18","doi":"10.1109/ICBK.2018.00012","ee":"https://doi.org/10.1109/ICBK.2018.00012","url":"https://dblp.org/rec/conf/icbk/FuRMW18"}, "url":"URL#2557063" }, { "@score":"6", "@id":"2557102", "info":{"authors":{"author":[{"@pid":"87/10304","text":"Dianlong You"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"71/3634","text":"Limin Shen"},{"@pid":"11/1266-7","text":"Zhen Chen 0007"},{"@pid":"87/5241","text":"Chuan Ma"},{"@pid":"66/10594","text":"Song Deng"}]},"title":"Online Feature Selection for Streaming Features with High Redundancy Using Sliding-Window Sampling.","venue":"ICBK","pages":"205-212","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/icbk/YouWSCMD18","doi":"10.1109/ICBK.2018.00035","ee":"https://doi.org/10.1109/ICBK.2018.00035","url":"https://dblp.org/rec/conf/icbk/YouWSCMD18"}, "url":"URL#2557102" }, { "@score":"6", "@id":"2563595", "info":{"authors":{"author":[{"@pid":"175/5300","text":"Jiamiao Wang"},{"@pid":"17/1237-6","text":"Ling Chen 0006"},{"@pid":"51/5585","text":"Lu Qin 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"ASTM: An Attentional Segmentation Based Topic Model for Short Texts.","venue":"ICDM","pages":"577-586","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdm/Wang0QW18","doi":"10.1109/ICDM.2018.00073","ee":"https://doi.org/10.1109/ICDM.2018.00073","url":"https://dblp.org/rec/conf/icdm/Wang0QW18"}, "url":"URL#2563595" }, { "@score":"8", "@id":"2563619", "info":{"authors":{"author":[{"@pid":"97/6864","text":"Minghui Wu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"On Big Wisdom.","venue":"ICDM","pages":"1-2","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdm/WuW18","doi":"10.1109/ICDM.2018.00009","ee":"https://doi.org/10.1109/ICDM.2018.00009","url":"https://dblp.org/rec/conf/icdm/WuW18"}, "url":"URL#2563619" }, { "@score":"6", "@id":"2563647", "info":{"authors":{"author":[{"@pid":"41/8967","text":"Guoxian Yu"},{"@pid":"06/1899-4","text":"Xia Chen 0004"},{"@pid":"50/5158","text":"Carlotta Domeniconi"},{"@pid":"125/8189-35","text":"Jun Wang 0035"},{"@pid":"l/ZhaoLi-7","text":"Zhao Li 0007"},{"@pid":"17/1185-1","text":"Zili Zhang 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Feature-Induced Partial Multi-label Learning.","venue":"ICDM","pages":"1398-1403","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdm/YuCDWLZW18","doi":"10.1109/ICDM.2018.00192","ee":"https://doi.org/10.1109/ICDM.2018.00192","url":"https://dblp.org/rec/conf/icdm/YuCDWLZW18"}, "url":"URL#2563647" }, { "@score":"8", "@id":"2579502", "info":{"authors":{"author":[{"@pid":"65/425-7","text":"Yi He 0007"},{"@pid":"52/328-56","text":"Di Wu 0056"},{"@pid":"201/4232","text":"Ege Beyazit"},{"@pid":"190/0419","text":"Xiaoduan Sun"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Supervised Data Synthesizing and Evolving - A Framework for Real-World Traffic Crash Severity Classification.","venue":"ICTAI","pages":"163-170","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/ictai/HeWBSW18","doi":"10.1109/ICTAI.2018.00034","ee":"https://doi.org/10.1109/ICTAI.2018.00034","url":"https://dblp.org/rec/conf/ictai/HeWBSW18"}, "url":"URL#2579502" }, { "@score":"6", "@id":"2608691", "info":{"authors":{"author":[{"@pid":"170/5786","text":"Weijie Fu"},{"@pid":"93/6765-1","text":"Meng Wang 0001"},{"@pid":"122/3198","text":"Shijie Hao"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Scalable Active Learning by Approximated Error Reduction.","venue":"KDD","pages":"1396-1405","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/FuWHW18","doi":"10.1145/3219819.3219954","ee":"https://doi.org/10.1145/3219819.3219954","url":"https://dblp.org/rec/conf/kdd/FuWHW18"}, "url":"URL#2608691" }, { "@score":"6", "@id":"2608919", "info":{"authors":{"author":[{"@pid":"05/3499-15","text":"Jing Zhang 0015"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Multi-Label Inference for Crowdsourcing.","venue":"KDD","pages":"2738-2747","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ZhangW18","doi":"10.1145/3219819.3219958","ee":"https://doi.org/10.1145/3219819.3219958","url":"https://dblp.org/rec/conf/kdd/ZhangW18"}, "url":"URL#2608919" }, { "@score":"6", "@id":"2662879", "info":{"authors":{"author":[{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"64/4136","text":"Yew-Soon Ong"},{"@pid":"a/CharuCAggarwal","text":"Charu C. Aggarwal"},{"@pid":"72/5816","text":"Huanhuan Chen"}]},"title":"2018 IEEE International Conference on Big Knowledge, ICBK 2018, Singapore, November 17-18, 2018","venue":"ICBK","publisher":"IEEE Computer Society","year":"2018","type":"Editorship","key":"conf/icbk/2018","ee":"https://ieeexplore.ieee.org/xpl/conhome/8588287/proceeding","url":"https://dblp.org/rec/conf/icbk/2018"}, "url":"URL#2662879" }, { "@score":"6", "@id":"2676223", "info":{"authors":{"author":[{"@pid":"194/4619","text":"Lei Sang"},{"@pid":"09/0-1","text":"Min Xu 0001"},{"@pid":"138/4249","text":"Shengsheng Qian"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"AAANE: Attention-based Adversarial Autoencoder for Multi-scale Network Embedding.","venue":"CoRR","volume":"abs/1803.09080","year":"2018","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1803-09080","ee":"http://arxiv.org/abs/1803.09080","url":"https://dblp.org/rec/journals/corr/abs-1803-09080"}, "url":"URL#2676223" }, { "@score":"6", "@id":"2689236", "info":{"authors":{"author":[{"@pid":"17/1876","text":"Zhong-Qiu Zhao"},{"@pid":"25/1888","text":"Peng Zheng"},{"@pid":"223/4104","text":"Shou-tao Xu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Object Detection with Deep Learning: A Review.","venue":"CoRR","volume":"abs/1807.05511","year":"2018","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1807-05511","ee":"http://arxiv.org/abs/1807.05511","url":"https://dblp.org/rec/journals/corr/abs-1807-05511"}, "url":"URL#2689236" }, { "@score":"6", "@id":"2691757", "info":{"authors":{"author":[{"@pid":"138/2494","text":"Jipeng Qiang"},{"@pid":"87/6284-10","text":"Yun Li 0010"},{"@pid":"51/7436","text":"Yunhao Yuan"},{"@pid":"49/3283-10","text":"Wei Liu 0010"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"STTM: A Tool for Short Text Topic Modeling.","venue":"CoRR","volume":"abs/1808.02215","year":"2018","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1808-02215","ee":"http://arxiv.org/abs/1808.02215","url":"https://dblp.org/rec/journals/corr/abs-1808-02215"}, "url":"URL#2691757" }, { "@score":"12", "@id":"2720760", "info":{"authors":{"author":[{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"72/5816","text":"Huanhuan Chen"},{"@pid":"95/3736-2","text":"Jun Liu 0002"},{"@pid":"63/6340","text":"Gong-Qing Wu"},{"@pid":"21/25","text":"Ruqian Lu"},{"@pid":"07/256-1","text":"Nanning Zheng 0001"}]},"title":"Knowledge Engineering With Big Data (BigKE): A 54-Month, 45-Million RMB, 15-Institution National Grand Project.","venue":"IEEE Access","volume":"5","pages":"12696-12701","year":"2017","type":"Journal Articles","access":"open","key":"journals/access/WuCLWLZ17","doi":"10.1109/ACCESS.2017.2710298","ee":"https://doi.org/10.1109/ACCESS.2017.2710298","url":"https://dblp.org/rec/journals/access/WuCLWLZ17"}, "url":"URL#2720760" }, { "@score":"6", "@id":"2730834", "info":{"authors":{"author":[{"@pid":"175/5300","text":"Jiamiao Wang"},{"@pid":"13/7007-2","text":"Lei Li 0002"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"LDA-Based Topic Strength Analysis.","venue":"Comput. Informatics","volume":"36","number":"6","pages":"1283-1311","year":"2017","type":"Journal Articles","access":"closed","key":"journals/cai/WangLW17","doi":"10.4149/CAI_2017_6_1283","ee":"https://doi.org/10.4149/cai_2017_6_1283","url":"https://dblp.org/rec/journals/cai/WangLW17"}, "url":"URL#2730834" }, { "@score":"8", "@id":"2735063", "info":{"authors":{"author":[{"@pid":"46/8700","text":"Youxi Wu"},{"@pid":"79/6027","text":"Cong Shen"},{"@pid":"30/3790-1","text":"He Jiang 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Strict pattern matching under non-overlapping condition.","venue":"Sci. China Inf. Sci.","volume":"60","number":"1","pages":"12101","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/WuSJW17","doi":"10.1007/S11432-015-0935-3","ee":"https://doi.org/10.1007/s11432-015-0935-3","url":"https://dblp.org/rec/journals/chinaf/WuSJW17"}, "url":"URL#2735063" }, { "@score":"6", "@id":"2749429", "info":{"authors":{"author":[{"@pid":"29/265-1","text":"Jian Jiao 0001"},{"@pid":"191/6509","text":"Xindong Sui"},{"@pid":"145/5359","text":"Shushi Gu"},{"@pid":"82/4227","text":"Shaohua Wu"},{"@pid":"10/2002","text":"Qinyu Zhang 0001"}]},"title":"Partially Observable Markov Decision Process-Based Transmission Policy over Ka-Band Channels for Space Information Networks.","venue":"Entropy","volume":"19","number":"10","pages":"510","year":"2017","type":"Journal Articles","access":"open","key":"journals/entropy/JiaoSGWZ17","doi":"10.3390/E19100510","ee":"https://doi.org/10.3390/e19100510","url":"https://dblp.org/rec/journals/entropy/JiaoSGWZ17"}, "url":"URL#2749429" }, { "@score":"6", "@id":"2769356", "info":{"authors":{"author":[{"@pid":"01/1504-2","text":"Yuhong Zhang 0002"},{"@pid":"202/6192","text":"Guang Chu"},{"@pid":"60/3675-1","text":"Pei-Pei Li 0001"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Three-layer concept drifting detection in text data streams.","venue":"Neurocomputing","volume":"260","pages":"393-403","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijon/ZhangCLHW17","doi":"10.1016/J.NEUCOM.2017.04.047","ee":"https://doi.org/10.1016/j.neucom.2017.04.047","url":"https://dblp.org/rec/journals/ijon/ZhangCLHW17"}, "url":"URL#2769356" }, { "@score":"8", "@id":"2775457", "info":{"authors":{"author":[{"@pid":"05/3499-15","text":"Jing Zhang 0015"},{"@pid":"36/4372","text":"Victor S. Sheng"},{"@pid":"31/2728","text":"Qianmu Li"},{"@pid":"96/2744-2","text":"Jian Wu 0002"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Consensus algorithms for biased labeling in crowdsourcing.","venue":"Inf. Sci.","volume":"382-383","pages":"254-273","year":"2017","type":"Journal Articles","access":"closed","key":"journals/isci/ZhangSLWW17","doi":"10.1016/J.INS.2016.12.026","ee":"https://doi.org/10.1016/j.ins.2016.12.026","url":"https://dblp.org/rec/journals/isci/ZhangSLWW17"}, "url":"URL#2775457" }, { "@score":"6", "@id":"2794475", "info":{"authors":{"author":[{"@pid":"51/1316","text":"Fei Xie"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"}]},"title":"Efficient sequential pattern mining with wildcards for keyphrase extraction.","venue":"Knowl. Based Syst.","volume":"115","pages":"27-39","year":"2017","type":"Journal Articles","access":"closed","key":"journals/kbs/XieWZ17","doi":"10.1016/J.KNOSYS.2016.10.011","ee":"https://doi.org/10.1016/j.knosys.2016.10.011","url":"https://dblp.org/rec/journals/kbs/XieWZ17"}, "url":"URL#2794475" }, { "@score":"6", "@id":"2794513", "info":{"authors":{"author":[{"@pid":"23/5823-8","text":"Peng Zhou 0008"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"60/3675-1","text":"Pei-Pei Li 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Online feature selection for high-dimensional class-imbalanced data.","venue":"Knowl. Based Syst.","volume":"136","pages":"187-199","year":"2017","type":"Journal Articles","access":"closed","key":"journals/kbs/ZhouHLW17","doi":"10.1016/J.KNOSYS.2017.09.006","ee":"https://doi.org/10.1016/j.knosys.2017.09.006","url":"https://dblp.org/rec/journals/kbs/ZhouHLW17"}, "url":"URL#2794513" }, { "@score":"8", "@id":"2807686", "info":{"authors":{"author":[{"@pid":"142/8139","text":"Dongkuan Xu"},{"@pid":"25/5536-1","text":"Jia Wu 0001"},{"@pid":"42/8133-2","text":"Dewei Li 0002"},{"@pid":"83/2547","text":"Yingjie Tian 0001"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"SALE: Self-adaptive LSH encoding for multi-instance learning.","venue":"Pattern Recognit.","volume":"71","pages":"460-482","year":"2017","type":"Journal Articles","access":"closed","key":"journals/pr/XuWLTZW17","doi":"10.1016/J.PATCOG.2017.04.029","ee":"https://doi.org/10.1016/j.patcog.2017.04.029","url":"https://dblp.org/rec/journals/pr/XuWLTZW17"}, "url":"URL#2807686" }, { "@score":"6", "@id":"2807739", "info":{"authors":{"author":[{"@pid":"25/1888","text":"Peng Zheng"},{"@pid":"17/1876","text":"Zhong-Qiu Zhao"},{"@pid":"82/4977-6","text":"Jun Gao 0006"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Image set classification based on cooperative sparse representation.","venue":"Pattern Recognit.","volume":"63","pages":"206-217","year":"2017","type":"Journal Articles","access":"closed","key":"journals/pr/ZhengZGW17","doi":"10.1016/J.PATCOG.2016.09.043","ee":"https://doi.org/10.1016/j.patcog.2016.09.043","url":"https://dblp.org/rec/journals/pr/ZhengZGW17"}, "url":"URL#2807739" }, { "@score":"8", "@id":"2828590", "info":{"authors":{"author":[{"@pid":"25/5536-1","text":"Jia Wu 0001"},{"@pid":"91/8171","text":"Shirui Pan"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"71/964","text":"Chengqi Zhang"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Positive and Unlabeled Multi-Graph Learning.","venue":"IEEE Trans. Cybern.","volume":"47","number":"4","pages":"818-829","year":"2017","type":"Journal Articles","access":"closed","key":"journals/tcyb/WuPZZW17","doi":"10.1109/TCYB.2016.2527239","ee":"https://doi.org/10.1109/TCYB.2016.2527239","url":"https://dblp.org/rec/journals/tcyb/WuPZZW17"}, "url":"URL#2828590" }, { "@score":"6", "@id":"2829673", "info":{"authors":{"author":[{"@pid":"123/4939","text":"Yaojin Lin"},{"@pid":"30/2395","text":"Qinghua Hu"},{"@pid":"71/10082","text":"Jinghua Liu"},{"@pid":"05/7569-1","text":"Jinjin Li 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Streaming Feature Selection for Multilabel Learning Based on Fuzzy Mutual Information.","venue":"IEEE Trans. Fuzzy Syst.","volume":"25","number":"6","pages":"1491-1507","year":"2017","type":"Journal Articles","access":"closed","key":"journals/tfs/LinHLLW17","doi":"10.1109/TFUZZ.2017.2735947","ee":"https://doi.org/10.1109/TFUZZ.2017.2735947","url":"https://dblp.org/rec/journals/tfs/LinHLLW17"}, "url":"URL#2829673" }, { "@score":"6", "@id":"2834412", "info":{"authors":{"author":[{"@pid":"87/254","text":"Binxing Fang"},{"@pid":"24/1403-1","text":"Yan Jia 0001"},{"@pid":"46/5404-3","text":"Xiaoyong Li 0003"},{"@pid":"33/5220","text":"Aiping Li"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Big Search in Cyberspace.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"29","number":"9","pages":"1793-1805","year":"2017","type":"Journal Articles","access":"closed","key":"journals/tkde/FangJLLW17","doi":"10.1109/TKDE.2017.2699675","ee":"https://doi.org/10.1109/TKDE.2017.2699675","url":"https://dblp.org/rec/journals/tkde/FangJLLW17"}, "url":"URL#2834412" }, { "@score":"6", "@id":"2834429", "info":{"authors":{"author":[{"@pid":"59/1501","text":"Richang Hong"},{"@pid":"76/4276","text":"Chuan He"},{"@pid":"39/844","text":"Yong Ge"},{"@pid":"93/6765-1","text":"Meng Wang 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"User Vitality Ranking and Prediction in Social Networking Services: A Dynamic Network Perspective.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"29","number":"6","pages":"1343-1356","year":"2017","type":"Journal Articles","access":"closed","key":"journals/tkde/HongHGWW17","doi":"10.1109/TKDE.2017.2672749","ee":"https://doi.org/10.1109/TKDE.2017.2672749","url":"https://dblp.org/rec/journals/tkde/HongHGWW17"}, "url":"URL#2834429" }, { "@score":"6", "@id":"2834516", "info":{"authors":{"author":[{"@pid":"93/6765-1","text":"Meng Wang 0001"},{"@pid":"170/5786","text":"Weijie Fu"},{"@pid":"122/3198","text":"Shijie Hao"},{"@pid":"69/6532","text":"Hengchang Liu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Learning on Big Graph: Label Inference and Regularization with Anchor Hierarchy.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"29","number":"5","pages":"1101-1114","year":"2017","type":"Journal Articles","access":"closed","key":"journals/tkde/WangFHLW17","doi":"10.1109/TKDE.2017.2654445","ee":"https://doi.org/10.1109/TKDE.2017.2654445","url":"https://dblp.org/rec/journals/tkde/WangFHLW17"}, "url":"URL#2834516" }, { "@score":"6", "@id":"2834527", "info":{"authors":{"author":[{"@pid":"163/0767","text":"Haishuai Wang"},{"@pid":"21/1048-1","text":"Peng Zhang 0001"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"35/5873","text":"Ivor Wai-Hung Tsang"},{"@pid":"17/1237-6","text":"Ling Chen 0006"},{"@pid":"71/964","text":"Chengqi Zhang"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Incremental Subgraph Feature Selection for Graph Classification.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"29","number":"1","pages":"128-142","year":"2017","type":"Journal Articles","access":"closed","key":"journals/tkde/WangZZTCZW17","doi":"10.1109/TKDE.2016.2616305","ee":"https://doi.org/10.1109/TKDE.2016.2616305","url":"https://dblp.org/rec/journals/tkde/WangZZTCZW17"}, "url":"URL#2834527" }, { "@score":"8", "@id":"2835494", "info":{"authors":{"author":[{"@pid":"d/ShuiguangDeng","text":"ShuiGuang Deng"},{"@pid":"76/10119","text":"Longtao Huang"},{"@pid":"59/2340","text":"Guandong Xu"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"54/6252-1","text":"Zhaohui Wu 0001"}]},"title":"On Deep Learning for Trust-Aware Recommendations in Social Networks.","venue":"IEEE Trans. Neural Networks Learn. Syst.","volume":"28","number":"5","pages":"1164-1177","year":"2017","type":"Journal Articles","access":"closed","key":"journals/tnn/DengHXWW17","doi":"10.1109/TNNLS.2016.2514368","ee":"https://doi.org/10.1109/TNNLS.2016.2514368","url":"https://dblp.org/rec/journals/tnn/DengHXWW17"}, "url":"URL#2835494" }, { "@score":"6", "@id":"2835694", "info":{"authors":{"author":[{"@pid":"52/2586","text":"Kui Yu"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"59/622-3","text":"Wei Ding 0003"},{"@pid":"32/7620","text":"Yang Mu"},{"@pid":"w/HaoWang-8","text":"Hao Wang 0008"}]},"title":"Markov Blanket Feature Selection Using Representative Sets.","venue":"IEEE Trans. Neural Networks Learn. Syst.","volume":"28","number":"11","pages":"2775-2788","year":"2017","type":"Journal Articles","access":"closed","key":"journals/tnn/YuWDMW17","doi":"10.1109/TNNLS.2016.2602365","ee":"https://doi.org/10.1109/TNNLS.2016.2602365","url":"https://dblp.org/rec/journals/tnn/YuWDMW17"}, "url":"URL#2835694" }, { "@score":"6", "@id":"2835719", "info":{"authors":{"author":[{"@pid":"60/4671-1","text":"Xiaofeng Zhu 0001"},{"@pid":"l/XuelongLi","text":"Xuelong Li 0001"},{"@pid":"z/ShichaoZhang","text":"Shichao Zhang"},{"@pid":"69/4435","text":"Chunhua Ju"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Robust Joint Graph Sparse Coding for Unsupervised Spectral Feature Selection.","venue":"IEEE Trans. Neural Networks Learn. Syst.","volume":"28","number":"6","pages":"1263-1275","year":"2017","type":"Journal Articles","access":"closed","key":"journals/tnn/ZhuLZJW17","doi":"10.1109/TNNLS.2016.2521602","ee":"https://doi.org/10.1109/TNNLS.2016.2521602","url":"https://dblp.org/rec/journals/tnn/ZhuLZJW17"}, "url":"URL#2835719" }, { "@score":"6", "@id":"2838069", "info":{"authors":{"author":[{"@pid":"118/3076","text":"Xindong Liu"},{"@pid":"78/7533","text":"Mohammad Shahidehpour"},{"@pid":"37/2047","text":"Yijia Cao"},{"@pid":"68/5597-4","text":"Lei Wu 0004"},{"@pid":"24/4105-7","text":"Wei Wei 0007"},{"@pid":"13/5407-3","text":"Xuan Liu 0003"}]},"title":"Microgrid Risk Analysis Considering the Impact of Cyber Attacks on Solar PV and ESS Control Systems.","venue":"IEEE Trans. Smart Grid","volume":"8","number":"3","pages":"1330-1339","year":"2017","type":"Journal Articles","access":"closed","key":"journals/tsg/LiuSCWWL17","doi":"10.1109/TSG.2016.2622289","ee":"https://doi.org/10.1109/TSG.2016.2622289","url":"https://dblp.org/rec/journals/tsg/LiuSCWWL17"}, "url":"URL#2838069" }, { "@score":"6", "@id":"2846947", "info":{"authors":{"author":[{"@pid":"95/2628","text":"Qingren Wang"},{"@pid":"36/4372","text":"Victor S. Sheng"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Keyphrase Extraction with Sequential Pattern Mining.","venue":"AAAI","pages":"5003-5004","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/WangSW17","doi":"10.1609/AAAI.V31I1.11075","ee":"https://doi.org/10.1609/aaai.v31i1.11075","url":"https://dblp.org/rec/conf/aaai/WangSW17"}, "url":"URL#2846947" }, { "@score":"8", "@id":"2881358", "info":{"authors":{"author":[{"@pid":"191/6509","text":"Xindong Sui"},{"@pid":"29/265-1","text":"Jian Jiao 0001"},{"@pid":"145/5359","text":"Shushi Gu"},{"@pid":"82/4227","text":"Shaohua Wu"},{"@pid":"10/2002","text":"Qinyu Zhang 0001"},{"@pid":"71/9559","text":"Weiqiang Wu"}]},"title":"Optimal Transmission Policy Based on POMDP over Ka-Band Channels in SINs.","venue":"CSPS","pages":"1133-1140","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csps/SuiJGWZW17","doi":"10.1007/978-981-10-6571-2_135","ee":"https://doi.org/10.1007/978-981-10-6571-2_135","url":"https://dblp.org/rec/conf/csps/SuiJGWZW17"}, "url":"URL#2881358" }, { "@score":"6", "@id":"2920983", "info":{"authors":{"author":[{"@pid":"96/1681","text":"Jin He"},{"@pid":"13/7007-2","text":"Lei Li 0002"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"A Self-Adaptive Sliding Window Based Topic Model for Non-uniform Texts.","venue":"ICDM","pages":"147-156","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdm/HeLW17","doi":"10.1109/ICDM.2017.24","ee":"https://doi.org/10.1109/ICDM.2017.24","url":"https://dblp.org/rec/conf/icdm/HeLW17"}, "url":"URL#2920983" }, { "@score":"6", "@id":"2979803", "info":{"authors":{"author":[{"@pid":"138/2494","text":"Jipeng Qiang"},{"@pid":"33/3675-1","text":"Ping Chen 0001"},{"@pid":"51/6856-7","text":"Tong Wang 0007"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Topic Modeling over Short Texts by Incorporating Word Embeddings.","venue":"PAKDD","pages":"363-374","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/pakdd/QiangCWW17","doi":"10.1007/978-3-319-57529-2_29","ee":"https://doi.org/10.1007/978-3-319-57529-2_29","url":"https://dblp.org/rec/conf/pakdd/QiangCWW17"}, "url":"URL#2979803" }, { "@score":"6", "@id":"3014779", "info":{"authors":{"author":[{"@pid":"r/VVRaghavan1","text":"Vijay Raghavan 0001"},{"@pid":"a/SAluru","text":"Srinivas Aluru"},{"@pid":"k/GeorgeKarypis","text":"George Karypis"},{"@pid":"211/2831","text":"Lucio Miele"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"2017 IEEE International Conference on Data Mining, ICDM 2017, New Orleans, LA, USA, November 18-21, 2017","venue":"ICDM","publisher":"IEEE Computer Society","year":"2017","type":"Editorship","key":"conf/icdm/2017","ee":"https://ieeexplore.ieee.org/xpl/conhome/8211002/proceeding","url":"https://dblp.org/rec/conf/icdm/2017"}, "url":"URL#3014779" }, { "@score":"6", "@id":"3014780", "info":{"authors":{"author":[{"@pid":"09/3234","text":"Raju Gottumukkala"},{"@pid":"28/1717","text":"Xia Ning"},{"@pid":"d/GuozhuDong","text":"Guozhu Dong"},{"@pid":"r/VVRaghavan1","text":"Vijay Raghavan 0001"},{"@pid":"a/SAluru","text":"Srinivas Aluru"},{"@pid":"k/GeorgeKarypis","text":"George Karypis"},{"@pid":"211/2831","text":"Lucio Miele"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"2017 IEEE International Conference on Data Mining Workshops, ICDM Workshops 2017, New Orleans, LA, USA, November 18-21, 2017","venue":"ICDM Workshops","publisher":"IEEE Computer Society","year":"2017","type":"Editorship","key":"conf/icdm/2017w","ee":"https://ieeexplore.ieee.org/xpl/conhome/8211022/proceeding","url":"https://dblp.org/rec/conf/icdm/2017w"}, "url":"URL#3014780" }, { "@score":"6", "@id":"3035132", "info":{"authors":{"author":[{"@pid":"86/4142","text":"Jifeng Xuan"},{"@pid":"30/3790-1","text":"He Jiang 0001"},{"@pid":"87/3691","text":"Yan Hu"},{"@pid":"85/6484","text":"Zhilei Ren"},{"@pid":"28/10592","text":"Weiqin Zou"},{"@pid":"17/6264","text":"Zhongxuan Luo"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Towards Effective Bug Triage with Towards Effective Bug Triage with Software Data Reduction Techniques.","venue":"CoRR","volume":"abs/1704.04761","year":"2017","type":"Informal and Other Publications","access":"open","key":"journals/corr/XuanJHRZLW17","ee":"http://arxiv.org/abs/1704.04761","url":"https://dblp.org/rec/journals/corr/XuanJHRZLW17"}, "url":"URL#3035132" }, { "@score":"6", "@id":"3061944", "info":{"authors":{"author":[{"@pid":"05/3499-15","text":"Jing Zhang 0015"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"36/4372","text":"Victor S. Sheng"}]},"title":"Learning from crowdsourced labeled data: a survey.","venue":"Artif. Intell. Rev.","volume":"46","number":"4","pages":"543-576","year":"2016","type":"Journal Articles","access":"closed","key":"journals/air/ZhangWS16","doi":"10.1007/S10462-016-9491-9","ee":"https://doi.org/10.1007/s10462-016-9491-9","url":"https://dblp.org/rec/journals/air/ZhangWS16"}, "url":"URL#3061944" }, { "@score":"8", "@id":"3065227", "info":{"authors":{"author":[{"@pid":"54/2618","text":"Donghui Hu"},{"@pid":"125/2864","text":"Xiaotian Zhang"},{"@pid":"91/3295","text":"Yuqi Fan"},{"@pid":"17/1876","text":"Zhong-Qiu Zhao"},{"@pid":"01/1318","text":"Lina Wang"},{"@pid":"w/XintaoWu","text":"Xintao Wu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"On digital image trustworthiness.","venue":"Appl. Soft Comput.","volume":"48","pages":"240-253","year":"2016","type":"Journal Articles","access":"closed","key":"journals/asc/HuZFZWWW16","doi":"10.1016/J.ASOC.2016.07.010","ee":"https://doi.org/10.1016/j.asoc.2016.07.010","url":"https://dblp.org/rec/journals/asc/HuZFZWWW16"}, "url":"URL#3065227" }, { "@score":"6", "@id":"3089226", "info":{"authors":{"author":[{"@pid":"13/7007-2","text":"Lei Li 0002"},{"@pid":"47/3877-6","text":"Jianping He 0006"},{"@pid":"93/6765-1","text":"Meng Wang 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Trust Agent-Based Behavior Induction in Social Networks.","venue":"IEEE Intell. Syst.","volume":"31","number":"1","pages":"24-30","year":"2016","type":"Journal Articles","access":"closed","key":"journals/expert/LiHWW16","doi":"10.1109/MIS.2016.6","ee":"https://doi.org/10.1109/MIS.2016.6","url":"https://dblp.org/rec/journals/expert/LiHWW16"}, "url":"URL#3089226" }, { "@score":"6", "@id":"3104692", "info":{"authors":{"author":[{"@pid":"19/3950","text":"Huawen Liu"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"z/ShichaoZhang","text":"Shichao Zhang"}]},"title":"Neighbor selection for multilabel classification.","venue":"Neurocomputing","volume":"182","pages":"187-196","year":"2016","type":"Journal Articles","access":"closed","key":"journals/ijon/LiuWZ16","doi":"10.1016/J.NEUCOM.2015.12.035","ee":"https://doi.org/10.1016/j.neucom.2015.12.035","url":"https://dblp.org/rec/journals/ijon/LiuWZ16"}, "url":"URL#3104692" }, { "@score":"6", "@id":"3110671", "info":{"authors":{"author":[{"@pid":"123/4939","text":"Yaojin Lin"},{"@pid":"30/2395","text":"Qinghua Hu"},{"@pid":"80/2266","text":"Jia Zhang"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Multi-label feature selection with streaming labels.","venue":"Inf. Sci.","volume":"372","pages":"256-275","year":"2016","type":"Journal Articles","access":"closed","key":"journals/isci/LinHZW16","doi":"10.1016/J.INS.2016.08.039","ee":"https://doi.org/10.1016/j.ins.2016.08.039","url":"https://dblp.org/rec/journals/isci/LinHZW16"}, "url":"URL#3110671" }, { "@score":"12", "@id":"3117756", "info":{"authors":{"author":[{"@pid":"63/6340","text":"Gong-Qing Wu"},{"@pid":"13/7007-2","text":"Lei Li 0002"},{"@pid":"53/2189","text":"Li Li"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Web News Extraction via Tag Path Feature Fusion Using DS Theory.","venue":"J. Comput. Sci. Technol.","volume":"31","number":"4","pages":"661-672","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcst/WuLLW16","doi":"10.1007/S11390-016-1655-1","ee":"https://doi.org/10.1007/s11390-016-1655-1","url":"https://dblp.org/rec/journals/jcst/WuLLW16"}, "url":"URL#3117756" }, { "@score":"8", "@id":"3121167", "info":{"authors":{"author":[{"@pid":"46/8700","text":"Youxi Wu"},{"@pid":"71/10098","text":"Zhiqiang Tang"},{"@pid":"30/3790-1","text":"He Jiang 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Approximate pattern matching with gap constraints.","venue":"J. Inf. Sci.","volume":"42","number":"5","pages":"639-658","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jis/WuTJW16","doi":"10.1177/0165551515603286","ee":"https://doi.org/10.1177/0165551515603286","url":"https://dblp.org/rec/journals/jis/WuTJW16"}, "url":"URL#3121167" }, { "@score":"6", "@id":"3126287", "info":{"authors":{"author":[{"@pid":"w/HaoWang-8","text":"Hao Wang 0008"},{"@pid":"68/7989-1","text":"Haiping Wang 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"带有通配符和长度约束的模式匹配问题求解模型 (Models for Pattern Matching with Wildcards and Length Constraints).","venue":"计算机科学","volume":"43","number":"4","pages":"279-283","year":"2016","type":"Journal Articles","access":"open","key":"journals/jsjkx/0008W018","doi":"10.11896/J.ISSN.1002-137X.2016.04.057","ee":"https://doi.org/10.11896/j.issn.1002-137X.2016.04.057","url":"https://dblp.org/rec/journals/jsjkx/0008W018"}, "url":"URL#3126287" }, { "@score":"6", "@id":"3129260", "info":{"authors":{"author":[{"@pid":"138/2494","text":"Jipeng Qiang"},{"@pid":"33/3675-1","text":"Ping Chen 0001"},{"@pid":"59/622-3","text":"Wei Ding 0003"},{"@pid":"51/1316","text":"Fei Xie"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Multi-document summarization using closed patterns.","venue":"Knowl. Based Syst.","volume":"99","pages":"28-38","year":"2016","type":"Journal Articles","access":"closed","key":"journals/kbs/QiangC0XW16","doi":"10.1016/J.KNOSYS.2016.01.030","ee":"https://doi.org/10.1016/j.knosys.2016.01.030","url":"https://dblp.org/rec/journals/kbs/QiangC0XW16"}, "url":"URL#3129260" }, { "@score":"6", "@id":"3129365", "info":{"authors":{"author":[{"@pid":"52/2586","text":"Kui Yu"},{"@pid":"59/622-3","text":"Wei Ding 0003"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"LOFS: A library of online streaming feature selection.","venue":"Knowl. Based Syst.","volume":"113","pages":"1-3","year":"2016","type":"Journal Articles","access":"closed","key":"journals/kbs/YuDW16","doi":"10.1016/J.KNOSYS.2016.08.026","ee":"https://doi.org/10.1016/j.knosys.2016.08.026","url":"https://dblp.org/rec/journals/kbs/YuDW16"}, "url":"URL#3129365" }, { "@score":"6", "@id":"3141386", "info":{"authors":{"author":[{"@pid":"17/1876","text":"Zhong-Qiu Zhao"},{"@pid":"12/3420","text":"Yiu-ming Cheung"},{"@pid":"90/5236-1","text":"Haibo Hu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Corrupted and occluded face recognition via cooperative sparse representation.","venue":"Pattern Recognit.","volume":"56","pages":"77-87","year":"2016","type":"Journal Articles","access":"closed","key":"journals/pr/ZhaoCHW16","doi":"10.1016/J.PATCOG.2016.02.016","ee":"https://doi.org/10.1016/j.patcog.2016.02.016","url":"https://dblp.org/rec/journals/pr/ZhaoCHW16"}, "url":"URL#3141386" }, { "@score":"6", "@id":"3157204", "info":{"authors":{"author":[{"@pid":"49/5671","text":"Ming Shao"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"00/5815-1","text":"Yun Fu 0001"}]},"title":"Scalable Nearest Neighbor Sparse Graph Approximation by Exploiting Graph Structure.","venue":"IEEE Trans. Big Data","volume":"2","number":"4","pages":"365-380","year":"2016","type":"Journal Articles","access":"closed","key":"journals/tbd/ShaoWF16","doi":"10.1109/TBDATA.2016.2617883","ee":"https://doi.org/10.1109/TBDATA.2016.2617883","url":"https://dblp.org/rec/journals/tbd/ShaoWF16"}, "url":"URL#3157204" }, { "@score":"6", "@id":"3165416", "info":{"authors":{"author":[{"@pid":"52/2586","text":"Kui Yu"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"59/622-3","text":"Wei Ding 0003"},{"@pid":"p/JianPei","text":"Jian Pei"}]},"title":"Scalable and Accurate Online Feature Selection for Big Data.","venue":"ACM Trans. Knowl. Discov. Data","volume":"11","number":"2","pages":"16:1-16:39","year":"2016","type":"Journal Articles","access":"closed","key":"journals/tkdd/YuWDP16","doi":"10.1145/2976744","ee":"https://doi.org/10.1145/2976744","url":"https://dblp.org/rec/journals/tkdd/YuWDP16"}, "url":"URL#3165416" }, { "@score":"6", "@id":"3165433", "info":{"authors":{"author":[{"@pid":"72/5696","text":"Mei Bai"},{"@pid":"35/3175","text":"Junchang Xin"},{"@pid":"64/146","text":"Guoren Wang"},{"@pid":"73/2476","text":"Luming Zhang"},{"@pid":"79/1490","text":"Roger Zimmermann"},{"@pid":"33/6315-1","text":"Ye Yuan 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Discovering the k Representative Skyline Over a Sliding Window.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"28","number":"8","pages":"2041-2056","year":"2016","type":"Journal Articles","access":"closed","key":"journals/tkde/BaiXWZZYW16","doi":"10.1109/TKDE.2016.2546242","ee":"https://doi.org/10.1109/TKDE.2016.2546242","url":"https://dblp.org/rec/journals/tkde/BaiXWZZYW16"}, "url":"URL#3165433" }, { "@score":"6", "@id":"3165485", "info":{"authors":{"author":[{"@pid":"51/5022-3","text":"Jun Huang 0003"},{"@pid":"28/4782","text":"Guorong Li"},{"@pid":"68/4388","text":"Qingming Huang"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Learning Label-Specific Features and Class-Dependent Labels for Multi-Label Classification.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"28","number":"12","pages":"3309-3323","year":"2016","type":"Journal Articles","access":"closed","key":"journals/tkde/HuangLHW16","doi":"10.1109/TKDE.2016.2608339","ee":"https://doi.org/10.1109/TKDE.2016.2608339","url":"https://dblp.org/rec/journals/tkde/HuangLHW16"}, "url":"URL#3165485" }, { "@score":"6", "@id":"3165582", "info":{"authors":{"author":[{"@pid":"93/6765-1","text":"Meng Wang 0001"},{"@pid":"170/5786","text":"Weijie Fu"},{"@pid":"122/3198","text":"Shijie Hao"},{"@pid":"46/3391","text":"Dacheng Tao"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Scalable Semi-Supervised Learning by Efficient Anchor Graph Regularization.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"28","number":"7","pages":"1864-1877","year":"2016","type":"Journal Articles","access":"closed","key":"journals/tkde/WangFHTW16","doi":"10.1109/TKDE.2016.2535367","ee":"https://doi.org/10.1109/TKDE.2016.2535367","url":"https://dblp.org/rec/journals/tkde/WangFHTW16"}, "url":"URL#3165582" }, { "@score":"6", "@id":"3165612", "info":{"authors":{"author":[{"@pid":"54/1474-7","text":"Chen Xu 0007"},{"@pid":"27/7698","text":"Yongquan Zhang"},{"@pid":"01/2608","text":"Runze Li"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"On the Feasibility of Distributed Kernel Regression for Big Data.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"28","number":"11","pages":"3041-3052","year":"2016","type":"Journal Articles","access":"closed","key":"journals/tkde/XuZLW16","doi":"10.1109/TKDE.2016.2594060","ee":"https://doi.org/10.1109/TKDE.2016.2594060","url":"https://dblp.org/rec/journals/tkde/XuZLW16"}, "url":"URL#3165612" }, { "@score":"8", "@id":"3165639", "info":{"authors":{"author":[{"@pid":"05/3499-15","text":"Jing Zhang 0015"},{"@pid":"36/4372","text":"Victor S. Sheng"},{"@pid":"96/2744-2","text":"Jian Wu 0002"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Multi-Class Ground Truth Inference in Crowdsourcing with Clustering.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"28","number":"4","pages":"1080-1085","year":"2016","type":"Journal Articles","access":"closed","key":"journals/tkde/ZhangSWW16","doi":"10.1109/TKDE.2015.2504974","ee":"https://doi.org/10.1109/TKDE.2015.2504974","url":"https://dblp.org/rec/journals/tkde/ZhangSWW16"}, "url":"URL#3165639" }, { "@score":"6", "@id":"3165644", "info":{"authors":{"author":[{"@pid":"45/47-11","text":"Qin Zhang 0011"},{"@pid":"21/1048-1","text":"Peng Zhang 0001"},{"@pid":"34/10089","text":"Guodong Long"},{"@pid":"59/622-3","text":"Wei Ding 0003"},{"@pid":"71/964","text":"Chengqi Zhang"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Online Learning from Trapezoidal Data Streams.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"28","number":"10","pages":"2709-2723","year":"2016","type":"Journal Articles","access":"closed","key":"journals/tkde/ZhangZL0ZW16","doi":"10.1109/TKDE.2016.2563424","ee":"https://doi.org/10.1109/TKDE.2016.2563424","url":"https://dblp.org/rec/journals/tkde/ZhangZL0ZW16"}, "url":"URL#3165644" }, { "@score":"6", "@id":"3166706", "info":{"authors":{"author":[{"@pid":"29/4190-17","text":"Jun Zhang 0017"},{"@pid":"93/6765-1","text":"Meng Wang 0001"},{"@pid":"60/1866","text":"Shengping Zhang"},{"@pid":"l/XuelongLi","text":"Xuelong Li 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Spatiochromatic Context Modeling for Color Saliency Analysis.","venue":"IEEE Trans. Neural Networks Learn. Syst.","volume":"27","number":"6","pages":"1177-1189","year":"2016","type":"Journal Articles","access":"closed","key":"journals/tnn/ZhangWZLW16","doi":"10.1109/TNNLS.2015.2464316","ee":"https://doi.org/10.1109/TNNLS.2015.2464316","url":"https://dblp.org/rec/journals/tnn/ZhangWZLW16"}, "url":"URL#3166706" }, { "@score":"6", "@id":"3214019", "info":{"authors":{"author":[{"@pid":"198/7176","text":"Yinfeng Zhao"},{"@pid":"13/7007-2","text":"Lei Li 0002"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Link Prediction-Based Multi-label Classification on Networked Data.","venue":"DSC","pages":"61-68","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/dsc/ZhaoLW16","doi":"10.1109/DSC.2016.45","ee":"https://doi.org/10.1109/DSC.2016.45","url":"https://dblp.org/rec/conf/dsc/ZhaoLW16"}, "url":"URL#3214019" }, { "@score":"6", "@id":"3243368", "info":{"authors":{"author":[{"@pid":"184/6460","text":"Kaili Yao"},{"@pid":"58/2484","text":"Nan Wu"},{"@pid":"69/5181-9","text":"Xudong Wang 0009"},{"@pid":"195/8079","text":"Xindong Gai"},{"@pid":"50/10223","text":"Haiyan Feng"}]},"title":"A novel power efficient modulation scheme for VLC systems.","venue":"ICCC","pages":"1-6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iccchina/YaoWWGF16","doi":"10.1109/ICCCHINA.2016.7636788","ee":"https://doi.org/10.1109/ICCChina.2016.7636788","url":"https://dblp.org/rec/conf/iccchina/YaoWWGF16"}, "url":"URL#3243368" }, { "@score":"6", "@id":"3246652", "info":{"authors":{"author":[{"@pid":"60/3675-1","text":"Pei-Pei Li 0001"},{"@pid":"88/7484","text":"Lu He"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"01/1504-2","text":"Yuhong Zhang 0002"},{"@pid":"13/7007-2","text":"Lei Li 0002"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Concept Based Short Text Stream Classification with Topic Drifting Detection.","venue":"ICDM","pages":"1009-1014","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdm/LiHHZLW16","doi":"10.1109/ICDM.2016.0128","ee":"https://doi.org/10.1109/ICDM.2016.0128","url":"https://dblp.org/rec/conf/icdm/LiHHZLW16"}, "url":"URL#3246652" }, { "@score":"6", "@id":"3246751", "info":{"authors":{"author":[{"@pid":"194/4619","text":"Lei Sang"},{"@pid":"51/1316","text":"Fei Xie"},{"@pid":"62/2168","text":"Xiaojian Liu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"WEFEST: Word Embedding Feature Extension for Short Text Classification.","venue":"ICDM Workshops","pages":"677-683","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdm/SangXLW16","doi":"10.1109/ICDMW.2016.0101","ee":"https://doi.org/10.1109/ICDMW.2016.0101","url":"https://dblp.org/rec/conf/icdm/SangXLW16"}, "url":"URL#3246751" }, { "@score":"6", "@id":"3248853", "info":{"authors":{"author":[{"@pid":"17/1876","text":"Zhong-Qiu Zhao"},{"@pid":"182/8109","text":"Kewen Cheng"},{"@pid":"82/8614","text":"Qinmu Peng"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"A Real-Time Head Pose Estimation Using Adaptive POSIT Based on Modified Supervised Descent Method.","venue":"ICIC","pages":"74-85","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icic/ZhaoCPW16","doi":"10.1007/978-3-319-42291-6_8","ee":"https://doi.org/10.1007/978-3-319-42291-6_8","url":"https://dblp.org/rec/conf/icic/ZhaoCPW16"}, "url":"URL#3248853" }, { "@score":"6", "@id":"3248855", "info":{"authors":{"author":[{"@pid":"17/1876","text":"Zhong-Qiu Zhao"},{"@pid":"182/8179","text":"Zhen-Wei Hao"},{"@pid":"182/8243","text":"Run Su"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Single Image Super Resolution with Neighbor Embedding and In-place Patch Matching.","venue":"ICIC","pages":"493-502","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icic/ZhaoHSW16","doi":"10.1007/978-3-319-42294-7_44","ee":"https://doi.org/10.1007/978-3-319-42294-7_44","url":"https://dblp.org/rec/conf/icic/ZhaoHSW16"}, "url":"URL#3248855" }, { "@score":"6", "@id":"3259357", "info":{"authors":{"author":[{"@pid":"138/2494","text":"Jipeng Qiang"},{"@pid":"33/3675-1","text":"Ping Chen 0001"},{"@pid":"59/622-3","text":"Wei Ding 0003"},{"@pid":"51/6856-7","text":"Tong Wang 0007"},{"@pid":"51/1316","text":"Fei Xie"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Topic Discovery from Heterogeneous Texts.","venue":"ICTAI","pages":"196-203","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/ictai/QiangC0WXW16","doi":"10.1109/ICTAI.2016.0039","ee":"https://doi.org/10.1109/ICTAI.2016.0039","url":"https://dblp.org/rec/conf/ictai/QiangC0WXW16"}, "url":"URL#3259357" }, { "@score":"6", "@id":"3331303", "info":{"authors":{"author":[{"@pid":"w/YangWang29","text":"Yang Wang 0029"},{"@pid":"29/265-1","text":"Jian Jiao 0001"},{"@pid":"191/6509","text":"Xindong Sui"},{"@pid":"82/4227","text":"Shaohua Wu"},{"@pid":"59/6828-1","text":"Yonghui Li 0001"},{"@pid":"10/2002","text":"Qinyu Zhang 0001"}]},"title":"Rateless coding scheme for time-varying dying channels.","venue":"WCSP","pages":"1-6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/wcsp/WangJSWLZ16","doi":"10.1109/WCSP.2016.7752699","ee":"https://doi.org/10.1109/WCSP.2016.7752699","url":"https://dblp.org/rec/conf/wcsp/WangJSWLZ16"}, "url":"URL#3331303" }, { "@score":"6", "@id":"3339181", "info":{"authors":{"author":[{"@pid":"b/FBonchi","text":"Francesco Bonchi"},{"@pid":"d/JDomingoFerrer","text":"Josep Domingo-Ferrer"},{"@pid":"b/RABaezaYates","text":"Ricardo Baeza-Yates"},{"@pid":"z/ZhiHuaZhou","text":"Zhi-Hua Zhou"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"IEEE 16th International Conference on Data Mining, ICDM 2016, December 12-15, 2016, Barcelona, Spain","venue":"ICDM","publisher":"IEEE Computer Society","year":"2016","type":"Editorship","key":"conf/icdm/2016","ee":"https://ieeexplore.ieee.org/xpl/conhome/7837023/proceeding","url":"https://dblp.org/rec/conf/icdm/2016"}, "url":"URL#3339181" }, { "@score":"6", "@id":"3339182", "info":{"authors":{"author":[{"@pid":"50/5158","text":"Carlotta Domeniconi"},{"@pid":"63/3664","text":"Francesco Gullo"},{"@pid":"b/FBonchi","text":"Francesco Bonchi"},{"@pid":"d/JDomingoFerrer","text":"Josep Domingo-Ferrer"},{"@pid":"b/RABaezaYates","text":"Ricardo Baeza-Yates"},{"@pid":"z/ZhiHuaZhou","text":"Zhi-Hua Zhou"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"IEEE International Conference on Data Mining Workshops, ICDM Workshops 2016, December 12-15, 2016, Barcelona, Spain.","venue":"ICDM Workshops","publisher":"IEEE Computer Society","year":"2016","type":"Editorship","key":"conf/icdm/2016w","ee":"https://ieeexplore.ieee.org/xpl/conhome/7836069/proceeding","url":"https://dblp.org/rec/conf/icdm/2016w"}, "url":"URL#3339182" }, { "@score":"6", "@id":"3351658", "info":{"authors":{"author":[{"@pid":"123/4421-5","text":"Xiang Jiang 0005"},{"@pid":"15/2139","text":"Shikui Wei"},{"@pid":"122/2625","text":"Ruizhen Zhao"},{"@pid":"45/2091-1","text":"Yao Zhao 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Camera Fingerprint: A New Perspective for Identifying User's Identity.","venue":"CoRR","volume":"abs/1610.07728","year":"2016","type":"Informal and Other Publications","access":"open","key":"journals/corr/JiangWZZW16","ee":"http://arxiv.org/abs/1610.07728","url":"https://dblp.org/rec/journals/corr/JiangWZZW16"}, "url":"URL#3351658" }, { "@score":"6", "@id":"3358088", "info":{"authors":{"author":[{"@pid":"138/2494","text":"Jipeng Qiang"},{"@pid":"33/3675-1","text":"Ping Chen 0001"},{"@pid":"51/6856-7","text":"Tong Wang 0007"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Topic Modeling over Short Texts by Incorporating Word Embeddings.","venue":"CoRR","volume":"abs/1609.08496","year":"2016","type":"Informal and Other Publications","access":"open","key":"journals/corr/QiangCWW16","ee":"http://arxiv.org/abs/1609.08496","url":"https://dblp.org/rec/journals/corr/QiangCWW16"}, "url":"URL#3358088" }, { "@score":"6", "@id":"3362591", "info":{"authors":{"author":[{"@pid":"02/736-21","text":"Jing Wang 0021"},{"@pid":"93/6765-1","text":"Meng Wang 0001"},{"@pid":"60/3675-1","text":"Pei-Pei Li 0001"},{"@pid":"29/8842","text":"Luoqi Liu"},{"@pid":"17/1876","text":"Zhongqiu Zhao"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Online Feature Selection with Group Structure Analysis.","venue":"CoRR","volume":"abs/1608.05889","year":"2016","type":"Informal and Other Publications","access":"open","key":"journals/corr/WangWLLZHW16","ee":"http://arxiv.org/abs/1608.05889","url":"https://dblp.org/rec/journals/corr/WangWLLZHW16"}, "url":"URL#3362591" }, { "@score":"6", "@id":"3363797", "info":{"authors":{"author":[{"@pid":"52/2586","text":"Kui Yu"},{"@pid":"59/622-3","text":"Wei Ding 0003"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"LOFS: Library of Online Streaming Feature Selection.","venue":"CoRR","volume":"abs/1603.00531","year":"2016","type":"Informal and Other Publications","access":"open","key":"journals/corr/Yu0W16","ee":"http://arxiv.org/abs/1603.00531","url":"https://dblp.org/rec/journals/corr/Yu0W16"}, "url":"URL#3363797" }, { "@score":"6", "@id":"3374252", "info":{"authors":{"author":[{"@pid":"60/3675-1","text":"Pei-Pei Li 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"w/HaoWang-8","text":"Hao Wang 0008"}]},"title":"An Incremental Decision Tree for Mining Multilabel Data.","venue":"Appl. Artif. Intell.","volume":"29","number":"10","pages":"992-1014","year":"2015","type":"Journal Articles","access":"closed","key":"journals/aai/LiWHW15","doi":"10.1080/08839514.2015.1097154","ee":"https://doi.org/10.1080/08839514.2015.1097154","url":"https://dblp.org/rec/journals/aai/LiWHW15"}, "url":"URL#3374252" }, { "@score":"8", "@id":"3379192", "info":{"authors":{"author":[{"@pid":"46/8700","text":"Youxi Wu"},{"@pid":"04/5641","text":"Shuai Fu"},{"@pid":"30/3790-1","text":"He Jiang 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Strict approximate pattern matching with general gaps.","venue":"Appl. Intell.","volume":"42","number":"3","pages":"566-580","year":"2015","type":"Journal Articles","access":"closed","key":"journals/apin/WuFJW15","doi":"10.1007/S10489-014-0612-3","ee":"https://doi.org/10.1007/s10489-014-0612-3","url":"https://dblp.org/rec/journals/apin/WuFJW15"}, "url":"URL#3379192" }, { "@score":"12", "@id":"3403786", "info":{"authors":{"author":[{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"72/5816","text":"Huanhuan Chen"},{"@pid":"63/6340","text":"Gong-Qing Wu"},{"@pid":"95/3736-2","text":"Jun Liu 0002"},{"@pid":"32/1858","text":"Qinghua Zheng"},{"@pid":"30/6858","text":"Xiaofeng He"},{"@pid":"z/AoyingZhou","text":"Aoying Zhou"},{"@pid":"17/1876","text":"Zhong-Qiu Zhao"},{"@pid":"120/9010","text":"Bifan Wei"},{"@pid":"37/4190-66","text":"Yang Li 0066"},{"@pid":"56/6023","text":"Qiping Zhang"},{"@pid":"z/ShichaoZhang","text":"Shichao Zhang"}]},"title":"Knowledge Engineering with Big Data.","venue":"IEEE Intell. Syst.","volume":"30","number":"5","pages":"46-55","year":"2015","type":"Journal Articles","access":"closed","key":"journals/expert/WuCWLZHzZWLZZ15","doi":"10.1109/MIS.2015.56","ee":"https://doi.org/10.1109/MIS.2015.56","url":"https://dblp.org/rec/journals/expert/WuCWLZHzZWLZZ15"}, "url":"URL#3403786" }, { "@score":"6", "@id":"3409901", "info":{"authors":{"author":[{"@pid":"17/1876","text":"Zhong-Qiu Zhao"},{"@pid":"12/3420","text":"Yiu-ming Cheung"},{"@pid":"90/5236-1","text":"Haibo Hu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Expanding dictionary for robust face recognition: pixel is not necessary while sparsity is.","venue":"IET Comput. Vis.","volume":"9","number":"5","pages":"648-654","year":"2015","type":"Journal Articles","access":"closed","key":"journals/iet-cvi/ZhaoCHW15","doi":"10.1049/IET-CVI.2014.0279","ee":"https://doi.org/10.1049/iet-cvi.2014.0279","url":"https://dblp.org/rec/journals/iet-cvi/ZhaoCHW15"}, "url":"URL#3409901" }, { "@score":"6", "@id":"3418193", "info":{"authors":{"author":[{"@pid":"60/3675-1","text":"Pei-Pei Li 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"w/HaoWang-8","text":"Hao Wang 0008"}]},"title":"Learning concept-drifting data streams with random ensemble decision trees.","venue":"Neurocomputing","volume":"166","pages":"68-83","year":"2015","type":"Journal Articles","access":"closed","key":"journals/ijon/LiWHW15","doi":"10.1016/J.NEUCOM.2015.04.024","ee":"https://doi.org/10.1016/j.neucom.2015.04.024","url":"https://dblp.org/rec/journals/ijon/LiWHW15"}, "url":"URL#3418193" }, { "@score":"6", "@id":"3418948", "info":{"authors":{"author":[{"@pid":"17/1876","text":"Zhong-Qiu Zhao"},{"@pid":"132/6805","text":"Lin-Hai Ma"},{"@pid":"12/3420","text":"Yiu-ming Cheung"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"t/YuanYanTang","text":"Yuan Yan Tang"},{"@pid":"48/4856","text":"Chun Lung Philip Chen"}]},"title":"ApLeaf: An efficient android-based plant leaf identification system.","venue":"Neurocomputing","volume":"151","pages":"1112-1119","year":"2015","type":"Journal Articles","access":"closed","key":"journals/ijon/ZhaoMCWTC15","doi":"10.1016/J.NEUCOM.2014.02.077","ee":"https://doi.org/10.1016/j.neucom.2014.02.077","url":"https://dblp.org/rec/journals/ijon/ZhaoMCWTC15"}, "url":"URL#3418948" }, { "@score":"8", "@id":"3419850", "info":{"authors":{"author":[{"@pid":"54/2618","text":"Donghui Hu"},{"@pid":"15/3850","text":"Bin Su"},{"@pid":"142/2136","text":"Shuli Zheng"},{"@pid":"17/1876","text":"Zhong-Qiu Zhao"},{"@pid":"w/XintaoWu","text":"Xintao Wu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Security and privacy protocols for perceptual image hashing.","venue":"Int. J. Sens. Networks","volume":"17","number":"3","pages":"146-162","year":"2015","type":"Journal Articles","access":"closed","key":"journals/ijsnet/HuSZZWW15","doi":"10.1504/IJSNET.2015.068178","ee":"https://doi.org/10.1504/IJSNET.2015.068178","url":"https://dblp.org/rec/journals/ijsnet/HuSZZWW15"}, "url":"URL#3419850" }, { "@score":"6", "@id":"3423454", "info":{"authors":{"author":[{"@pid":"58/798","text":"Yusheng Cheng"},{"@pid":"30/5462","text":"Wenfa Zhan"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"52/149","text":"Yuzhou Zhang"}]},"title":"Automatic determination about precision parameter value based on inclusion degree with variable precision rough set model.","venue":"Inf. Sci.","volume":"290","pages":"72-85","year":"2015","type":"Journal Articles","access":"closed","key":"journals/isci/ChengZWZ15","doi":"10.1016/J.INS.2014.08.034","ee":"https://doi.org/10.1016/j.ins.2014.08.034","url":"https://dblp.org/rec/journals/isci/ChengZWZ15"}, "url":"URL#3423454" }, { "@score":"6", "@id":"3426923", "info":{"authors":{"author":[{"@pid":"21/8331","text":"Ahmed Abdeen Hamed"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"166/6093","text":"Robert Erickson"},{"@pid":"160/8841","text":"Tamer Fandy"}]},"title":"Twitter K-H networks in action: Advancing biomedical literature for drug search.","venue":"J. Biomed. Informatics","volume":"56","pages":"157-168","year":"2015","type":"Journal Articles","access":"open","key":"journals/jbi/HamedWEF15","doi":"10.1016/J.JBI.2015.05.015","ee":"https://doi.org/10.1016/j.jbi.2015.05.015","url":"https://dblp.org/rec/journals/jbi/HamedWEF15"}, "url":"URL#3426923" }, { "@score":"6", "@id":"3430821", "info":{"authors":{"author":[{"@pid":"a/AbdullahNArslan","text":"Abdullah N. Arslan"},{"@pid":"77/2036-1","text":"Dan He 0001"},{"@pid":"16/3418","text":"Yu He"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Pattern matching with wildcards and length constraints using maximum network flow.","venue":"J. Discrete Algorithms","volume":"35","pages":"9-16","year":"2015","type":"Journal Articles","access":"open","key":"journals/jda/ArslanHHW15","doi":"10.1016/J.JDA.2015.08.003","ee":"https://doi.org/10.1016/j.jda.2015.08.003","url":"https://dblp.org/rec/journals/jda/ArslanHHW15"}, "url":"URL#3430821" }, { "@score":"6", "@id":"3434785", "info":{"authors":{"author":[{"@pid":"05/3499-15","text":"Jing Zhang 0015"},{"@pid":"36/4372","text":"Victor S. Sheng"},{"@pid":"171/1532","text":"Bryce Nicholson"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"CEKA: a tool for mining the wisdom of crowds.","venue":"J. Mach. Learn. Res.","volume":"16","pages":"2853-2858","year":"2015","type":"Journal Articles","access":"closed","key":"journals/jmlr/ZhangSNW15","doi":"10.5555/2789272.2912090","ee":"https://dl.acm.org/doi/10.5555/2789272.2912090","url":"https://dblp.org/rec/journals/jmlr/ZhangSNW15"}, "url":"URL#3434785" }, { "@score":"6", "@id":"3452132", "info":{"authors":{"author":[{"@pid":"19/3950","text":"Huawen Liu"},{"@pid":"146/8307","text":"Zongjie Ma"},{"@pid":"z/ShichaoZhang","text":"Shichao Zhang"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Penalized partial least square discriminant analysis with l1 for multi-label data.","venue":"Pattern Recognit.","volume":"48","number":"5","pages":"1724-1733","year":"2015","type":"Journal Articles","access":"closed","key":"journals/pr/LiuMZW15","doi":"10.1016/J.PATCOG.2014.11.007","ee":"https://doi.org/10.1016/j.patcog.2014.11.007","url":"https://dblp.org/rec/journals/pr/LiuMZW15"}, "url":"URL#3452132" }, { "@score":"6", "@id":"3452563", "info":{"authors":{"author":[{"@pid":"01/1504-2","text":"Yuhong Zhang 0002"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"60/3675-1","text":"Pei-Pei Li 0001"},{"@pid":"13/7007-2","text":"Lei Li 0002"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Cross-domain sentiment classification-feature divergence, polarity divergence or both?","venue":"Pattern Recognit. Lett.","volume":"65","pages":"44-50","year":"2015","type":"Journal Articles","access":"closed","key":"journals/prl/ZhangHLLW15","doi":"10.1016/J.PATREC.2015.07.006","ee":"https://doi.org/10.1016/j.patrec.2015.07.006","url":"https://dblp.org/rec/journals/prl/ZhangHLLW15"}, "url":"URL#3452563" }, { "@score":"6", "@id":"3470082", "info":{"authors":{"author":[{"@pid":"05/3499-15","text":"Jing Zhang 0015"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"36/4372","text":"Victor S. Sheng"}]},"title":"Active Learning With Imbalanced Multiple Noisy Labeling.","venue":"IEEE Trans. Cybern.","volume":"45","number":"5","pages":"1081-1093","year":"2015","type":"Journal Articles","access":"closed","key":"journals/tcyb/ZhangWS15","doi":"10.1109/TCYB.2014.2344674","ee":"https://doi.org/10.1109/TCYB.2014.2344674","url":"https://dblp.org/rec/journals/tcyb/ZhangWS15"}, "url":"URL#3470082" }, { "@score":"6", "@id":"3474976", "info":{"authors":{"author":[{"@pid":"52/2586","text":"Kui Yu"},{"@pid":"59/622-3","text":"Wei Ding 0003"},{"@pid":"81/6368","text":"Dan A. Simovici"},{"@pid":"w/HaoWang-8","text":"Hao Wang 0008"},{"@pid":"p/JianPei","text":"Jian Pei"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Classification with Streaming Features: An Emerging-Pattern Mining Approach.","venue":"ACM Trans. Knowl. Discov. Data","volume":"9","number":"4","pages":"30:1-30:31","year":"2015","type":"Journal Articles","access":"closed","key":"journals/tkdd/Yu0SWPW15","doi":"10.1145/2700409","ee":"https://doi.org/10.1145/2700409","url":"https://dblp.org/rec/journals/tkdd/Yu0SWPW15"}, "url":"URL#3474976" }, { "@score":"6", "@id":"3475029", "info":{"authors":{"author":[{"@pid":"124/5793","text":"Yuqiang Fang"},{"@pid":"00/7016","text":"Ruili Wang"},{"@pid":"79/292-1","text":"Bin Dai 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Graph-Based Learning via Auto-Grouped Sparse Regularization and Kernelized Extension.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"27","number":"1","pages":"142-154","year":"2015","type":"Journal Articles","access":"closed","key":"journals/tkde/FangWDW15","doi":"10.1109/TKDE.2014.2312322","ee":"https://doi.org/10.1109/TKDE.2014.2312322","url":"https://dblp.org/rec/journals/tkde/FangWDW15"}, "url":"URL#3475029" }, { "@score":"6", "@id":"3475085", "info":{"authors":{"author":[{"@pid":"60/3675-1","text":"Pei-Pei Li 0001"},{"@pid":"w/HaixunWang","text":"Haixun Wang"},{"@pid":"z/KennyQiliZhu","text":"Kenny Q. Zhu"},{"@pid":"84/6394-6","text":"Zhongyuan Wang 0006"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"A Large Probabilistic Semantic Network Based Approach to Compute Term Similarity.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"27","number":"10","pages":"2604-2617","year":"2015","type":"Journal Articles","access":"closed","key":"journals/tkde/LiWZWHW15","doi":"10.1109/TKDE.2015.2419673","ee":"https://doi.org/10.1109/TKDE.2015.2419673","url":"https://dblp.org/rec/journals/tkde/LiWZWHW15"}, "url":"URL#3475085" }, { "@score":"6", "@id":"3475104", "info":{"authors":{"author":[{"@pid":"58/6443","text":"Zhenyu Lu"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"b/JoshuaCliffordBongard","text":"Josh C. Bongard"}]},"title":"Active Learning through Adaptive Heterogeneous Ensembling.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"27","number":"2","pages":"368-381","year":"2015","type":"Journal Articles","access":"closed","key":"journals/tkde/LuWB15","doi":"10.1109/TKDE.2014.2304474","ee":"https://doi.org/10.1109/TKDE.2014.2304474","url":"https://dblp.org/rec/journals/tkde/LuWB15"}, "url":"URL#3475104" }, { "@score":"6", "@id":"3475174", "info":{"authors":{"author":[{"@pid":"93/6765-1","text":"Meng Wang 0001"},{"@pid":"08/6294","text":"Xueliang Liu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Visual Classification by ℓ1-Hypergraph Modeling.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"27","number":"9","pages":"2564-2574","year":"2015","type":"Journal Articles","access":"closed","key":"journals/tkde/WangLW15","doi":"10.1109/TKDE.2015.2415497","ee":"https://doi.org/10.1109/TKDE.2015.2415497","url":"https://dblp.org/rec/journals/tkde/WangLW15"}, "url":"URL#3475174" }, { "@score":"6", "@id":"3475181", "info":{"authors":{"author":[{"@pid":"02/736-21","text":"Jing Wang 0021"},{"@pid":"93/6765-1","text":"Meng Wang 0001"},{"@pid":"60/3675-1","text":"Pei-Pei Li 0001"},{"@pid":"29/8842","text":"Luoqi Liu"},{"@pid":"17/1876","text":"Zhong-Qiu Zhao"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Online Feature Selection with Group Structure Analysis.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"27","number":"11","pages":"3029-3041","year":"2015","type":"Journal Articles","access":"closed","key":"journals/tkde/WangWLLZHW15","doi":"10.1109/TKDE.2015.2441716","ee":"https://doi.org/10.1109/TKDE.2015.2441716","url":"https://dblp.org/rec/journals/tkde/WangWLLZHW15"}, "url":"URL#3475181" }, { "@score":"6", "@id":"3475196", "info":{"authors":{"author":[{"@pid":"86/4142","text":"Jifeng Xuan"},{"@pid":"30/3790-1","text":"He Jiang 0001"},{"@pid":"87/3691","text":"Yan Hu"},{"@pid":"85/6484","text":"Zhilei Ren"},{"@pid":"28/10592","text":"Weiqin Zou"},{"@pid":"17/6264","text":"Zhongxuan Luo"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Towards Effective Bug Triage with Software Data Reduction Techniques.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"27","number":"1","pages":"264-280","year":"2015","type":"Journal Articles","access":"closed","key":"journals/tkde/XuanJHRZLW15","doi":"10.1109/TKDE.2014.2324590","ee":"https://doi.org/10.1109/TKDE.2014.2324590","url":"https://dblp.org/rec/journals/tkde/XuanJHRZLW15"}, "url":"URL#3475196" }, { "@score":"6", "@id":"3475219", "info":{"authors":{"author":[{"@pid":"05/3499-15","text":"Jing Zhang 0015"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"36/4372","text":"Victor S. Sheng"}]},"title":"Imbalanced Multiple Noisy Labeling.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"27","number":"2","pages":"489-503","year":"2015","type":"Journal Articles","access":"closed","key":"journals/tkde/ZhangWS15","doi":"10.1109/TKDE.2014.2327039","ee":"https://doi.org/10.1109/TKDE.2014.2327039","url":"https://dblp.org/rec/journals/tkde/ZhangWS15"}, "url":"URL#3475219" }, { "@score":"8", "@id":"3510278", "info":{"authors":{"author":[{"@pid":"05/3499-15","text":"Jing Zhang 0015"},{"@pid":"36/4372","text":"Victor S. Sheng"},{"@pid":"96/2744-2","text":"Jian Wu 0002"},{"@pid":"169/1723","text":"Xiaoqin Fu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Improving Label Quality in Crowdsourcing Using Noise Correction.","venue":"CIKM","pages":"1931-1934","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/cikm/ZhangSWFW15","doi":"10.1145/2806416.2806627","ee":"https://doi.org/10.1145/2806416.2806627","url":"https://dblp.org/rec/conf/cikm/ZhangSWFW15"}, "url":"URL#3510278" }, { "@score":"6", "@id":"3536562", "info":{"authors":{"author":[{"@pid":"95/2628","text":"Qingren Wang"},{"@pid":"33/1875","text":"Youhua Zhang"},{"@pid":"51/1316","text":"Fei Xie"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Prediction of rice brown planthoppers based on system dynamics.","venue":"FSKD","pages":"2559-2564","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/fskd/WangZXW15","doi":"10.1109/FSKD.2015.7382359","ee":"https://doi.org/10.1109/FSKD.2015.7382359","url":"https://dblp.org/rec/conf/fskd/WangZXW15"}, "url":"URL#3536562" }, { "@score":"6", "@id":"3557890", "info":{"authors":{"author":[{"@pid":"51/5022-3","text":"Jun Huang 0003"},{"@pid":"28/4782","text":"Guorong Li"},{"@pid":"68/4388","text":"Qingming Huang"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Learning Label Specific Features for Multi-label Classification.","venue":"ICDM","pages":"181-190","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdm/HuangLHW15","doi":"10.1109/ICDM.2015.67","ee":"https://doi.org/10.1109/ICDM.2015.67","url":"https://dblp.org/rec/conf/icdm/HuangLHW15"}, "url":"URL#3557890" }, { "@score":"6", "@id":"3558148", "info":{"authors":{"author":[{"@pid":"45/47-11","text":"Qin Zhang 0011"},{"@pid":"21/1048-1","text":"Peng Zhang 0001"},{"@pid":"34/10089","text":"Guodong Long"},{"@pid":"59/622-3","text":"Wei Ding 0003"},{"@pid":"71/964","text":"Chengqi Zhang"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Towards Mining Trapezoidal Data Streams.","venue":"ICDM","pages":"1111-1116","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdm/ZhangZLDZW15","doi":"10.1109/ICDM.2015.42","ee":"https://doi.org/10.1109/ICDM.2015.42","url":"https://dblp.org/rec/conf/icdm/ZhangZLDZW15"}, "url":"URL#3558148" }, { "@score":"6", "@id":"3562776", "info":{"authors":{"author":[{"@pid":"17/1876","text":"Zhong-Qiu Zhao"},{"@pid":"88/5135","text":"Yan Hong"},{"@pid":"25/1888","text":"Peng Zheng"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Plant identification using triangular representation based on salient points and margin points.","venue":"ICIP","pages":"1145-1149","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icip/ZhaoHZW15","doi":"10.1109/ICIP.2015.7350979","ee":"https://doi.org/10.1109/ICIP.2015.7350979","url":"https://dblp.org/rec/conf/icip/ZhaoHZW15"}, "url":"URL#3562776" }, { "@score":"6", "@id":"3579305", "info":{"authors":{"author":[{"@pid":"29/4190-17","text":"Jun Zhang 0017"},{"@pid":"93/6765-1","text":"Meng Wang 0001"},{"@pid":"82/4977-6","text":"Jun Gao 0006"},{"@pid":"17/221","text":"Yi Wang"},{"@pid":"58/6205","text":"Xudong Zhang"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Saliency Detection with a Deeper Investigation of Light Field.","venue":"IJCAI","pages":"2212-2218","year":"2015","type":"Conference and Workshop Papers","access":"open","key":"conf/ijcai/ZhangWGWZW15","ee":"http://ijcai.org/Abstract/15/313","url":"https://dblp.org/rec/conf/ijcai/ZhangWGWZW15"}, "url":"URL#3579305" }, { "@score":"6", "@id":"3596917", "info":{"authors":{"author":[{"@pid":"52/2586","text":"Kui Yu"},{"@pid":"39/2537-8","text":"Dawei Wang 0008"},{"@pid":"59/622-3","text":"Wei Ding 0003"},{"@pid":"p/JianPei","text":"Jian Pei"},{"@pid":"134/4007","text":"David L. Small"},{"@pid":"89/7747","text":"Shafiqul Islam"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Tornado Forecasting with Multiple Markov Boundaries.","venue":"KDD","pages":"2237-2246","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/YuW0PSIW15","doi":"10.1145/2783258.2788612","ee":"https://doi.org/10.1145/2783258.2788612","url":"https://dblp.org/rec/conf/kdd/YuW0PSIW15"}, "url":"URL#3596917" }, { "@score":"6", "@id":"3627258", "info":{"authors":{"author":[{"@pid":"59/871","text":"Yi Li"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"13/7007-2","text":"Lei Li 0002"}]},"title":"Community Influence Analysis Based on Social Network Structures.","venue":"SmartCity","pages":"247-254","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/smartcity/LiWL15","doi":"10.1109/SMARTCITY.2015.79","ee":"https://doi.org/10.1109/SmartCity.2015.79","url":"https://dblp.org/rec/conf/smartcity/LiWL15"}, "url":"URL#3627258" }, { "@score":"6", "@id":"3647542", "info":{"authors":{"author":[{"@pid":"a/CharuCAggarwal","text":"Charu C. Aggarwal"},{"@pid":"z/ZhiHuaZhou","text":"Zhi-Hua Zhou"},{"@pid":"t/AlexanderTuzhilin","text":"Alexander Tuzhilin"},{"@pid":"x/HuiXiong","text":"Hui Xiong 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"2015 IEEE International Conference on Data Mining, ICDM 2015, Atlantic City, NJ, USA, November 14-17, 2015","venue":"ICDM","publisher":"IEEE Computer Society","year":"2015","type":"Editorship","key":"conf/icdm/2015","ee":"https://ieeexplore.ieee.org/xpl/conhome/7373198/proceeding","url":"https://dblp.org/rec/conf/icdm/2015"}, "url":"URL#3647542" }, { "@score":"6", "@id":"3667490", "info":{"authors":{"author":[{"@pid":"52/2586","text":"Kui Yu"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"59/622-3","text":"Wei Ding 0003"},{"@pid":"p/JianPei","text":"Jian Pei"}]},"title":"Scalable and Accurate Online Feature Selection for Big Data.","venue":"CoRR","volume":"abs/1511.09263","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/YuW0P15","ee":"http://arxiv.org/abs/1511.09263","url":"https://dblp.org/rec/journals/corr/YuW0P15"}, "url":"URL#3667490" }, { "@score":"6", "@id":"3682203", "info":{"authors":{"author":[{"@pid":"123/4939","text":"Yaojin Lin"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Ensemble learning from multiple information sources via label propagation and consensus.","venue":"Appl. Intell.","volume":"41","number":"1","pages":"30-41","year":"2014","type":"Journal Articles","access":"closed","key":"journals/apin/LinHW14","doi":"10.1007/S10489-013-0508-7","ee":"https://doi.org/10.1007/s10489-013-0508-7","url":"https://dblp.org/rec/journals/apin/LinHW14"}, "url":"URL#3682203" }, { "@score":"8", "@id":"3682256", "info":{"authors":{"author":[{"@pid":"46/8700","text":"Youxi Wu"},{"@pid":"59/251","text":"Lingling Wang"},{"@pid":"77/1631","text":"Jiadong Ren"},{"@pid":"59/622-3","text":"Wei Ding 0003"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Mining sequential patterns with periodic wildcard gaps.","venue":"Appl. Intell.","volume":"41","number":"1","pages":"99-116","year":"2014","type":"Journal Articles","access":"closed","key":"journals/apin/WuWR0W14","doi":"10.1007/S10489-013-0499-4","ee":"https://doi.org/10.1007/s10489-013-0499-4","url":"https://dblp.org/rec/journals/apin/WuWR0W14"}, "url":"URL#3682256" }, { "@score":"8", "@id":"3690758", "info":{"authors":{"author":[{"@pid":"30/3790-1","text":"He Jiang 0001"},{"@pid":"86/4142","text":"Jifeng Xuan"},{"@pid":"85/6484","text":"Zhilei Ren"},{"@pid":"46/8700","text":"Youxi Wu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Misleading classification.","venue":"Sci. China Inf. Sci.","volume":"57","number":"5","pages":"1-17","year":"2014","type":"Journal Articles","access":"closed","key":"journals/chinaf/JiangXRWW14","doi":"10.1007/S11432-013-4798-5","ee":"https://doi.org/10.1007/s11432-013-4798-5","url":"https://dblp.org/rec/journals/chinaf/JiangXRWW14"}, "url":"URL#3690758" }, { "@score":"6", "@id":"3690831", "info":{"authors":{"author":[{"@pid":"08/3821","text":"Huansheng Ning"},{"@pid":"49/1832-2","text":"Jianhua Ma 0002"},{"@pid":"y/LaurenceTianruoYang","text":"Laurence T. Yang"},{"@pid":"142/5257","text":"Weifeng Lü"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"36/4847","text":"Victor C. M. Leung"},{"@pid":"62/577","text":"Vincenzo Piuri"}]},"title":"Editor's note.","venue":"Sci. China Inf. Sci.","volume":"57","number":"3","pages":"1","year":"2014","type":"Journal Articles","access":"open","key":"journals/chinaf/NingMYLWLP14","doi":"10.1007/S11432-014-5072-1","ee":"https://doi.org/10.1007/s11432-014-5072-1","url":"https://dblp.org/rec/journals/chinaf/NingMYLWLP14"}, "url":"URL#3690831" }, { "@score":"6", "@id":"3690948", "info":{"authors":{"author":[{"@pid":"17/1876","text":"Zhong-Qiu Zhao"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"19/10878","text":"Canyi Lu"},{"@pid":"95/3400","text":"Hervé Glotin"},{"@pid":"82/4977-6","text":"Jun Gao 0006"}]},"title":"Optimizing widths with PSO for center selection of Gaussian radial basis function networks.","venue":"Sci. China Inf. Sci.","volume":"57","number":"5","pages":"1-17","year":"2014","type":"Journal Articles","access":"closed","key":"journals/chinaf/ZhaoWLGG14","doi":"10.1007/S11432-013-4850-5","ee":"https://doi.org/10.1007/s11432-013-4850-5","url":"https://dblp.org/rec/journals/chinaf/ZhaoWLGG14"}, "url":"URL#3690948" }, { "@score":"6", "@id":"3691006", "info":{"authors":{"author":[{"@pid":"19/3950","text":"Huawen Liu"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"z/ShichaoZhang","text":"Shichao Zhang"}]},"title":"A New Supervised Feature Selection Method for Pattern Classification.","venue":"Comput. Intell.","volume":"30","number":"2","pages":"342-361","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ci/LiuWZ14","doi":"10.1111/J.1467-8640.2012.00465.X","ee":"https://doi.org/10.1111/j.1467-8640.2012.00465.x","url":"https://dblp.org/rec/journals/ci/LiuWZ14"}, "url":"URL#3691006" }, { "@score":"6", "@id":"3719743", "info":{"authors":{"author":[{"@pid":"123/4939","text":"Yaojin Lin"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Quality of information-based source assessment and selection.","venue":"Neurocomputing","volume":"133","pages":"95-102","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ijon/LinHW14","doi":"10.1016/J.NEUCOM.2013.11.027","ee":"https://doi.org/10.1016/j.neucom.2013.11.027","url":"https://dblp.org/rec/journals/ijon/LinHW14"}, "url":"URL#3719743" }, { "@score":"6", "@id":"3724458", "info":{"authors":{"author":[{"@pid":"59/1501","text":"Richang Hong"},{"@pid":"08/3554","text":"Jianxin Pan"},{"@pid":"122/3198","text":"Shijie Hao"},{"@pid":"93/6765-1","text":"Meng Wang 0001"},{"@pid":"03/517","text":"Feng Xue"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Image quality assessment based on matching pursuit.","venue":"Inf. Sci.","volume":"273","pages":"196-211","year":"2014","type":"Journal Articles","access":"closed","key":"journals/isci/HongPHWXW14","doi":"10.1016/J.INS.2014.03.009","ee":"https://doi.org/10.1016/j.ins.2014.03.009","url":"https://dblp.org/rec/journals/isci/HongPHWXW14"}, "url":"URL#3724458" }, { "@score":"6", "@id":"3724629", "info":{"authors":{"author":[{"@pid":"19/3950","text":"Huawen Liu"},{"@pid":"z/ShichaoZhang","text":"Shichao Zhang"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"MLSLR: Multilabel Learning via Sparse Logistic Regression.","venue":"Inf. Sci.","volume":"281","pages":"310-320","year":"2014","type":"Journal Articles","access":"closed","key":"journals/isci/LiuZW14","doi":"10.1016/J.INS.2014.05.013","ee":"https://doi.org/10.1016/j.ins.2014.05.013","url":"https://dblp.org/rec/journals/isci/LiuZW14"}, "url":"URL#3724629" }, { "@score":"6", "@id":"3733045", "info":{"authors":{"author":[{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"138/2494","text":"Jipeng Qiang"},{"@pid":"51/1316","text":"Fei Xie"}]},"title":"Pattern Matching with Flexible Wildcards.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"5","pages":"740-750","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/WuQX14","doi":"10.1007/S11390-014-1464-3","ee":"https://doi.org/10.1007/s11390-014-1464-3","url":"https://dblp.org/rec/journals/jcst/WuQX14"}, "url":"URL#3733045" }, { "@score":"6", "@id":"3743000", "info":{"authors":{"author":[{"@pid":"128/2055","text":"Mingquan Ye"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"54/2618","text":"Donghui Hu"}]},"title":"Knowledge reduction for decision tables with attribute value taxonomies.","venue":"Knowl. Based Syst.","volume":"56","pages":"68-78","year":"2014","type":"Journal Articles","access":"closed","key":"journals/kbs/YeWHH14","doi":"10.1016/J.KNOSYS.2013.10.022","ee":"https://doi.org/10.1016/j.knosys.2013.10.022","url":"https://dblp.org/rec/journals/kbs/YeWHH14"}, "url":"URL#3743000" }, { "@score":"6", "@id":"3743013", "info":{"authors":{"author":[{"@pid":"69/5538-1","text":"Chunxia Zhang 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"06/3613","text":"Zhendong Niu"},{"@pid":"59/622-3","text":"Wei Ding 0003"}]},"title":"Authorship identification from unstructured texts.","venue":"Knowl. Based Syst.","volume":"66","pages":"99-111","year":"2014","type":"Journal Articles","access":"closed","key":"journals/kbs/ZhangWN014","doi":"10.1016/J.KNOSYS.2014.04.025","ee":"https://doi.org/10.1016/j.knosys.2014.04.025","url":"https://dblp.org/rec/journals/kbs/ZhangWN014"}, "url":"URL#3743013" }, { "@score":"6", "@id":"3750342", "info":{"authors":{"author":[{"@pid":"63/7622","text":"Ying-Ling Liu"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"82/4977-6","text":"Jun Gao 0006"}]},"title":"A Matching Algorithm in PMWL based on CluTree.","venue":"New Gener. Comput.","volume":"32","number":"2","pages":"95-122","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ngc/LiuWHG14","doi":"10.1007/S00354-014-0201-3","ee":"https://doi.org/10.1007/s00354-014-0201-3","url":"https://dblp.org/rec/journals/ngc/LiuWHG14"}, "url":"URL#3750342" }, { "@score":"6", "@id":"3763022", "info":{"authors":{"author":[{"@pid":"21/8331","text":"Ahmed Abdeen Hamed"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"125/4108","text":"Alan Rubin"}]},"title":"A twitter recruitment intelligent system: association rule mining for smoking cessation.","venue":"Soc. Netw. Anal. Min.","volume":"4","number":"1","pages":"212","year":"2014","type":"Journal Articles","access":"closed","key":"journals/snam/HamedWR14","doi":"10.1007/S13278-014-0212-6","ee":"https://doi.org/10.1007/s13278-014-0212-6","url":"https://dblp.org/rec/journals/snam/HamedWR14"}, "url":"URL#3763022" }, { "@score":"6", "@id":"3769620", "info":{"authors":{"author":[{"@pid":"45/794","text":"Jie Gui"},{"@pid":"13/5916","text":"Zhenan Sun"},{"@pid":"78/5816","text":"Jun Cheng"},{"@pid":"84/6405","text":"Shuiwang Ji"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"How to Estimate the Regularization Parameter for Spectral Regression Discriminant Analysis and its Kernel Version?","venue":"IEEE Trans. Circuits Syst. Video Technol.","volume":"24","number":"2","pages":"211-223","year":"2014","type":"Journal Articles","access":"closed","key":"journals/tcsv/GuiSCJW14","doi":"10.1109/TCSVT.2013.2273652","ee":"https://doi.org/10.1109/TCSVT.2013.2273652","url":"https://dblp.org/rec/journals/tcsv/GuiSCJW14"}, "url":"URL#3769620" }, { "@score":"6", "@id":"3769824", "info":{"authors":{"author":[{"@pid":"59/1501","text":"Richang Hong"},{"@pid":"93/6765-1","text":"Meng Wang 0001"},{"@pid":"33/3099-2","text":"Yue Gao 0002"},{"@pid":"46/3391","text":"Dacheng Tao"},{"@pid":"l/XuelongLi","text":"Xuelong Li 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Image Annotation by Multiple-Instance Learning With Discriminative Feature Mapping and Selection.","venue":"IEEE Trans. Cybern.","volume":"44","number":"5","pages":"669-680","year":"2014","type":"Journal Articles","access":"closed","key":"journals/tcyb/HongWGTLW14","doi":"10.1109/TCYB.2013.2265601","ee":"https://doi.org/10.1109/TCYB.2013.2265601","url":"https://dblp.org/rec/journals/tcyb/HongWGTLW14"}, "url":"URL#3769824" }, { "@score":"6", "@id":"3771715", "info":{"authors":{"author":[{"@pid":"33/3099-2","text":"Yue Gao 0002"},{"@pid":"93/6765-1","text":"Meng Wang 0001"},{"@pid":"86/5681","text":"Rongrong Ji"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"39/4543","text":"Qionghai Dai"}]},"title":"3-D Object Retrieval With Hausdorff Distance Learning.","venue":"IEEE Trans. Ind. Electron.","volume":"61","number":"4","pages":"2088-2098","year":"2014","type":"Journal Articles","access":"closed","key":"journals/tie/GaoWJWD14","doi":"10.1109/TIE.2013.2262760","ee":"https://doi.org/10.1109/TIE.2013.2262760","url":"https://dblp.org/rec/journals/tie/GaoWJWD14"}, "url":"URL#3771715" }, { "@score":"12", "@id":"3775032", "info":{"authors":{"author":[{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"63/6340","text":"Gong-Qing Wu"},{"@pid":"59/622-3","text":"Wei Ding 0003"}]},"title":"Data Mining with Big Data.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"26","number":"1","pages":"97-107","year":"2014","type":"Journal Articles","access":"closed","key":"journals/tkde/WuZW014","doi":"10.1109/TKDE.2013.109","ee":"https://doi.org/10.1109/TKDE.2013.109","url":"https://dblp.org/rec/journals/tkde/WuZW014"}, "url":"URL#3775032" }, { "@score":"6", "@id":"3775053", "info":{"authors":{"author":[{"@pid":"97/8704-116","text":"Lei Zhang 0116"},{"@pid":"45/2091-1","text":"Yao Zhao 0001"},{"@pid":"46/2273","text":"Zhenfeng Zhu"},{"@pid":"15/2139","text":"Shikui Wei"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Mining Semantically Consistent Patterns for Cross-View Data.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"26","number":"11","pages":"2745-2758","year":"2014","type":"Journal Articles","access":"closed","key":"journals/tkde/ZhangZZWW14","doi":"10.1109/TKDE.2014.2313866","ee":"https://doi.org/10.1109/TKDE.2014.2313866","url":"https://dblp.org/rec/journals/tkde/ZhangZZWW14"}, "url":"URL#3775053" }, { "@score":"6", "@id":"3782635", "info":{"authors":{"author":[{"@pid":"01/3322","text":"Faliang Huang"},{"@pid":"z/ShichaoZhang","text":"Shichao Zhang"},{"@pid":"30/1609","text":"Minghua He"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Clustering web documents using hierarchical representation with multi-granularity.","venue":"World Wide Web","volume":"17","number":"1","pages":"105-126","year":"2014","type":"Journal Articles","access":"closed","key":"journals/www/HuangZHW14","doi":"10.1007/S11280-012-0197-X","ee":"https://doi.org/10.1007/s11280-012-0197-x","url":"https://dblp.org/rec/journals/www/HuangZHW14"}, "url":"URL#3782635" }, { "@score":"6", "@id":"3786250", "info":{"authors":{"author":[{"@pid":"17/1876","text":"Zhong-Qiu Zhao"},{"@pid":"161/1854","text":"Bao-Jian Xie"},{"@pid":"12/3420","text":"Yiu-ming Cheung"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Plant Leaf Identification via a Growing Convolution Neural Network with Progressive Sample Learning.","venue":"ACCV","pages":"348-361","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/accv/ZhaoXCW14","doi":"10.1007/978-3-319-16808-1_24","ee":"https://doi.org/10.1007/978-3-319-16808-1_24","url":"https://dblp.org/rec/conf/accv/ZhaoXCW14"}, "url":"URL#3786250" }, { "@score":"6", "@id":"3788437", "info":{"authors":{"author":[{"@pid":"21/8331","text":"Ahmed Abdeen Hamed"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"160/8841","text":"Tamer Fandy"}]},"title":"Mining patterns in Big Data K-H networks.","venue":"AICCSA","pages":"176-183","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/aiccsa/HamedWF14","doi":"10.1109/AICCSA.2014.7073196","ee":"https://doi.org/10.1109/AICCSA.2014.7073196","url":"https://dblp.org/rec/conf/aiccsa/HamedWF14"}, "url":"URL#3788437" }, { "@score":"6", "@id":"3797694", "info":{"authors":{"author":[{"@pid":"21/8331","text":"Ahmed Abdeen Hamed"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Does Social Media Big Data Make the World Smaller? An Exploratory Analysis of Keyword-Hashtag Networks.","venue":"BigData Congress","pages":"454-461","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/bigdata/HamedW14","doi":"10.1109/BIGDATA.CONGRESS.2014.72","ee":"https://doi.org/10.1109/BigData.Congress.2014.72","url":"https://dblp.org/rec/conf/bigdata/HamedW14"}, "url":"URL#3797694" }, { "@score":"6", "@id":"3854727", "info":{"authors":{"author":[{"@pid":"51/1316","text":"Fei Xie"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"}]},"title":"Document-Specific Keyphrase Extraction Using Sequential Patterns with Wildcards.","venue":"ICDM","pages":"1055-1060","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdm/XieWZ14","doi":"10.1109/ICDM.2014.105","ee":"https://doi.org/10.1109/ICDM.2014.105","url":"https://dblp.org/rec/conf/icdm/XieWZ14"}, "url":"URL#3854727" }, { "@score":"6", "@id":"3854749", "info":{"authors":{"author":[{"@pid":"52/2586","text":"Kui Yu"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"59/622-3","text":"Wei Ding 0003"},{"@pid":"p/JianPei","text":"Jian Pei"}]},"title":"Towards Scalable and Accurate Online Feature Selection for Big Data.","venue":"ICDM","pages":"660-669","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdm/YuW0P14","doi":"10.1109/ICDM.2014.63","ee":"https://doi.org/10.1109/ICDM.2014.63","url":"https://dblp.org/rec/conf/icdm/YuW0P14"}, "url":"URL#3854749" }, { "@score":"6", "@id":"3912820", "info":{"authors":{"author":[{"@pid":"181/2856-8","text":"Zhao Li 0008"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Single multiplicatively updated matrix factorization for co-clustering.","venue":"SAC","pages":"97-104","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/LiW14","doi":"10.1145/2554850.2554979","ee":"https://doi.org/10.1145/2554850.2554979","url":"https://dblp.org/rec/conf/sac/LiW14"}, "url":"URL#3912820" }, { "@score":"6", "@id":"3912821", "info":{"authors":{"author":[{"@pid":"06/8230","text":"Hai-Guang Li"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"181/2856-8","text":"Zhao Li 0008"}]},"title":"Online learning with mobile sensor data for user recognition.","venue":"SAC","pages":"64-70","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/LiWL14","doi":"10.1145/2554850.2554877","ee":"https://doi.org/10.1145/2554850.2554877","url":"https://dblp.org/rec/conf/sac/LiWL14"}, "url":"URL#3912821" }, { "@score":"6", "@id":"3940801", "info":{"authors":{"author":[{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"e/MartinEster","text":"Martin Ester"},{"@pid":"59/2340","text":"Guandong Xu"}]},"title":"2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2014, Beijing, China, August 17-20, 2014","venue":"ASONAM","publisher":"IEEE Computer Society","year":"2014","type":"Editorship","key":"conf/asunam/2014","ee":"https://ieeexplore.ieee.org/xpl/conhome/6911097/proceeding","url":"https://dblp.org/rec/conf/asunam/2014"}, "url":"URL#3940801" }, { "@score":"6", "@id":"3941745", "info":{"authors":{"author":[{"@pid":"k/RaviKumar","text":"Ravi Kumar 0001"},{"@pid":"t/HannuToivonen","text":"Hannu Toivonen"},{"@pid":"p/JianPei","text":"Jian Pei"},{"@pid":"h/JoshuaZhexueHuang","text":"Joshua Zhexue Huang"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"2014 IEEE International Conference on Data Mining, ICDM 2014, Shenzhen, China, December 14-17, 2014","venue":"ICDM","publisher":"IEEE Computer Society","year":"2014","type":"Editorship","key":"conf/icdm/2014","ee":"https://ieeexplore.ieee.org/xpl/conhome/7022262/proceeding","url":"https://dblp.org/rec/conf/icdm/2014"}, "url":"URL#3941745" }, { "@score":"6", "@id":"3941746", "info":{"authors":{"author":[{"@pid":"z/ZhiHuaZhou","text":"Zhi-Hua Zhou"},{"@pid":"35/7092-28","text":"Wei Wang 0028"},{"@pid":"k/RaviKumar","text":"Ravi Kumar 0001"},{"@pid":"t/HannuToivonen","text":"Hannu Toivonen"},{"@pid":"p/JianPei","text":"Jian Pei"},{"@pid":"h/JoshuaZhexueHuang","text":"Joshua Zhexue Huang"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"2014 IEEE International Conference on Data Mining Workshops, ICDM Workshops 2014, Shenzhen, China, December 14, 2014","venue":"ICDM Workshops","publisher":"IEEE Computer Society","year":"2014","type":"Editorship","key":"conf/icdm/2014w","ee":"https://ieeexplore.ieee.org/xpl/conhome/7022263/proceeding","url":"https://dblp.org/rec/conf/icdm/2014w"}, "url":"URL#3941746" }, { "@score":"6", "@id":"3973965", "info":{"authors":{"author":[{"@pid":"44/6570","text":"Dan Guo"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"51/1316","text":"Fei Xie"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Pattern matching with wildcards and gap-length constraints based on a centrality-degree graph.","venue":"Appl. Intell.","volume":"39","number":"1","pages":"57-74","year":"2013","type":"Journal Articles","access":"closed","key":"journals/apin/GuoHXW13","doi":"10.1007/S10489-012-0394-4","ee":"https://doi.org/10.1007/s10489-012-0394-4","url":"https://dblp.org/rec/journals/apin/GuoHXW13"}, "url":"URL#3973965" }, { "@score":"6", "@id":"3973984", "info":{"authors":{"author":[{"@pid":"06/8230","text":"Hai-Guang Li"},{"@pid":"181/2856-8","text":"Zhao Li 0008"},{"@pid":"116/4938","text":"Robert T. White"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"A real-time transportation prediction system.","venue":"Appl. Intell.","volume":"39","number":"4","pages":"793-804","year":"2013","type":"Journal Articles","access":"closed","key":"journals/apin/LiLWW13","doi":"10.1007/S10489-012-0409-1","ee":"https://doi.org/10.1007/s10489-012-0409-1","url":"https://dblp.org/rec/journals/apin/LiLWW13"}, "url":"URL#3973984" }, { "@score":"12", "@id":"3973985", "info":{"authors":{"author":[{"@pid":"06/8230","text":"Hai-Guang Li"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"181/2856-8","text":"Zhao Li 0008"},{"@pid":"63/6340","text":"Gong-Qing Wu"}]},"title":"A relation extraction method of Chinese named entities based on location and semantic features.","venue":"Appl. Intell.","volume":"38","number":"1","pages":"1-15","year":"2013","type":"Journal Articles","access":"closed","key":"journals/apin/LiWLW13","doi":"10.1007/S10489-012-0353-0","ee":"https://doi.org/10.1007/s10489-012-0353-0","url":"https://dblp.org/rec/journals/apin/LiWLW13"}, "url":"URL#3973985" }, { "@score":"6", "@id":"3974023", "info":{"authors":{"author":[{"@pid":"128/2055","text":"Mingquan Ye"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"54/2618","text":"Donghui Hu"}]},"title":"Multi-level rough set reduction for decision rule mining.","venue":"Appl. Intell.","volume":"39","number":"3","pages":"642-658","year":"2013","type":"Journal Articles","access":"closed","key":"journals/apin/YeWHH13","doi":"10.1007/S10489-013-0439-3","ee":"https://doi.org/10.1007/s10489-013-0439-3","url":"https://dblp.org/rec/journals/apin/YeWHH13"}, "url":"URL#3974023" }, { "@score":"6", "@id":"3980043", "info":{"authors":{"author":[{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"16/3418","text":"Yu He"},{"@pid":"a/AbdullahNArslan","text":"Abdullah N. Arslan"}]},"title":"PMBC: Pattern mining from biological sequences with wildcard constraints.","venue":"Comput. Biol. Medicine","volume":"43","number":"5","pages":"481-492","year":"2013","type":"Journal Articles","access":"closed","key":"journals/cbm/WuZHA13","doi":"10.1016/J.COMPBIOMED.2013.02.006","ee":"https://doi.org/10.1016/j.compbiomed.2013.02.006","url":"https://dblp.org/rec/journals/cbm/WuZHA13"}, "url":"URL#3980043" }, { "@score":"6", "@id":"3991268", "info":{"authors":{"author":[{"@pid":"123/4939","text":"Yaojin Lin"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"53/4014","text":"Xiaomei Li"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Mining stable patterns in multiple correlated databases.","venue":"Decis. Support Syst.","volume":"56","pages":"202-210","year":"2013","type":"Journal Articles","access":"closed","key":"journals/dss/LinHLW13","doi":"10.1016/J.DSS.2013.06.003","ee":"https://doi.org/10.1016/j.dss.2013.06.003","url":"https://dblp.org/rec/journals/dss/LinHLW13"}, "url":"URL#3991268" }, { "@score":"12", "@id":"4003322", "info":{"authors":{"author":[{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"51/1316","text":"Fei Xie"},{"@pid":"63/6340","text":"Gong-Qing Wu"},{"@pid":"59/622-3","text":"Wei Ding 0003"}]},"title":"Pnfs: Personalized Web News Filtering and Summarization.","venue":"Int. J. Artif. Intell. Tools","volume":"22","number":"5","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ijait/WuXW013","doi":"10.1142/S0218213013600075","ee":"https://doi.org/10.1142/S0218213013600075","url":"https://dblp.org/rec/journals/ijait/WuXW013"}, "url":"URL#4003322" }, { "@score":"6", "@id":"4006194", "info":{"authors":{"author":[{"@pid":"51/1316","text":"Fei Xie"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"82/4977-6","text":"Jun Gao 0006"},{"@pid":"44/6570","text":"Dan Guo"},{"@pid":"00/4881","text":"Yulian Fei"},{"@pid":"28/7682","text":"Ertian Hua"}]},"title":"MAIL: mining sequential patterns with wildcards.","venue":"Int. J. Data Min. Bioinform.","volume":"8","number":"1","pages":"1-23","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ijdmb/XieWHGGFH13","doi":"10.1504/IJDMB.2013.054690","ee":"https://doi.org/10.1504/IJDMB.2013.054690","url":"https://dblp.org/rec/journals/ijdmb/XieWHGGFH13"}, "url":"URL#4006194" }, { "@score":"6", "@id":"4010495", "info":{"authors":{"author":[{"@pid":"30/3790-1","text":"He Jiang 0001"},{"@pid":"85/6484","text":"Zhilei Ren"},{"@pid":"86/4142","text":"Jifeng Xuan"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Extracting elite pairwise constraints for clustering.","venue":"Neurocomputing","volume":"99","pages":"124-133","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ijon/JiangRXW13","doi":"10.1016/J.NEUCOM.2012.06.013","ee":"https://doi.org/10.1016/j.neucom.2012.06.013","url":"https://dblp.org/rec/journals/ijon/JiangRXW13"}, "url":"URL#4010495" }, { "@score":"6", "@id":"4031823", "info":{"authors":{"author":[{"@pid":"128/2055","text":"Mingquan Ye"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"54/2618","text":"Donghui Hu"}]},"title":"Anonymizing classification data using rough set theory.","venue":"Knowl. Based Syst.","volume":"43","pages":"82-94","year":"2013","type":"Journal Articles","access":"closed","key":"journals/kbs/YeWHH13","doi":"10.1016/J.KNOSYS.2013.01.007","ee":"https://doi.org/10.1016/j.knosys.2013.01.007","url":"https://dblp.org/rec/journals/kbs/YeWHH13"}, "url":"URL#4031823" }, { "@score":"6", "@id":"4040791", "info":{"authors":{"author":[{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"52/2586","text":"Kui Yu"},{"@pid":"59/622-3","text":"Wei Ding 0003"},{"@pid":"w/HaoWang-8","text":"Hao Wang 0008"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"}]},"title":"Online Feature Selection with Streaming Features.","venue":"IEEE Trans. Pattern Anal. Mach. Intell.","volume":"35","number":"5","pages":"1178-1192","year":"2013","type":"Journal Articles","access":"closed","key":"journals/pami/WuYDWZ13","doi":"10.1109/TPAMI.2012.197","ee":"https://doi.org/10.1109/TPAMI.2012.197","url":"https://dblp.org/rec/journals/pami/WuYDWZ13"}, "url":"URL#4040791" }, { "@score":"6", "@id":"4049670", "info":{"authors":{"author":[{"@pid":"59/1501","text":"Richang Hong"},{"@pid":"23/1818","text":"Zheng-Jun Zha"},{"@pid":"33/3099-2","text":"Yue Gao 0002"},{"@pid":"24/6606","text":"Tat-Seng Chua"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Multimedia encyclopedia construction by mining web knowledge.","venue":"Signal Process.","volume":"93","number":"8","pages":"2361-2368","year":"2013","type":"Journal Articles","access":"closed","key":"journals/sigpro/HongZGCW13","doi":"10.1016/J.SIGPRO.2012.06.028","ee":"https://doi.org/10.1016/j.sigpro.2012.06.028","url":"https://dblp.org/rec/journals/sigpro/HongZGCW13"}, "url":"URL#4049670" }, { "@score":"6", "@id":"4060465", "info":{"authors":{"author":[{"@pid":"33/3099-2","text":"Yue Gao 0002"},{"@pid":"93/6765-1","text":"Meng Wang 0001"},{"@pid":"23/1818","text":"Zheng-Jun Zha"},{"@pid":"33/7046","text":"Jialie Shen 0001"},{"@pid":"l/XuelongLi","text":"Xuelong Li 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Visual-Textual Joint Relevance Learning for Tag-Based Social Image Search.","venue":"IEEE Trans. Image Process.","volume":"22","number":"1","pages":"363-376","year":"2013","type":"Journal Articles","access":"closed","key":"journals/tip/GaoWZSLW13","doi":"10.1109/TIP.2012.2202676","ee":"https://doi.org/10.1109/TIP.2012.2202676","url":"https://dblp.org/rec/journals/tip/GaoWZSLW13"}, "url":"URL#4060465" }, { "@score":"6", "@id":"4062327", "info":{"authors":{"author":[{"@pid":"52/2586","text":"Kui Yu"},{"@pid":"59/622-3","text":"Wei Ding 0003"},{"@pid":"w/HaoWang-8","text":"Hao Wang 0008"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Bridging Causal Relevance and Pattern Discriminability: Mining Emerging Patterns from High-Dimensional Data.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"25","number":"12","pages":"2721-2739","year":"2013","type":"Journal Articles","access":"closed","key":"journals/tkde/YuDWW13","doi":"10.1109/TKDE.2012.218","ee":"https://doi.org/10.1109/TKDE.2012.218","url":"https://dblp.org/rec/journals/tkde/YuDWW13"}, "url":"URL#4062327" }, { "@score":"6", "@id":"4071925", "info":{"authors":{"author":[{"@pid":"06/8230","text":"Hai-Guang Li"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"181/2856-8","text":"Zhao Li 0008"},{"@pid":"59/622-3","text":"Wei Ding 0003"}]},"title":"Online Group Feature Selection from Feature Streams.","venue":"AAAI","pages":"1627-1628","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/LiWLD13","doi":"10.1609/AAAI.V27I1.8516","ee":"https://doi.org/10.1609/aaai.v27i1.8516","url":"https://dblp.org/rec/conf/aaai/LiWLD13"}, "url":"URL#4071925" }, { "@score":"12", "@id":"4071926", "info":{"authors":{"author":[{"@pid":"53/4014","text":"Xiaomei Li"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"63/6340","text":"Gong-Qing Wu"},{"@pid":"38/5910","text":"Xuegang Hu"}]},"title":"Subchloroplast Location Prediction via Homolog Knowledge Transfer and Feature Selection.","venue":"AAAI","pages":"1631-1632","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/LiWWH13","doi":"10.1609/AAAI.V27I1.8527","ee":"https://doi.org/10.1609/aaai.v27i1.8527","url":"https://dblp.org/rec/conf/aaai/LiWWH13"}, "url":"URL#4071926" }, { "@score":"6", "@id":"4072099", "info":{"authors":{"author":[{"@pid":"05/3499-15","text":"Jing Zhang 0015"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"36/4372","text":"Victor Shengli Sheng"}]},"title":"Imbalanced Multiple Noisy Labeling for Supervised Learning.","venue":"AAAI","pages":"1651-1652","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/ZhangWS13","doi":"10.1609/AAAI.V27I1.8530","ee":"https://doi.org/10.1609/aaai.v27i1.8530","url":"https://dblp.org/rec/conf/aaai/ZhangWS13"}, "url":"URL#4072099" }, { "@score":"6", "@id":"4082949", "info":{"authors":{"author":[{"@pid":"21/8331","text":"Ahmed Abdeen Hamed"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"139/2311","text":"James R. Fingar"}]},"title":"A Twitter-based smoking cessation recruitment system.","venue":"ASONAM","pages":"854-861","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/HamedWF13","doi":"10.1145/2492517.2500228","ee":"https://doi.org/10.1145/2492517.2500228","url":"https://dblp.org/rec/conf/asunam/HamedWF13"}, "url":"URL#4082949" }, { "@score":"6", "@id":"4083095", "info":{"authors":{"author":[{"@pid":"05/3499-15","text":"Jing Zhang 0015"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"36/4372","text":"Victor S. Sheng"}]},"title":"A threshold method for imbalanced multiple noisy labeling.","venue":"ASONAM","pages":"61-65","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/ZhangWS13","doi":"10.1145/2492517.2492640","ee":"https://doi.org/10.1145/2492517.2492640","url":"https://dblp.org/rec/conf/asunam/ZhangWS13"}, "url":"URL#4083095" }, { "@score":"6", "@id":"4095102", "info":{"authors":{"author":[{"@pid":"60/3675-1","text":"Pei-Pei Li 0001"},{"@pid":"w/HaixunWang","text":"Haixun Wang"},{"@pid":"19/6359","text":"Hongsong Li"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Assessing sparse information extraction using semantic contexts.","venue":"CIKM","pages":"1709-1714","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/cikm/LiWLW13","doi":"10.1145/2505515.2505598","ee":"https://doi.org/10.1145/2505515.2505598","url":"https://dblp.org/rec/conf/cikm/LiWLW13"}, "url":"URL#4095102" }, { "@score":"6", "@id":"4095103", "info":{"authors":{"author":[{"@pid":"60/3675-1","text":"Pei-Pei Li 0001"},{"@pid":"w/HaixunWang","text":"Haixun Wang"},{"@pid":"z/KennyQiliZhu","text":"Kenny Q. Zhu"},{"@pid":"84/6394-6","text":"Zhongyuan Wang 0006"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Computing term similarity by large probabilistic isA knowledge.","venue":"CIKM","pages":"1401-1410","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/cikm/LiWZWW13","doi":"10.1145/2505515.2505567","ee":"https://doi.org/10.1145/2505515.2505567","url":"https://dblp.org/rec/conf/cikm/LiWZWW13"}, "url":"URL#4095103" }, { "@score":"12", "@id":"4095303", "info":{"authors":{"author":[{"@pid":"63/6340","text":"Gong-Qing Wu"},{"@pid":"53/2189","text":"Li Li"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Web news extraction via path ratios.","venue":"CIKM","pages":"2059-2068","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/cikm/WuLHW13","doi":"10.1145/2505515.2505558","ee":"https://doi.org/10.1145/2505515.2505558","url":"https://dblp.org/rec/conf/cikm/WuLHW13"}, "url":"URL#4095303" }, { "@score":"6", "@id":"4141811", "info":{"authors":{"author":[{"@pid":"06/8230","text":"Hai-Guang Li"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"181/2856-8","text":"Zhao Li 0008"},{"@pid":"59/622-3","text":"Wei Ding 0003"}]},"title":"Group Feature Selection with Streaming Features.","venue":"ICDM","pages":"1109-1114","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdm/LiWLD13","doi":"10.1109/ICDM.2013.137","ee":"https://doi.org/10.1109/ICDM.2013.137","url":"https://dblp.org/rec/conf/icdm/LiWLD13"}, "url":"URL#4141811" }, { "@score":"6", "@id":"4141945", "info":{"authors":{"author":[{"@pid":"52/2586","text":"Kui Yu"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"123/0825","text":"Zan Zhang"},{"@pid":"32/7620","text":"Yang Mu"},{"@pid":"w/HaoWang-8","text":"Hao Wang 0008"},{"@pid":"59/622-3","text":"Wei Ding 0003"}]},"title":"Markov Blanket Feature Selection with Non-faithful Data Distributions.","venue":"ICDM","pages":"857-866","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdm/YuWZMWD13","doi":"10.1109/ICDM.2013.154","ee":"https://doi.org/10.1109/ICDM.2013.154","url":"https://dblp.org/rec/conf/icdm/YuWZMWD13"}, "url":"URL#4141945" }, { "@score":"6", "@id":"4153760", "info":{"authors":{"author":[{"@pid":"44/6570","text":"Dan Guo"},{"@pid":"141/2062","text":"Taining Xiang"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Flexible Pattern Matching with Gap-Length and One-Off Conditions.","venue":"ICTAI","pages":"446-453","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/ictai/GuoXHW13","doi":"10.1109/ICTAI.2013.73","ee":"https://doi.org/10.1109/ICTAI.2013.73","url":"https://dblp.org/rec/conf/ictai/GuoXHW13"}, "url":"URL#4153760" }, { "@score":"6", "@id":"4160591", "info":{"authors":{"author":[{"@pid":"02/736-21","text":"Jing Wang 0021"},{"@pid":"17/1876","text":"Zhong-Qiu Zhao"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"12/3420","text":"Yiu-ming Cheung"},{"@pid":"93/6765-1","text":"Meng Wang 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Online Group Feature Selection.","venue":"IJCAI","pages":"1757-1763","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/ijcai/WangZHCWW13","ee":"http://www.aaai.org/ocs/index.php/IJCAI/IJCAI13/paper/view/6765","url":"https://dblp.org/rec/conf/ijcai/WangZHCWW13"}, "url":"URL#4160591" }, { "@score":"6", "@id":"4177365", "info":{"authors":{"author":[{"@pid":"39/2537-8","text":"Dawei Wang 0008"},{"@pid":"59/622-3","text":"Wei Ding 0003"},{"@pid":"52/2586","text":"Kui Yu"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"33/3675-1","text":"Ping Chen 0001"},{"@pid":"134/4007","text":"David L. Small"},{"@pid":"89/7747","text":"Shafiqul Islam"}]},"title":"Towards long-lead forecasting of extreme flood events: a data mining framework for precipitation cluster precursors identification.","venue":"KDD","pages":"1285-1293","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/WangDYWCSI13","doi":"10.1145/2487575.2488220","ee":"https://doi.org/10.1145/2487575.2488220","url":"https://dblp.org/rec/conf/kdd/WangDYWCSI13"}, "url":"URL#4177365" }, { "@score":"6", "@id":"4191992", "info":{"authors":{"author":[{"@pid":"60/4671-1","text":"Xiaofeng Zhu 0001"},{"@pid":"70/6862","text":"Zi Huang"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Multi-View Visual Classification via a Mixed-Norm Regularizer.","venue":"PAKDD","pages":"520-531","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/pakdd/ZhuHW13","doi":"10.1007/978-3-642-37453-1_43","ee":"https://doi.org/10.1007/978-3-642-37453-1_43","url":"https://dblp.org/rec/conf/pakdd/ZhuHW13"}, "url":"URL#4191992" }, { "@score":"6", "@id":"4200406", "info":{"authors":{"author":[{"@pid":"59/622-3","text":"Wei Ding 0003"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"z/ShichaoZhang","text":"Shichao Zhang"},{"@pid":"60/4671-1","text":"Xiaofeng Zhu 0001"}]},"title":"Feature Selection by Joint Graph Sparse Coding.","venue":"SDM","pages":"803-811","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/sdm/0003W0Z13","doi":"10.1137/1.9781611972832.89","ee":"https://doi.org/10.1137/1.9781611972832.89","url":"https://dblp.org/rec/conf/sdm/0003W0Z13"}, "url":"URL#4200406" }, { "@score":"6", "@id":"4226755", "info":{"authors":{"author":[{"@pid":"x/HuiXiong","text":"Hui Xiong 0001"},{"@pid":"k/GeorgeKarypis","text":"George Karypis"},{"@pid":"t/BMThuraisingham","text":"Bhavani Thuraisingham"},{"@pid":"c/DianeJCook","text":"Diane J. Cook"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"2013 IEEE 13th International Conference on Data Mining, Dallas, TX, USA, December 7-10, 2013","venue":"ICDM","publisher":"IEEE Computer Society","year":"2013","type":"Editorship","key":"conf/icdm/2013","ee":"https://ieeexplore.ieee.org/xpl/conhome/6724379/proceeding","url":"https://dblp.org/rec/conf/icdm/2013"}, "url":"URL#4226755" }, { "@score":"6", "@id":"4226756", "info":{"authors":{"author":[{"@pid":"59/622-3","text":"Wei Ding 0003"},{"@pid":"w/TakashiWashio","text":"Takashi Washio"},{"@pid":"x/HuiXiong","text":"Hui Xiong 0001"},{"@pid":"k/GeorgeKarypis","text":"George Karypis"},{"@pid":"t/BMThuraisingham","text":"Bhavani Thuraisingham"},{"@pid":"c/DianeJCook","text":"Diane J. Cook"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"13th IEEE International Conference on Data Mining Workshops, ICDM Workshops, TX, USA, December 7-10, 2013","venue":"ICDM Workshops","publisher":"IEEE Computer Society","year":"2013","type":"Editorship","key":"conf/icdm/2013w","ee":"https://ieeexplore.ieee.org/xpl/conhome/6732242/proceeding","url":"https://dblp.org/rec/conf/icdm/2013w"}, "url":"URL#4226756" }, { "@score":"6", "@id":"4226801", "info":{"authors":{"author":[{"@pid":"33/1254","text":"Ke Lu"},{"@pid":"12/5444","text":"Tao Mei"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"International Conference on Internet Multimedia Computing and Service, ICIMCS '13, Huangshan, China - August 17 - 19, 2013","venue":"ICIMCS","publisher":"ACM","year":"2013","type":"Editorship","key":"conf/icimcs/2013","ee":"http://dl.acm.org/citation.cfm?id=2499788","url":"https://dblp.org/rec/conf/icimcs/2013"}, "url":"URL#4226801" }, { "@score":"6", "@id":"4254819", "info":{"authors":{"author":[{"@pid":"z/ShichaoZhang","text":"Shichao Zhang"},{"@pid":"21/3047","text":"Feng Chen"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"71/964","text":"Chengqi Zhang"},{"@pid":"00/7016","text":"Ruili Wang"}]},"title":"Mining bridging rules between conceptual clusters.","venue":"Appl. Intell.","volume":"36","number":"1","pages":"108-118","year":"2012","type":"Journal Articles","access":"closed","key":"journals/apin/ZhangCWZW12","doi":"10.1007/S10489-010-0247-Y","ee":"https://doi.org/10.1007/s10489-010-0247-y","url":"https://dblp.org/rec/journals/apin/ZhangCWZW12"}, "url":"URL#4254819" }, { "@score":"6", "@id":"4263205", "info":{"authors":{"author":[{"@pid":"52/2586","text":"Kui Yu"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"59/622-3","text":"Wei Ding 0003"},{"@pid":"w/HaoWang-8","text":"Hao Wang 0008"}]},"title":"Exploring Causal Relationships with Streaming Features.","venue":"Comput. J.","volume":"55","number":"9","pages":"1103-1117","year":"2012","type":"Journal Articles","access":"closed","key":"journals/cj/YuWDW12","doi":"10.1093/COMJNL/BXS032","ee":"https://doi.org/10.1093/comjnl/bxs032","url":"https://dblp.org/rec/journals/cj/YuWDW12"}, "url":"URL#4263205" }, { "@score":"6", "@id":"4285044", "info":{"authors":{"author":[{"@pid":"35/3429","text":"Guojun Mao"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"80/6988","text":"Xuxian Jiang"}]},"title":"Intrusion Detection Models Based on Data Mining.","venue":"Int. J. Comput. Intell. Syst.","volume":"5","number":"1","pages":"30-38","year":"2012","type":"Journal Articles","access":"open","key":"journals/ijcisys/MaoWJ12","doi":"10.1080/18756891.2012.670519","ee":"https://doi.org/10.1080/18756891.2012.670519","url":"https://dblp.org/rec/journals/ijcisys/MaoWJ12"}, "url":"URL#4285044" }, { "@score":"8", "@id":"4287024", "info":{"authors":{"author":[{"@pid":"79/4191","text":"Fan Min 0001"},{"@pid":"46/8700","text":"Youxi Wu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"The Apriori property of sequence pattern mining with wildcard gaps.","venue":"Int. J. Funct. Informatics Pers. Medicine","volume":"4","number":"1","pages":"15-31","year":"2012","type":"Journal Articles","access":"closed","key":"journals/ijfipm/MinWW12","doi":"10.1504/IJFIPM.2012.050418","ee":"https://doi.org/10.1504/IJFIPM.2012.050418","url":"https://dblp.org/rec/journals/ijfipm/MinWW12"}, "url":"URL#4287024" }, { "@score":"6", "@id":"4288291", "info":{"authors":{"author":[{"@pid":"38/4649","text":"Gabor Melli"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"16/6540","text":"Paul Beinat"},{"@pid":"b/FBonchi","text":"Francesco Bonchi"},{"@pid":"14/2589","text":"Longbing Cao"},{"@pid":"64/2818","text":"Rong Duan"},{"@pid":"f/CFaloutsos","text":"Christos Faloutsos"},{"@pid":"19/6687","text":"Rayid Ghani"},{"@pid":"96/2817","text":"Brendan Kitts"},{"@pid":"g/BartGoethals","text":"Bart Goethals"},{"@pid":"83/3246","text":"Geoffrey J. McLachlan"},{"@pid":"p/JianPei","text":"Jian Pei"},{"@pid":"30/6673","text":"Ashok Srivastava"},{"@pid":"z/OsmarRZaiane","text":"Osmar R. Zaïane"}]},"title":"Top-10 Data Mining Case Studies.","venue":"Int. J. Inf. Technol. Decis. Mak.","volume":"11","number":"2","pages":"389-400","year":"2012","type":"Journal Articles","access":"closed","key":"journals/ijitdm/MelliWBBCDFGKGMPSZ12","doi":"10.1142/S021962201240007X","ee":"https://doi.org/10.1142/S021962201240007X","url":"https://dblp.org/rec/journals/ijitdm/MelliWBBCDFGKGMPSZ12"}, "url":"URL#4288291" }, { "@score":"6", "@id":"4290160", "info":{"authors":{"author":[{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"60/3675-1","text":"Pei-Pei Li 0001"},{"@pid":"38/5910","text":"Xuegang Hu"}]},"title":"Learning from concept drifting data streams with unlabeled data.","venue":"Neurocomputing","volume":"92","pages":"145-155","year":"2012","type":"Journal Articles","access":"closed","key":"journals/ijon/WuLH12","doi":"10.1016/J.NEUCOM.2011.08.041","ee":"https://doi.org/10.1016/j.neucom.2011.08.041","url":"https://dblp.org/rec/journals/ijon/WuLH12"}, "url":"URL#4290160" }, { "@score":"6", "@id":"4290878", "info":{"authors":{"author":[{"@pid":"181/2856-8","text":"Zhao Li 0008"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Fast Co-Clustering by Ranking and Sampling.","venue":"Int. J. Softw. Informatics","volume":"6","number":"4","pages":"523-534","year":"2012","type":"Journal Articles","access":"closed","key":"journals/ijsi/LiW12","ee":"http://www.ijsi.org/ch/reader/view_abstract.aspx?file_no=i143","url":"https://dblp.org/rec/journals/ijsi/LiW12"}, "url":"URL#4290878" }, { "@score":"6", "@id":"4313038", "info":{"authors":{"author":[{"@pid":"88/8205-1","text":"Tianyi Zhou 0001"},{"@pid":"46/3391","text":"Dacheng Tao"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Compressed labeling on distilled labelsets for multi-label learning.","venue":"Mach. Learn.","volume":"88","number":"1-2","pages":"69-126","year":"2012","type":"Journal Articles","access":"open","key":"journals/ml/ZhouTW12","doi":"10.1007/S10994-011-5276-1","ee":"https://doi.org/10.1007/s10994-011-5276-1","url":"https://dblp.org/rec/journals/ml/ZhouTW12"}, "url":"URL#4313038" }, { "@score":"6", "@id":"4336583", "info":{"authors":{"author":[{"@pid":"93/6765-1","text":"Meng Wang 0001"},{"@pid":"17/5705","text":"Hao Li"},{"@pid":"46/3391","text":"Dacheng Tao"},{"@pid":"33/1254","text":"Ke Lu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Multimodal Graph-Based Reranking for Web Image Search.","venue":"IEEE Trans. Image Process.","volume":"21","number":"11","pages":"4649-4661","year":"2012","type":"Journal Articles","access":"closed","key":"journals/tip/WangLTLW12","doi":"10.1109/TIP.2012.2207397","ee":"https://doi.org/10.1109/TIP.2012.2207397","url":"https://dblp.org/rec/journals/tip/WangLTLW12"}, "url":"URL#4336583" }, { "@score":"6", "@id":"4336642", "info":{"authors":{"author":[{"@pid":"17/1876","text":"Zhong-Qiu Zhao"},{"@pid":"95/3400","text":"Hervé Glotin"},{"@pid":"32/6328","text":"Zhao Xie"},{"@pid":"82/4977-6","text":"Jun Gao 0006"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Cooperative Sparse Representation in Two Opposite Directions for Semi-Supervised Image Annotation.","venue":"IEEE Trans. Image Process.","volume":"21","number":"9","pages":"4218-4231","year":"2012","type":"Journal Articles","access":"closed","key":"journals/tip/ZhaoGXGW12","doi":"10.1109/TIP.2012.2197631","ee":"https://doi.org/10.1109/TIP.2012.2197631","url":"https://dblp.org/rec/journals/tip/ZhaoGXGW12"}, "url":"URL#4336642" }, { "@score":"6", "@id":"4336740", "info":{"authors":{"author":[{"@pid":"60/3675-1","text":"Pei-Pei Li 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"38/5910","text":"Xuegang Hu"}]},"title":"Mining Recurring Concept Drifts with Limited Labeled Streaming Data.","venue":"ACM Trans. Intell. Syst. Technol.","volume":"3","number":"2","pages":"29:1-29:32","year":"2012","type":"Journal Articles","access":"closed","key":"journals/tist/LiWH12","doi":"10.1145/2089094.2089105","ee":"https://doi.org/10.1145/2089094.2089105","url":"https://dblp.org/rec/journals/tist/LiWH12"}, "url":"URL#4336740" }, { "@score":"6", "@id":"4395788", "info":{"authors":{"author":[{"@pid":"63/7622","text":"Ying-Ling Liu"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"82/4977-6","text":"Jun Gao 0006"},{"@pid":"09/404","text":"Chi Wang"}]},"title":"Pattern matching with wildcards based on multiple suffix trees.","venue":"GrC","pages":"320-325","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/grc/LiuWHGW12","doi":"10.1109/GRC.2012.6468626","ee":"https://doi.org/10.1109/GrC.2012.6468626","url":"https://dblp.org/rec/conf/grc/LiuWHGW12"}, "url":"URL#4395788" }, { "@score":"6", "@id":"4395806", "info":{"authors":{"author":[{"@pid":"138/2494","text":"Jipeng Qiang"},{"@pid":"40/7075","text":"Weidong Tian"},{"@pid":"44/6570","text":"Dan Guo"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Online pattern matching with wildcards.","venue":"GrC","pages":"394-399","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/grc/QiangTGW12","doi":"10.1109/GRC.2012.6468639","ee":"https://doi.org/10.1109/GrC.2012.6468639","url":"https://dblp.org/rec/conf/grc/QiangTGW12"}, "url":"URL#4395806" }, { "@score":"12", "@id":"4396094", "info":{"authors":{"author":[{"@pid":"05/3499-15","text":"Jing Zhang 0015"},{"@pid":"63/6340","text":"Gong-Qing Wu"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"A Distributed Cache for Hadoop Distributed File System in Real-Time Cloud Services.","venue":"GRID","pages":"12-21","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/grid/ZhangWHW12","doi":"10.1109/GRID.2012.17","ee":"https://doi.org/10.1109/Grid.2012.17","url":"https://dblp.org/rec/conf/grid/ZhangWHW12"}, "url":"URL#4396094" }, { "@score":"6", "@id":"4408495", "info":{"authors":{"author":[{"@pid":"67/463","text":"Meng Fang"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"89/6764-15","text":"Bin Li 0015"},{"@pid":"59/622-3","text":"Wei Ding 0003"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Self-Taught Active Learning from Crowds.","venue":"ICDM","pages":"858-863","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdm/FangZLDW12","doi":"10.1109/ICDM.2012.64","ee":"https://doi.org/10.1109/ICDM.2012.64","url":"https://dblp.org/rec/conf/icdm/FangZLDW12"}, "url":"URL#4408495" }, { "@score":"6", "@id":"4422391", "info":{"authors":{"author":[{"@pid":"06/8230","text":"Hai-Guang Li"},{"@pid":"181/2856-8","text":"Zhao Li 0008"},{"@pid":"116/4938","text":"Robert T. White"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"A Real-Time Transportation Prediction System.","venue":"IEA/AIE","pages":"68-77","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieaaie/LiLWW12","doi":"10.1007/978-3-642-31087-4_8","ee":"https://doi.org/10.1007/978-3-642-31087-4_8","url":"https://dblp.org/rec/conf/ieaaie/LiLWW12"}, "url":"URL#4422391" }, { "@score":"8", "@id":"4445012", "info":{"authors":{"author":[{"@pid":"117/4296","text":"Yin Song"},{"@pid":"14/2589","text":"Longbing Cao"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"52/3901","text":"Gang Wei"},{"@pid":"84/308","text":"Wu Ye"},{"@pid":"59/622-3","text":"Wei Ding 0003"}]},"title":"Coupled behavior analysis for capturing coupling relationships in group-based market manipulations.","venue":"KDD","pages":"976-984","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/SongCWWYD12","doi":"10.1145/2339530.2339683","ee":"https://doi.org/10.1145/2339530.2339683","url":"https://dblp.org/rec/conf/kdd/SongCWWYD12"}, "url":"URL#4445012" }, { "@score":"6", "@id":"4445060", "info":{"authors":{"author":[{"@pid":"52/2586","text":"Kui Yu"},{"@pid":"59/622-3","text":"Wei Ding 0003"},{"@pid":"81/6368","text":"Dan A. Simovici"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Mining emerging patterns by streaming feature selection.","venue":"KDD","pages":"60-68","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/YuDSW12","doi":"10.1145/2339530.2339544","ee":"https://doi.org/10.1145/2339530.2339544","url":"https://dblp.org/rec/conf/kdd/YuDSW12"}, "url":"URL#4445060" }, { "@score":"12", "@id":"4484818", "info":{"authors":{"author":[{"@pid":"63/6340","text":"Gong-Qing Wu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Extracting Web News Using Tag Path Patterns.","venue":"Web Intelligence","pages":"588-595","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/webi/WuW12","doi":"10.1109/WI-IAT.2012.107","ee":"https://doi.org/10.1109/WI-IAT.2012.107","url":"https://dblp.org/rec/conf/webi/WuW12"}, "url":"URL#4484818" }, { "@score":"6", "@id":"4491738", "info":{"authors":{"author":[{"@pid":"65/7211-1","text":"Tianyu Cao 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"h/XiaohuaHu","text":"Xiaohua Hu 0001"}]},"title":"ProteinNET: A Protein Interaction Network Integration System.","venue":"Modern Advances in Intelligent Systems and Tools","pages":"71-76","year":"2012","type":"Parts in Books or Collections","access":"closed","key":"series/sci/CaoWH12","doi":"10.1007/978-3-642-30732-4_9","ee":"https://doi.org/10.1007/978-3-642-30732-4_9","url":"https://dblp.org/rec/series/sci/CaoWH12"}, "url":"URL#4491738" }, { "@score":"6", "@id":"4493230", "info":{"authors":{"author":[{"@pid":"z/MohammedJaveedZaki","text":"Mohammed Javeed Zaki"},{"@pid":"s/ArnoSiebes","text":"Arno Siebes"},{"@pid":"y/JXuYu","text":"Jeffrey Xu Yu"},{"@pid":"g/BartGoethals","text":"Bart Goethals"},{"@pid":"w/GeoffreyIWebb","text":"Geoffrey I. Webb"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"12th IEEE International Conference on Data Mining, ICDM 2012, Brussels, Belgium, December 10-13, 2012","venue":"ICDM","publisher":"IEEE Computer Society","year":"2012","type":"Editorship","key":"conf/icdm/2012","ee":"https://ieeexplore.ieee.org/xpl/conhome/6412852/proceeding","url":"https://dblp.org/rec/conf/icdm/2012"}, "url":"URL#4493230" }, { "@score":"6", "@id":"4493231", "info":{"authors":{"author":[{"@pid":"94/6462","text":"Jilles Vreeken"},{"@pid":"97/7211","text":"Charles Ling"},{"@pid":"z/MohammedJaveedZaki","text":"Mohammed Javeed Zaki"},{"@pid":"s/ArnoSiebes","text":"Arno Siebes"},{"@pid":"y/JXuYu","text":"Jeffrey Xu Yu"},{"@pid":"g/BartGoethals","text":"Bart Goethals"},{"@pid":"w/GeoffreyIWebb","text":"Geoffrey I. Webb"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"12th IEEE International Conference on Data Mining Workshops, ICDM Workshops, Brussels, Belgium, December 10, 2012","venue":"ICDM Workshops","publisher":"IEEE Computer Society","year":"2012","type":"Editorship","key":"conf/icdm/2012w","ee":"https://ieeexplore.ieee.org/xpl/conhome/6403636/proceeding","url":"https://dblp.org/rec/conf/icdm/2012w"}, "url":"URL#4493231" }, { "@score":"6", "@id":"4493403", "info":{"authors":{"author":[{"@pid":"30/3790-1","text":"He Jiang 0001"},{"@pid":"59/622-3","text":"Wei Ding 0003"},{"@pid":"71/2744","text":"Moonis Ali"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Advanced Research in Applied Artificial Intelligence - 25th International Conference on Industrial Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2012, Dalian, China, June 9-12, 2012. Proceedings","venue":["IEA/AIE","Lecture Notes in Computer Science"],"volume":"7345","publisher":"Springer","year":"2012","type":"Editorship","key":"conf/ieaaie/2012","doi":"10.1007/978-3-642-31087-4","ee":"https://doi.org/10.1007/978-3-642-31087-4","url":"https://dblp.org/rec/conf/ieaaie/2012"}, "url":"URL#4493403" }, { "@score":"6", "@id":"4516548", "info":{"authors":{"author":[{"@pid":"25/5687","text":"Yongguo Liu"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"12/4493","text":"Yi-Dong Shen"}]},"title":"Automatic clustering using genetic algorithms.","venue":"Appl. Math. Comput.","volume":"218","number":"4","pages":"1267-1279","year":"2011","type":"Journal Articles","access":"closed","key":"journals/amc/LiuWS11","doi":"10.1016/J.AMC.2011.06.007","ee":"https://doi.org/10.1016/j.amc.2011.06.007","url":"https://dblp.org/rec/journals/amc/LiuWS11"}, "url":"URL#4516548" }, { "@score":"12", "@id":"4523592", "info":{"authors":{"author":[{"@pid":"44/6570","text":"Dan Guo"},{"@pid":"20/7623","text":"Xiao-Li Hong"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"82/4977-6","text":"Jun Gao 0006"},{"@pid":"63/7622","text":"Ying-Ling Liu"},{"@pid":"63/6340","text":"Gong-Qing Wu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"A Bit-Parallel Algorithm for Sequential Pattern Matching with Wildcards.","venue":"Cybern. Syst.","volume":"42","number":"6","pages":"382-401","year":"2011","type":"Journal Articles","access":"closed","key":"journals/cas/GuoHHGLWW11","doi":"10.1080/01969722.2011.600651","ee":"https://doi.org/10.1080/01969722.2011.600651","url":"https://dblp.org/rec/journals/cas/GuoHHGLWW11"}, "url":"URL#4523592" }, { "@score":"6", "@id":"4525796", "info":{"authors":{"author":[{"@pid":"77/2036-1","text":"Dan He 0001"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Mining Approximate Repeating Patterns from Sequence Data with Gap Constraints.","venue":"Comput. Intell.","volume":"27","number":"3","pages":"336-362","year":"2011","type":"Journal Articles","access":"closed","key":"journals/ci/HeZW11","doi":"10.1111/J.1467-8640.2011.00383.X","ee":"https://doi.org/10.1111/j.1467-8640.2011.00383.x","url":"https://dblp.org/rec/journals/ci/HeZW11"}, "url":"URL#4525796" }, { "@score":"6", "@id":"4532242", "info":{"authors":{"author":[{"@pid":"88/8205-1","text":"Tianyi Zhou 0001"},{"@pid":"46/3391","text":"Dacheng Tao"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Manifold elastic net: a unified framework for sparse dimension reduction.","venue":"Data Min. Knowl. Discov.","volume":"22","number":"3","pages":"340-371","year":"2011","type":"Journal Articles","access":"closed","key":"journals/datamine/ZhouTW11","doi":"10.1007/S10618-010-0182-X","ee":"https://doi.org/10.1007/s10618-010-0182-x","url":"https://dblp.org/rec/journals/datamine/ZhouTW11"}, "url":"URL#4532242" }, { "@score":"6", "@id":"4533638", "info":{"authors":{"author":[{"@pid":"21/1048-1","text":"Peng Zhang 0001"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"84/5467-1","text":"Yong Shi 0001"},{"@pid":"02/929-1","text":"Li Guo 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Robust ensemble learning for mining noisy data streams.","venue":"Decis. Support Syst.","volume":"50","number":"2","pages":"469-479","year":"2011","type":"Journal Articles","access":"closed","key":"journals/dss/ZhangZSGW11","doi":"10.1016/J.DSS.2010.11.004","ee":"https://doi.org/10.1016/j.dss.2010.11.004","url":"https://dblp.org/rec/journals/dss/ZhangZSGW11"}, "url":"URL#4533638" }, { "@score":"6", "@id":"4533641", "info":{"authors":{"author":[{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"89/6764-15","text":"Bin Li 0015"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"77/2036-1","text":"Dan He 0001"},{"@pid":"71/964","text":"Chengqi Zhang"}]},"title":"CLAP: Collaborative pattern mining for distributed information systems.","venue":"Decis. Support Syst.","volume":"52","number":"1","pages":"40-51","year":"2011","type":"Journal Articles","access":"closed","key":"journals/dss/ZhuLWHZ11","doi":"10.1016/J.DSS.2011.05.002","ee":"https://doi.org/10.1016/j.dss.2011.05.002","url":"https://dblp.org/rec/journals/dss/ZhuLWHZ11"}, "url":"URL#4533641" }, { "@score":"6", "@id":"4536951", "info":{"authors":{"author":[{"@pid":"65/7211-1","text":"Tianyu Cao 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"62/3151","text":"Song Wang"},{"@pid":"h/XiaohuaHu","text":"Xiaohua Hu 0001"}]},"title":"Maximizing influence spread in modular social networks by optimal resource allocation.","venue":"Expert Syst. Appl.","volume":"38","number":"10","pages":"13128-13135","year":"2011","type":"Journal Articles","access":"closed","key":"journals/eswa/CaoWWH11","doi":"10.1016/J.ESWA.2011.04.119","ee":"https://doi.org/10.1016/j.eswa.2011.04.119","url":"https://dblp.org/rec/journals/eswa/CaoWWH11"}, "url":"URL#4536951" }, { "@score":"6", "@id":"4555697", "info":{"authors":{"author":[{"@pid":"04/3348","text":"Yan Zhang"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"36/2410","text":"Jeffrey P. Bond"}]},"title":"Corrective classification: Learning from data imperfections with aggressive and diverse classifier ensembling.","venue":"Inf. Syst.","volume":"36","number":"8","pages":"1135-1157","year":"2011","type":"Journal Articles","access":"closed","key":"journals/is/ZhangZWB11","doi":"10.1016/J.IS.2011.05.002","ee":"https://doi.org/10.1016/j.is.2011.05.002","url":"https://dblp.org/rec/journals/is/ZhangZWB11"}, "url":"URL#4555697" }, { "@score":"6", "@id":"4570200", "info":{"authors":{"author":[{"@pid":"69/5538-1","text":"Chunxia Zhang 0001"},{"@pid":"90/4009","text":"Cungen Cao"},{"@pid":"58/375","text":"Yuefei Sui"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"A Chinese time ontology for the Semantic Web.","venue":"Knowl. Based Syst.","volume":"24","number":"7","pages":"1057-1074","year":"2011","type":"Journal Articles","access":"closed","key":"journals/kbs/ZhangCSW11","doi":"10.1016/J.KNOSYS.2011.04.021","ee":"https://doi.org/10.1016/j.knosys.2011.04.021","url":"https://dblp.org/rec/journals/kbs/ZhangCSW11"}, "url":"URL#4570200" }, { "@score":"6", "@id":"4577906", "info":{"authors":{"author":[{"@pid":"46/999","text":"Bo Yang"},{"@pid":"60/5111","text":"Songcan Chen"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"A structurally motivated framework for discriminant analysis.","venue":"Pattern Anal. Appl.","volume":"14","number":"4","pages":"349-367","year":"2011","type":"Journal Articles","access":"closed","key":"journals/paa/YangCW11","doi":"10.1007/S10044-011-0228-8","ee":"https://doi.org/10.1007/s10044-011-0228-8","url":"https://dblp.org/rec/journals/paa/YangCW11"}, "url":"URL#4577906" }, { "@score":"8", "@id":"4594849", "info":{"authors":{"author":[{"@pid":"59/622-3","text":"Wei Ding 0003"},{"@pid":"71/3101","text":"Tomasz F. Stepinski"},{"@pid":"32/7620","text":"Yang Mu"},{"@pid":"55/2022","text":"Lourenço P. C. Bandeira"},{"@pid":"v/RicardoVilalta","text":"Ricardo Vilalta"},{"@pid":"46/8700","text":"Youxi Wu"},{"@pid":"58/6443","text":"Zhenyu Lu"},{"@pid":"65/7211-1","text":"Tianyu Cao 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Subkilometer crater discovery with boosting and transfer learning.","venue":"ACM Trans. Intell. Syst. Technol.","volume":"2","number":"4","pages":"39:1-39:22","year":"2011","type":"Journal Articles","access":"closed","key":"journals/tist/DingSMBVWLCW11","doi":"10.1145/1989734.1989743","ee":"https://doi.org/10.1145/1989734.1989743","url":"https://dblp.org/rec/journals/tist/DingSMBVWLCW11"}, "url":"URL#4594849" }, { "@score":"6", "@id":"4598457", "info":{"authors":{"author":[{"@pid":"a/QianhuiAltheaLiang","text":"Qianhui Liang"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"p/EKPark","text":"E. K. Park"},{"@pid":"k/TMKhoshgoftaar","text":"Taghi M. Khoshgoftaar"},{"@pid":"89/3076","text":"Chi-Hung Chi"}]},"title":"Ontology-Based Business Process Customization for Composite Web Services.","venue":"IEEE Trans. Syst. Man Cybern. Part A","volume":"41","number":"4","pages":"717-729","year":"2011","type":"Journal Articles","access":"closed","key":"journals/tsmc/LiangWPKC11","doi":"10.1109/TSMCA.2011.2132710","ee":"https://doi.org/10.1109/TSMCA.2011.2132710","url":"https://dblp.org/rec/journals/tsmc/LiangWPKC11"}, "url":"URL#4598457" }, { "@score":"6", "@id":"4601612", "info":{"authors":{"author":[{"@pid":"z/ShichaoZhang","text":"Shichao Zhang"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Fundamentals of association rules in data mining and knowledge discovery.","venue":"WIREs Data Mining Knowl. Discov.","volume":"1","number":"2","pages":"97-116","year":"2011","type":"Journal Articles","access":"closed","key":"journals/widm/ZhangW11","doi":"10.1002/WIDM.10","ee":"https://doi.org/10.1002/widm.10","url":"https://dblp.org/rec/journals/widm/ZhangW11"}, "url":"URL#4601612" }, { "@score":"6", "@id":"4614854", "info":{"authors":{"author":[{"@pid":"24/1518-41","text":"Xin Chen 0041"},{"@pid":"89/4362-3","text":"Tingting He 0003"},{"@pid":"h/XiaohuaHu","text":"Xiaohua Hu 0001"},{"@pid":"54/323","text":"Yuan An"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Inferring Functional Groups from Microbial Gene Catalogue with Probabilistic Topic Models.","venue":"BIBM","pages":"3-9","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/bibm/ChenHHAW11","doi":"10.1109/BIBM.2011.12","ee":"https://doi.org/10.1109/BIBM.2011.12","url":"https://dblp.org/rec/conf/bibm/ChenHHAW11"}, "url":"URL#4614854" }, { "@score":"6", "@id":"4624602", "info":{"authors":{"author":[{"@pid":"19/3950","text":"Huawen Liu"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"z/ShichaoZhang","text":"Shichao Zhang"}]},"title":"Feature selection using hierarchical feature clustering.","venue":"CIKM","pages":"979-984","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/cikm/LiuWZ11","doi":"10.1145/2063576.2063716","ee":"https://doi.org/10.1145/2063576.2063716","url":"https://dblp.org/rec/conf/cikm/LiuWZ11"}, "url":"URL#4624602" }, { "@score":"12", "@id":"4656267", "info":{"authors":{"author":[{"@pid":"06/8230","text":"Hai-Guang Li"},{"@pid":"63/6340","text":"Gong-Qing Wu"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"05/3499-15","text":"Jing Zhang 0015"},{"@pid":"57/1586","text":"Lian Li"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"K-Means Clustering with Bagging and MapReduce.","venue":"HICSS","pages":"1-8","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/hicss/LiWHZLW11","doi":"10.1109/HICSS.2011.265","ee":"https://doi.org/10.1109/HICSS.2011.265","url":"https://dblp.org/rec/conf/hicss/LiWHZLW11"}, "url":"URL#4656267" }, { "@score":"6", "@id":"4667464", "info":{"authors":{"author":[{"@pid":"52/2586","text":"Kui Yu"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"59/622-3","text":"Wei Ding 0003"},{"@pid":"w/HaoWang-8","text":"Hao Wang 0008"},{"@pid":"13/5805","text":"Hongliang Yao"}]},"title":"Causal Associative Classification.","venue":"ICDM","pages":"914-923","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdm/YuWDWY11","doi":"10.1109/ICDM.2011.30","ee":"https://doi.org/10.1109/ICDM.2011.30","url":"https://dblp.org/rec/conf/icdm/YuWDWY11"}, "url":"URL#4667464" }, { "@score":"6", "@id":"4671258", "info":{"authors":{"author":[{"@pid":"15/10487","text":"Jiajia Feng"},{"@pid":"51/1316","text":"Fei Xie"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"60/3675-1","text":"Pei-Pei Li 0001"},{"@pid":"39/6191-1","text":"Jie Cao 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Keyword extraction based on sequential pattern mining.","venue":"ICIMCS","pages":"34-38","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/icimcs/FengXHLCW11","doi":"10.1145/2043674.2043685","ee":"https://doi.org/10.1145/2043674.2043685","url":"https://dblp.org/rec/conf/icimcs/FengXHLCW11"}, "url":"URL#4671258" }, { "@score":"6", "@id":"4679486", "info":{"authors":{"author":[{"@pid":"73/10660","text":"Saeed Abdullah"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"An Epidemic Model for News Spreading on Twitter.","venue":"ICTAI","pages":"163-169","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ictai/AbdullahW11","doi":"10.1109/ICTAI.2011.33","ee":"https://doi.org/10.1109/ICTAI.2011.33","url":"https://dblp.org/rec/conf/ictai/AbdullahW11"}, "url":"URL#4679486" }, { "@score":"6", "@id":"4679592", "info":{"authors":{"author":[{"@pid":"181/2856-8","text":"Zhao Li 0008"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Weighted Nonnegative Matrix Tri-Factorization for Co-clustering.","venue":"ICTAI","pages":"811-816","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ictai/LiW11","doi":"10.1109/ICTAI.2011.127","ee":"https://doi.org/10.1109/ICTAI.2011.127","url":"https://dblp.org/rec/conf/ictai/LiW11"}, "url":"URL#4679592" }, { "@score":"12", "@id":"4679656", "info":{"authors":{"author":[{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"51/1316","text":"Fei Xie"},{"@pid":"63/6340","text":"Gong-Qing Wu"},{"@pid":"59/622-3","text":"Wei Ding 0003"}]},"title":"Personalized News Filtering and Summarization on the Web.","venue":"ICTAI","pages":"414-421","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ictai/WuXWD11","doi":"10.1109/ICTAI.2011.68","ee":"https://doi.org/10.1109/ICTAI.2011.68","url":"https://dblp.org/rec/conf/ictai/WuXWD11"}, "url":"URL#4679656" }, { "@score":"6", "@id":"4684886", "info":{"authors":{"author":[{"@pid":"89/6764-15","text":"Bin Li 0015"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"77/1298","text":"Ruijiang Li"},{"@pid":"71/964","text":"Chengqi Zhang"},{"@pid":"84/3791","text":"Xiangyang Xue"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Cross-Domain Collaborative Filtering over Time.","venue":"IJCAI","pages":"2293-2298","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ijcai/LiZLZXW11","doi":"10.5591/978-1-57735-516-8/IJCAI11-382","ee":"https://doi.org/10.5591/978-1-57735-516-8/IJCAI11-382","url":"https://dblp.org/rec/conf/ijcai/LiZLZXW11"}, "url":"URL#4684886" }, { "@score":"6", "@id":"4713485", "info":{"authors":{"author":[{"@pid":"60/3675-1","text":"Pei-Pei Li 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"a/QianhuiAltheaLiang","text":"Qianhui Liang"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"01/1504-2","text":"Yuhong Zhang 0002"}]},"title":"Random Ensemble Decision Trees for Learning Concept-Drifting Data Streams.","venue":"PAKDD","pages":"313-325","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/pakdd/LiWLHZ11","doi":"10.1007/978-3-642-20841-6_26","ee":"https://doi.org/10.1007/978-3-642-20841-6_26","url":"https://dblp.org/rec/conf/pakdd/LiWLHZ11"}, "url":"URL#4713485" }, { "@score":"6", "@id":"4715065", "info":{"authors":{"author":[{"@pid":"65/7211-1","text":"Tianyu Cao 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"h/XiaohuaHu","text":"Xiaohua Tony Hu"},{"@pid":"62/3151","text":"Song Wang"}]},"title":"Active Learning of Model Parameters for Influence Maximization.","venue":"ECML/PKDD","pages":"280-295","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/pkdd/CaoWHW11","doi":"10.1007/978-3-642-23780-5_28","ee":"https://doi.org/10.1007/978-3-642-23780-5_28","url":"https://dblp.org/rec/conf/pkdd/CaoWHW11"}, "url":"URL#4715065" }, { "@score":"6", "@id":"4744632", "info":{"authors":{"author":[{"@pid":"c/DianeJCook","text":"Diane J. Cook"},{"@pid":"p/JianPei","text":"Jian Pei"},{"@pid":"w/WeiWang","text":"Wei Wang 0010"},{"@pid":"z/OsmarRZaiane","text":"Osmar R. Zaïane"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"11th IEEE International Conference on Data Mining, ICDM 2011, Vancouver, BC, Canada, December 11-14, 2011","venue":"ICDM","publisher":"IEEE Computer Society","year":"2011","type":"Editorship","key":"conf/icdm/2011","ee":"https://ieeexplore.ieee.org/xpl/conhome/6135855/proceeding","url":"https://dblp.org/rec/conf/icdm/2011"}, "url":"URL#4744632" }, { "@score":"6", "@id":"4744633", "info":{"authors":{"author":[{"@pid":"s/MyraSpiliopoulou","text":"Myra Spiliopoulou"},{"@pid":"w/HaixunWang","text":"Haixun Wang"},{"@pid":"c/DianeJCook","text":"Diane J. Cook"},{"@pid":"p/JianPei","text":"Jian Pei"},{"@pid":"w/WeiWang","text":"Wei Wang 0010"},{"@pid":"z/OsmarRZaiane","text":"Osmar R. Zaïane"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Data Mining Workshops (ICDMW), 2011 IEEE 11th International Conference on, Vancouver, BC, Canada, December 11, 2011","venue":"ICDM Workshops","publisher":"IEEE Computer Society","year":"2011","type":"Editorship","key":"conf/icdm/2011w","ee":"https://ieeexplore.ieee.org/xpl/conhome/6136510/proceeding","url":"https://dblp.org/rec/conf/icdm/2011w"}, "url":"URL#4744633" }, { "@score":"6", "@id":"4764810", "info":{"authors":{"author":[{"@pid":"60/3675-1","text":"Pei-Pei Li 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"a/QianhuiAltheaLiang","text":"Qianhui Liang"},{"@pid":"80/2651","text":"Yunjun Gao"}]},"title":"A Random Decision Tree Ensemble for Mining Concept Drifts from Noisy Data Streams.","venue":"Appl. Artif. Intell.","volume":"24","number":"7","pages":"680-710","year":"2010","type":"Journal Articles","access":"closed","key":"journals/aai/LiWHLG10","doi":"10.1080/08839514.2010.499500","ee":"https://doi.org/10.1080/08839514.2010.499500","url":"https://dblp.org/rec/journals/aai/LiWHLG10"}, "url":"URL#4764810" }, { "@score":"8", "@id":"4772030", "info":{"authors":{"author":[{"@pid":"53/6705","text":"Daniel Duanqing Wu"},{"@pid":"h/XiaohuaHu","text":"Xiaohua Hu 0001"},{"@pid":"p/EKPark","text":"E. K. Park"},{"@pid":"99/2479","text":"Xiaofeng Wang"},{"@pid":"73/3183","text":"Jiali Feng"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Exploratory analysis of protein translation regulatory networks using hierarchical random graphs.","venue":"BMC Bioinform.","volume":"11","number":"S-3","pages":"2","year":"2010","type":"Journal Articles","access":"open","key":"journals/bmcbi/WuHPWFW10","doi":"10.1186/1471-2105-11-S3-S2","ee":"https://doi.org/10.1186/1471-2105-11-S3-S2","url":"https://dblp.org/rec/journals/bmcbi/WuHPWFW10"}, "url":"URL#4772030" }, { "@score":"12", "@id":"4788055", "info":{"authors":{"author":[{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"63/6340","text":"Gong-Qing Wu"},{"@pid":"51/1316","text":"Fei Xie"},{"@pid":"35/1316","text":"Zhu Zhu"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"72/5422","text":"Hao Lu"},{"@pid":"95/1075","text":"Huiqian Li"}]},"title":"News Filtering and Summarization on the Web.","venue":"IEEE Intell. Syst.","volume":"25","number":"5","pages":"68-76","year":"2010","type":"Journal Articles","access":"closed","key":"journals/expert/WuWXZHLL10","doi":"10.1109/MIS.2010.11","ee":"https://doi.org/10.1109/MIS.2010.11","url":"https://dblp.org/rec/journals/expert/WuWXZHLL10"}, "url":"URL#4788055" }, { "@score":"6", "@id":"4804431", "info":{"authors":{"author":[{"@pid":"04/3348","text":"Yan Zhang"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Integrating induction and deduction for noisy data mining.","venue":"Inf. Sci.","volume":"180","number":"14","pages":"2663-2673","year":"2010","type":"Journal Articles","access":"closed","key":"journals/isci/ZhangW10","doi":"10.1016/J.INS.2009.11.045","ee":"https://doi.org/10.1016/j.ins.2009.11.045","url":"https://dblp.org/rec/journals/isci/ZhangW10"}, "url":"URL#4804431" }, { "@score":"6", "@id":"4817467", "info":{"authors":{"author":[{"@pid":"71/6513","text":"Keith C. C. Chan"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Special issue on selected papers from IEEE DMF 2008.","venue":"Knowl. Inf. Syst.","volume":"24","number":"3","pages":"339-340","year":"2010","type":"Journal Articles","access":"closed","key":"journals/kais/ChanW10","doi":"10.1007/S10115-010-0339-3","ee":"https://doi.org/10.1007/s10115-010-0339-3","url":"https://dblp.org/rec/journals/kais/ChanW10"}, "url":"URL#4817467" }, { "@score":"6", "@id":"4824421", "info":{"authors":{"author":[{"@pid":"17/1876","text":"Zhong-Qiu Zhao"},{"@pid":"09/8775","text":"Jun-Zhao Li"},{"@pid":"82/4977-6","text":"Jun Gao 0006"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"A Modified Semi-Supervised Learning Algorithm on Laplacian Eigenmaps.","venue":"Neural Process. Lett.","volume":"32","number":"1","pages":"75-82","year":"2010","type":"Journal Articles","access":"closed","key":"journals/npl/ZhaoLGW10","doi":"10.1007/S11063-010-9142-0","ee":"https://doi.org/10.1007/s11063-010-9142-0","url":"https://dblp.org/rec/journals/npl/ZhaoLGW10"}, "url":"URL#4824421" }, { "@score":"6", "@id":"4827327", "info":{"authors":{"author":[{"@pid":"181/2856-8","text":"Zhao Li 0008"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"27/1817","text":"Hong Peng"}]},"title":"Nonnegative Matrix Factorization on Orthogonal Subspace.","venue":"Pattern Recognit. Lett.","volume":"31","number":"9","pages":"905-911","year":"2010","type":"Journal Articles","access":"closed","key":"journals/prl/LiWP10","doi":"10.1016/J.PATREC.2009.12.023","ee":"https://doi.org/10.1016/j.patrec.2009.12.023","url":"https://dblp.org/rec/journals/prl/LiWP10"}, "url":"URL#4827327" }, { "@score":"6", "@id":"4849463", "info":{"authors":{"author":[{"@pid":"51/1316","text":"Fei Xie"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"38/5910","text":"Xuegang Hu"}]},"title":"Keyphrase extraction based on semantic relatedness.","venue":"IEEE ICCI","pages":"308-312","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/IEEEicci/XieWH10","doi":"10.1109/COGINF.2010.5599721","ee":"https://doi.org/10.1109/COGINF.2010.5599721","url":"https://dblp.org/rec/conf/IEEEicci/XieWH10"}, "url":"URL#4849463" }, { "@score":"6", "@id":"4849475", "info":{"authors":{"author":[{"@pid":"52/2586","text":"Kui Yu"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"w/HaoWang-8","text":"Hao Wang 0008"}]},"title":"Online causal discovery.","venue":"IEEE ICCI","pages":"667-671","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/IEEEicci/YuWW10","doi":"10.1109/COGINF.2010.5599825","ee":"https://doi.org/10.1109/COGINF.2010.5599825","url":"https://dblp.org/rec/conf/IEEEicci/YuWW10"}, "url":"URL#4849475" }, { "@score":"6", "@id":"4849483", "info":{"authors":{"author":[{"@pid":"z/ShichaoZhang","text":"Shichao Zhang"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"62/10082","text":"Manlong Zhu"}]},"title":"Efficient missing data imputation for supervised learning.","venue":"IEEE ICCI","pages":"672-679","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/IEEEicci/ZhangWZ10","doi":"10.1109/COGINF.2010.5599826","ee":"https://doi.org/10.1109/COGINF.2010.5599826","url":"https://dblp.org/rec/conf/IEEEicci/ZhangWZ10"}, "url":"URL#4849483" }, { "@score":"6", "@id":"4850063", "info":{"authors":{"author":[{"@pid":"181/2856-8","text":"Zhao Li 0008"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"A Phrase-Based Method for Hierarchical Clustering of Web Snippets.","venue":"AAAI","pages":"1947-1948","year":"2010","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/LiW10a","doi":"10.1609/AAAI.V24I1.7773","ee":"https://doi.org/10.1609/aaai.v24i1.7773","url":"https://dblp.org/rec/conf/aaai/LiW10a"}, "url":"URL#4850063" }, { "@score":"6", "@id":"4850064", "info":{"authors":{"author":[{"@pid":"60/3675-1","text":"Pei-Pei Li 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"38/5910","text":"Xuegang Hu"}]},"title":"Learning from Concept Drifting Data Streams with Unlabeled Data.","venue":"AAAI","pages":"1945-1946","year":"2010","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/LiWH10","doi":"10.1609/AAAI.V24I1.7770","ee":"https://doi.org/10.1609/aaai.v24i1.7770","url":"https://dblp.org/rec/conf/aaai/LiWH10"}, "url":"URL#4850064" }, { "@score":"6", "@id":"4852853", "info":{"authors":{"author":[{"@pid":"17/1876","text":"Zhong-Qiu Zhao"},{"@pid":"82/4977-6","text":"Jun Gao 0006"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Semi-supervised Learning by Spectral Mapping with Label Information.","venue":"AICI","pages":"448-454","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/aici/ZhaoGW10","doi":"10.1007/978-3-642-16530-6_53","ee":"https://doi.org/10.1007/978-3-642-16530-6_53","url":"https://dblp.org/rec/conf/aici/ZhaoGW10"}, "url":"URL#4852853" }, { "@score":"8", "@id":"4859798", "info":{"authors":{"author":[{"@pid":"79/4191","text":"Fan Min 0001"},{"@pid":"46/8700","text":"Youxi Wu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"The Apriori property of sequence pattern mining with wildcard gaps.","venue":"BIBM Workshops","pages":"138-143","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/bibm/MinW010","doi":"10.1109/BIBMW.2010.5703787","ee":"https://doi.org/10.1109/BIBMW.2010.5703787","url":"https://dblp.org/rec/conf/bibm/MinW010"}, "url":"URL#4859798" }, { "@score":"12", "@id":"4867262", "info":{"authors":{"author":[{"@pid":"05/3499-15","text":"Jing Zhang 0015"},{"@pid":"63/6340","text":"Gong-Qing Wu"},{"@pid":"178/1002","text":"Haiguang Li"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"A 2-Tier Clustering Algorithm with Map-Reduce.","venue":"ChinaGrid","pages":"160-166","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/chinagrid/ZhangWLHW10","doi":"10.1109/CHINAGRID.2010.14","ee":"https://doi.org/10.1109/ChinaGrid.2010.14","url":"https://dblp.org/rec/conf/chinagrid/ZhangWLHW10"}, "url":"URL#4867262" }, { "@score":"6", "@id":"4891034", "info":{"authors":{"author":[{"@pid":"23/8471","text":"Jiaying He"},{"@pid":"60/3675-1","text":"Pei-Pei Li 0001"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"A New Automatic Categorization Algorithm for Web Services.","venue":"GrC","pages":"200-205","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/grc/HeLHW10","doi":"10.1109/GRC.2010.124","ee":"https://doi.org/10.1109/GrC.2010.124","url":"https://dblp.org/rec/conf/grc/HeLHW10"}, "url":"URL#4891034" }, { "@score":"6", "@id":"4891120", "info":{"authors":{"author":[{"@pid":"68/7989-1","text":"Haiping Wang 0001"},{"@pid":"51/1316","text":"Fei Xie"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"60/3675-1","text":"Pei-Pei Li 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Pattern Matching with Flexible Wildcards and Recurring Characters.","venue":"GrC","pages":"782-786","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/grc/WangXHLW10","doi":"10.1109/GRC.2010.156","ee":"https://doi.org/10.1109/GrC.2010.156","url":"https://dblp.org/rec/conf/grc/WangXHLW10"}, "url":"URL#4891120" }, { "@score":"6", "@id":"4891162", "info":{"authors":{"author":[{"@pid":"78/8471","text":"Qun Zhu"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"01/1504-2","text":"Yuhong Zhang 0002"},{"@pid":"60/3675-1","text":"Pei-Pei Li 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"A Double-Window-Based Classification Algorithm for Concept Drifting Data Streams.","venue":"GrC","pages":"639-644","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/grc/ZhuHZLW10","doi":"10.1109/GRC.2010.125","ee":"https://doi.org/10.1109/GrC.2010.125","url":"https://dblp.org/rec/conf/grc/ZhuHZLW10"}, "url":"URL#4891162" }, { "@score":"6", "@id":"4901049", "info":{"authors":{"author":[{"@pid":"55/2775","text":"Xiaoyan Liu"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"22/3940","text":"Huaiqing Wang"},{"@pid":"03/505","text":"Rui Zhang 0003"},{"@pid":"b/JamesBailey","text":"James Bailey 0001"},{"@pid":"r/KRamamohanarao","text":"Kotagiri Ramamohanarao"}]},"title":"Mining distribution change in stock order streams.","venue":"ICDE","pages":"105-108","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/icde/LiuWWZBR10","doi":"10.1109/ICDE.2010.5447901","ee":"https://doi.org/10.1109/ICDE.2010.5447901","url":"https://dblp.org/rec/conf/icde/LiuWWZBR10"}, "url":"URL#4901049" }, { "@score":"6", "@id":"4901794", "info":{"authors":{"author":{"@pid":"59/4107","text":"Xindong Wu 0001"}},"title":"10 Years of Data Mining Research: Retrospect and Prospect.","venue":"ICDM","pages":"7","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdm/Wu10","doi":"10.1109/ICDM.2010.172","ee":"https://doi.org/10.1109/ICDM.2010.172","url":"https://dblp.org/rec/conf/icdm/Wu10"}, "url":"URL#4901794" }, { "@score":"6", "@id":"4901797", "info":{"authors":{"author":[{"@pid":"65/4144","text":"Yanshan Xiao"},{"@pid":"58/2670-2","text":"Bo Liu 0002"},{"@pid":"14/2589","text":"Longbing Cao"},{"@pid":"97/3358","text":"Jie Yin"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"SMILE: A Similarity-Based Approach for Multiple Instance Learning.","venue":"ICDM","pages":"589-598","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdm/XiaoLCYW10","doi":"10.1109/ICDM.2010.126","ee":"https://doi.org/10.1109/ICDM.2010.126","url":"https://dblp.org/rec/conf/icdm/XiaoLCYW10"}, "url":"URL#4901797" }, { "@score":"6", "@id":"4901810", "info":{"authors":{"author":[{"@pid":"52/2586","text":"Kui Yu"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"w/HaoWang-8","text":"Hao Wang 0008"},{"@pid":"59/622-3","text":"Wei Ding 0003"}]},"title":"Causal Discovery from Streaming Features.","venue":"ICDM","pages":"1163-1168","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdm/YuWWD10","doi":"10.1109/ICDM.2010.82","ee":"https://doi.org/10.1109/ICDM.2010.82","url":"https://dblp.org/rec/conf/icdm/YuWWD10"}, "url":"URL#4901810" }, { "@score":"6", "@id":"4901832", "info":{"authors":{"author":[{"@pid":"88/8205-1","text":"Tianyi Zhou 0001"},{"@pid":"46/3391","text":"Dacheng Tao"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"NESVM: A Fast Gradient Method for Support Vector Machines.","venue":"ICDM","pages":"679-688","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdm/ZhouTW10","doi":"10.1109/ICDM.2010.135","ee":"https://doi.org/10.1109/ICDM.2010.135","url":"https://dblp.org/rec/conf/icdm/ZhouTW10"}, "url":"URL#4901832" }, { "@score":"6", "@id":"4908559", "info":{"authors":{"author":[{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"52/2586","text":"Kui Yu"},{"@pid":"w/HaoWang-8","text":"Hao Wang 0008"},{"@pid":"59/622-3","text":"Wei Ding 0003"}]},"title":"Online Streaming Feature Selection.","venue":"ICML","pages":"1159-1166","year":"2010","type":"Conference and Workshop Papers","access":"open","key":"conf/icml/WuYWD10","ee":"https://icml.cc/Conferences/2010/papers/238.pdf","url":"https://dblp.org/rec/conf/icml/WuYWD10"}, "url":"URL#4908559" }, { "@score":"8", "@id":"4914567", "info":{"authors":{"author":[{"@pid":"46/8700","text":"Youxi Wu"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"30/3790-1","text":"He Jiang 0001"},{"@pid":"79/4191","text":"Fan Min 0001"}]},"title":"A Nettree for Approximate Maximal Pattern Matching with Gaps and One-Off Constraint.","venue":"ICTAI","pages":"38-41","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/ictai/WuWJM10","doi":"10.1109/ICTAI.2010.81","ee":"https://doi.org/10.1109/ICTAI.2010.81","url":"https://dblp.org/rec/conf/ictai/WuWJM10"}, "url":"URL#4914567" }, { "@score":"6", "@id":"4914568", "info":{"authors":{"author":[{"@pid":"51/1316","text":"Fei Xie"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"82/4977-6","text":"Jun Gao 0006"},{"@pid":"44/6570","text":"Dan Guo"},{"@pid":"00/4881","text":"Yulian Fei"},{"@pid":"28/7682","text":"Ertian Hua"}]},"title":"Sequential Pattern Mining with Wildcards.","venue":"ICTAI","pages":"241-247","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/ictai/XieWHGGFH10","doi":"10.1109/ICTAI.2010.42","ee":"https://doi.org/10.1109/ICTAI.2010.42","url":"https://dblp.org/rec/conf/ictai/XieWHGGFH10"}, "url":"URL#4914568" }, { "@score":"8", "@id":"4924916", "info":{"authors":{"author":[{"@pid":"46/8700","text":"Youxi Wu"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"79/4191","text":"Fan Min 0001"},{"@pid":"87/660-87","text":"Yan Li 0087"}]},"title":"A Nettree for pattern Matching with flexible wildcard Constraints.","venue":"IRI","pages":"109-114","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/iri/WuWML10","doi":"10.1109/IRI.2010.5558954","ee":"https://doi.org/10.1109/IRI.2010.5558954","url":"https://dblp.org/rec/conf/iri/WuWML10"}, "url":"URL#4924916" }, { "@score":"6", "@id":"4935838", "info":{"authors":{"author":[{"@pid":"58/6443","text":"Zhenyu Lu"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"b/JoshuaCliffordBongard","text":"Josh C. Bongard"}]},"title":"Ensemble pruning via individual contribution ordering.","venue":"KDD","pages":"871-880","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LuWZB10","doi":"10.1145/1835804.1835914","ee":"https://doi.org/10.1145/1835804.1835914","url":"https://dblp.org/rec/conf/kdd/LuWZB10"}, "url":"URL#4935838" }, { "@score":"6", "@id":"4940964", "info":{"authors":{"author":[{"@pid":"95/3400","text":"Hervé Glotin"},{"@pid":"17/1876","text":"Zhong-Qiu Zhao"},{"@pid":"82/4977-6","text":"Jun Gao 0006"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"A matrix modular SVM robust to imbalanced data for efficient visual concept detection.","venue":"Multimedia Information Retrieval","pages":"333-338","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/mir/GlotinZGW10","doi":"10.1145/1743384.1743439","ee":"https://doi.org/10.1145/1743384.1743439","url":"https://dblp.org/rec/conf/mir/GlotinZGW10"}, "url":"URL#4940964" }, { "@score":"6", "@id":"4947731", "info":{"authors":{"author":[{"@pid":"77/2036-1","text":"Dan He 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"}]},"title":"Rule Synthesizing from Multiple Related Databases.","venue":"PAKDD","pages":"201-213","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/pakdd/HeWZ10","doi":"10.1007/978-3-642-13672-6_20","ee":"https://doi.org/10.1007/978-3-642-13672-6_20","url":"https://dblp.org/rec/conf/pakdd/HeWZ10"}, "url":"URL#4947731" }, { "@score":"6", "@id":"4947747", "info":{"authors":{"author":[{"@pid":"181/2856-8","text":"Zhao Li 0008"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"58/6443","text":"Zhenyu Lu"}]},"title":"Fast Orthogonal Nonnegative Matrix Tri-Factorization for Simultaneous Clustering.","venue":"PAKDD","pages":"214-221","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/pakdd/LiWL10","doi":"10.1007/978-3-642-13672-6_21","ee":"https://doi.org/10.1007/978-3-642-13672-6_21","url":"https://dblp.org/rec/conf/pakdd/LiWL10"}, "url":"URL#4947747" }, { "@score":"6", "@id":"4953312", "info":{"authors":{"author":[{"@pid":"65/7211-1","text":"Tianyu Cao 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"62/3151","text":"Song Wang"},{"@pid":"h/XiaohuaHu","text":"Xiaohua Hu 0001"}]},"title":"OASNET: an optimal allocation approach to influence maximization in modular social networks.","venue":"SAC","pages":"1088-1094","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/CaoWWH10","doi":"10.1145/1774088.1774314","ee":"https://doi.org/10.1145/1774088.1774314","url":"https://dblp.org/rec/conf/sac/CaoWWH10"}, "url":"URL#4953312" }, { "@score":"6", "@id":"4955107", "info":{"authors":{"author":[{"@pid":"58/6443","text":"Zhenyu Lu"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"b/JoshuaCliffordBongard","text":"Josh C. Bongard"}]},"title":"Adaptive Informative Sampling for Active Learning.","venue":"SDM","pages":"894-905","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/sdm/LuWB10","doi":"10.1137/1.9781611972801.78","ee":"https://doi.org/10.1137/1.9781611972801.78","url":"https://dblp.org/rec/conf/sdm/LuWB10"}, "url":"URL#4955107" }, { "@score":"6", "@id":"4973280", "info":{"authors":{"author":[{"@pid":"60/3675-1","text":"Pei-Pei Li 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"38/5910","text":"Xuegang Hu"}]},"title":"Mining Recurring Concept Drifts with Limited Labeled Streaming Data.","venue":"ACML","pages":"241-252","year":"2010","type":"Conference and Workshop Papers","access":"open","key":"journals/jmlr/LiWH10","ee":"http://proceedings.mlr.press/v13/li10a.html","url":"https://dblp.org/rec/journals/jmlr/LiWH10"}, "url":"URL#4973280" }, { "@score":"6", "@id":"4975441", "info":{"authors":{"author":[{"@pid":"y/YingYang-1","text":"Ying Yang 0001"},{"@pid":"w/GeoffreyIWebb","text":"Geoffrey I. Webb"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Discretization Methods.","venue":"Data Mining and Knowledge Discovery Handbook","pages":"101-116","year":"2010","type":"Parts in Books or Collections","access":"closed","key":"reference/dmkdh/YangWW10","doi":"10.1007/978-0-387-09823-4_6","ee":"https://doi.org/10.1007/978-0-387-09823-4_6","url":"https://dblp.org/rec/reference/dmkdh/YangWW10"}, "url":"URL#4975441" }, { "@score":"6", "@id":"4977099", "info":{"authors":{"author":[{"@pid":"h/XiangjiHuang","text":"Jimmy X. Huang"},{"@pid":"k/NickKoudas","text":"Nick Koudas"},{"@pid":"81/4050","text":"Gareth J. F. Jones"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"42/4842","text":"Kevyn Collins-Thompson"},{"@pid":"99/3459","text":"Aijun An"}]},"title":"Proceedings of the 19th ACM Conference on Information and Knowledge Management, CIKM 2010, Toronto, Ontario, Canada, October 26-30, 2010","venue":"CIKM","publisher":"ACM","year":"2010","type":"Editorship","access":"unavailable","key":"conf/cikm/2010","url":"https://dblp.org/rec/conf/cikm/2010"}, "url":"URL#4977099" }, { "@score":"6", "@id":"4977730", "info":{"authors":{"author":[{"@pid":"w/GeoffreyIWebb","text":"Geoffrey I. Webb"},{"@pid":"l/BingLiu1","text":"Bing Liu 0001"},{"@pid":"71/964","text":"Chengqi Zhang"},{"@pid":"g/DimitriosGunopulos","text":"Dimitrios Gunopulos"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"ICDM 2010, The 10th IEEE International Conference on Data Mining, Sydney, Australia, 14-17 December 2010","venue":"ICDM","publisher":"IEEE Computer Society","year":"2010","type":"Editorship","key":"conf/icdm/2010","ee":"https://ieeexplore.ieee.org/xpl/conhome/5690658/proceeding","url":"https://dblp.org/rec/conf/icdm/2010"}, "url":"URL#4977730" }, { "@score":"6", "@id":"4977731", "info":{"authors":{"author":[{"@pid":"54/3488","text":"Wei Fan"},{"@pid":"h/WynneHsu","text":"Wynne Hsu"},{"@pid":"w/GeoffreyIWebb","text":"Geoffrey I. Webb"},{"@pid":"l/BingLiu1","text":"Bing Liu 0001"},{"@pid":"71/964","text":"Chengqi Zhang"},{"@pid":"g/DimitriosGunopulos","text":"Dimitrios Gunopulos"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"ICDMW 2010, The 10th IEEE International Conference on Data Mining Workshops, Sydney, Australia, 13 December 2010","venue":"ICDM Workshops","publisher":"IEEE Computer Society","year":"2010","type":"Editorship","key":"conf/icdm/2010w","ee":"https://ieeexplore.ieee.org/xpl/conhome/5691154/proceeding","url":"https://dblp.org/rec/conf/icdm/2010w"}, "url":"URL#4977731" }, { "@score":"6", "@id":"4984499", "info":{"authors":{"author":[{"@pid":"88/8205-1","text":"Tianyi Zhou 0001"},{"@pid":"46/3391","text":"Dacheng Tao"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Manifold Elastic Net: A Unified Framework for Sparse Dimension Reduction","venue":"CoRR","volume":"abs/1007.3564","year":"2010","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1007-3564","ee":"http://arxiv.org/abs/1007.3564","url":"https://dblp.org/rec/journals/corr/abs-1007-3564"}, "url":"URL#4984499" }, { "@score":"6", "@id":"4985056", "info":{"authors":{"author":[{"@pid":"88/8205-1","text":"Tianyi Zhou 0001"},{"@pid":"46/3391","text":"Dacheng Tao"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"NESVM: a Fast Gradient Method for Support Vector Machines","venue":"CoRR","volume":"abs/1008.4000","year":"2010","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-1008-4000","ee":"http://arxiv.org/abs/1008.4000","url":"https://dblp.org/rec/journals/corr/abs-1008-4000"}, "url":"URL#4985056" }, { "@score":"6", "@id":"5016619", "info":{"authors":{"author":[{"@pid":"z/ShichaoZhang","text":"Shichao Zhang"},{"@pid":"81/7299","text":"Xiaofang You"},{"@pid":"22/3510","text":"Zhi Jin"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Mining globally interesting patterns from multiple databases using kernel estimation.","venue":"Expert Syst. Appl.","volume":"36","number":"8","pages":"10863-10869","year":"2009","type":"Journal Articles","access":"closed","key":"journals/eswa/ZhangYJW09","doi":"10.1016/J.ESWA.2009.01.030","ee":"https://doi.org/10.1016/j.eswa.2009.01.030","url":"https://dblp.org/rec/journals/eswa/ZhangYJW09"}, "url":"URL#5016619" }, { "@score":"6", "@id":"5016970", "info":{"authors":{"author":[{"@pid":"17/1185-1","text":"Zili Zhang 0001"},{"@pid":"72/5112","text":"Pengyi Yang"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"71/964","text":"Chengqi Zhang"}]},"title":"An Agent-Based Hybrid System for Microarray Data Analysis.","venue":"IEEE Intell. Syst.","volume":"24","number":"5","pages":"53-63","year":"2009","type":"Journal Articles","access":"closed","key":"journals/expert/ZhangYWZ09","doi":"10.1109/MIS.2009.92","ee":"https://doi.org/10.1109/MIS.2009.92","url":"https://dblp.org/rec/journals/expert/ZhangYWZ09"}, "url":"URL#5016970" }, { "@score":"6", "@id":"5037065", "info":{"authors":{"author":[{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"75/1639","text":"Qijun Chen"},{"@pid":"14/374-1","text":"Fei-Yue Wang 0001"}]},"title":"Ubiquitous Mining with Interactive Data Mining Agents.","venue":"J. Comput. Sci. Technol.","volume":"24","number":"6","pages":"1018-1027","year":"2009","type":"Journal Articles","access":"closed","key":"journals/jcst/WuZCW09","doi":"10.1007/S11390-009-9291-7","ee":"https://doi.org/10.1007/s11390-009-9291-7","url":"https://dblp.org/rec/journals/jcst/WuZCW09"}, "url":"URL#5037065" }, { "@score":"6", "@id":"5050561", "info":{"authors":{"author":[{"@pid":"46/3391","text":"Dacheng Tao"},{"@pid":"l/XuelongLi","text":"Xuelong Li 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"m/StephenJMaybank","text":"Stephen J. Maybank"}]},"title":"Geometric Mean for Subspace Selection.","venue":"IEEE Trans. Pattern Anal. Mach. Intell.","volume":"31","number":"2","pages":"260-274","year":"2009","type":"Journal Articles","access":"closed","key":"journals/pami/TaoLWM09","doi":"10.1109/TPAMI.2008.70","ee":"https://doi.org/10.1109/TPAMI.2008.70","url":"https://dblp.org/rec/journals/pami/TaoLWM09"}, "url":"URL#5050561" }, { "@score":"6", "@id":"5052418", "info":{"authors":{"author":[{"@pid":"32/6328","text":"Zhao Xie"},{"@pid":"82/4977-6","text":"Jun Gao 0006"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Regional category parsing in undirected graphical models.","venue":"Pattern Recognit. Lett.","volume":"30","number":"14","pages":"1264-1272","year":"2009","type":"Journal Articles","access":"closed","key":"journals/prl/XieGW09","doi":"10.1016/J.PATREC.2009.06.010","ee":"https://doi.org/10.1016/j.patrec.2009.06.010","url":"https://dblp.org/rec/journals/prl/XieGW09"}, "url":"URL#5052418" }, { "@score":"6", "@id":"5066831", "info":{"authors":{"author":{"@pid":"59/4107","text":"Xindong Wu 0001"}},"title":"EIC Editorial: Introducing the New Editor-in-Chief and Four New Associate Editors.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"21","number":"1","pages":"1-3","year":"2009","type":"Journal Articles","access":"closed","key":"journals/tkde/Wu09","doi":"10.1109/TKDE.2009.8","ee":"https://doi.org/10.1109/TKDE.2009.8","url":"https://dblp.org/rec/journals/tkde/Wu09"}, "url":"URL#5066831" }, { "@score":"6", "@id":"5068797", "info":{"authors":{"author":[{"@pid":"a/QianhuiAltheaLiang","text":"Qianhui Althea Liang"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"27/6572","text":"Hoong Chuin Lau"}]},"title":"Optimizing Service Systems Based on Application-Level QoS.","venue":"IEEE Trans. Serv. Comput.","volume":"2","number":"2","pages":"108-121","year":"2009","type":"Journal Articles","access":"closed","key":"journals/tsc/LiangWL09","doi":"10.1109/TSC.2009.13","ee":"https://doi.org/10.1109/TSC.2009.13","url":"https://dblp.org/rec/journals/tsc/LiangWL09"}, "url":"URL#5068797" }, { "@score":"6", "@id":"5074427", "info":{"authors":{"author":[{"@pid":"a/QianhuiAltheaLiang","text":"Qianhui Liang"},{"@pid":"60/3675-1","text":"Pei-Pei Li 0001"},{"@pid":"h/PCKHung","text":"Patrick C. K. Hung"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Clustering Web Services for Automatic Categorization.","venue":"IEEE SCC","pages":"380-387","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/IEEEscc/LiangLHW09","doi":"10.1109/SCC.2009.39","ee":"https://doi.org/10.1109/SCC.2009.39","url":"https://dblp.org/rec/conf/IEEEscc/LiangLHW09"}, "url":"URL#5074427" }, { "@score":"12", "@id":"5091214", "info":{"authors":{"author":[{"@pid":"63/6340","text":"Gong-Qing Wu"},{"@pid":"06/8230","text":"Hai-Guang Li"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"66/8230","text":"Yuan-Jun Bi"},{"@pid":"05/3499-15","text":"Jing Zhang 0015"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"MReC4.5: C4.5 Ensemble Classification with MapReduce.","venue":"ChinaGrid","pages":"249-255","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/chinagrid/WuLHBZW09","doi":"10.1109/CHINAGRID.2009.39","ee":"https://doi.org/10.1109/ChinaGrid.2009.39","url":"https://dblp.org/rec/conf/chinagrid/WuLHBZW09"}, "url":"URL#5091214" }, { "@score":"12", "@id":"5097035", "info":{"authors":{"author":[{"@pid":"62/1302","text":"Yongming Huang"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"51/1316","text":"Fei Xie"},{"@pid":"82/4977-6","text":"Jun Gao 0006"},{"@pid":"63/6340","text":"Gong-Qing Wu"}]},"title":"Mining Frequent Patterns with Gaps and One-Off Condition.","venue":"CSE","pages":"180-186","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/cse/HuangWHXGW09","doi":"10.1109/CSE.2009.160","ee":"https://doi.org/10.1109/CSE.2009.160","url":"https://dblp.org/rec/conf/cse/HuangWHXGW09"}, "url":"URL#5097035" }, { "@score":"6", "@id":"5097158", "info":{"authors":{"author":[{"@pid":"79/4191","text":"Fan Min 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Local Semi-linear Regression for River Runoff Forecasting.","venue":"CSE","pages":"556-561","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/cse/MinW09","doi":"10.1109/CSE.2009.214","ee":"https://doi.org/10.1109/CSE.2009.214","url":"https://dblp.org/rec/conf/cse/MinW09"}, "url":"URL#5097158" }, { "@score":"6", "@id":"5100604", "info":{"authors":{"author":[{"@pid":"79/4191","text":"Fan Min 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"58/6443","text":"Zhenyu Lu"}]},"title":"Pattern Matching with Independent Wildcard Gaps.","venue":"DASC","pages":"194-199","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/dasc/MinWL09","doi":"10.1109/DASC.2009.65","ee":"https://doi.org/10.1109/DASC.2009.65","url":"https://dblp.org/rec/conf/dasc/MinWL09"}, "url":"URL#5100604" }, { "@score":"12", "@id":"5117644", "info":{"authors":{"author":[{"@pid":"06/8230","text":"Hai-Guang Li"},{"@pid":"63/6340","text":"Gong-Qing Wu"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"66/8230","text":"Yuan-Jun Bi"},{"@pid":"60/3675-1","text":"Pei-Pei Li 0001"}]},"title":"A relation extraction method of Chinese named entities based on location and semantic features.","venue":"GrC","pages":"334-339","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/grc/LiWHWBL09","doi":"10.1109/GRC.2009.5255100","ee":"https://doi.org/10.1109/GRC.2009.5255100","url":"https://dblp.org/rec/conf/grc/LiWHWBL09"}, "url":"URL#5117644" }, { "@score":"6", "@id":"5117695", "info":{"authors":{"author":{"@pid":"59/4107","text":"Xindong Wu 0001"}},"title":"Ubiquitous personalized information processing with wildcards.","venue":"GrC","pages":"5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/grc/Wu09","doi":"10.1109/GRC.2009.5255135","ee":"https://doi.org/10.1109/GRC.2009.5255135","url":"https://dblp.org/rec/conf/grc/Wu09"}, "url":"URL#5117695" }, { "@score":"6", "@id":"5129238", "info":{"authors":{"author":[{"@pid":"58/6443","text":"Zhenyu Lu"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"b/JoshuaCliffordBongard","text":"Josh C. Bongard"}]},"title":"Active Learning with Adaptive Heterogeneous Ensembles.","venue":"ICDM","pages":"327-336","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdm/LuWB09","doi":"10.1109/ICDM.2009.63","ee":"https://doi.org/10.1109/ICDM.2009.63","url":"https://dblp.org/rec/conf/icdm/LuWB09"}, "url":"URL#5129238" }, { "@score":"6", "@id":"5129345", "info":{"authors":{"author":[{"@pid":"65/4144","text":"Yanshan Xiao"},{"@pid":"58/2670-2","text":"Bo Liu 0002"},{"@pid":"14/2589","text":"Longbing Cao"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"71/964","text":"Chengqi Zhang"},{"@pid":"94/6214","text":"Zhifeng Hao"},{"@pid":"32/1482","text":"Fengzhao Yang"},{"@pid":"39/6191-1","text":"Jie Cao 0001"}]},"title":"Multi-sphere Support Vector Data Description for Outliers Detection on Multi-distribution Data.","venue":"ICDM Workshops","pages":"82-87","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdm/XiaoLCWZHYC09","doi":"10.1109/ICDMW.2009.87","ee":"https://doi.org/10.1109/ICDMW.2009.87","url":"https://dblp.org/rec/conf/icdm/XiaoLCWZHYC09"}, "url":"URL#5129345" }, { "@score":"6", "@id":"5129372", "info":{"authors":{"author":[{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"71/964","text":"Chengqi Zhang"}]},"title":"Vague One-Class Learning for Data Streams.","venue":"ICDM","pages":"657-666","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdm/ZhuWZ09","doi":"10.1109/ICDM.2009.70","ee":"https://doi.org/10.1109/ICDM.2009.70","url":"https://dblp.org/rec/conf/icdm/ZhuWZ09"}, "url":"URL#5129372" }, { "@score":"6", "@id":"5139325", "info":{"authors":{"author":[{"@pid":"77/2036-1","text":"Dan He 0001"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Approximate Repeating Pattern Mining with Gap Requirements.","venue":"ICTAI","pages":"17-24","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/ictai/HeZW09","doi":"10.1109/ICTAI.2009.8","ee":"https://doi.org/10.1109/ICTAI.2009.8","url":"https://dblp.org/rec/conf/ictai/HeZW09"}, "url":"URL#5139325" }, { "@score":"6", "@id":"5139326", "info":{"authors":{"author":[{"@pid":"77/2036-1","text":"Dan He 0001"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Error Detection and Uncertainty Modeling for Imprecise Data.","venue":"ICTAI","pages":"792-795","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/ictai/HeZW09a","doi":"10.1109/ICTAI.2009.9","ee":"https://doi.org/10.1109/ICTAI.2009.9","url":"https://dblp.org/rec/conf/ictai/HeZW09a"}, "url":"URL#5139326" }, { "@score":"12", "@id":"5149002", "info":{"authors":{"author":[{"@pid":"63/7622","text":"Ying-Ling Liu"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"82/4977-6","text":"Jun Gao 0006"},{"@pid":"63/6340","text":"Gong-Qing Wu"},{"@pid":"68/7989-1","text":"Haiping Wang 0001"},{"@pid":"20/7623","text":"Xiao-Li Hong"}]},"title":"Pattern Matching with Wildcards based on Key Character Location.","venue":"IRI","pages":"167-170","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iri/LiuWHGWWH09","doi":"10.1109/IRI.2009.5211545","ee":"https://doi.org/10.1109/IRI.2009.5211545","url":"https://dblp.org/rec/conf/iri/LiuWHGWWH09"}, "url":"URL#5149002" }, { "@score":"6", "@id":"5170264", "info":{"authors":{"author":[{"@pid":"60/3675-1","text":"Pei-Pei Li 0001"},{"@pid":"a/QianhuiAltheaLiang","text":"Qianhui Liang"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"38/5910","text":"Xuegang Hu"}]},"title":"Parameter Estimdation in Semi-Random Decision Tree Ensembling on Streaming Data.","venue":"PAKDD","pages":"376-388","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/pakdd/LiLWH09","doi":"10.1007/978-3-642-01307-2_35","ee":"https://doi.org/10.1007/978-3-642-01307-2_35","url":"https://dblp.org/rec/conf/pakdd/LiLWH09"}, "url":"URL#5170264" }, { "@score":"6", "@id":"5170329", "info":{"authors":{"author":[{"@pid":"21/1048-1","text":"Peng Zhang 0001"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"84/5467-1","text":"Yong Shi 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"An Aggregate Ensemble for Mining Concept Drifting Data Streams with Noise.","venue":"PAKDD","pages":"1021-1029","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/pakdd/ZhangZSW09","doi":"10.1007/978-3-642-01307-2_109","ee":"https://doi.org/10.1007/978-3-642-01307-2_109","url":"https://dblp.org/rec/conf/pakdd/ZhangZSW09"}, "url":"URL#5170329" }, { "@score":"12", "@id":"5175390", "info":{"authors":{"author":[{"@pid":"20/7623","text":"Xiao-Li Hong"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"63/7622","text":"Ying-Ling Liu"},{"@pid":"82/4977-6","text":"Jun Gao 0006"},{"@pid":"63/6340","text":"Gong-Qing Wu"}]},"title":"BPBM: An Algorithm for String Matching with Wildcards and Length Constraints.","venue":"RSFDGrC","pages":"518-525","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/rsfdgrc/HongWHLGW09","doi":"10.1007/978-3-642-10646-0_63","ee":"https://doi.org/10.1007/978-3-642-10646-0_63","url":"https://dblp.org/rec/conf/rsfdgrc/HongWHLGW09"}, "url":"URL#5175390" }, { "@score":"6", "@id":"5175406", "info":{"authors":{"author":[{"@pid":"79/4191","text":"Fan Min 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"A Comparative Study of Pattern Matching Algorithms on Sequences.","venue":"RSFDGrC","pages":"510-517","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/rsfdgrc/MinW09","doi":"10.1007/978-3-642-10646-0_62","ee":"https://doi.org/10.1007/978-3-642-10646-0_62","url":"https://dblp.org/rec/conf/rsfdgrc/MinW09"}, "url":"URL#5175406" }, { "@score":"6", "@id":"5198331", "info":{"authors":{"author":[{"@pid":"60/2899","text":"Emilio Corchado"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"81/2178","text":"Erkki Oja"},{"@pid":"92/2688","text":"Álvaro Herrero 0001"},{"@pid":"46/3556","text":"Bruno Baruque"}]},"title":"Hybrid Artificial Intelligence Systems, 4th International Conference, HAIS 2009, Salamanca, Spain, June 10-12, 2009. Proceedings","venue":["HAIS","Lecture Notes in Computer Science"],"volume":"5572","publisher":"Springer","year":"2009","type":"Editorship","key":"conf/hais/2009","doi":"10.1007/978-3-642-02319-4","ee":"https://doi.org/10.1007/978-3-642-02319-4","url":"https://dblp.org/rec/conf/hais/2009"}, "url":"URL#5198331" }, { "@score":"6", "@id":"5198453", "info":{"authors":{"author":[{"@pid":"w/WeiWang","text":"Wei Wang 0010"},{"@pid":"k/HillolKargupta","text":"Hillol Kargupta"},{"@pid":"r/SanjayRanka","text":"Sanjay Ranka"},{"@pid":"y/PhilipSYu","text":"Philip S. Yu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"ICDM 2009, The Ninth IEEE International Conference on Data Mining, Miami, Florida, USA, 6-9 December 2009","venue":"ICDM","publisher":"IEEE Computer Society","year":"2009","type":"Editorship","key":"conf/icdm/2009","ee":"https://ieeexplore.ieee.org/xpl/conhome/5360037/proceeding","url":"https://dblp.org/rec/conf/icdm/2009"}, "url":"URL#5198453" }, { "@score":"6", "@id":"5198454", "info":{"authors":{"author":[{"@pid":"48/5154","text":"Yücel Saygin"},{"@pid":"y/JXuYu","text":"Jeffrey Xu Yu"},{"@pid":"k/HillolKargupta","text":"Hillol Kargupta"},{"@pid":"w/WeiWang","text":"Wei Wang 0010"},{"@pid":"r/SanjayRanka","text":"Sanjay Ranka"},{"@pid":"y/PhilipSYu","text":"Philip S. Yu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"ICDM Workshops 2009, IEEE International Conference on Data Mining Workshops, Miami, Florida, USA, 6 December 2009","venue":"ICDM Workshops","publisher":"IEEE Computer Society","year":"2009","type":"Editorship","key":"conf/icdm/2009w","ee":"https://ieeexplore.ieee.org/xpl/conhome/5360416/proceeding","url":"https://dblp.org/rec/conf/icdm/2009w"}, "url":"URL#5198454" }, { "@score":"6", "@id":"5232849", "info":{"authors":{"author":[{"@pid":"y/YingYang-1","text":"Ying Yang 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"}]},"title":"Conceptual equivalence for contrast mining in classification learning.","venue":"Data Knowl. Eng.","volume":"67","number":"3","pages":"413-429","year":"2008","type":"Journal Articles","access":"closed","key":"journals/dke/YangWZ08","doi":"10.1016/J.DATAK.2008.07.001","ee":"https://doi.org/10.1016/j.datak.2008.07.001","url":"https://dblp.org/rec/journals/dke/YangWZ08"}, "url":"URL#5232849" }, { "@score":"6", "@id":"5248144", "info":{"authors":{"author":[{"@pid":"46/3391","text":"Dacheng Tao"},{"@pid":"l/XuelongLi","text":"Xuelong Li 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"m/StephenJMaybank","text":"Stephen J. Maybank"}]},"title":"Tensor Rank One Discriminant Analysis - A convergent method for discriminative multilinear subspace selection.","venue":"Neurocomputing","volume":"71","number":"10-12","pages":"1866-1882","year":"2008","type":"Journal Articles","access":"closed","key":"journals/ijon/TaoLWM08","doi":"10.1016/J.NEUCOM.2007.08.036","ee":"https://doi.org/10.1016/j.neucom.2007.08.036","url":"https://dblp.org/rec/journals/ijon/TaoLWM08"}, "url":"URL#5248144" }, { "@score":"6", "@id":"5261414", "info":{"authors":{"author":[{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"k/VipinKumar-1","text":"Vipin Kumar 0001"},{"@pid":"q/JRQuinlan","text":"J. Ross Quinlan"},{"@pid":"51/2272","text":"Joydeep Ghosh"},{"@pid":"82/6362-1","text":"Qiang Yang 0001"},{"@pid":"08/6525","text":"Hiroshi Motoda"},{"@pid":"83/3246","text":"Geoffrey J. McLachlan"},{"@pid":"05/6140","text":"Angus F. M. Ng"},{"@pid":"l/BingLiu1","text":"Bing Liu 0001"},{"@pid":"y/PhilipSYu","text":"Philip S. Yu"},{"@pid":"z/ZhiHuaZhou","text":"Zhi-Hua Zhou"},{"@pid":"04/1613","text":"Michael S. Steinbach"},{"@pid":"65/3721","text":"David J. Hand"},{"@pid":"16/1665","text":"Dan Steinberg"}]},"title":"Top 10 algorithms in data mining.","venue":"Knowl. Inf. Syst.","volume":"14","number":"1","pages":"1-37","year":"2008","type":"Journal Articles","access":"closed","key":"journals/kais/WuKQGYMMNLYZSHS08","doi":"10.1007/S10115-007-0114-2","ee":"https://doi.org/10.1007/s10115-007-0114-2","url":"https://dblp.org/rec/journals/kais/WuKQGYMMNLYZSHS08"}, "url":"URL#5261414" }, { "@score":"6", "@id":"5261422", "info":{"authors":{"author":[{"@pid":"z/ShichaoZhang","text":"Shichao Zhang"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"71/964","text":"Chengqi Zhang"},{"@pid":"33/4290","text":"Jingli Lu"}]},"title":"Computing the minimum-support for mining frequent patterns.","venue":"Knowl. Inf. Syst.","volume":"15","number":"2","pages":"233-257","year":"2008","type":"Journal Articles","access":"closed","key":"journals/kais/ZhangWZL08","doi":"10.1007/S10115-007-0081-7","ee":"https://doi.org/10.1007/s10115-007-0081-7","url":"https://dblp.org/rec/journals/kais/ZhangWZL08"}, "url":"URL#5261422" }, { "@score":"6", "@id":"5279989", "info":{"authors":{"author":[{"@pid":"46/3391","text":"Dacheng Tao"},{"@pid":"71/5333","text":"Mingli Song"},{"@pid":"l/XuelongLi","text":"Xuelong Li 0001"},{"@pid":"33/7046","text":"Jialie Shen 0001"},{"@pid":"54/4948","text":"Jimeng Sun 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"f/CFaloutsos","text":"Christos Faloutsos"},{"@pid":"m/StephenJMaybank","text":"Stephen J. Maybank"}]},"title":"Bayesian Tensor Approach for 3-D Face Modeling.","venue":"IEEE Trans. Circuits Syst. Video Technol.","volume":"18","number":"10","pages":"1397-1410","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tcsv/TaoSLSSWFM08","doi":"10.1109/TCSVT.2008.2002825","ee":"https://doi.org/10.1109/TCSVT.2008.2002825","url":"https://dblp.org/rec/journals/tcsv/TaoSLSSWFM08"}, "url":"URL#5279989" }, { "@score":"6", "@id":"5283078", "info":{"authors":{"author":{"@pid":"59/4107","text":"Xindong Wu 0001"}},"title":"Editorial: TKDE Editorial Board Changes.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"20","number":"7","pages":"865-867","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tkde/Wu08","doi":"10.1109/TKDE.2008.108","ee":"https://doi.org/10.1109/TKDE.2008.108","url":"https://dblp.org/rec/journals/tkde/Wu08"}, "url":"URL#5283078" }, { "@score":"6", "@id":"5283079", "info":{"authors":{"author":{"@pid":"59/4107","text":"Xindong Wu 0001"}},"title":"TKDE 20(12) (December 2008) EIC Editorial: State of the Transactions.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"20","number":"12","pages":"1585-1586","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tkde/Wu08a","doi":"10.1109/TKDE.2008.219","ee":"https://doi.org/10.1109/TKDE.2008.219","url":"https://dblp.org/rec/journals/tkde/Wu08a"}, "url":"URL#5283079" }, { "@score":"6", "@id":"5285390", "info":{"authors":{"author":[{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"}]},"title":"Mining With Noise Knowledge: Error-Aware Data Mining.","venue":"IEEE Trans. Syst. Man Cybern. Part A","volume":"38","number":"4","pages":"917-932","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tsmc/WuZ08","doi":"10.1109/TSMCA.2008.923034","ee":"https://doi.org/10.1109/TSMCA.2008.923034","url":"https://dblp.org/rec/journals/tsmc/WuZ08"}, "url":"URL#5285390" }, { "@score":"6", "@id":"5292470", "info":{"authors":{"author":[{"@pid":"60/3675-1","text":"Pei-Pei Li 0001"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Mining Concept-Drifting Data Streams with Multiple Semi-Random Decision Trees.","venue":"ADMA","pages":"733-740","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/adma/LiHW08","doi":"10.1007/978-3-540-88192-6_78","ee":"https://doi.org/10.1007/978-3-540-88192-6_78","url":"https://dblp.org/rec/conf/adma/LiHW08"}, "url":"URL#5292470" }, { "@score":"6", "@id":"5305182", "info":{"authors":{"author":[{"@pid":"51/4153","text":"Dingiun Chen"},{"@pid":"71/6513","text":"Keith C. C. Chan"},{"@pid":"181/2770","text":"Xindong Wu 0002"}]},"title":"Gene expression analyses using Genetic Algorithm based hybrid approaches.","venue":"IEEE Congress on Evolutionary Computation","pages":"963-969","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/cec/ChenCW08","doi":"10.1109/CEC.2008.4630913","ee":"https://doi.org/10.1109/CEC.2008.4630913","url":"https://dblp.org/rec/conf/cec/ChenCW08"}, "url":"URL#5305182" }, { "@score":"6", "@id":"5318086", "info":{"authors":{"author":[{"@pid":"29/3409","text":"DongJun Zong"},{"@pid":"35/3429","text":"Guojun Mao"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"An Intrusion Detection Model Based on Mining Data Streams.","venue":"DMIN","pages":"398-403","year":"2008","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/dmin/ZongMW08","url":"https://dblp.org/rec/conf/dmin/ZongMW08"}, "url":"URL#5318086" }, { "@score":"6", "@id":"5330467", "info":{"authors":{"author":[{"@pid":"181/2856-8","text":"Zhao Li 0008"},{"@pid":"27/1817","text":"Hong Peng"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"A New Descriptive Clustering Algorithm based on Nonnegative Matrix Factorization.","venue":"GrC","pages":"407-412","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/grc/LiPW08","doi":"10.1109/GRC.2008.4664752","ee":"https://doi.org/10.1109/GRC.2008.4664752","url":"https://dblp.org/rec/conf/grc/LiPW08"}, "url":"URL#5330467" }, { "@score":"6", "@id":"5330790", "info":{"authors":{"author":{"@pid":"59/4107","text":"Xindong Wu 0001"}},"title":"Data Mining: Algorithms and Problems.","venue":"HAIS","pages":"1","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/hais/Wu08","doi":"10.1007/978-3-540-87656-4_1","ee":"https://doi.org/10.1007/978-3-540-87656-4_1","url":"https://dblp.org/rec/conf/hais/Wu08"}, "url":"URL#5330790" }, { "@score":"6", "@id":"5339900", "info":{"authors":{"author":[{"@pid":"72/3476","text":"Xinghua Li"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"51/1316","text":"Fei Xie"},{"@pid":"61/6007","text":"Zhaozhong Jiang"}]},"title":"Keyword Extraction Based on Lexical Chains and Word Co-occurrence for Chinese News Web Pages.","venue":"ICDM Workshops","pages":"744-751","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdm/LiWHXJ08","doi":"10.1109/ICDMW.2008.122","ee":"https://doi.org/10.1109/ICDMW.2008.122","url":"https://dblp.org/rec/conf/icdm/LiWHXJ08"}, "url":"URL#5339900" }, { "@score":"6", "@id":"5339910", "info":{"authors":{"author":[{"@pid":"55/2775","text":"Xiaoyan Liu"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"22/3940","text":"Huaiqing Wang"},{"@pid":"24/2796","text":"Yingfeng Wang"}]},"title":"Multilayer Change-Point Detection on Stock Order Flows by Wavelet Transformation.","venue":"ICDM Workshops","pages":"635-642","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdm/LiuWWW08","doi":"10.1109/ICDMW.2008.65","ee":"https://doi.org/10.1109/ICDMW.2008.65","url":"https://dblp.org/rec/conf/icdm/LiuWWW08"}, "url":"URL#5339910" }, { "@score":"6", "@id":"5340024", "info":{"authors":{"author":[{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"21/1048-1","text":"Peng Zhang 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"77/2036-1","text":"Dan He 0001"},{"@pid":"71/964","text":"Chengqi Zhang"},{"@pid":"84/5467-1","text":"Yong Shi 0001"}]},"title":"Cleansing Noisy Data Streams.","venue":"ICDM","pages":"1139-1144","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdm/ZhuZWHZS08","doi":"10.1109/ICDM.2008.45","ee":"https://doi.org/10.1109/ICDM.2008.45","url":"https://dblp.org/rec/conf/icdm/ZhuZWHZS08"}, "url":"URL#5340024" }, { "@score":"6", "@id":"5340172", "info":{"authors":{"author":[{"@pid":"a/QianhuiAltheaLiang","text":"Qianhui Liang"},{"@pid":"27/6572","text":"Hoong Chuin Lau"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Robust Application-Level QoS Management in Service-Oriented Systems.","venue":"ICEBE","pages":"239-246","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/icebe/LiangLW08","doi":"10.1109/ICEBE.2008.115","ee":"https://doi.org/10.1109/ICEBE.2008.115","url":"https://dblp.org/rec/conf/icebe/LiangLW08"}, "url":"URL#5340172" }, { "@score":"6", "@id":"5356613", "info":{"authors":{"author":[{"@pid":"46/3391","text":"Dacheng Tao"},{"@pid":"54/4948","text":"Jimeng Sun 0001"},{"@pid":"33/7046","text":"Jialie Shen 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"l/XuelongLi","text":"Xuelong Li 0001"},{"@pid":"m/StephenJMaybank","text":"Stephen J. Maybank"},{"@pid":"f/CFaloutsos","text":"Christos Faloutsos"}]},"title":"Bayesian tensor analysis.","venue":"IJCNN","pages":"1402-1409","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/ijcnn/TaoSSWLMF08","doi":"10.1109/IJCNN.2008.4633981","ee":"https://doi.org/10.1109/IJCNN.2008.4633981","url":"https://dblp.org/rec/conf/ijcnn/TaoSSWLMF08"}, "url":"URL#5356613" }, { "@score":"6", "@id":"5363661", "info":{"authors":{"author":[{"@pid":"51/1316","text":"Fei Xie"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"14/374-1","text":"Fei-Yue Wang 0001"}]},"title":"Keyphrase Extraction from Chinese News Web Pages Based on Semantic Relations.","venue":"ISI Workshops","pages":"490-495","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/isi/XieWHW08","doi":"10.1007/978-3-540-69304-8_51","ee":"https://doi.org/10.1007/978-3-540-69304-8_51","url":"https://dblp.org/rec/conf/isi/XieWHW08"}, "url":"URL#5363661" }, { "@score":"12", "@id":"5363679", "info":{"authors":{"author":[{"@pid":"35/1316","text":"Zhu Zhu"},{"@pid":"63/6340","text":"Gong-Qing Wu"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"14/374-1","text":"Fei-Yue Wang 0001"}]},"title":"Automatic Recognition of News Web Pages.","venue":"ISI Workshops","pages":"496-501","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/isi/ZhuWWHW08","doi":"10.1007/978-3-540-69304-8_52","ee":"https://doi.org/10.1007/978-3-540-69304-8_52","url":"https://dblp.org/rec/conf/isi/ZhuWWHW08"}, "url":"URL#5363679" }, { "@score":"6", "@id":"5369775", "info":{"authors":{"author":{"@pid":"59/4107","text":"Xindong Wu 0001"}},"title":"Error-Tolerant Data Mining.","venue":"JCKBSE","pages":"5-6","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/jckbse/Wu08","doi":"10.3233/978-1-58603-900-4-5","ee":"https://doi.org/10.3233/978-1-58603-900-4-5","url":"https://dblp.org/rec/conf/jckbse/Wu08"}, "url":"URL#5369775" }, { "@score":"6", "@id":"5404197", "info":{"authors":{"author":[{"@pid":"28/5548","text":"Jeffrey Stone"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"48/3228","text":"Marc Greenblatt"}]},"title":"User-Centered Biological Information Location by Combining User Profiles and Domain Knowledge.","venue":"Next Generation of Data Mining","year":"2008","type":"Parts in Books or Collections","access":"closed","key":"books/tf/08/Stone0G08","doi":"10.1201/9781420085877.CH9","ee":"https://doi.org/10.1201/9781420085877.ch9","url":"https://dblp.org/rec/books/tf/08/Stone0G08"}, "url":"URL#5404197" }, { "@score":"6", "@id":"5404827", "info":{"authors":{"author":[{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"04/3348","text":"Yan Zhang"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"}]},"title":"Data Mining.","venue":"Wiley Encyclopedia of Computer Science and Engineering","year":"2008","type":"Parts in Books or Collections","access":"closed","key":"reference/wiley/WuZZ08","doi":"10.1002/9780470050118.ECSE094","ee":"https://doi.org/10.1002/9780470050118.ecse094","url":"https://dblp.org/rec/reference/wiley/WuZZ08"}, "url":"URL#5404827" }, { "@score":"12", "@id":"5457151", "info":{"authors":{"author":[{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"60/3675-1","text":"Pei-Pei Li 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"63/6340","text":"Gong-Qing Wu"}]},"title":"A Semi-Random Multiple Decision-Tree Algorithm for Mining Data Streams.","venue":"J. Comput. Sci. Technol.","volume":"22","number":"5","pages":"711-724","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jcst/HuLWW07","doi":"10.1007/S11390-007-9084-9","ee":"https://doi.org/10.1007/s11390-007-9084-9","url":"https://dblp.org/rec/journals/jcst/HuLWW07"}, "url":"URL#5457151" }, { "@score":"6", "@id":"5457208", "info":{"authors":{"author":[{"@pid":"03/517","text":"Feng Xue"},{"@pid":"11/873","text":"You-Sheng Zhang"},{"@pid":"121/0791","text":"Julang Jiang"},{"@pid":"86/6507","text":"Min Hu"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"71/1937","text":"Ronggui Wang"}]},"title":"Real-Time Texture Synthesis Using s-Tile Set.","venue":"J. Comput. Sci. Technol.","volume":"22","number":"4","pages":"590-596","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jcst/XueZJHWW07","doi":"10.1007/S11390-007-9072-0","ee":"https://doi.org/10.1007/s11390-007-9072-0","url":"https://dblp.org/rec/journals/jcst/XueZJHWW07"}, "url":"URL#5457208" }, { "@score":"6", "@id":"5458993", "info":{"authors":{"author":[{"@pid":"35/3429","text":"Guojun Mao"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"49/4553","text":"Gong Chen"},{"@pid":"05/305","text":"Chunnian Liu"}]},"title":"Mining maximal frequent itemsets from data streams.","venue":"J. Inf. Sci.","volume":"33","number":"3","pages":"251-262","year":"2007","type":"Journal Articles","access":"closed","key":"journals/jis/MaoWZCL07","doi":"10.1177/0165551506068179","ee":"https://doi.org/10.1177/0165551506068179","url":"https://dblp.org/rec/journals/jis/MaoWZCL07"}, "url":"URL#5458993" }, { "@score":"6", "@id":"5462730", "info":{"authors":{"author":[{"@pid":"46/3391","text":"Dacheng Tao"},{"@pid":"l/XuelongLi","text":"Xuelong Li 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"41/6824","text":"Weiming Hu"},{"@pid":"m/StephenJMaybank","text":"Stephen J. Maybank"}]},"title":"Supervised tensor learning.","venue":"Knowl. Inf. Syst.","volume":"13","number":"1","pages":"1-42","year":"2007","type":"Journal Articles","access":"closed","key":"journals/kais/TaoLWHM07","doi":"10.1007/S10115-006-0050-6","ee":"https://doi.org/10.1007/s10115-006-0050-6","url":"https://dblp.org/rec/journals/kais/TaoLWHM07"}, "url":"URL#5462730" }, { "@score":"6", "@id":"5467689", "info":{"authors":{"author":[{"@pid":"49/4553","text":"Gong Chen"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"}]},"title":"Mining Sequential Patterns across Time Sequences.","venue":"New Gener. Comput.","volume":"26","number":"1","pages":"75-96","year":"2007","type":"Journal Articles","access":"closed","key":"journals/ngc/ChenWZ07","doi":"10.1007/S00354-007-0036-2","ee":"https://doi.org/10.1007/s00354-007-0036-2","url":"https://dblp.org/rec/journals/ngc/ChenWZ07"}, "url":"URL#5467689" }, { "@score":"6", "@id":"5468889", "info":{"authors":{"author":[{"@pid":"46/3391","text":"Dacheng Tao"},{"@pid":"l/XuelongLi","text":"Xuelong Li 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"m/StephenJMaybank","text":"Stephen J. Maybank"}]},"title":"General Tensor Discriminant Analysis and Gabor Features for Gait Recognition.","venue":"IEEE Trans. Pattern Anal. Mach. Intell.","volume":"29","number":"10","pages":"1700-1715","year":"2007","type":"Journal Articles","access":"closed","key":"journals/pami/TaoLWM07","doi":"10.1109/TPAMI.2007.1096","ee":"https://doi.org/10.1109/TPAMI.2007.1096","url":"https://dblp.org/rec/journals/pami/TaoLWM07"}, "url":"URL#5468889" }, { "@score":"6", "@id":"5470424", "info":{"authors":{"author":[{"@pid":"82/4977-6","text":"Jun Gao 0006"},{"@pid":"32/6328","text":"Zhao Xie"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Generic object recognition with regional statistical models and layer joint boosting.","venue":"Pattern Recognit. Lett.","volume":"28","number":"16","pages":"2227-2237","year":"2007","type":"Journal Articles","access":"closed","key":"journals/prl/GaoXW07","doi":"10.1016/J.PATREC.2007.07.006","ee":"https://doi.org/10.1016/j.patrec.2007.07.006","url":"https://dblp.org/rec/journals/prl/GaoXW07"}, "url":"URL#5470424" }, { "@score":"6", "@id":"5490143", "info":{"authors":{"author":[{"@pid":"51/1086","text":"Jilian Zhang"},{"@pid":"z/ShichaoZhang","text":"Shichao Zhang"},{"@pid":"60/4671-1","text":"Xiaofeng Zhu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"71/964","text":"Chengqi Zhang"}]},"title":"Measuring the Uncertainty of Differences for Contrasting Groups.","venue":"AAAI","pages":"1920-1921","year":"2007","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/aaai/ZhangZZWZ07","ee":"http://www.aaai.org/Library/AAAI/2007/aaai07-335.php","url":"https://dblp.org/rec/conf/aaai/ZhangZZWZ07"}, "url":"URL#5490143" }, { "@score":"6", "@id":"5498578", "info":{"authors":{"author":[{"@pid":"77/2036-1","text":"Dan He 0001"},{"@pid":"a/AbdullahNArslan","text":"Abdullah N. Arslan"},{"@pid":"16/3418","text":"Yu He"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Iterative Refinement of Repeat Sequence Specification Using Constrained Pattern Matching.","venue":"BIBE","pages":"1199-1203","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/bibe/HeAHW07","doi":"10.1109/BIBE.2007.4375715","ee":"https://doi.org/10.1109/BIBE.2007.4375715","url":"https://dblp.org/rec/conf/bibe/HeAHW07"}, "url":"URL#5498578" }, { "@score":"6", "@id":"5498774", "info":{"authors":{"author":[{"@pid":"77/2036-1","text":"Dan He 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"}]},"title":"SAIL-APPROX: An Efficient On-Line Algorithm for Approximate Pattern Matching with Wildcards and Length Constraints.","venue":"BIBM","pages":"151-158","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/bibm/HeWZ07","doi":"10.1109/BIBM.2007.64","ee":"https://doi.org/10.1109/BIBM.2007.64","url":"https://dblp.org/rec/conf/bibm/HeWZ07"}, "url":"URL#5498774" }, { "@score":"6", "@id":"5505843", "info":{"authors":{"author":{"@pid":"59/4107","text":"Xindong Wu 0001"}},"title":"Mining with Noise Knowledge: Error Aware Data Mining.","venue":"CIS","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/cis/Wu07","doi":"10.1109/CIS.2007.7","ee":"https://doi.org/10.1109/CIS.2007.7","url":"https://dblp.org/rec/conf/cis/Wu07"}, "url":"URL#5505843" }, { "@score":"6", "@id":"5520946", "info":{"authors":{"author":[{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"49/3283","text":"Wei Liu"},{"@pid":"15/586","text":"Dexing Wang"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Mining Frequent Itemsets Using a Pruned Concept Lattice.","venue":"FSKD","pages":"606-610","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/fskd/HuLWW07","doi":"10.1109/FSKD.2007.401","ee":"https://doi.org/10.1109/FSKD.2007.401","url":"https://dblp.org/rec/conf/fskd/HuLWW07"}, "url":"URL#5520946" }, { "@score":"6", "@id":"5536717", "info":{"authors":{"author":[{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Discovering Relational Patterns across Multiple Databases.","venue":"ICDE","pages":"726-735","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/icde/ZhuW07","doi":"10.1109/ICDE.2007.367918","ee":"https://doi.org/10.1109/ICDE.2007.367918","url":"https://dblp.org/rec/conf/icde/ZhuW07"}, "url":"URL#5536717" }, { "@score":"6", "@id":"5537017", "info":{"authors":{"author":[{"@pid":"46/3391","text":"Dacheng Tao"},{"@pid":"l/XuelongLi","text":"Xuelong Li 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"m/StephenJMaybank","text":"Stephen J. Maybank"}]},"title":"General Averaged Divergence Analysis.","venue":"ICDM","pages":"302-311","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdm/TaoLWM07","doi":"10.1109/ICDM.2007.105","ee":"https://doi.org/10.1109/ICDM.2007.105","url":"https://dblp.org/rec/conf/icdm/TaoLWM07"}, "url":"URL#5537017" }, { "@score":"6", "@id":"5537058", "info":{"authors":{"author":[{"@pid":"04/3348","text":"Yan Zhang"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Noise Modeling with Associative Corruption Rules.","venue":"ICDM","pages":"733-738","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdm/ZhangW07","doi":"10.1109/ICDM.2007.28","ee":"https://doi.org/10.1109/ICDM.2007.28","url":"https://dblp.org/rec/conf/icdm/ZhangW07"}, "url":"URL#5537058" }, { "@score":"6", "@id":"5543763", "info":{"authors":{"author":[{"@pid":"46/3391","text":"Dacheng Tao"},{"@pid":"54/4948","text":"Jimeng Sun 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"l/XuelongLi","text":"Xuelong Li 0001"},{"@pid":"33/7046","text":"Jialie Shen 0001"},{"@pid":"m/StephenJMaybank","text":"Stephen J. Maybank"},{"@pid":"f/CFaloutsos","text":"Christos Faloutsos"}]},"title":"Probabilistic Tensor Analysis with Akaike and Bayesian Information Criteria.","venue":"ICONIP","pages":"791-801","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/iconip/TaoSWLSMF07","doi":"10.1007/978-3-540-69158-7_82","ee":"https://doi.org/10.1007/978-3-540-69158-7_82","url":"https://dblp.org/rec/conf/iconip/TaoSWLSMF07"}, "url":"URL#5543763" }, { "@score":"6", "@id":"5551201", "info":{"authors":{"author":[{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Mining Complex Patterns across Sequences with Gap Requirements.","venue":"IJCAI","pages":"2934-2941","year":"2007","type":"Conference and Workshop Papers","access":"open","key":"conf/ijcai/ZhuW07","ee":"http://ijcai.org/Proceedings/07/Papers/472.pdf","url":"https://dblp.org/rec/conf/ijcai/ZhuW07"}, "url":"URL#5551201" }, { "@score":"6", "@id":"5551202", "info":{"authors":{"author":[{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"k/TMKhoshgoftaar","text":"Taghi M. Khoshgoftaar"},{"@pid":"84/5467-1","text":"Yong Shi 0001"}]},"title":"An Empirical Study of the Noise Impact on Cost-Sensitive Learning.","venue":"IJCAI","pages":"1168-1174","year":"2007","type":"Conference and Workshop Papers","access":"open","key":"conf/ijcai/ZhuWKS07","ee":"http://ijcai.org/Proceedings/07/Papers/189.pdf","url":"https://dblp.org/rec/conf/ijcai/ZhuWKS07"}, "url":"URL#5551202" }, { "@score":"6", "@id":"5555482", "info":{"authors":{"author":[{"@pid":"16/3418","text":"Yu He"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"a/AbdullahNArslan","text":"Abdullah N. Arslan"}]},"title":"Mining Frequent Patterns with Wildcards from Biological Sequences.","venue":"IRI","pages":"329-334","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/iri/HeWZA07","doi":"10.1109/IRI.2007.4296642","ee":"https://doi.org/10.1109/IRI.2007.4296642","url":"https://dblp.org/rec/conf/iri/HeWZA07"}, "url":"URL#5555482" }, { "@score":"6", "@id":"5568930", "info":{"authors":{"author":[{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"50/2908","text":"Dongbo Wang"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Varying Density Spatial Clustering Based on a Hierarchical Tree.","venue":"MLDM","pages":"188-202","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/mldm/HuWW07","doi":"10.1007/978-3-540-73499-4_15","ee":"https://doi.org/10.1007/978-3-540-73499-4_15","url":"https://dblp.org/rec/conf/mldm/HuWW07"}, "url":"URL#5568930" }, { "@score":"6", "@id":"5574162", "info":{"authors":{"author":{"@pid":"59/4107","text":"Xindong Wu 0001"}},"title":"Class Noise vs Attribute Noise: Their Impacts, Detection and Cleansing.","venue":"PAKDD","pages":"7-8","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/pakdd/Wu07","doi":"10.1007/978-3-540-71701-0_3","ee":"https://doi.org/10.1007/978-3-540-71701-0_3","url":"https://dblp.org/rec/conf/pakdd/Wu07"}, "url":"URL#5574162" }, { "@score":"6", "@id":"5574189", "info":{"authors":{"author":[{"@pid":"52/2586","text":"Kui Yu"},{"@pid":"w/HaoWang-8","text":"Hao Wang 0008"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"A Parallel Algorithm for Learning Bayesian Networks.","venue":"PAKDD","pages":"1055-1063","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/pakdd/YuWW07","doi":"10.1007/978-3-540-71701-0_119","ee":"https://doi.org/10.1007/978-3-540-71701-0_119","url":"https://dblp.org/rec/conf/pakdd/YuWW07"}, "url":"URL#5574189" }, { "@score":"6", "@id":"5578978", "info":{"authors":{"author":[{"@pid":"38/5910","text":"Xuegang Hu"},{"@pid":"65/6603","text":"Junhua Shi"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"A New Algorithm for Attribute Reduction in Decision Tables.","venue":"RSFDGrC","pages":"37-46","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/rsfdgrc/HuSW07","doi":"10.1007/978-3-540-72530-5_4","ee":"https://doi.org/10.1007/978-3-540-72530-5_4","url":"https://dblp.org/rec/conf/rsfdgrc/HuSW07"}, "url":"URL#5578978" }, { "@score":"6", "@id":"5600787", "info":{"authors":{"author":[{"@pid":"28/827","text":"Pavel Berkhin"},{"@pid":"c/RichCaruana","text":"Rich Caruana"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Jose, California, USA, August 12-15, 2007","venue":"KDD","publisher":"ACM","year":"2007","type":"Editorship","access":"unavailable","key":"conf/kdd/2007","url":"https://dblp.org/rec/conf/kdd/2007"}, "url":"URL#5600787" }, { "@score":"6", "@id":"5601462", "info":{"authors":{"author":[{"@pid":"c/CClifton","text":"Christopher W. Clifton"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"f/CFaloutsos","text":"Christos Faloutsos"}]},"title":"TKDE Guidelines for Survey Papers.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"19","number":"11","pages":"1449","year":"2007","type":"Editorship","key":"journals/tkde/CliftonWF07","doi":"10.1109/TKDE.2007.190685","ee":"https://doi.org/10.1109/TKDE.2007.190685","url":"https://dblp.org/rec/journals/tkde/CliftonWF07"}, "url":"URL#5601462" }, { "@score":"6", "@id":"5601464", "info":{"authors":{"author":{"@pid":"59/4107","text":"Xindong Wu 0001"}},"title":"EIC Editorial: 2007 TKDE Editorial Board Changes.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"19","number":"10","pages":"1305-1307","year":"2007","type":"Editorship","key":"journals/tkde/Wu07","doi":"10.1109/TKDE.2007.190658","ee":"https://doi.org/10.1109/TKDE.2007.190658","url":"https://dblp.org/rec/journals/tkde/Wu07"}, "url":"URL#5601464" }, { "@score":"6", "@id":"5622943", "info":{"authors":{"author":[{"@pid":"y/YingYang-1","text":"Ying Yang 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"}]},"title":"Mining in Anticipation for Concept Change: Proactive-Reactive Prediction in Data Streams.","venue":"Data Min. Knowl. Discov.","volume":"13","number":"3","pages":"261-289","year":"2006","type":"Journal Articles","access":"closed","key":"journals/datamine/YangWZ06","doi":"10.1007/S10618-006-0050-X","ee":"https://doi.org/10.1007/s10618-006-0050-x","url":"https://dblp.org/rec/journals/datamine/YangWZ06"}, "url":"URL#5622943" }, { "@score":"6", "@id":"5622945", "info":{"authors":{"author":[{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"75/1639","text":"Qijun Chen"}]},"title":"Bridging Local and Global Data Cleansing: Identifying Class Noise in Large, Distributed Data Datasets.","venue":"Data Min. Knowl. Discov.","volume":"12","number":"2-3","pages":"275-308","year":"2006","type":"Journal Articles","access":"closed","key":"journals/datamine/ZhuWC06","doi":"10.1007/S10618-005-0012-8","ee":"https://doi.org/10.1007/s10618-005-0012-8","url":"https://dblp.org/rec/journals/datamine/ZhuWC06"}, "url":"URL#5622945" }, { "@score":"6", "@id":"5624329", "info":{"authors":{"author":[{"@pid":"80/5001","text":"Kaile Su"},{"@pid":"80/365","text":"Huijing Huang"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"z/ShichaoZhang","text":"Shichao Zhang"}]},"title":"A logical framework for identifying quality knowledge from different data sources.","venue":"Decis. Support Syst.","volume":"42","number":"3","pages":"1673-1683","year":"2006","type":"Journal Articles","access":"closed","key":"journals/dss/SuHWZ06","doi":"10.1016/J.DSS.2006.02.012","ee":"https://doi.org/10.1016/j.dss.2006.02.012","url":"https://dblp.org/rec/journals/dss/SuHWZ06"}, "url":"URL#5624329" }, { "@score":"6", "@id":"5634717", "info":{"authors":{"author":[{"@pid":"82/6362-1","text":"Qiang Yang 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"10 Challenging Problems in Data Mining Research.","venue":"Int. J. Inf. Technol. Decis. Mak.","volume":"5","number":"4","pages":"597-604","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ijitdm/YangW06","doi":"10.1142/S0219622006002258","ee":"https://doi.org/10.1142/S0219622006002258","url":"https://dblp.org/rec/journals/ijitdm/YangW06"}, "url":"URL#5634717" }, { "@score":"6", "@id":"5647872", "info":{"authors":{"author":[{"@pid":"49/4553","text":"Gong Chen"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"a/AbdullahNArslan","text":"Abdullah N. Arslan"},{"@pid":"16/3418","text":"Yu He"}]},"title":"Efficient string matching with wildcards and length constraints.","venue":"Knowl. Inf. Syst.","volume":"10","number":"4","pages":"399-419","year":"2006","type":"Journal Articles","access":"closed","key":"journals/kais/ChenWZAH06","doi":"10.1007/S10115-006-0016-8","ee":"https://doi.org/10.1007/s10115-006-0016-8","url":"https://dblp.org/rec/journals/kais/ChenWZAH06"}, "url":"URL#5647872" }, { "@score":"6", "@id":"5647909", "info":{"authors":{"author":[{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"y/YingYang-1","text":"Ying Yang 0001"}]},"title":"Effective classification of noisy data streams with attribute-oriented dynamic classifier selection.","venue":"Knowl. Inf. Syst.","volume":"9","number":"3","pages":"339-363","year":"2006","type":"Journal Articles","access":"closed","key":"journals/kais/ZhuWY06","doi":"10.1007/S10115-005-0212-Y","ee":"https://doi.org/10.1007/s10115-005-0212-y","url":"https://dblp.org/rec/journals/kais/ZhuWY06"}, "url":"URL#5647909" }, { "@score":"6", "@id":"5653941", "info":{"authors":{"author":[{"@pid":"46/3391","text":"Dacheng Tao"},{"@pid":"04/5226","text":"Xiaoou Tang"},{"@pid":"l/XuelongLi","text":"Xuelong Li 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Asymmetric Bagging and Random Subspace for Support Vector Machines-Based Relevance Feedback in Image Retrieval.","venue":"IEEE Trans. Pattern Anal. Mach. Intell.","volume":"28","number":"7","pages":"1088-1099","year":"2006","type":"Journal Articles","access":"closed","key":"journals/pami/TaoTLW06","doi":"10.1109/TPAMI.2006.134","ee":"https://doi.org/10.1109/TPAMI.2006.134","url":"https://dblp.org/rec/journals/pami/TaoTLW06"}, "url":"URL#5653941" }, { "@score":"6", "@id":"5667143", "info":{"authors":{"author":[{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Class Noise Handling for Effective Cost-Sensitive Learning by Cost-Guided Iterative Classification Filtering.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"18","number":"10","pages":"1435-1440","year":"2006","type":"Journal Articles","access":"closed","key":"journals/tkde/ZhuW06","doi":"10.1109/TKDE.2006.155","ee":"https://doi.org/10.1109/TKDE.2006.155","url":"https://dblp.org/rec/journals/tkde/ZhuW06"}, "url":"URL#5667143" }, { "@score":"6", "@id":"5694037", "info":{"authors":{"author":[{"@pid":"46/3391","text":"Dacheng Tao"},{"@pid":"l/XuelongLi","text":"Xuelong Li 0001"},{"@pid":"m/StephenJMaybank","text":"Stephen J. Maybank"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Human Carrying Status in Visual Surveillance.","venue":"CVPR","pages":"1670-1677","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/cvpr/TaoLMW06","doi":"10.1109/CVPR.2006.138","ee":"https://doi.org/10.1109/CVPR.2006.138","url":"https://dblp.org/rec/conf/cvpr/TaoLMW06"}, "url":"URL#5694037" }, { "@score":"6", "@id":"5699139", "info":{"authors":{"author":{"@pid":"59/4107","text":"Xindong Wu 0001"}},"title":"User-Centered Agents for Structured Information Location on the Web.","venue":"EDOC","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/edoc/Wu06","doi":"10.1109/EDOC.2006.66","ee":"https://doi.org/10.1109/EDOC.2006.66","url":"https://dblp.org/rec/conf/edoc/Wu06"}, "url":"URL#5699139" }, { "@score":"6", "@id":"5709780", "info":{"authors":{"author":[{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Error awareness data mining.","venue":"GrC","pages":"269-274","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/grc/ZhuW06a","doi":"10.1109/GRC.2006.1635795","ee":"https://doi.org/10.1109/GRC.2006.1635795","url":"https://dblp.org/rec/conf/grc/ZhuW06a"}, "url":"URL#5709780" }, { "@score":"6", "@id":"5715288", "info":{"authors":{"author":[{"@pid":"46/3391","text":"Dacheng Tao"},{"@pid":"l/XuelongLi","text":"Xuelong Li 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"m/StephenJMaybank","text":"Steve J. Maybank"}]},"title":"Elapsed Time in Human Gait Recognition: A New Approach.","venue":"ICASSP","pages":"177-180","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/icassp/TaoLWM06","doi":"10.1109/ICASSP.2006.1660308","ee":"https://doi.org/10.1109/ICASSP.2006.1660308","url":"https://dblp.org/rec/conf/icassp/TaoLWM06"}, "url":"URL#5715288" }, { "@score":"6", "@id":"5719873", "info":{"authors":{"author":[{"@pid":"04/3348","text":"Yan Zhang"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Corrective Classification: Classifier Ensembling with Corrective and Diverse Base Learners.","venue":"ICDM","pages":"1199-1204","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdm/ZhangZW06","doi":"10.1109/ICDM.2006.45","ee":"https://doi.org/10.1109/ICDM.2006.45","url":"https://dblp.org/rec/conf/icdm/ZhangZW06"}, "url":"URL#5719873" }, { "@score":"6", "@id":"5727259", "info":{"authors":{"author":[{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Scalable Representative Instance Selection and Ranking.","venue":"ICPR","pages":"352-355","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/icpr/ZhuW06","doi":"10.1109/ICPR.2006.1023","ee":"https://doi.org/10.1109/ICPR.2006.1023","url":"https://dblp.org/rec/conf/icpr/ZhuW06"}, "url":"URL#5727259" }, { "@score":"6", "@id":"5736236", "info":{"authors":{"author":[{"@pid":"77/2036-1","text":"Dan He 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Ontology-based feature weighting for biomedical literature classification.","venue":"IRI","pages":"280-285","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/iri/HeW06","doi":"10.1109/IRI.2006.252426","ee":"https://doi.org/10.1109/IRI.2006.252426","url":"https://dblp.org/rec/conf/iri/HeW06"}, "url":"URL#5736236" }, { "@score":"6", "@id":"5741573", "info":{"authors":{"author":[{"@pid":"w/HaoWang-8","text":"Hao Wang 0008"},{"@pid":"52/2586","text":"Kui Yu"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"13/5805","text":"Hongliang Yao"}]},"title":"Triangulation of Bayesian Networks Using an Adaptive Genetic Algorithm.","venue":"ISMIS","pages":"127-136","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/WangYWY06","doi":"10.1007/11875604_16","ee":"https://doi.org/10.1007/11875604_16","url":"https://dblp.org/rec/conf/ismis/WangYWY06"}, "url":"URL#5741573" }, { "@score":"6", "@id":"5747095", "info":{"authors":{"author":[{"@pid":"z/ShichaoZhang","text":"Shichao Zhang"},{"@pid":"21/3047","text":"Feng Chen"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"71/964","text":"Chengqi Zhang"}]},"title":"Identifying bridging rules between conceptual clusters.","venue":"KDD","pages":"815-820","year":"2006","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ZhangCWZ06","doi":"10.1145/1150402.1150509","ee":"https://doi.org/10.1145/1150402.1150509","url":"https://dblp.org/rec/conf/kdd/ZhangCWZ06"}, "url":"URL#5747095" }, { "@score":"6", "@id":"5777804", "info":{"authors":{"author":[{"@pid":"44/740","text":"Jiaqi Wang"},{"@pid":"71/964","text":"Chengqi Zhang"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"90/5068","text":"Hongwei Qi"},{"@pid":"69/393","text":"Jue Wang"}]},"title":"SVM-OD: SVM Method to Detect Outliers.","venue":"Foundations and Novel Approaches in Data Mining","pages":"129-141","year":"2006","type":"Parts in Books or Collections","access":"closed","key":"series/sci/WangZWQW06","doi":"10.1007/11539827_7","ee":"https://doi.org/10.1007/11539827_7","url":"https://dblp.org/rec/series/sci/WangZWQW06"}, "url":"URL#5777804" }, { "@score":"6", "@id":"5779483", "info":{"authors":{"author":{"@pid":"59/4107","text":"Xindong Wu 0001"}},"title":"EIC Editorial: State of the Transactions.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"18","number":"1","pages":"1-5","year":"2006","type":"Editorship","key":"journals/tkde/Wu06","doi":"10.1109/TKDE.2006.9","ee":"https://doi.org/10.1109/TKDE.2006.9","url":"https://dblp.org/rec/journals/tkde/Wu06"}, "url":"URL#5779483" }, { "@score":"6", "@id":"5779484", "info":{"authors":{"author":{"@pid":"59/4107","text":"Xindong Wu 0001"}},"title":"EIC Editorial: TKDE Editorial Board Changes.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"18","number":"9","pages":"1153-1155","year":"2006","type":"Editorship","key":"journals/tkde/Wu06a","doi":"10.1109/TKDE.2006.143","ee":"https://doi.org/10.1109/TKDE.2006.143","url":"https://dblp.org/rec/journals/tkde/Wu06a"}, "url":"URL#5779484" }, { "@score":"6", "@id":"5806598", "info":{"authors":{"author":[{"@pid":"44/740","text":"Jiaqi Wang"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"71/964","text":"Chengqi Zhang"}]},"title":"Support vector machines based on K-means clustering for real-time business intelligence systems.","venue":"Int. J. Bus. Intell. Data Min.","volume":"1","number":"1","pages":"54-64","year":"2005","type":"Journal Articles","access":"closed","key":"journals/ijbidm/WangWZ05","doi":"10.1504/IJBIDM.2005.007318","ee":"https://doi.org/10.1504/IJBIDM.2005.007318","url":"https://dblp.org/rec/journals/ijbidm/WangWZ05"}, "url":"URL#5806598" }, { "@score":"6", "@id":"5811600", "info":{"authors":{"author":[{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"71/964","text":"Chengqi Zhang"},{"@pid":"z/ShichaoZhang","text":"Shichao Zhang"}]},"title":"Database classification for multi-database mining.","venue":"Inf. Syst.","volume":"30","number":"1","pages":"71-88","year":"2005","type":"Journal Articles","access":"closed","key":"journals/is/WuZZ05","doi":"10.1016/J.IS.2003.10.001","ee":"https://doi.org/10.1016/j.is.2003.10.001","url":"https://dblp.org/rec/journals/is/WuZZ05"}, "url":"URL#5811600" }, { "@score":"6", "@id":"5823608", "info":{"authors":{"author":[{"@pid":"04/5616","text":"Hao Huang"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"01/2351","text":"Richard Relue"}]},"title":"Mining Frequent Patterns with the Pattern Tree.","venue":"New Gener. Comput.","volume":"23","number":"4","pages":"315-337","year":"2005","type":"Journal Articles","access":"closed","key":"journals/ngc/HuangWR05","doi":"10.1007/BF03037636","ee":"https://doi.org/10.1007/BF03037636","url":"https://dblp.org/rec/journals/ngc/HuangWR05"}, "url":"URL#5823608" }, { "@score":"6", "@id":"5836902", "info":{"authors":{"author":[{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Cost-Constrained Data Acquisition for Intelligent Data Preparation.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"17","number":"11","pages":"1542-1556","year":"2005","type":"Journal Articles","access":"closed","key":"journals/tkde/ZhuW05","doi":"10.1109/TKDE.2005.176","ee":"https://doi.org/10.1109/TKDE.2005.176","url":"https://dblp.org/rec/journals/tkde/ZhuW05"}, "url":"URL#5836902" }, { "@score":"8", "@id":"5836903", "info":{"authors":{"author":[{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"e/AKElmagarmid","text":"Ahmed K. Elmagarmid"},{"@pid":"36/1508-1","text":"Zhe Feng 0001"},{"@pid":"72/2097","text":"Lide Wu"}]},"title":"Video Data Mining: Semantic Indexing and Event Detection from the Association Perspective.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"17","number":"5","pages":"665-677","year":"2005","type":"Journal Articles","access":"closed","key":"journals/tkde/ZhuWEFW05","doi":"10.1109/TKDE.2005.83","ee":"https://doi.org/10.1109/TKDE.2005.83","url":"https://dblp.org/rec/journals/tkde/ZhuWEFW05"}, "url":"URL#5836903" }, { "@score":"6", "@id":"5862789", "info":{"authors":{"author":[{"@pid":"z/ShichaoZhang","text":"Shichao Zhang"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"51/1086","text":"Jilian Zhang"},{"@pid":"71/964","text":"Chengqi Zhang"}]},"title":"A Decremental Algorithm for Maintaining Frequent Itemsets in Dynamic Databases.","venue":"DaWaK","pages":"305-314","year":"2005","type":"Conference and Workshop Papers","access":"closed","key":"conf/dawak/ZhangWZZ05","doi":"10.1007/11546849_30","ee":"https://doi.org/10.1007/11546849_30","url":"https://dblp.org/rec/conf/dawak/ZhangWZZ05"}, "url":"URL#5862789" }, { "@score":"6", "@id":"5884741", "info":{"authors":{"author":[{"@pid":"49/4553","text":"Gong Chen"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"}]},"title":"Sequential Pattern Mining in Multiple Streams.","venue":"ICDM","pages":"585-588","year":"2005","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdm/ChenWZ05","doi":"10.1109/ICDM.2005.130","ee":"https://doi.org/10.1109/ICDM.2005.130","url":"https://dblp.org/rec/conf/icdm/ChenWZ05"}, "url":"URL#5884741" }, { "@score":"6", "@id":"5884830", "info":{"authors":{"author":[{"@pid":"46/3391","text":"Dacheng Tao"},{"@pid":"l/XuelongLi","text":"Xuelong Li 0001"},{"@pid":"41/6824","text":"Weiming Hu"},{"@pid":"m/StephenJMaybank","text":"Stephen J. Maybank"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Supervised Tensor Learning.","venue":"ICDM","pages":"450-457","year":"2005","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdm/TaoLHMW05","doi":"10.1109/ICDM.2005.139","ee":"https://doi.org/10.1109/ICDM.2005.139","url":"https://dblp.org/rec/conf/icdm/TaoLHMW05"}, "url":"URL#5884830" }, { "@score":"6", "@id":"5892252", "info":{"authors":{"author":[{"@pid":"04/3348","text":"Yan Zhang"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"36/2410","text":"Jeffrey P. Bond"}]},"title":"ACE: An Aggressive Classifier Ensemble with Error Detection, Correction, and Cleansing.","venue":"ICTAI","pages":"310-317","year":"2005","type":"Conference and Workshop Papers","access":"closed","key":"conf/ictai/ZhangZWB05","doi":"10.1109/ICTAI.2005.23","ee":"https://doi.org/10.1109/ICTAI.2005.23","url":"https://dblp.org/rec/conf/ictai/ZhangZWB05"}, "url":"URL#5892252" }, { "@score":"6", "@id":"5902944", "info":{"authors":{"author":[{"@pid":"75/1639","text":"Qijun Chen"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"}]},"title":"Scalable Inductive Learning on Partitioned Data.","venue":"ISMIS","pages":"391-403","year":"2005","type":"Conference and Workshop Papers","access":"closed","key":"conf/ismis/ChenWZ05","doi":"10.1007/11425274_41","ee":"https://doi.org/10.1007/11425274_41","url":"https://dblp.org/rec/conf/ismis/ChenWZ05"}, "url":"URL#5902944" }, { "@score":"6", "@id":"5907851", "info":{"authors":{"author":[{"@pid":"y/YingYang-1","text":"Ying Yang 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"}]},"title":"Combining proactive and reactive predictions for data streams.","venue":"KDD","pages":"710-715","year":"2005","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/YangWZ05","doi":"10.1145/1081870.1081961","ee":"https://doi.org/10.1145/1081870.1081961","url":"https://dblp.org/rec/conf/kdd/YangWZ05"}, "url":"URL#5907851" }, { "@score":"6", "@id":"5920092", "info":{"authors":{"author":[{"@pid":"20/3620","text":"Gyesung Lee"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"58/2009","text":"Jinho Chon"}]},"title":"Rearranging data objects for efficient and stable clustering.","venue":"SAC","pages":"519-523","year":"2005","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/LeeWC05","doi":"10.1145/1066677.1066794","ee":"https://doi.org/10.1145/1066677.1066794","url":"https://dblp.org/rec/conf/sac/LeeWC05"}, "url":"URL#5920092" }, { "@score":"6", "@id":"5935287", "info":{"authors":{"author":[{"@pid":"y/YingYang-1","text":"Ying Yang 0001"},{"@pid":"w/GeoffreyIWebb","text":"Geoffrey I. Webb"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Discretization Methods.","venue":"The Data Mining and Knowledge Discovery Handbook","pages":"113-130","year":"2005","type":"Parts in Books or Collections","access":"unavailable","key":"books/sp/datamining2005/YangWW05","url":"https://dblp.org/rec/books/sp/datamining2005/YangWW05"}, "url":"URL#5935287" }, { "@score":"6", "@id":"5937450", "info":{"authors":{"author":{"@pid":"59/4107","text":"Xindong Wu 0001"}},"title":"EIC Editorial: TKDE Editorial Board Changes.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"17","number":"4","pages":"443-446","year":"2005","type":"Editorship","key":"journals/tkde/Wu05","doi":"10.1109/TKDE.2005.61","ee":"https://doi.org/10.1109/TKDE.2005.61","url":"https://dblp.org/rec/journals/tkde/Wu05"}, "url":"URL#5937450" }, { "@score":"6", "@id":"5937451", "info":{"authors":{"author":[{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"f/CFaloutsos","text":"Christos Faloutsos"}]},"title":"Editorial: TKDE Topic Area Revisions.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"17","number":"6","pages":"731-733","year":"2005","type":"Editorship","key":"journals/tkde/WuF05","doi":"10.1109/TKDE.2005.94","ee":"https://doi.org/10.1109/TKDE.2005.94","url":"https://dblp.org/rec/journals/tkde/WuF05"}, "url":"URL#5937451" }, { "@score":"6", "@id":"5944643", "info":{"authors":{"author":[{"@pid":"z/ShichaoZhang","text":"Shichao Zhang"},{"@pid":"71/964","text":"Chengqi Zhang"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Knowledge Discovery in Multiple Databases.","venue":"Advanced Information and Knowledge Processing","pages":"1-233","publisher":"Springer","year":"2004","type":"Books and Theses","access":"closed","key":"series/aikp/ZhangZW04","doi":"10.1007/978-0-85729-388-6","ee":"https://doi.org/10.1007/978-0-85729-388-6","url":"https://dblp.org/rec/series/aikp/ZhangZW04"}, "url":"URL#5944643" }, { "@score":"6", "@id":"5945555", "info":{"authors":{"author":[{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Class Noise vs. Attribute Noise: A Quantitative Study.","venue":"Artif. Intell. Rev.","volume":"22","number":"3","pages":"177-210","year":"2004","type":"Journal Articles","access":"closed","key":"journals/air/ZhuW04","doi":"10.1007/S10462-004-0751-8","ee":"https://doi.org/10.1007/s10462-004-0751-8","url":"https://dblp.org/rec/journals/air/ZhuW04"}, "url":"URL#5945555" }, { "@score":"6", "@id":"5950956", "info":{"authors":{"author":{"@pid":"59/4107","text":"Xindong Wu 0001"}},"title":"Data Mining: An AI Perspective.","venue":"IEEE Intell. Informatics Bull.","volume":"4","pages":"23-26","year":"2004","type":"Journal Articles","access":"open","key":"journals/cib/Wu04","ee":"http://www.comp.hkbu.edu.hk/~cib/2004/Dec/iib_vol4no2_article3.pdf","url":"https://dblp.org/rec/journals/cib/Wu04"}, "url":"URL#5950956" }, { "@score":"6", "@id":"5957874", "info":{"authors":{"author":[{"@pid":"82/6362-1","text":"Qiang Yang 0001"},{"@pid":"k/CAKnoblock","text":"Craig A. Knoblock"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Guest Editors' Introduction: Mining Actionable Knowledge on the Web.","venue":"IEEE Intell. Syst.","volume":"19","number":"6","pages":"30-31","year":"2004","type":"Journal Articles","access":"closed","key":"journals/expert/YangKW04","doi":"10.1109/MIS.2004.64","ee":"https://doi.org/10.1109/MIS.2004.64","url":"https://dblp.org/rec/journals/expert/YangKW04"}, "url":"URL#5957874" }, { "@score":"6", "@id":"5957875", "info":{"authors":{"author":[{"@pid":"y/YingYang-1","text":"Ying Yang 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Parameter Tuning for Induction-Algorithm-Oriented Feature Elimination.","venue":"IEEE Intell. Syst.","volume":"19","number":"2","pages":"40-49","year":"2004","type":"Journal Articles","access":"closed","key":"journals/expert/YangW04","doi":"10.1109/MIS.2004.1274910","ee":"https://doi.org/10.1109/MIS.2004.1274910","url":"https://dblp.org/rec/journals/expert/YangW04"}, "url":"URL#5957875" }, { "@score":"6", "@id":"5972858", "info":{"authors":{"author":{"@pid":"59/4107","text":"Xindong Wu 0001"}},"title":"Editorial: Introducing the New Editor-in-Chief.","venue":"Knowl. Inf. Syst.","volume":"6","number":"6","pages":"643-644","year":"2004","type":"Journal Articles","access":"closed","key":"journals/kais/Wu04","doi":"10.1007/S10115-004-0186-1","ee":"https://doi.org/10.1007/s10115-004-0186-1","url":"https://dblp.org/rec/journals/kais/Wu04"}, "url":"URL#5972858" }, { "@score":"6", "@id":"5974660", "info":{"authors":{"author":[{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"69/2360","text":"Jianping Fan 0001"},{"@pid":"e/AKElmagarmid","text":"Ahmed K. Elmagarmid"},{"@pid":"a/WGAref","text":"Walid G. Aref"}]},"title":"Exploring video content structure for hierarchical summarization.","venue":"Multim. Syst.","volume":"10","number":"2","pages":"98-115","year":"2004","type":"Journal Articles","access":"closed","key":"journals/mms/ZhuWFEA04","doi":"10.1007/S00530-004-0142-7","ee":"https://doi.org/10.1007/s00530-004-0142-7","url":"https://dblp.org/rec/journals/mms/ZhuWFEA04"}, "url":"URL#5974660" }, { "@score":"6", "@id":"5988828", "info":{"authors":{"author":[{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"71/964","text":"Chengqi Zhang"},{"@pid":"z/ShichaoZhang","text":"Shichao Zhang"}]},"title":"Efficient mining of both positive and negative association rules.","venue":"ACM Trans. Inf. Syst.","volume":"22","number":"3","pages":"381-405","year":"2004","type":"Journal Articles","access":"closed","key":"journals/tois/WuZZ04","doi":"10.1145/1010614.1010616","ee":"https://doi.org/10.1145/1010614.1010616","url":"https://dblp.org/rec/journals/tois/WuZZ04"}, "url":"URL#5988828" }, { "@score":"6", "@id":"5993045", "info":{"authors":{"author":[{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"y/YingYang-1","text":"Ying Yang 0001"}]},"title":"Error Detection and Impact-Sensitive Instance Ranking in Noisy Datasets.","venue":"AAAI","pages":"378-384","year":"2004","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/aaai/ZhuWY04","ee":"http://www.aaai.org/Library/AAAI/2004/aaai04-061.php","url":"https://dblp.org/rec/conf/aaai/ZhuWY04"}, "url":"URL#5993045" }, { "@score":"6", "@id":"6006462", "info":{"authors":{"author":[{"@pid":"28/5548","text":"Jeffrey Stone"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"48/3228","text":"Marc Greenblatt"}]},"title":"An Intelligent Digital Library System for Biologists.","venue":"CSB","pages":"491-492","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/csb/StoneWG04","doi":"10.1109/CSB.2004.1332471","ee":"https://doi.org/10.1109/CSB.2004.1332471","url":"https://dblp.org/rec/conf/csb/StoneWG04"}, "url":"URL#6006462" }, { "@score":"6", "@id":"6009393", "info":{"authors":{"author":[{"@pid":"50/4988","text":"Ian J. Cottingham"},{"@pid":"49/502","text":"Steve Goddard"},{"@pid":"93/227","text":"Shifeng Zhang"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"33/1254","text":"Ke Lu"},{"@pid":"62/1618","text":"A. Rutledge"},{"@pid":"53/2705","text":"William J. Waltman"}]},"title":"Demonstration of the National Agricultural Decision Support System.","venue":"DG.O","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/dgo/CottinghamGZWLRW04","ee":"http://dl.acm.org/citation.cfm?id=1124212","url":"https://dblp.org/rec/conf/dgo/CottinghamGZWLRW04"}, "url":"URL#6009393" }, { "@score":"6", "@id":"6027396", "info":{"authors":{"author":[{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Cost-Guided Class Noise Handling for Effective Cost-Sensitive Learning.","venue":"ICDM","pages":"297-304","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdm/ZhuW04","doi":"10.1109/ICDM.2004.10108","ee":"https://doi.org/10.1109/ICDM.2004.10108","url":"https://dblp.org/rec/conf/icdm/ZhuW04"}, "url":"URL#6027396" }, { "@score":"6", "@id":"6027397", "info":{"authors":{"author":[{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"y/YingYang-1","text":"Ying Yang 0001"}]},"title":"Dynamic Classifier Selection for Effective Mining from Noisy Data Streams.","venue":"ICDM","pages":"305-312","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdm/ZhuWY04","doi":"10.1109/ICDM.2004.10091","ee":"https://doi.org/10.1109/ICDM.2004.10091","url":"https://dblp.org/rec/conf/icdm/ZhuWY04"}, "url":"URL#6027397" }, { "@score":"6", "@id":"6034902", "info":{"authors":{"author":{"@pid":"59/4107","text":"Xindong Wu 0001"}},"title":"Knowledge Discovery in Multiple Databases.","venue":"ICTAI","pages":"2","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/ictai/Wu04","doi":"10.1109/ICTAI.2004.78","ee":"https://doi.org/10.1109/ICTAI.2004.78","url":"https://dblp.org/rec/conf/ictai/Wu04"}, "url":"URL#6034902" }, { "@score":"6", "@id":"6034913", "info":{"authors":{"author":[{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Data Acquisition with Active and Impact-Sensitive Instance Selection.","venue":"ICTAI","pages":"721-726","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/ictai/ZhuW04","doi":"10.1109/ICTAI.2004.46","ee":"https://doi.org/10.1109/ICTAI.2004.46","url":"https://dblp.org/rec/conf/ictai/ZhuW04"}, "url":"URL#6034913" }, { "@score":"6", "@id":"6035678", "info":{"authors":{"author":[{"@pid":"75/1639","text":"Qijun Chen"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"}]},"title":"OIDM: Online Interactive Data Mining.","venue":"IEA/AIE","pages":"66-76","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieaaie/ChenWZ04","doi":"10.1007/978-3-540-24677-0_8","ee":"https://doi.org/10.1007/978-3-540-24677-0_8","url":"https://dblp.org/rec/conf/ieaaie/ChenWZ04"}, "url":"URL#6035678" }, { "@score":"6", "@id":"6058549", "info":{"authors":{"author":[{"@pid":"y/YingYang-1","text":"Ying Yang 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"26/4253","text":"Xingquan Zhu 0001"}]},"title":"Dealing with Predictive-but-Unpredictable Attributes in Noisy Data Sources.","venue":"PKDD","pages":"471-483","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/pkdd/YangWZ04","doi":"10.1007/978-3-540-30116-5_43","ee":"https://doi.org/10.1007/978-3-540-30116-5_43","url":"https://dblp.org/rec/conf/pkdd/YangWZ04"}, "url":"URL#6058549" }, { "@score":"6", "@id":"6070995", "info":{"authors":{"author":{"@pid":"59/4107","text":"Xindong Wu 0001"}},"title":"Data Mining: Artificial Intelligence in Data Analysis.","venue":"Web Intelligence","pages":"7","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/webi/Wu04","doi":"10.1109/WI.2004.10000","ee":"https://doi.org/10.1109/WI.2004.10000","url":"https://dblp.org/rec/conf/webi/Wu04"}, "url":"URL#6070995" }, { "@score":"6", "@id":"6085834", "info":{"authors":{"author":[{"@pid":"z/ShichaoZhang","text":"Shichao Zhang"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"71/964","text":"Chengqi Zhang"}]},"title":"Multi-Database Mining.","venue":"IEEE Intell. Informatics Bull.","volume":"2","number":"1","pages":"5-13","year":"2003","type":"Journal Articles","access":"open","key":"journals/cib/ZhangWZ03","ee":"http://www.comp.hkbu.edu.hk/~cib/2003/June/cib_vol2no1_article1.pdf","url":"https://dblp.org/rec/journals/cib/ZhangWZ03"}, "url":"URL#6085834" }, { "@score":"6", "@id":"6105648", "info":{"authors":{"author":{"@pid":"59/4107","text":"Xindong Wu 0001"}},"title":"Online First publication.","venue":"Knowl. Inf. Syst.","volume":"5","number":"1","pages":"1","year":"2003","type":"Journal Articles","access":"closed","key":"journals/kais/Wu03","doi":"10.1007/S10115-003-0113-X","ee":"https://doi.org/10.1007/s10115-003-0113-x","url":"https://dblp.org/rec/journals/kais/Wu03"}, "url":"URL#6105648" }, { "@score":"6", "@id":"6105649", "info":{"authors":{"author":[{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"y/PhilipSYu","text":"Philip S. Yu"},{"@pid":"p/GPiatetskyShapiro","text":"Gregory Piatetsky-Shapiro"}]},"title":"Data Mining: How Research Meets Practical Development?","venue":"Knowl. Inf. Syst.","volume":"5","number":"2","pages":"248-261","year":"2003","type":"Journal Articles","access":"closed","key":"journals/kais/WuYP03","doi":"10.1007/10.1007/S10115-003-0101-1","ee":"https://doi.org/10.1007/10.1007/s10115-003-0101-1","url":"https://dblp.org/rec/journals/kais/WuYP03"}, "url":"URL#6105649" }, { "@score":"6", "@id":"6107191", "info":{"authors":{"author":[{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"69/2360","text":"Jianping Fan 0001"},{"@pid":"e/AKElmagarmid","text":"Ahmed K. Elmagarmid"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Hierarchical video content description and summarization using unified semantic and visual similarity.","venue":"Multim. Syst.","volume":"9","number":"1","pages":"31-53","year":"2003","type":"Journal Articles","access":"closed","key":"journals/mms/ZhuFEW03","doi":"10.1007/S00530-003-0076-5","ee":"https://doi.org/10.1007/s00530-003-0076-5","url":"https://dblp.org/rec/journals/mms/ZhuFEW03"}, "url":"URL#6107191" }, { "@score":"6", "@id":"6120449", "info":{"authors":{"author":[{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"z/ShichaoZhang","text":"Shichao Zhang"}]},"title":"Synthesizing High-Frequency Rules from Different Data Sources.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"15","number":"2","pages":"353-367","year":"2003","type":"Journal Articles","access":"closed","key":"journals/tkde/WuZ03","doi":"10.1109/TKDE.2003.1185839","ee":"https://doi.org/10.1109/TKDE.2003.1185839","url":"https://dblp.org/rec/journals/tkde/WuZ03"}, "url":"URL#6120449" }, { "@score":"6", "@id":"6157488", "info":{"authors":{"author":[{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Sequential association mining for video summarization.","venue":"ICME","pages":"333-336","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/icmcs/ZhuW03","doi":"10.1109/ICME.2003.1221316","ee":"https://doi.org/10.1109/ICME.2003.1221316","url":"https://dblp.org/rec/conf/icmcs/ZhuW03"}, "url":"URL#6157488" }, { "@score":"6", "@id":"6157739", "info":{"authors":{"author":[{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"75/1639","text":"Qijun Chen"}]},"title":"Eliminating Class Noise in Large Datasets.","venue":"ICML","pages":"920-927","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/icml/ZhuWC03","ee":"http://www.aaai.org/Library/ICML/2003/icml03-119.php","url":"https://dblp.org/rec/conf/icml/ZhuWC03"}, "url":"URL#6157739" }, { "@score":"6", "@id":"6162738", "info":{"authors":{"author":[{"@pid":"26/4253","text":"Xingquan Zhu 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Mining Video Associations for Efficient Database Management.","venue":"IJCAI","pages":"1422-","year":"2003","type":"Conference and Workshop Papers","access":"open","key":"conf/ijcai/ZhuW03","ee":"http://ijcai.org/Proceedings/03/Papers/225.pdf","url":"https://dblp.org/rec/conf/ijcai/ZhuW03"}, "url":"URL#6162738" }, { "@score":"6", "@id":"6200684", "info":{"authors":{"author":{"@pid":"59/4107","text":"Xindong Wu 0001"}},"title":"Message from the TCCI Chair.","venue":"IEEE Intell. Informatics Bull.","volume":"1","number":"1","pages":"1-2","year":"2002","type":"Journal Articles","access":"open","key":"journals/cib/Wu02","ee":"http://www.comp.hkbu.edu.hk/~cib/2002/cib_iss1a.pdf","url":"https://dblp.org/rec/journals/cib/Wu02"}, "url":"URL#6200684" }, { "@score":"6", "@id":"6202250", "info":{"authors":{"author":[{"@pid":"63/2902","text":"Stephen Ransom"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Using Knowledge Anchors to Reduce Cognitive Overheads.","venue":"Computer","volume":"35","number":"11","pages":"111-112","year":"2002","type":"Journal Articles","access":"closed","key":"journals/computer/RansomW02","doi":"10.1109/MC.2002.1046984","ee":"https://doi.org/10.1109/MC.2002.1046984","url":"https://dblp.org/rec/journals/computer/RansomW02"}, "url":"URL#6202250" }, { "@score":"6", "@id":"6258768", "info":{"authors":{"author":[{"@pid":"04/5616","text":"Hao Huang"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"01/2351","text":"Richard Relue"}]},"title":"Association Analysis with One Scan of Databases.","venue":"ICDM","pages":"629-632","year":"2002","type":"Conference and Workshop Papers","access":"closed","key":"conf/icdm/HuangWR02","doi":"10.1109/ICDM.2002.1184015","ee":"https://doi.org/10.1109/ICDM.2002.1184015","url":"https://dblp.org/rec/conf/icdm/HuangWR02"}, "url":"URL#6258768" }, { "@score":"6", "@id":"6261529", "info":{"authors":{"author":[{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"71/964","text":"Chengqi Zhang"},{"@pid":"z/ShichaoZhang","text":"Shichao Zhang"}]},"title":"Mining Both Positive and Negative Association Rules.","venue":"ICML","pages":"658-665","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/icml/WuZZ02","url":"https://dblp.org/rec/conf/icml/WuZZ02"}, "url":"URL#6261529" }, { "@score":"6", "@id":"6263915", "info":{"authors":{"author":[{"@pid":"60/3501","text":"Kalyani K. Manchi"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Dynamic Refinement of Classification Rules.","venue":"ICTAI","pages":"189-","year":"2002","type":"Conference and Workshop Papers","access":"closed","key":"conf/ictai/ManchiW02","doi":"10.1109/TAI.2002.1180804","ee":"https://doi.org/10.1109/TAI.2002.1180804","url":"https://dblp.org/rec/conf/ictai/ManchiW02"}, "url":"URL#6263915" }, { "@score":"6", "@id":"6282153", "info":{"authors":{"author":{"@pid":"59/4107","text":"Xindong Wu 0001"}},"title":"Knowledge discovery in very large databases.","venue":"SEKE","pages":"15","year":"2002","type":"Conference and Workshop Papers","access":"closed","key":"conf/seke/Wu02","doi":"10.1145/568760.568764","ee":"https://doi.org/10.1145/568760.568764","url":"https://dblp.org/rec/conf/seke/Wu02"}, "url":"URL#6282153" }, { "@score":"6", "@id":"6293959", "info":{"authors":{"author":[{"@pid":"z/ShichaoZhang","text":"Shichao Zhang"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Large Scale Data Mining Based on Data Partitioning.","venue":"Appl. Artif. Intell.","volume":"15","number":"2","pages":"129-139","year":"2001","type":"Journal Articles","access":"closed","key":"journals/aai/ZhangW01","doi":"10.1080/088395101750065732","ee":"https://doi.org/10.1080/088395101750065732","url":"https://dblp.org/rec/journals/aai/ZhangW01"}, "url":"URL#6293959" }, { "@score":"6", "@id":"6336048", "info":{"authors":{"author":[{"@pid":"01/2351","text":"Richard Relue"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"04/5616","text":"Hao Huang"}]},"title":"Efficient Runtime Generation of Association Rules.","venue":"CIKM","pages":"466-473","year":"2001","type":"Conference and Workshop Papers","access":"closed","key":"conf/cikm/RelueWH01","doi":"10.1145/502585.502664","ee":"https://doi.org/10.1145/502585.502664","url":"https://dblp.org/rec/conf/cikm/RelueWH01"}, "url":"URL#6336048" }, { "@score":"6", "@id":"6339918", "info":{"authors":{"author":[{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"46/5879","text":"Daniel Ngu"},{"@pid":"p/SameerPradhan","text":"Sameer Pradhan"}]},"title":"User-Centered Agents for Structured Information Location.","venue":"E-Commerce Agents","pages":"323-331","year":"2001","type":"Conference and Workshop Papers","access":"closed","key":"conf/ecAgents/WuNP01","doi":"10.1007/3-540-45370-9_19","ee":"https://doi.org/10.1007/3-540-45370-9_19","url":"https://dblp.org/rec/conf/ecAgents/WuNP01"}, "url":"URL#6339918" }, { "@score":"6", "@id":"6377335", "info":{"authors":{"author":[{"@pid":"c/NickCercone","text":"Nick Cercone"},{"@pid":"l/TsauYoungLin","text":"Tsau Young Lin"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Proceedings of the 2001 IEEE International Conference on Data Mining, 29 November - 2 December 2001, San Jose, California, USA","publisher":"IEEE Computer Society","year":"2001","type":"Editorship","key":"conf/icdm/2001","ee":"https://ieeexplore.ieee.org/xpl/conhome/7762/proceeding","url":"https://dblp.org/rec/conf/icdm/2001"}, "url":"URL#6377335" }, { "@score":"6", "@id":"6381468", "info":{"authors":{"author":{"@pid":"59/4107","text":"Xindong Wu 0001"}},"title":"Building Intelligent Learning Database Systems.","venue":"AI Mag.","volume":"21","number":"3","pages":"61-68","year":"2000","type":"Journal Articles","access":"closed","key":"journals/aim/Wu00","doi":"10.1609/AIMAG.V21I3.1524","ee":"https://doi.org/10.1609/aimag.v21i3.1524","url":"https://dblp.org/rec/journals/aim/Wu00"}, "url":"URL#6381468" }, { "@score":"6", "@id":"6412845", "info":{"authors":{"author":[{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"27/4515","text":"Kevin Cai"}]},"title":"Knowledge object modeling.","venue":"IEEE Trans. Syst. Man Cybern. Part A","volume":"30","number":"2","pages":"96-107","year":"2000","type":"Journal Articles","access":"closed","key":"journals/tsmc/WuC00","doi":"10.1109/3468.833091","ee":"https://doi.org/10.1109/3468.833091","url":"https://dblp.org/rec/journals/tsmc/WuC00"}, "url":"URL#6412845" }, { "@score":"6", "@id":"6479257", "info":{"authors":{"author":[{"@pid":"w/BenjaminWWah","text":"Benjamin W. Wah"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Editorial.","venue":"Knowl. Inf. Syst.","volume":"1","number":"1","pages":"1-3","year":"1999","type":"Journal Articles","access":"closed","key":"journals/kais/WahW99","doi":"10.1007/BF03325088","ee":"https://doi.org/10.1007/BF03325088","url":"https://dblp.org/rec/journals/kais/WahW99"}, "url":"URL#6479257" }, { "@score":"6", "@id":"6479258", "info":{"authors":{"author":[{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"w/BenjaminWWah","text":"Benjamin W. Wah"}]},"title":"Editorial.","venue":"Knowl. Inf. Syst.","volume":"1","number":"2","pages":"127","year":"1999","type":"Journal Articles","access":"closed","key":"journals/kais/WuW99","doi":"10.1007/BF03325095","ee":"https://doi.org/10.1007/BF03325095","url":"https://dblp.org/rec/journals/kais/WuW99"}, "url":"URL#6479258" }, { "@score":"6", "@id":"6487846", "info":{"authors":{"author":{"@pid":"59/4107","text":"Xindong Wu 0001"}},"title":"Fuzzy interpretation of discretized intervals.","venue":"IEEE Trans. Fuzzy Syst.","volume":"7","number":"6","pages":"753-759","year":"1999","type":"Journal Articles","access":"closed","key":"journals/tfs/Wu99","doi":"10.1109/91.811246","ee":"https://doi.org/10.1109/91.811246","url":"https://dblp.org/rec/journals/tfs/Wu99"}, "url":"URL#6487846" }, { "@score":"6", "@id":"6489220", "info":{"authors":{"author":[{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"50/2668","text":"David Urpani"}]},"title":"Induction By Attribute Elimination.","venue":"IEEE Trans. Knowl. Data Eng.","volume":"11","number":"5","pages":"805-812","year":"1999","type":"Journal Articles","access":"closed","key":"journals/tkde/WuU99","doi":"10.1109/69.806938","ee":"https://doi.org/10.1109/69.806938","url":"https://dblp.org/rec/journals/tkde/WuU99"}, "url":"URL#6489220" }, { "@score":"6", "@id":"6520955", "info":{"authors":{"author":{"@pid":"59/4107","text":"Xindong Wu 0001"}},"title":"Induction as Pre-processing.","venue":"PAKDD","pages":"114-122","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/pakdd/Wu99","doi":"10.1007/3-540-48912-6_16","ee":"https://doi.org/10.1007/3-540-48912-6_16","url":"https://dblp.org/rec/conf/pakdd/Wu99"}, "url":"URL#6520955" }, { "@score":"6", "@id":"6535662", "info":{"authors":{"author":[{"@pid":"02/3672-1","text":"Heng Li 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Learning Design Knowledge as Generalization.","venue":"Cybern. Syst.","volume":"29","number":"2","pages":"181-207","year":"1998","type":"Journal Articles","access":"closed","key":"journals/cas/LiW98","doi":"10.1080/019697298125786","ee":"https://doi.org/10.1080/019697298125786","url":"https://dblp.org/rec/journals/cas/LiW98"}, "url":"URL#6535662" }, { "@score":"6", "@id":"6536648", "info":{"authors":{"author":[{"@pid":"67/6513","text":"Jason Lowder"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Wide Area Selection as a Hyperdocument Search Interface.","venue":"Comput. Networks","volume":"30","number":"1-7","pages":"658-659","year":"1998","type":"Journal Articles","access":"closed","key":"journals/cn/LowderW98","doi":"10.1016/S0169-7552(98)00043-9","ee":"https://doi.org/10.1016/S0169-7552(98)00043-9","url":"https://dblp.org/rec/journals/cn/LowderW98"}, "url":"URL#6536648" }, { "@score":"6", "@id":"6536677", "info":{"authors":{"author":[{"@pid":"25/822-2","text":"Thuy-Linh Nguyen 0002"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"61/3971","text":"Sayed Sajeev"}]},"title":"Object-Oriented Modeling of Multimedia Documents.","venue":"Comput. Networks","volume":"30","number":"1-7","pages":"578-582","year":"1998","type":"Journal Articles","access":"closed","key":"journals/cn/NguyenWS98","doi":"10.1016/S0169-7552(98)00041-5","ee":"https://doi.org/10.1016/S0169-7552(98)00041-5","url":"https://dblp.org/rec/journals/cn/NguyenWS98"}, "url":"URL#6536677" }, { "@score":"6", "@id":"6543471", "info":{"authors":{"author":[{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"88/536","text":"Guang Fang"},{"@pid":"43/1312","text":"Matjaz Gams"}]},"title":"LFA+: A Fast Chaining Algorithm for Rule-Based Systems.","venue":"Informatica","volume":"22","number":"3","year":"1998","type":"Journal Articles","access":"unavailable","key":"journals/informaticaSI/WuFG98","url":"https://dblp.org/rec/journals/informaticaSI/WuFG98"}, "url":"URL#6543471" }, { "@score":"6", "@id":"6545340", "info":{"authors":{"author":{"@pid":"59/4107","text":"Xindong Wu 0001"}},"title":"Rule Induction with Extension Matrices.","venue":"J. Am. Soc. Inf. Sci.","volume":"49","number":"5","pages":"435-454","year":"1998","type":"Journal Articles","access":"closed","key":"journals/jasis/Wu98","doi":"10.1002/(SICI)1097-4571(19980415)49:5<435::AID-ASI6>3.0.CO;2-R","ee":"https://doi.org/10.1002/(SICI)1097-4571(19980415)49:5<435::AID-ASI6>3.0.CO;2-R","url":"https://dblp.org/rec/journals/jasis/Wu98"}, "url":"URL#6545340" }, { "@score":"6", "@id":"6551279", "info":{"authors":{"author":[{"@pid":"83/261","text":"Meide Zhao"},{"@pid":"61/3950","text":"Francis K. H. Quek"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"RIEVL: Recursive Induction Learning in Hand Gesture Recognition.","venue":"IEEE Trans. Pattern Anal. Mach. Intell.","volume":"20","number":"11","pages":"1174-1185","year":"1998","type":"Journal Articles","access":"closed","key":"journals/pami/ZhaoQW98","doi":"10.1109/34.730553","ee":"https://doi.org/10.1109/34.730553","url":"https://dblp.org/rec/journals/pami/ZhaoQW98"}, "url":"URL#6551279" }, { "@score":"6", "@id":"6586802", "info":{"authors":{"author":[{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"06/3232","text":"William H. W. Lo"}]},"title":"Multi-layer Incremental Induction.","venue":"PRICAI","pages":"24-32","year":"1998","type":"Conference and Workshop Papers","access":"closed","key":"conf/pricai/WuL98","doi":"10.1007/BFB0095255","ee":"https://doi.org/10.1007/BFb0095255","url":"https://dblp.org/rec/conf/pricai/WuL98"}, "url":"URL#6586802" }, { "@score":"6", "@id":"6593167", "info":{"authors":{"author":[{"@pid":"34/1945","text":"Daniel Siaw Weng Ngu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Interest Discovery for Incremental Web Exploration.","venue":"WebNet","year":"1998","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/webnet/NguW98","url":"https://dblp.org/rec/conf/webnet/NguW98"}, "url":"URL#6593167" }, { "@score":"6", "@id":"6594670", "info":{"authors":{"author":[{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"r/KRamamohanarao","text":"Kotagiri Ramamohanarao"},{"@pid":"97/3195","text":"Kevin B. Korb"}]},"title":"Research and Development in Knowledge Discovery and Data Mining, Second Pacific-Asia Conference, PAKDD-98, Melbourne, Australia, April 15-17, 1998, Proceedings","venue":["PAKDD","Lecture Notes in Computer Science"],"volume":"1394","publisher":"Springer","year":"1998","type":"Editorship","key":"conf/pakdd/1998","doi":"10.1007/3-540-64383-4","ee":"https://doi.org/10.1007/3-540-64383-4","url":"https://dblp.org/rec/conf/pakdd/1998"}, "url":"URL#6594670" }, { "@score":"6", "@id":"6601024", "info":{"authors":{"author":{"@pid":"59/4107","text":"Xindong Wu 0001"}},"title":"Hybrid Interpretation of 'No Match' and 'Multiple Match' in Induction.","venue":"Comput. J.","volume":"40","number":"1","pages":"50-57","year":"1997","type":"Journal Articles","access":"closed","key":"journals/cj/Wu97","doi":"10.1093/COMJNL/40.1.50","ee":"https://doi.org/10.1093/comjnl/40.1.50","url":"https://dblp.org/rec/journals/cj/Wu97"}, "url":"URL#6601024" }, { "@score":"6", "@id":"6601386", "info":{"authors":{"author":[{"@pid":"34/1945","text":"Daniel Siaw Weng Ngu"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"SiteHelper: A Localized Agent That Helps Incremental Exploration of the World Wide Web.","venue":"Comput. Networks","volume":"29","number":"8-13","pages":"1249-1255","year":"1997","type":"Journal Articles","access":"closed","key":"journals/cn/NguW97","doi":"10.1016/S0169-7552(97)00055-X","ee":"https://doi.org/10.1016/S0169-7552(97)00055-X","url":"https://dblp.org/rec/journals/cn/NguW97"}, "url":"URL#6601386" }, { "@score":"6", "@id":"6605943", "info":{"authors":{"author":[{"@pid":"63/2902","text":"Stephen Ransom"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"s/HeinzWSchmidt","text":"Heinz W. Schmidt"}]},"title":"Disorientation and Cognitive Overhead in Hypertext Systems.","venue":"Int. J. Artif. Intell. Tools","volume":"6","number":"2","pages":"227-253","year":"1997","type":"Journal Articles","access":"closed","key":"journals/ijait/RansomWS97","doi":"10.1142/S021821309700013X","ee":"https://doi.org/10.1142/S021821309700013X","url":"https://dblp.org/rec/journals/ijait/RansomWS97"}, "url":"URL#6605943" }, { "@score":"6", "@id":"6638896", "info":{"authors":{"author":[{"@pid":"27/4515","text":"Kevin Cai"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"s/HeinzWSchmidt","text":"Heinz W. Schmidt"}]},"title":"Schedular++: Scheduling with Knowledge Objects.","venue":"ICTAI","pages":"480-483","year":"1997","type":"Conference and Workshop Papers","access":"closed","key":"conf/ictai/CaiWS97","doi":"10.1109/TAI.1997.632292","ee":"https://doi.org/10.1109/TAI.1997.632292","url":"https://dblp.org/rec/conf/ictai/CaiWS97"}, "url":"URL#6638896" }, { "@score":"6", "@id":"6639382", "info":{"authors":{"author":[{"@pid":"d/HonghuaDai","text":"Honghua Dai 0001"},{"@pid":"97/3195","text":"Kevin B. Korb"},{"@pid":"86/2899","text":"Chris S. Wallace"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"A Study of Causal Discovery With Weak Links and Small Samples.","venue":"IJCAI","pages":"1304-1309","year":"1997","type":"Conference and Workshop Papers","access":"open","key":"conf/ijcai/DaiKWW97","ee":"http://ijcai.org/Proceedings/97-2/Papers/074.pdf","url":"https://dblp.org/rec/conf/ijcai/DaiKWW97"}, "url":"URL#6639382" }, { "@score":"6", "@id":"6657262", "info":{"authors":{"author":{"@pid":"59/4107","text":"Xindong Wu 0001"}},"title":"A Bayesian Discretizer for Real-Valued Attributes.","venue":"Comput. J.","volume":"39","number":"8","pages":"688-691","year":"1996","type":"Journal Articles","access":"closed","key":"journals/cj/Wu96","doi":"10.1093/COMJNL/39.8.688","ee":"https://doi.org/10.1093/comjnl/39.8.688","url":"https://dblp.org/rec/journals/cj/Wu96"}, "url":"URL#6657262" }, { "@score":"6", "@id":"6662194", "info":{"authors":{"author":[{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"152/7744","text":"Johan Krisár"},{"@pid":"14/5408","text":"Petter Måhlén"}]},"title":"Noise Handling with Extension Matrices.","venue":"Int. J. Artif. Intell. Tools","volume":"5","number":"1-2","pages":"81-98","year":"1996","type":"Journal Articles","access":"closed","key":"journals/ijait/WuKM96","doi":"10.1142/S0218213096000067","ee":"https://doi.org/10.1142/S0218213096000067","url":"https://dblp.org/rec/journals/ijait/WuKM96"}, "url":"URL#6662194" }, { "@score":"6", "@id":"6683936", "info":{"authors":{"author":[{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"50/2668","text":"David Urpani"},{"@pid":"70/5091","text":"James A. Sykes"}]},"title":"Rule Induction Without Decision Tree Construction.","venue":"ECAI","pages":"463-470","year":"1996","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/ecai/WuUS96","url":"https://dblp.org/rec/conf/ecai/WuUS96"}, "url":"URL#6683936" }, { "@score":"6", "@id":"6697012", "info":{"authors":{"author":[{"@pid":"50/2668","text":"David Urpani"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"29/4500","text":"Jim Sykes"}]},"title":"RITIO - Rule Induction Two In One.","venue":"KDD","pages":"339-342","year":"1996","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/UrpaniWS96","ee":"http://www.aaai.org/Library/KDD/1996/kdd96-062.php","url":"https://dblp.org/rec/conf/kdd/UrpaniWS96"}, "url":"URL#6697012" }, { "@score":"6", "@id":"6715210", "info":{"authors":{"author":[{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"00/6524","text":"Sita Ramakrishnan"},{"@pid":"s/HeinzWSchmidt","text":"Heinz W. Schmidt"}]},"title":"Knowledge Objects.","venue":"Informatica","volume":"19","number":"4","year":"1995","type":"Journal Articles","access":"unavailable","key":"journals/informaticaSI/WuRS95","url":"https://dblp.org/rec/journals/informaticaSI/WuRS95"}, "url":"URL#6715210" }, { "@score":"6", "@id":"6741357", "info":{"authors":{"author":[{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"152/7744","text":"Johan Krisár"},{"@pid":"14/5408","text":"Petter Måhlén"}]},"title":"Noise handling with extension matrices.","venue":"ICTAI","pages":"190-197","year":"1995","type":"Conference and Workshop Papers","access":"closed","key":"conf/ictai/WuKM95","doi":"10.1109/TAI.1995.479514","ee":"https://doi.org/10.1109/TAI.1995.479514","url":"https://dblp.org/rec/conf/ictai/WuKM95"}, "url":"URL#6741357" }, { "@score":"6", "@id":"6741457", "info":{"authors":{"author":{"@pid":"59/4107","text":"Xindong Wu 0001"}},"title":"SIKT: A Structured Interactive Knowledge Transfer Program.","venue":"IEA/AIE","pages":"787-795","year":"1995","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieaaie/Wu95","ee":"http://portal.acm.org/citation.cfm?id=215624.215895","url":"https://dblp.org/rec/conf/ieaaie/Wu95"}, "url":"URL#6741457" }, { "@score":"6", "@id":"6745030", "info":{"authors":{"author":[{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"14/5408","text":"Petter Måhlén"}]},"title":"Fuzzy Interpretation of Induction Results.","venue":"KDD","pages":"325-330","year":"1995","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/WuM95","ee":"http://www.aaai.org/Library/KDD/1995/kdd95-038.php","url":"https://dblp.org/rec/conf/kdd/WuM95"}, "url":"URL#6745030" }, { "@score":"6", "@id":"6761712", "info":{"authors":{"author":{"@pid":"59/4107","text":"Xindong Wu 0001"}},"title":"Lecture Notes in Machine Learning.","venue":"Informatica","volume":"18","number":"2","year":"1994","type":"Journal Articles","access":"unavailable","key":"journals/informaticaSI/Wu94","url":"https://dblp.org/rec/journals/informaticaSI/Wu94"}, "url":"URL#6761712" }, { "@score":"6", "@id":"6800921", "info":{"authors":{"author":{"@pid":"59/4107","text":"Xindong Wu 0001"}},"title":"Inductive learning: Algorithms and frontiers.","venue":"Artif. Intell. Rev.","volume":"7","number":"2","pages":"93-108","year":"1993","type":"Journal Articles","access":"closed","key":"journals/air/Wu93","doi":"10.1007/BF00849079","ee":"https://doi.org/10.1007/BF00849079","url":"https://dblp.org/rec/journals/air/Wu93"}, "url":"URL#6800921" }, { "@score":"6", "@id":"6806589", "info":{"authors":{"author":{"@pid":"59/4107","text":"Xindong Wu 0001"}},"title":"A Prolog-Based Presentation for Integrating Knowledge and Data.","venue":"Informatica","volume":"17","number":"2","year":"1993","type":"Journal Articles","access":"unavailable","key":"journals/informaticaSI/Wu93","url":"https://dblp.org/rec/journals/informaticaSI/Wu93"}, "url":"URL#6806589" }, { "@score":"6", "@id":"6808267", "info":{"authors":{"author":{"@pid":"59/4107","text":"Xindong Wu 0001"}},"title":"Inductive learning.","venue":"J. Comput. Sci. Technol.","volume":"8","number":"2","pages":"118-132","year":"1993","type":"Journal Articles","access":"closed","key":"journals/jcst/Wu93","doi":"10.1007/BF02939474","ee":"https://doi.org/10.1007/BF02939474","url":"https://dblp.org/rec/journals/jcst/Wu93"}, "url":"URL#6808267" }, { "@score":"6", "@id":"6818466", "info":{"authors":{"author":{"@pid":"59/4107","text":"Xindong Wu 0001"}},"title":"The HCV Induction Algorithm.","venue":"ACM Conference on Computer Science","pages":"168-175","year":"1993","type":"Conference and Workshop Papers","access":"closed","key":"conf/acm/Wu93","doi":"10.1145/170791.170825","ee":"https://doi.org/10.1145/170791.170825","url":"https://dblp.org/rec/conf/acm/Wu93"}, "url":"URL#6818466" } ] } } } )