Modeling Decisions for Artificial Intelligence

Modeling Decisions for Artificial Intelligence : 13th International Conference, MDAI 2016Sant Juliade Loria, Andorra, September 19–21, 2016: Proceedings

[1]  Humberto Bustince,et al.  A Practical Guide to Averaging Functions , 2015, Studies in Fuzziness and Soft Computing.

[2]  Joachim M. Buhmann,et al.  The Balanced Accuracy and Its Posterior Distribution , 2010, 2010 20th International Conference on Pattern Recognition.

[3]  Joan Torrens,et al.  Residual implications on the set of discrete fuzzy numbers , 2013, Inf. Sci..

[4]  G. Choquet Theory of capacities , 1954 .

[5]  Sergei Vassilvitskii,et al.  k-means++: the advantages of careful seeding , 2007, SODA '07.

[6]  Hua Xu,et al.  Grouping Product Features Using Semi-Supervised Learning with Soft-Constraints , 2010, COLING.

[7]  Cynthia Dwork,et al.  Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography , 2007, WWW '07.

[8]  P. Wakker Additive Representations of Preferences: A New Foundation of Decision Analysis , 1988 .

[9]  G. N. Lance,et al.  A General Theory of Classificatory Sorting Strategies: 1. Hierarchical Systems , 1967, Comput. J..

[10]  Humberto Bustince,et al.  Construction theorems for intuitionistic fuzzy sets , 1996, Fuzzy Sets Syst..

[11]  Paolo Torroni,et al.  Microdebates: Structuring debates without a structuring tool , 2015, AI Commun..

[12]  Pietro Perona,et al.  Self-Tuning Spectral Clustering , 2004, NIPS.

[13]  Cong Wang,et al.  Security Challenges for the Public Cloud , 2012, IEEE Internet Computing.

[14]  Alan Agresti,et al.  Categorical Data Analysis , 2003 .

[15]  Juan Carlos Valencia Rincón Internet and Surveillance: The Challenges of Web 2.0 and Social Media , 2012 .

[16]  Xiangji Huang,et al.  Mining network data for intrusion detection through combining SVMs with ant colony networks , 2014, Future Gener. Comput. Syst..

[17]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[18]  Alex Thomo,et al.  Why Waldo befriended the dummy? k-Anonymization of social networks with pseudo-nodes , 2012, Social Network Analysis and Mining.

[19]  Gary W. Dickson,et al.  AN ANALYSIS OF VENDOR SELECTION SYSTEMS AND DECISIONS , 1966 .

[20]  L. Freeman Centrality in social networks conceptual clarification , 1978 .

[21]  Chris Cornelis,et al.  Implication in intuitionistic fuzzy and interval-valued fuzzy set theory: construction, classification, application , 2004, Int. J. Approx. Reason..

[22]  Charu C. Aggarwal,et al.  Graph Clustering , 2010, Encyclopedia of Machine Learning and Data Mining.

[23]  Salvatore J. Stolfo,et al.  Using artificial anomalies to detect unknown and known network intrusions , 2003, Knowledge and Information Systems.

[24]  Desney S. Tan,et al.  Interactive optimization for steering machine classification , 2010, CHI.

[25]  Roee Teper On the continuity of the concave integral , 2009, Fuzzy Sets Syst..

[26]  David Sánchez,et al.  A semantic framework to protect the privacy of electronic health records with non-numerical attributes , 2013, J. Biomed. Informatics.

[27]  Ester Yen,et al.  Data mining-based intrusion detectors , 2009, Expert Syst. Appl..

[28]  Christer Carlsson,et al.  Fuzzy Ontology Used for Knowledge Mobilization , 2013, Int. J. Intell. Syst..

[29]  Vicenç Torra,et al.  Improving the characterization of P-stability for applications in network privacy , 2016, Discret. Appl. Math..

[30]  Josep Domingo-Ferrer,et al.  Privacy-preserving distributed statistical computation to a semi-honest multi-cloud , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).

[31]  Andrea Ellero,et al.  Monotonicity and Symmetry of IFPD Bayesian Confirmation Measures , 2016, MDAI.

[32]  Shou-Hsuan Stephen Huang,et al.  Neural networks-based detection of stepping-stone intrusion , 2010, Expert Syst. Appl..

[33]  Donald F. Towsley,et al.  Resisting structural re-identification in anonymized social networks , 2008, The VLDB Journal.

[34]  Mohiuddin Ahmed,et al.  A survey of network anomaly detection techniques , 2016, J. Netw. Comput. Appl..

[35]  Mark Klein,et al.  Enabling Large-Scale Deliberation Using Attention-Mediation Metrics , 2011, Computer Supported Cooperative Work (CSCW).

[36]  Denis Lalanne,et al.  SpiralView: Towards Security Policies Assessment through Visual Correlation of Network Resources with Evolution of Alarms , 2007, 2007 IEEE Symposium on Visual Analytics Science and Technology.

[37]  Chris Almost,et al.  Measures of Risk , 2012 .

[38]  Branden Fitelson,et al.  Likelihoodism, Bayesianism, and relational confirmation , 2007, Synthese.

[39]  Martin Pitt,et al.  Can the Retinal Screening Interval Be Safely Increased to 2 Years for Type 2 Diabetic Patients Without Retinopathy? , 2012, Diabetes Care.

[40]  Iyad Rahwan,et al.  Judgment Aggregation in Multi-Agent Argumentation , 2014, J. Log. Comput..

[41]  K. Fountas,et al.  Investigating brain tumor differentiation with diffusion and perfusion metrics at 3T MRI using pattern recognition techniques. , 2013, Magnetic resonance imaging.

[42]  Sadaaki Miyamoto,et al.  Spherical k-Means++ Clustering , 2015, MDAI.

[43]  Josep Domingo-Ferrer,et al.  Ordinal, Continuous and Heterogeneous k-Anonymity Through Microaggregation , 2005, Data Mining and Knowledge Discovery.

[44]  François Yvon,et al.  Formal Models of Analogical Proportions , 2007 .

[45]  Yan Li,et al.  A generalized fuzzy ID3 algorithm using generalized information entropy , 2014, Knowl. Based Syst..

[46]  Ricardo Alberto Marques Pereira,et al.  On a new poverty measure constructed from the exponential mean , 2015, IFSA-EUSFLAT.

[47]  H. Jeffreys Logical Foundations of Probability , 1952, Nature.

[48]  Michel Verleysen,et al.  Bridging Information Visualization with Machine Learning , 2015 .

[49]  I. Hatono,et al.  Fuzzy decision trees by fuzzy ID3 algorithm and its application to diagnosis systems , 1994, Proceedings of 1994 IEEE 3rd International Fuzzy Systems Conference.

[50]  Salvatore J. Stolfo,et al.  Anagram: A Content Anomaly Detector Resistant to Mimicry Attack , 2006, RAID.

[51]  Peter Szolovits Uncertainty and Decisions in Medical Informatics , 1995, Methods of Information in Medicine.

[52]  Hai Thanh Nguyen,et al.  Reliable Machine Learning Al- gorithms for Intrusion Detec- tion Systems , 2012 .

[53]  Radko Mesiar,et al.  A THEORY OF FUZZY MEASURES: INTEGRATION AND ITS ADDITIVITY , 1994 .

[54]  Umberto Straccia,et al.  Managing uncertainty and vagueness in description logics for the Semantic Web , 2008, J. Web Semant..

[55]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[56]  David H. Glass,et al.  Entailment and symmetry in confirmation measures of interestingness , 2014, Inf. Sci..

[57]  Hua Xu,et al.  Constrained LDA for Grouping Product Features in Opinion Mining , 2011, PAKDD.

[58]  Lise Getoor,et al.  Preserving the Privacy of Sensitive Relationships in Graph Data , 2007, PinKDD.

[59]  Ali S. Hadi,et al.  Finding Groups in Data: An Introduction to Chster Analysis , 1991 .

[60]  Laurent Miclet,et al.  Learning by Analogy: A Classification Rule for Binary and Nominal Data , 2007, IJCAI.

[61]  Jordi Castellà-Roca,et al.  Preventing automatic user profiling in Web 2.0 applications , 2012, Knowl. Based Syst..

[62]  Branden Fitelson The Plurality of Bayesian Measures of Confirmation and the Problem of Measure Sensitivity , 1999, Philosophy of Science.

[63]  Gert de Cooman Integration and Conditioning in Numerical Possibility Theory , 2004, Annals of Mathematics and Artificial Intelligence.

[64]  J. Siskos Assessing a set of additive utility functions for multicriteria decision-making , 1982 .

[65]  Giovanni Vigna,et al.  A Learning-Based Approach to the Detection of SQL Attacks , 2005, DIMVA.

[66]  George A. Lampropoulos,et al.  Automatic brain tumor detection in Magnetic Resonance Images , 2012, 2012 9th IEEE International Symposium on Biomedical Imaging (ISBI).

[67]  E. Eells,et al.  Symmetries and Asymmetries in Evidential Support , 2002 .

[68]  Barbara Hammer,et al.  How to visualize a classifier , 2012 .

[69]  Nelly Gordillo,et al.  State of the art survey on MRI brain tumor segmentation. , 2013, Magnetic resonance imaging.

[70]  Angela Fahrni,et al.  Old Wine or Warm Beer : Target-Specific Sentiment Analysis of Adjectives , .

[71]  Enrique Herrera-Viedma,et al.  A linguistic consensus model for Web 2.0 communities , 2013, Appl. Soft Comput..

[72]  Ehud Lehrer,et al.  The concave integral over large spaces , 2008, Fuzzy Sets Syst..

[73]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[74]  Yuchi Kanzawa On Kernelization for a Maximizing Model of Bezdek-Like Spherical Fuzzy c-Means Clustering , 2014, MDAI.

[75]  Sadaaki Miyamoto,et al.  Fuzzy Multiset Model and Methods of Nonlinear Document Clustering for Information Retrieval , 2004, MDAI.

[76]  Peter Eades,et al.  A Heuristic for Graph Drawing , 1984 .

[77]  Henri Prade,et al.  Ranking Alternatives on the Basis of Generic Constraints and Examples - A Possibilistic Approach , 2007, IJCAI.

[78]  Henri Prade,et al.  Handling Analogical Proportions in Classical Logic and Fuzzy Logics Settings , 2009, ECSQARU.

[79]  G. Brady Governing the Commons: The Evolution of Institutions for Collective Action , 1993 .

[80]  Cameron A MacKenzie,et al.  Summarizing Risk Using Risk Measures and Risk Indices , 2014, Risk analysis : an official publication of the Society for Risk Analysis.

[81]  Robert Susmaga,et al.  The Property of χ 201-Concordance for Bayesian Confirmation Measures , 2013 .

[82]  David Sánchez,et al.  Ontology-based semantic similarity: A new feature-based approach , 2012, Expert Syst. Appl..

[83]  Michel Grabisch,et al.  K-order Additive Discrete Fuzzy Measures and Their Representation , 1997, Fuzzy Sets Syst..

[84]  Graham J. Wills,et al.  Visualizing Network Data , 2009, Encyclopedia of Database Systems.

[85]  Diego Calvanese,et al.  The Description Logic Handbook: Theory, Implementation, and Applications , 2003, Description Logic Handbook.

[86]  Vicenç Torra,et al.  Reidentification and k-anonymity: a model for disclosure risk in graphs , 2012, Soft Comput..

[87]  Jean-Luc Marichal,et al.  An axiomatic approach of the discrete Choquet integral as a tool to aggregate interacting criteria , 2000, IEEE Trans. Fuzzy Syst..

[88]  Pei-Chann Chang,et al.  A CBR-based fuzzy decision tree approach for database classification , 2010, Expert Syst. Appl..

[89]  Fachao Li,et al.  Fuzzy ID3 Algorithm Based on Generating Hartley Measure , 2011, WISM.

[90]  Radko Mesiar,et al.  Hesitant L ‐Fuzzy Sets , 2017, Int. J. Intell. Syst..

[91]  Heeyoul Choi,et al.  Robust kernel Isomap , 2007, Pattern Recognit..

[92]  Sumitra Mukherjee,et al.  A Polynomial Algorithm for Optimal Univariate Microaggregation , 2003, IEEE Trans. Knowl. Data Eng..

[93]  Alain Chateauneuf,et al.  Modeling attitudes towards uncertainty and risk through the use of choquet integral , 1994, Ann. Oper. Res..

[94]  Dewan Md. Farid,et al.  Application of Machine Learning Approaches in Intrusion Detection System: A Survey , 2015 .

[95]  Michael I. Jordan,et al.  Latent Dirichlet Allocation , 2001, J. Mach. Learn. Res..

[96]  L. Saul,et al.  An Introduction to Locally Linear Embedding , 2001 .

[97]  Christopher Krügel,et al.  Anomaly detection of web-based attacks , 2003, CCS '03.

[98]  Olivier Thonnard,et al.  VisTracer: a visual analytics tool to investigate routing anomalies in traceroutes , 2012, VizSec '12.

[99]  M. Yaari The Dual Theory of Choice under Risk , 1987 .

[100]  Gilles Richard,et al.  Completing Preferences by Means of Analogical Proportions , 2016, MDAI.

[101]  Salvatore J. Stolfo,et al.  A framework for constructing features and models for intrusion detection systems , 2000, TSEC.

[102]  Eva Armengol,et al.  Lazy Induction of Descriptions for Relational Case-Based Learning , 2001, ECML.

[103]  Barbara Hammer,et al.  Discriminative Dimensionality Reduction for the Visualization of Classifiers , 2013, ICPRAM.

[104]  Ran Wolff,et al.  The VLDB Journal manuscript No. (will be inserted by the editor) Providing k-Anonymity in Data Mining , 2022 .

[105]  Humberto Bustince,et al.  A review of the relationships between implication, negation and aggregation functions from the point of view of material implication , 2016, Inf. Sci..

[106]  Didier Dubois,et al.  Decision-theoretic foundations of qualitative possibility theory , 2001, Eur. J. Oper. Res..

[107]  Steffen Staab,et al.  Ontology Learning for the Semantic Web , 2002, IEEE Intell. Syst..

[108]  Desney S. Tan,et al.  Performance and Preferences: Interactive Refinement of Machine Learning Procedures , 2012, AAAI.

[109]  Humberto Bustince,et al.  Intuitionistic Fuzzy Implication Operators - An Expression And Main Properties , 2004, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[110]  Robert LIN,et al.  NOTE ON FUZZY SETS , 2014 .

[111]  M. S. Ali,et al.  Fuzzy Expert Systems (FES) for Medical Diagnosis , 2013 .

[112]  Jiannong Cao,et al.  A Distributed TCAM Coprocessor Architecture for Integrated Longest Prefix Matching, Policy Filtering, and Content Filtering , 2013, IEEE Transactions on Computers.

[113]  Konrad Rieck,et al.  Linear-Time Computation of Similarity Measures for Sequential Data , 2008, J. Mach. Learn. Res..

[114]  Jean-Luc Marichal,et al.  Aggregation of interacting criteria by means of the discrete Choquet integral , 2002 .

[115]  Gilles Richard,et al.  From Analogical Proportion to Logical Proportions , 2013, Logica Universalis.

[116]  David Atkinson,et al.  Confirmation and justification. A commentary on Shogenji’s measure , 2009, Synthese.

[117]  Maria L. Rizzo,et al.  Brownian distance covariance , 2009, 1010.0297.

[118]  Pablo M. Granitto,et al.  Abrupt change detection with One-Class Time-Adaptive Support Vector Machines , 2013, Expert Syst. Appl..

[119]  Gilles Richard,et al.  Analogical classification: A new way to deal with examples , 2014, ECAI.

[120]  Francisco Herrera,et al.  Aggregation operators for linguistic weighted information , 1997, IEEE Trans. Syst. Man Cybern. Part A.

[121]  Luis Martínez-López,et al.  AN EXTENDED HIERARCHICAL LINGUISTIC MODEL FOR DECISION‐MAKING PROBLEMS , 2011, Comput. Intell..

[122]  Christopher Krügel,et al.  Anomalous system call detection , 2006, TSEC.

[123]  Silvia Calegari,et al.  Fuzzy Ontology, Fuzzy Description Logics and Fuzzy-OWL , 2007, WILF.

[124]  David J. DeWitt,et al.  Incognito: efficient full-domain K-anonymity , 2005, SIGMOD '05.

[125]  R. Narasimhan An Analytical Approach to Supplier Selection , 1983 .

[126]  Ekrem Duman,et al.  A cost-sensitive decision tree approach for fraud detection , 2013, Expert Syst. Appl..

[127]  Rajeev Motwani,et al.  Two Can Keep A Secret: A Distributed Architecture for Secure Database Services , 2005, CIDR.

[128]  Amy Nicole Langville,et al.  A Survey of Eigenvector Methods for Web Information Retrieval , 2005, SIAM Rev..

[129]  José María Sarabia,et al.  Modelling losses and locating the tail with the Pareto Positive Stable distribution , 2011 .

[130]  Xizhao Wang,et al.  A comparative study on heuristic algorithms for generating fuzzy decision trees , 2001, IEEE Trans. Syst. Man Cybern. Part B.

[131]  Francisco Herrera,et al.  Integrating three representation models in fuzzy multipurpose decision making based on fuzzy preference relations , 1998, Fuzzy Sets Syst..

[132]  Shaun S. Wang Premium Calculation by Transforming the Layer Premium Density , 1996, ASTIN Bulletin.

[133]  M. Shaw,et al.  Induction of fuzzy decision trees , 1995 .

[134]  Saburo Muroga,et al.  Binary Decision Diagrams , 2000, The VLSI Handbook.

[135]  James Stephen Marron,et al.  Transformations in Density Estimation , 1991 .

[136]  Nan Zhang,et al.  Kernel feature selection to fuse multi-spectral MRI images for brain tumor segmentation , 2011, Comput. Vis. Image Underst..

[137]  William Yurcik,et al.  NVisionIP: netflow visualizations of system state for security situational awareness , 2004, VizSEC/DMSEC '04.

[138]  Yuchi Kanzawa,et al.  Sequential Cluster Extraction Using Power-Regularized Possibilistic c-Means , 2015, J. Adv. Comput. Intell. Intell. Informatics.

[139]  Wei-Yang Lin,et al.  Intrusion detection by machine learning: A review , 2009, Expert Syst. Appl..

[140]  Jian Pei,et al.  A brief survey on anonymization techniques for privacy preserving publishing of social network data , 2008, SKDD.

[141]  Duncan J. Watts,et al.  Collective dynamics of ‘small-world’ networks , 1998, Nature.

[142]  N. Rescher A Theory of Evidence , 1958, Philosophy of Science.

[143]  Ian H. Witten,et al.  The WEKA data mining software: an update , 2009, SKDD.

[144]  Mark A. Girolami,et al.  Mercer kernel-based clustering in feature space , 2002, IEEE Trans. Neural Networks.

[145]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[146]  L. Stein,et al.  Probability and the Weighing of Evidence , 1950 .

[147]  Michel Grabisch,et al.  Modeling attitudes towards uncertainty through the use of Sugeno integral , 2001 .

[148]  Howard J. Hamilton,et al.  Interestingness measures for data mining: A survey , 2006, CSUR.

[149]  Philippe Lacomme,et al.  Job-shop based framework for simultaneous scheduling of machines and automated guided vehicles , 2013 .

[150]  Vicenç Torra,et al.  Graphic sequences, distances and k-degree anonymity , 2015, Discret. Appl. Math..

[151]  Kyung Mi Lee,et al.  A genetic algorithm for general machine scheduling problems , 1998, 1998 Second International Conference. Knowledge-Based Intelligent Electronic Systems. Proceedings KES'98 (Cat. No.98EX111).

[152]  Hajime Inoue,et al.  Comparing Anomaly Detection Techniques for HTTP , 2007, RAID.

[153]  Sadaaki Miyamoto,et al.  Fuzzy c-means as a regularization and maximum entropy approach , 1997 .

[154]  Didier Dubois,et al.  Expressing Preferences from Generic Rules and Examples - A Possibilistic Approach Without Aggregation Function , 2005, ECSQARU.

[155]  Ehud Lehrer,et al.  A new integral for capacities , 2005 .

[156]  S. H. Ghodsypour,et al.  A weighted max–min model for fuzzy multi-objective supplier selection in a supply chain , 2011 .

[157]  Hideo Tanaka,et al.  Fuzzy integrals based on pseudo-additions and multiplications , 1988 .

[158]  Chen-Ping Yu,et al.  3D blob based brain tumor detection and segmentation in MR images , 2014, 2014 IEEE 11th International Symposium on Biomedical Imaging (ISBI).

[159]  Mathieu Serrurier,et al.  Elicitating Sugeno Integrals: Methodology and a Case Study , 2009, ECSQARU.

[160]  Vicenç Torra,et al.  Modeling decisions - information fusion and aggregation operators , 2007 .

[161]  Michel Verleysen,et al.  Information Visualization, Visual Data Mining and Machine Learning (Dagstuhl Seminar 12081) , 2012, Dagstuhl Reports.

[162]  Didier Dubois,et al.  The Use of the Discrete Sugeno Integral in Decision-Making: A Survey , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[163]  Gündüz Ulusoy,et al.  A Time Window Approach to Simultaneous Scheduling of Machines and Material Handling System in an FMS , 1995, Oper. Res..

[164]  Dimitris Kanellopoulos,et al.  Handling imbalanced datasets: A review , 2006 .

[165]  J. K. Lenstra,et al.  Complexity of vehicle routing and scheduling problems , 1981, Networks.

[166]  Yuchi Kanzawa A Maximizing Model of Bezdek-Like Spherical Fuzzy c-Means , 2015, J. Adv. Comput. Intell. Intell. Informatics.

[167]  Humberto Bustince,et al.  Image thresholding using restricted equivalence functions and maximizing the measures of similarity , 2007, Fuzzy Sets Syst..

[168]  Bart Goethals,et al.  On Private Scalar Product Computation for Privacy-Preserving Data Mining , 2004, ICISC.

[169]  Peter Eades,et al.  FADE: Graph Drawing, Clustering, and Visual Abstraction , 2000, GD.

[170]  Philip K. Chan,et al.  Learning rules for anomaly detection of hostile network traffic , 2003, Third IEEE International Conference on Data Mining.

[171]  Pierangela Samarati,et al.  Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .

[172]  Enrique Herrera-Viedma,et al.  Decision Support System for Decision Making in Changeable and Multi-Granular Fuzzy Linguistic Contexts , 2016, J. Multiple Valued Log. Soft Comput..

[173]  M. Newman,et al.  Finding community structure in networks using the eigenvectors of matrices. , 2006, Physical review. E, Statistical, nonlinear, and soft matter physics.

[174]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[175]  Pierangela Samarati,et al.  Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..

[176]  Humberto Bustince,et al.  Generation of linear orders for intervals by means of aggregation functions , 2013, Fuzzy Sets Syst..

[177]  Christopher Krügel,et al.  Stateful intrusion detection for high-speed network's , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[178]  Nahla Ben Amor,et al.  Possibilistic sequential decision making , 2014, Int. J. Approx. Reason..

[179]  Josep Domingo-Ferrer,et al.  Semantic variance: An intuitive measure for ontology accuracy evaluation , 2015, Eng. Appl. Artif. Intell..

[180]  James M. Keller,et al.  The possibilistic C-means algorithm: insights and recommendations , 1996, IEEE Trans. Fuzzy Syst..

[181]  Ahmed Ben Hamida,et al.  3D multimodal MRI brain glioma tumor and edema segmentation: A graph cut distribution matching approach , 2015, Comput. Medical Imaging Graph..

[182]  Xiaojun Tong,et al.  Pan-operations structure with non-idempotent pan-addition , 2004, Fuzzy Sets Syst..

[183]  Leo Guelman,et al.  A decision support framework to implement optimal personalized marketing interventions , 2015, Decis. Support Syst..

[184]  Olivier Strauss,et al.  An interval-valued inversion of the non-additive interval-valued F-transform: Use for upsampling a signal , 2016, Fuzzy Sets Syst..

[185]  Marek Gagolewski,et al.  Fuzzy K-Minpen Clustering and K-nearest-minpen Classification Procedures Incorporating Generic Distance-Based Penalty Minimizers , 2016, IPMU.

[186]  Matthieu Cord,et al.  Quadruplet-Wise Image Similarity Learning , 2013, 2013 IEEE International Conference on Computer Vision.

[187]  Jun Li,et al.  Generalized Lebesgue integral , 2011, Int. J. Approx. Reason..

[188]  Yukihiro Hamasuna,et al.  On even-sized clustering algorithm based on optimization , 2014, 2014 Joint 7th International Conference on Soft Computing and Intelligent Systems (SCIS) and 15th International Symposium on Advanced Intelligent Systems (ISIS).

[189]  Clark F. Olson,et al.  Parallel Algorithms for Hierarchical Clustering , 1995, Parallel Comput..

[190]  Salvatore Greco,et al.  jMAF - Dominance-Based Rough Set Data Analysis Framework , 2013, Rough Sets and Intelligent Systems.

[191]  Bostjan Likar,et al.  A Review of Methods for Correction of Intensity Inhomogeneity in MRI , 2007, IEEE Transactions on Medical Imaging.

[192]  Daniel A. Keim,et al.  Large-Scale Network Monitoring for Visual Analysis of Attacks , 2008, VizSEC.

[193]  Yin Jianping,et al.  Detecting Distributed Denial of Service Attack Based on Address Correlation Value , 2009 .

[194]  Yoram Wind,et al.  The Determinants of Vendor Selection: The Evaluation Function Approach , 1968 .

[195]  Leo Katz,et al.  A new status index derived from sociometric analysis , 1953 .

[196]  Francisco Herrera,et al.  A consensus model for multiperson decision making with different preference structures , 2002, IEEE Trans. Syst. Man Cybern. Part A.

[197]  John A. Czepiel Word-of-Mouth Processes in the Diffusion of a Major Technological Innovation , 1974 .

[198]  Gary M. Weiss Data Mining in the Real World: Experiences, Challenges, and Recommendations , 2009, DMIN.

[199]  Rajeev Motwani,et al.  The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.

[200]  Yongchuan Tang,et al.  Linguistic modelling based on semantic similarity relation among linguistic labels , 2006, Fuzzy Sets Syst..

[201]  Michel Grabisch,et al.  A decade of application of the Choquet and Sugeno integrals in multi-criteria decision aid , 2010, Ann. Oper. Res..

[202]  Fernando Ortega Managing vagueness in ontologies , 2011 .

[203]  Benjamín R. C. Bedregal,et al.  On interval fuzzy S-implications , 2010, Inf. Sci..

[204]  M. Cugmas,et al.  On comparing partitions , 2015 .

[205]  Yannis Siskos,et al.  Preference disaggregation: 20 years of MCDA experience , 2001, Eur. J. Oper. Res..

[206]  Eric Medvet,et al.  Anomaly detection techniques for a web defacement monitoring service , 2011, Expert Syst. Appl..

[207]  Wojciech Boa,et al.  The new golf neighborhood for the flexible job shop problem , 2010 .

[208]  Shaun S. Wang,et al.  Insurance pricing and increased limits ratemaking by proportional hazards transforms , 1995 .

[209]  Francisco Herrera,et al.  A Historical Account of Types of Fuzzy Sets and Their Relationships , 2016, IEEE Transactions on Fuzzy Systems.

[210]  W. Zachary,et al.  An Information Flow Model for Conflict and Fission in Small Groups , 1977, Journal of Anthropological Research.

[211]  Tsuhan Chen,et al.  Malicious web content detection by machine learning , 2010, Expert Syst. Appl..

[212]  Didier Dubois,et al.  Qualitative Decision Theory with Sugeno Integrals , 1998, UAI.

[213]  Julián Salas,et al.  A data driven anonymization system for information rich online social network graphs , 2016, Expert Syst. Appl..

[214]  Gözde B. Ünal,et al.  Tumor-Cut: Segmentation of Brain Tumors on Contrast Enhanced MR Images for Radiosurgery Applications , 2012, IEEE Transactions on Medical Imaging.

[215]  Bernhard Schölkopf,et al.  Nonlinear Component Analysis as a Kernel Eigenvalue Problem , 1998, Neural Computation.

[216]  Deolinda M. L. D. Rasteiro,et al.  Random decision forests for automatic brain tumor segmentation on multi-modal MRI images , 2015, 2015 IEEE 4th Portuguese Meeting on Bioengineering (ENBENG).

[217]  M. Sugeno,et al.  Pseudo-additive measures and integrals , 1987 .

[218]  Hongfei Yan,et al.  Jointly Modeling Aspects and Opinions with a MaxEnt-LDA Hybrid , 2010, EMNLP.

[219]  Alain Chateauneuf,et al.  Some Characterizations of Lower Probabilities and Other Monotone Capacities through the use of Möbius Inversion , 1989, Classic Works of the Dempster-Shafer Theory of Belief Functions.

[220]  Francisco Herrera,et al.  A Fuzzy Linguistic Methodology to Deal With Unbalanced Linguistic Term Sets , 2008, IEEE Transactions on Fuzzy Systems.

[221]  Barbara Hammer,et al.  Using Discriminative Dimensionality Reduction to Visualize Classifiers , 2014, Neural Processing Letters.

[222]  S. H. Ghodsypour,et al.  The total cost of logistics in supplier selection, under conditions of multiple sourcing, multiple criteria and capacity constraint , 2001 .

[223]  S. Wasserman,et al.  Blockmodels: Interpretation and evaluation , 1992 .

[224]  Salvatore J. Stolfo,et al.  One-Class Training for Masquerade Detection , 2003 .

[225]  José Luis García-Lapresta,et al.  A new class of fuzzy poverty measures , 2015, IFSA-EUSFLAT.

[226]  Francisco Herrera,et al.  Hesitant Fuzzy Linguistic Term Sets for Decision Making , 2012, IEEE Transactions on Fuzzy Systems.

[227]  Salvatore J. Stolfo,et al.  A Geometric Framework for Unsupervised Anomaly Detection , 2002, Applications of Data Mining in Computer Security.

[228]  James M. Keller,et al.  A possibilistic approach to clustering , 1993, IEEE Trans. Fuzzy Syst..

[229]  Yuchi Kanzawa Fuzzy clustering based on α-divergence for spherical data and for categorical multivariate data , 2015, 2015 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE).

[230]  Edward M. Reingold,et al.  Graph drawing by force‐directed placement , 1991, Softw. Pract. Exp..

[231]  Ronald R. Yager,et al.  Quantifier guided aggregation using OWA operators , 1996, Int. J. Intell. Syst..

[232]  Zdzisław Pawlak,et al.  Can Bayesian confirmation measures be useful for rough set decision rules? , 2004, Eng. Appl. Artif. Intell..

[233]  Sigrid Knust,et al.  Tabu search algorithms for job-shop problems with a single transport robot , 2005, Eur. J. Oper. Res..

[234]  Vijay S. Iyengar,et al.  Transforming data to satisfy privacy constraints , 2002, KDD.

[235]  Marek Gagolewski,et al.  Genie: A new, fast, and outlier-resistant hierarchical clustering algorithm , 2016, Inf. Sci..

[236]  Christopher Krügel,et al.  Automatic Network Protocol Analysis , 2008, NDSS.

[237]  So Young Sohn,et al.  Random effects logistic regression model for anomaly detection , 2007, Expert Syst. Appl..

[238]  T. Krueger,et al.  An Architecture for Inline Anomaly Detection , 2008, 2008 European Conference on Computer Network Defense.

[239]  H. Prade,et al.  A Choquet Integral Representation in Multicriteria Decision Making , 2002 .

[240]  Dominique Brodbeck,et al.  A Visual Approach for Monitoring Logs , 1998, LISA.

[241]  Konrad Rieck,et al.  Language models for detection of unknown attacks in network traffic , 2006, Journal in Computer Virology.

[242]  Endre Pap,et al.  Non-additive measures and integrals , 2006 .

[243]  Ronald R. Yager,et al.  On ordered weighted averaging aggregation operators in multicriteria decisionmaking , 1988, IEEE Trans. Syst. Man Cybern..

[244]  Leo Breiman,et al.  Random Forests , 2001, Machine Learning.

[245]  Humberto Bustince,et al.  A class of aggregation functions encompassing two-dimensional OWA operators , 2010, Inf. Sci..

[246]  David Sánchez,et al.  Semantic Noise: Privacy-Protection of Nominal Microdata through Uncorrelated Noise Addition , 2015, 2015 IEEE 27th International Conference on Tools with Artificial Intelligence (ICTAI).

[247]  Inderjit S. Dhillon,et al.  Concept Decompositions for Large Sparse Text Data Using Clustering , 2004, Machine Learning.

[248]  Radko Mesiar,et al.  Pseudo-arithmetical operations as a basis for the general measure and integration theory , 2004, Inf. Sci..

[249]  Yuchi Kanzawa On Possibilistic Clustering Methods Based on Shannon/Tsallis-Entropy for Spherical Data and Categorical Multivariate Data , 2015, MDAI.

[250]  Eyke Hüllermeier,et al.  Preference Learning (Dagstuhl Seminar 14101) , 2014, Dagstuhl Reports.

[251]  F. R. Pitts A GRAPH THEORETIC APPROACH TO HISTORICAL GEOGRAPHY , 1965 .

[252]  Roberto Festa,et al.  Towards a Grammar of Bayesian Confirmation , 2009 .

[253]  J. Shaw,et al.  Global estimates of the prevalence of diabetes for 2010 and 2030. , 2010, Diabetes research and clinical practice.

[254]  Gilles Richard,et al.  Reasoning with Logical Proportions , 2010, KR.

[255]  Xindong Wu,et al.  10 Challenging Problems in Data Mining Research , 2006, Int. J. Inf. Technol. Decis. Mak..

[256]  Feyzan Arikan,et al.  A fuzzy solution approach for multi objective supplier selection , 2013, Expert Syst. Appl..

[257]  Weijun Xia,et al.  Supplier selection with multiple criteria in volume discount environments , 2007 .

[258]  Ratul Mahajan,et al.  CueT: human-guided fast and accurate network alarm triage , 2011, CHI.

[259]  Michel Ménard,et al.  Possibilistic and probabilistic fuzzy clustering: unification within the framework of the non-extensive thermostatistics , 2003, Pattern Recognit..

[260]  S. Bodjanova Fuzzy Sets and Fuzzy Partitions , 1993 .

[261]  Sean Chester,et al.  Complexity of social network anonymization , 2012, Social Network Analysis and Mining.

[262]  László Szilágyi,et al.  Automatic Brain Tumor Segmentation in Multispectral MRI Volumetric Records , 2015, ICONIP.

[263]  Salvatore Greco,et al.  Ordinal regression revisited: Multiple criteria ranking using a set of additive value functions , 2008, Eur. J. Oper. Res..

[264]  Alina Campan,et al.  A Clustering Approach for Data and Structural Anonymity in Social Networks , 2008 .

[265]  Cai Zhi-ping Research on the Technology of Quantitative Security Evaluation Based on Fuzzy Number Arithmetic Operations , 2004 .

[266]  Jian Pei,et al.  Preserving Privacy in Social Networks Against Neighborhood Attacks , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[267]  Shahram Sarkani,et al.  A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier , 2012, Expert Syst. Appl..

[268]  Karl Friedrich Siburg,et al.  Symmetry of functions and exchangeability of random variables , 2011 .

[269]  Eva Armengol Building Partial Domain Theories from Explanations , 2008, Künstliche Intell..

[270]  Bennett A. Landman,et al.  Out-of-atlas labeling: A multi-atlas approach to cancer segmentation , 2012, 2012 9th IEEE International Symposium on Biomedical Imaging (ISBI).

[271]  E. Pap Null-Additive Set Functions , 1995 .

[272]  Zeshui Xu,et al.  An outranking sorting method for multi-criteria group decision making using intuitionistic fuzzy sets , 2016, Inf. Sci..

[273]  Orestis Tsigkas,et al.  Visual spam campaigns analysis using abstract graphs representation , 2012, VizSec '12.

[274]  H. Leavitt Some effects of certain communication patterns on group performance. , 1951, Journal of abnormal psychology.

[275]  Xiaowei Xu,et al.  Multi-criteria decision making approaches for supplier evaluation and selection: A literature review , 2010, Eur. J. Oper. Res..

[276]  David Maxwell Chickering,et al.  ModelTracker: Redesigning Performance Analysis Tools for Machine Learning , 2015, CHI.

[277]  J. MacQueen Some methods for classification and analysis of multivariate observations , 1967 .

[278]  Petr Ekel,et al.  A flexible consensus scheme for multicriteria group decision making under linguistic assessments , 2010, Inf. Sci..

[279]  Alina Campan,et al.  Data and Structural k-Anonymity in Social Networks , 2009, PinKDD.

[280]  Enrique Herrera-Viedma,et al.  Fuzzy decision making and consensus: Challenges , 2015, J. Intell. Fuzzy Syst..

[281]  Jianwu Dang,et al.  Fuzzy Rough Decision Trees , 2014, Fundam. Informaticae.

[282]  Yunghsiang Sam Han,et al.  Privacy-Preserving Multivariate Statistical Analysis: Linear Regression and Classification , 2004, SDM.

[283]  Taghi M. Khoshgoftaar,et al.  Intrusion detection and Big Heterogeneous Data: a Survey , 2015, Journal of Big Data.

[284]  Tiago P. Peixoto Hierarchical block structures and high-resolution model selection in large networks , 2013, ArXiv.

[285]  Pei-Chann Chang,et al.  A hybrid model combining case-based reasoning and fuzzy decision tree for medical data classification , 2011, Appl. Soft Comput..

[286]  G. Klir,et al.  Generalized Measure Theory , 2008 .

[287]  Núria Agell,et al.  Modeling group assessments by means of hesitant fuzzy linguistic term sets , 2017, J. Appl. Log..

[288]  Marie-Ange Manier,et al.  A genetic algorithm with tabu search procedure for flexible job shop scheduling with transportation constraints and bounded processing times , 2012, Comput. Oper. Res..

[289]  Hans-Peter Kriegel,et al.  A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.

[290]  Khaled Ghédira,et al.  Optimizing Robot Movements in Flexible Job Shop Environment by Metaheuristics Based on Clustered Holonic Multiagent Model , 2016, MDAI.

[291]  Navneet Gupta Privacy and Security in the Cloud , 2014 .

[292]  José Luis García-Lapresta,et al.  Classical inequality indices, welfare and illfare functions, and the dual decomposition , 2013, Fuzzy Sets Syst..

[293]  Ron Kohavi,et al.  Lazy Decision Trees , 1996, AAAI/IAAI, Vol. 1.

[294]  Andreas Tsanakas,et al.  Measurement and Pricing of Risk in Insurance Markets , 2005, Risk Analysis.

[295]  W. Torgerson Multidimensional scaling: I. Theory and method , 1952 .

[296]  Alina Campan,et al.  Preservation of structural properties in anonymized social networks , 2012, 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom).

[297]  Francisco Herrera,et al.  A Sequential Selection Process in Group Decision Making with a Linguistic Assessment Approach , 1995, Inf. Sci..

[298]  Elisa Bertino,et al.  Efficient k -Anonymization Using Clustering Techniques , 2007, DASFAA.

[299]  Pedro Romero-Aroca,et al.  Changes observed in diabetic retinopathy: eight-year follow-up of a Spanish population , 2016, British Journal of Ophthalmology.

[300]  Hae-Sang Park,et al.  A simple and fast algorithm for K-medoids clustering , 2009, Expert Syst. Appl..

[301]  Josep Domingo-Ferrer,et al.  Anonymization of nominal data based on semantic marginality , 2013, Inf. Sci..

[302]  E. Stefánsson,et al.  Biennial eye screening in patients with diabetes without retinopathy: 10-year experience , 2007, British Journal of Ophthalmology.

[303]  S. C. Johnson Hierarchical clustering schemes , 1967, Psychometrika.

[304]  Ravi Ranjan,et al.  A New Clustering Approach for Anomaly Intrusion Detection , 2014, ArXiv.

[305]  Chris Clifton,et al.  Tools for privacy preserving distributed data mining , 2002, SKDD.

[306]  Brian B. Avants,et al.  Optimal Symmetric Multimodal Templates and Concatenated Random Forests for Supervised Brain Tumor Segmentation (Simplified) with ANTsR , 2014, Neuroinformatics.

[307]  Satoru Kawai,et al.  An Algorithm for Drawing General Undirected Graphs , 1989, Inf. Process. Lett..

[308]  Gilles Richard,et al.  Multiple-valued extensions of analogical proportions , 2016, Fuzzy Sets Syst..

[309]  Gregory Piatetsky-Shapiro,et al.  Discovery, Analysis, and Presentation of Strong Rules , 1991, Knowledge Discovery in Databases.

[310]  Jerome P. Reiter,et al.  Privacy-Preserving Analysis of Vertically Partitioned Data Using Secure Matrix Products , 2009 .

[311]  Mohamed F. Hassan,et al.  A hybrid GA/heuristic approach to the simultaneous scheduling of machines and automated guided vehicles , 2004 .

[312]  Mark E. J. Newman,et al.  Stochastic blockmodels and community structure in networks , 2010, Physical review. E, Statistical, nonlinear, and soft matter physics.

[313]  Konrad Rieck,et al.  Detecting Unknown Network Attacks Using Language Models , 2006, DIMVA.

[314]  Salvatore Greco,et al.  Properties of rule interestingness measures and alternative approaches to normalization of measures , 2012, Inf. Sci..

[315]  Cristina Pérez-Solà,et al.  The Bitcoin P2P Network , 2014, Financial Cryptography Workshops.

[316]  Philip S. Yu,et al.  Anonymizing Classification Data for Privacy Preservation , 2007, IEEE Transactions on Knowledge and Data Engineering.

[317]  Zeshui Xu,et al.  Some geometric aggregation operators based on intuitionistic fuzzy sets , 2006, Int. J. Gen. Syst..

[318]  Karl Aberer,et al.  A Cloud-Based eHealth Architecture for Privacy Preserving Data Integration , 2015, SEC.

[319]  Humberto Bustince,et al.  A New Approach to Interval-Valued Choquet Integrals and the Problem of Ordering in Interval-Valued Fuzzy Set Applications , 2013, IEEE Transactions on Fuzzy Systems.

[320]  Anna Kolesárová,et al.  Aggregation-based extensions of fuzzy measures , 2012, Fuzzy Sets Syst..

[321]  Heng Tao Shen,et al.  Principal Component Analysis , 2009, Encyclopedia of Biometrics.

[322]  Dongjoon Kong,et al.  A differentiated one-class classification method with applications to intrusion detection , 2012, Expert Syst. Appl..

[323]  Carlos García Garino,et al.  An autonomous labeling approach to support vector machines algorithms for network traffic anomaly detection , 2012, Expert Syst. Appl..

[324]  J. Kruskal Multidimensional scaling by optimizing goodness of fit to a nonmetric hypothesis , 1964 .

[325]  Michel Grabisch,et al.  A review of methods for capacity identification in Choquet integral based multi-attribute utility theory: Applications of the Kappalab R package , 2008, Eur. J. Oper. Res..

[326]  R. Mesiar Choquet-like Integrals , 1995 .

[327]  Li Zhang,et al.  An adaptive ensemble classifier for mining concept drifting data streams , 2013, Expert Syst. Appl..

[328]  Humberto Bustince,et al.  Relationship between restricted dissimilarity functions, restricted equivalence functions and normal EN-functions: Image thresholding invariant , 2008, Pattern Recognit. Lett..

[329]  Yukihiro Hamasuna,et al.  On Various Types of Even-Sized Clustering Based on Optimization , 2016, MDAI.

[330]  Xiaoping Fan,et al.  MVSec: multi-perspective and deductive visual analytics on heterogeneous network security data , 2014, J. Vis..

[331]  อนิรุธ สืบสิงห์,et al.  Data Mining Practical Machine Learning Tools and Techniques , 2014 .

[332]  Slava Kisilevich,et al.  A GIS-based decision support system for hotel room rate estimation and temporal price prediction: The hotel brokers' context , 2013, Decis. Support Syst..

[333]  Sadaaki Miyamoto,et al.  Algorithms of nonlinear document clustering based on fuzzy multiset model , 2008, Int. J. Intell. Syst..

[334]  菅野 道夫,et al.  Theory of fuzzy integrals and its applications , 1975 .

[335]  Larry L. Peterson,et al.  binpac: a yacc for writing application protocol parsers , 2006, IMC '06.

[336]  V. Rao Vemuri,et al.  Using Text Categorization Techniques for Intrusion Detection , 2002, USENIX Security Symposium.

[337]  Eva Armengol,et al.  Relational Case-based Reasoning for Carcinogenic Activity Prediction , 2003, Artificial Intelligence Review.

[338]  Konrad Rieck,et al.  Machine learning for application layer intrusion detection , 2011 .

[339]  Elena N. Zaitseva,et al.  Usage of New Information Estimations for Induction of Fuzzy Decision Trees , 2002, IDEAL.

[340]  M. Sugeno,et al.  Fuzzy Measures and Integrals: Theory and Applications , 2000 .

[341]  Martin Grötschel,et al.  Mathematical Programming The State of the Art, XIth International Symposium on Mathematical Programming, Bonn, Germany, August 23-27, 1982 , 1983, ISMP.

[342]  Xindong Wu,et al.  Efficient mining of both positive and negative association rules , 2004, TOIS.

[343]  Francisco Chiclana,et al.  Accuracy and complexity evaluation of defuzzification strategies for the discretised interval type-2 fuzzy set , 2013, Int. J. Approx. Reason..

[344]  Roberto J. Bayardo,et al.  Data privacy through optimal k-anonymization , 2005, 21st International Conference on Data Engineering (ICDE'05).

[345]  Sushil Jajodia,et al.  Selective data outsourcing for enforcing privacy , 2011, J. Comput. Secur..

[346]  José María Sarabia,et al.  Simple risk measure calculations for sums of positive random variables , 2013 .

[347]  Humberto Bustince,et al.  Automorphisms, negations and implication operators , 2003, Fuzzy Sets Syst..

[348]  Humberto Bustince,et al.  Restricted equivalence functions , 2006, Fuzzy Sets Syst..

[349]  Gleb Beliakov,et al.  Aggregation Functions: A Guide for Practitioners , 2007, Studies in Fuzziness and Soft Computing.

[350]  Lilly Suriani Affendey,et al.  Intrusion detection using data mining techniques , 2010, 2010 International Conference on Information Retrieval & Knowledge Management (CAMP).

[351]  Josep Domingo-Ferrer,et al.  Practical Data-Oriented Microaggregation for Statistical Disclosure Control , 2002, IEEE Trans. Knowl. Data Eng..

[352]  Robert Susmaga,et al.  Can interestingness measures be usefully visualized? , 2015, Int. J. Appl. Math. Comput. Sci..

[353]  Ludmil Mikhailov,et al.  An interpretable fuzzy rule-based classification methodology for medical diagnosis , 2009, Artif. Intell. Medicine.

[354]  Amit Kumar Dewangan,et al.  An Ensemble Model for Classification of Attacks with Feature Selection based on KDD99 and NSL-KDD Data Set , 2014 .

[355]  R. Mooney,et al.  Impact of Similarity Measures on Web-page Clustering , 2000 .

[356]  Ramón López de Mántaras,et al.  A distance-based attribute selection measure for decision tree induction , 1991, Machine Learning.

[357]  N. Shilkret Maxitive measure and integration , 1971 .

[358]  Helen J. Wang,et al.  Generic Application-Level Protocol Analyzer and its Language , 2007, NDSS.

[359]  K. Liu,et al.  Towards identity anonymization on graphs , 2008, SIGMOD Conference.

[360]  Ning Zhang,et al.  Inducting Fuzzy Decision Tree Based on Discrete Attributes through Uncertainty Reduction , 2013 .

[361]  Tomoji Shogenji The degree of epistemic justification and the conjunction fallacy , 2009, Synthese.