Modeling Decisions for Artificial Intelligence
暂无分享,去创建一个
Vicenç Torra | Guillermo Navarro-Arribas | Yasuo Narukawa | Cristina Yañez | V. Torra | S. Tsumoto | Y. Narukawa | Xinyu Yang | Y. Maeda | Y. Bi | Hui Wang | G. Navarro-Arribas | G. Guo | Wenjing Yang | Ming Zeng | D. Bell | Cristina Yáñez
[1] Humberto Bustince,et al. A Practical Guide to Averaging Functions , 2015, Studies in Fuzziness and Soft Computing.
[2] Joachim M. Buhmann,et al. The Balanced Accuracy and Its Posterior Distribution , 2010, 2010 20th International Conference on Pattern Recognition.
[3] Joan Torrens,et al. Residual implications on the set of discrete fuzzy numbers , 2013, Inf. Sci..
[4] G. Choquet. Theory of capacities , 1954 .
[5] Sergei Vassilvitskii,et al. k-means++: the advantages of careful seeding , 2007, SODA '07.
[6] Hua Xu,et al. Grouping Product Features Using Semi-Supervised Learning with Soft-Constraints , 2010, COLING.
[7] Cynthia Dwork,et al. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography , 2007, WWW '07.
[8] P. Wakker. Additive Representations of Preferences: A New Foundation of Decision Analysis , 1988 .
[9] G. N. Lance,et al. A General Theory of Classificatory Sorting Strategies: 1. Hierarchical Systems , 1967, Comput. J..
[10] Humberto Bustince,et al. Construction theorems for intuitionistic fuzzy sets , 1996, Fuzzy Sets Syst..
[11] Paolo Torroni,et al. Microdebates: Structuring debates without a structuring tool , 2015, AI Commun..
[12] Pietro Perona,et al. Self-Tuning Spectral Clustering , 2004, NIPS.
[13] Cong Wang,et al. Security Challenges for the Public Cloud , 2012, IEEE Internet Computing.
[14] Alan Agresti,et al. Categorical Data Analysis , 2003 .
[15] Juan Carlos Valencia Rincón. Internet and Surveillance: The Challenges of Web 2.0 and Social Media , 2012 .
[16] Xiangji Huang,et al. Mining network data for intrusion detection through combining SVMs with ant colony networks , 2014, Future Gener. Comput. Syst..
[17] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[18] Alex Thomo,et al. Why Waldo befriended the dummy? k-Anonymization of social networks with pseudo-nodes , 2012, Social Network Analysis and Mining.
[19] Gary W. Dickson,et al. AN ANALYSIS OF VENDOR SELECTION SYSTEMS AND DECISIONS , 1966 .
[20] L. Freeman. Centrality in social networks conceptual clarification , 1978 .
[21] Chris Cornelis,et al. Implication in intuitionistic fuzzy and interval-valued fuzzy set theory: construction, classification, application , 2004, Int. J. Approx. Reason..
[22] Charu C. Aggarwal,et al. Graph Clustering , 2010, Encyclopedia of Machine Learning and Data Mining.
[23] Salvatore J. Stolfo,et al. Using artificial anomalies to detect unknown and known network intrusions , 2003, Knowledge and Information Systems.
[24] Desney S. Tan,et al. Interactive optimization for steering machine classification , 2010, CHI.
[25] Roee Teper. On the continuity of the concave integral , 2009, Fuzzy Sets Syst..
[26] David Sánchez,et al. A semantic framework to protect the privacy of electronic health records with non-numerical attributes , 2013, J. Biomed. Informatics.
[27] Ester Yen,et al. Data mining-based intrusion detectors , 2009, Expert Syst. Appl..
[28] Christer Carlsson,et al. Fuzzy Ontology Used for Knowledge Mobilization , 2013, Int. J. Intell. Syst..
[29] Vicenç Torra,et al. Improving the characterization of P-stability for applications in network privacy , 2016, Discret. Appl. Math..
[30] Josep Domingo-Ferrer,et al. Privacy-preserving distributed statistical computation to a semi-honest multi-cloud , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).
[31] Andrea Ellero,et al. Monotonicity and Symmetry of IFPD Bayesian Confirmation Measures , 2016, MDAI.
[32] Shou-Hsuan Stephen Huang,et al. Neural networks-based detection of stepping-stone intrusion , 2010, Expert Syst. Appl..
[33] Donald F. Towsley,et al. Resisting structural re-identification in anonymized social networks , 2008, The VLDB Journal.
[34] Mohiuddin Ahmed,et al. A survey of network anomaly detection techniques , 2016, J. Netw. Comput. Appl..
[35] Mark Klein,et al. Enabling Large-Scale Deliberation Using Attention-Mediation Metrics , 2011, Computer Supported Cooperative Work (CSCW).
[36] Denis Lalanne,et al. SpiralView: Towards Security Policies Assessment through Visual Correlation of Network Resources with Evolution of Alarms , 2007, 2007 IEEE Symposium on Visual Analytics Science and Technology.
[37] Chris Almost,et al. Measures of Risk , 2012 .
[38] Branden Fitelson,et al. Likelihoodism, Bayesianism, and relational confirmation , 2007, Synthese.
[39] Martin Pitt,et al. Can the Retinal Screening Interval Be Safely Increased to 2 Years for Type 2 Diabetic Patients Without Retinopathy? , 2012, Diabetes Care.
[40] Iyad Rahwan,et al. Judgment Aggregation in Multi-Agent Argumentation , 2014, J. Log. Comput..
[41] K. Fountas,et al. Investigating brain tumor differentiation with diffusion and perfusion metrics at 3T MRI using pattern recognition techniques. , 2013, Magnetic resonance imaging.
[42] Sadaaki Miyamoto,et al. Spherical k-Means++ Clustering , 2015, MDAI.
[43] Josep Domingo-Ferrer,et al. Ordinal, Continuous and Heterogeneous k-Anonymity Through Microaggregation , 2005, Data Mining and Knowledge Discovery.
[44] François Yvon,et al. Formal Models of Analogical Proportions , 2007 .
[45] Yan Li,et al. A generalized fuzzy ID3 algorithm using generalized information entropy , 2014, Knowl. Based Syst..
[46] Ricardo Alberto Marques Pereira,et al. On a new poverty measure constructed from the exponential mean , 2015, IFSA-EUSFLAT.
[47] H. Jeffreys. Logical Foundations of Probability , 1952, Nature.
[48] Michel Verleysen,et al. Bridging Information Visualization with Machine Learning , 2015 .
[49] I. Hatono,et al. Fuzzy decision trees by fuzzy ID3 algorithm and its application to diagnosis systems , 1994, Proceedings of 1994 IEEE 3rd International Fuzzy Systems Conference.
[50] Salvatore J. Stolfo,et al. Anagram: A Content Anomaly Detector Resistant to Mimicry Attack , 2006, RAID.
[51] Peter Szolovits. Uncertainty and Decisions in Medical Informatics , 1995, Methods of Information in Medicine.
[52] Hai Thanh Nguyen,et al. Reliable Machine Learning Al- gorithms for Intrusion Detec- tion Systems , 2012 .
[53] Radko Mesiar,et al. A THEORY OF FUZZY MEASURES: INTEGRATION AND ITS ADDITIVITY , 1994 .
[54] Umberto Straccia,et al. Managing uncertainty and vagueness in description logics for the Semantic Web , 2008, J. Web Semant..
[55] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[56] David H. Glass,et al. Entailment and symmetry in confirmation measures of interestingness , 2014, Inf. Sci..
[57] Hua Xu,et al. Constrained LDA for Grouping Product Features in Opinion Mining , 2011, PAKDD.
[58] Lise Getoor,et al. Preserving the Privacy of Sensitive Relationships in Graph Data , 2007, PinKDD.
[59] Ali S. Hadi,et al. Finding Groups in Data: An Introduction to Chster Analysis , 1991 .
[60] Laurent Miclet,et al. Learning by Analogy: A Classification Rule for Binary and Nominal Data , 2007, IJCAI.
[61] Jordi Castellà-Roca,et al. Preventing automatic user profiling in Web 2.0 applications , 2012, Knowl. Based Syst..
[62] Branden Fitelson. The Plurality of Bayesian Measures of Confirmation and the Problem of Measure Sensitivity , 1999, Philosophy of Science.
[63] Gert de Cooman. Integration and Conditioning in Numerical Possibility Theory , 2004, Annals of Mathematics and Artificial Intelligence.
[64] J. Siskos. Assessing a set of additive utility functions for multicriteria decision-making , 1982 .
[65] Giovanni Vigna,et al. A Learning-Based Approach to the Detection of SQL Attacks , 2005, DIMVA.
[66] George A. Lampropoulos,et al. Automatic brain tumor detection in Magnetic Resonance Images , 2012, 2012 9th IEEE International Symposium on Biomedical Imaging (ISBI).
[67] E. Eells,et al. Symmetries and Asymmetries in Evidential Support , 2002 .
[68] Barbara Hammer,et al. How to visualize a classifier , 2012 .
[69] Nelly Gordillo,et al. State of the art survey on MRI brain tumor segmentation. , 2013, Magnetic resonance imaging.
[70] Angela Fahrni,et al. Old Wine or Warm Beer : Target-Specific Sentiment Analysis of Adjectives , .
[71] Enrique Herrera-Viedma,et al. A linguistic consensus model for Web 2.0 communities , 2013, Appl. Soft Comput..
[72] Ehud Lehrer,et al. The concave integral over large spaces , 2008, Fuzzy Sets Syst..
[73] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[74] Yuchi Kanzawa. On Kernelization for a Maximizing Model of Bezdek-Like Spherical Fuzzy c-Means Clustering , 2014, MDAI.
[75] Sadaaki Miyamoto,et al. Fuzzy Multiset Model and Methods of Nonlinear Document Clustering for Information Retrieval , 2004, MDAI.
[76] Peter Eades,et al. A Heuristic for Graph Drawing , 1984 .
[77] Henri Prade,et al. Ranking Alternatives on the Basis of Generic Constraints and Examples - A Possibilistic Approach , 2007, IJCAI.
[78] Henri Prade,et al. Handling Analogical Proportions in Classical Logic and Fuzzy Logics Settings , 2009, ECSQARU.
[79] G. Brady. Governing the Commons: The Evolution of Institutions for Collective Action , 1993 .
[80] Cameron A MacKenzie,et al. Summarizing Risk Using Risk Measures and Risk Indices , 2014, Risk analysis : an official publication of the Society for Risk Analysis.
[81] Robert Susmaga,et al. The Property of χ 201-Concordance for Bayesian Confirmation Measures , 2013 .
[82] David Sánchez,et al. Ontology-based semantic similarity: A new feature-based approach , 2012, Expert Syst. Appl..
[83] Michel Grabisch,et al. K-order Additive Discrete Fuzzy Measures and Their Representation , 1997, Fuzzy Sets Syst..
[84] Graham J. Wills,et al. Visualizing Network Data , 2009, Encyclopedia of Database Systems.
[85] Diego Calvanese,et al. The Description Logic Handbook: Theory, Implementation, and Applications , 2003, Description Logic Handbook.
[86] Vicenç Torra,et al. Reidentification and k-anonymity: a model for disclosure risk in graphs , 2012, Soft Comput..
[87] Jean-Luc Marichal,et al. An axiomatic approach of the discrete Choquet integral as a tool to aggregate interacting criteria , 2000, IEEE Trans. Fuzzy Syst..
[88] Pei-Chann Chang,et al. A CBR-based fuzzy decision tree approach for database classification , 2010, Expert Syst. Appl..
[89] Fachao Li,et al. Fuzzy ID3 Algorithm Based on Generating Hartley Measure , 2011, WISM.
[90] Radko Mesiar,et al. Hesitant L ‐Fuzzy Sets , 2017, Int. J. Intell. Syst..
[91] Heeyoul Choi,et al. Robust kernel Isomap , 2007, Pattern Recognit..
[92] Sumitra Mukherjee,et al. A Polynomial Algorithm for Optimal Univariate Microaggregation , 2003, IEEE Trans. Knowl. Data Eng..
[93] Alain Chateauneuf,et al. Modeling attitudes towards uncertainty and risk through the use of choquet integral , 1994, Ann. Oper. Res..
[94] Dewan Md. Farid,et al. Application of Machine Learning Approaches in Intrusion Detection System: A Survey , 2015 .
[95] Michael I. Jordan,et al. Latent Dirichlet Allocation , 2001, J. Mach. Learn. Res..
[96] L. Saul,et al. An Introduction to Locally Linear Embedding , 2001 .
[97] Christopher Krügel,et al. Anomaly detection of web-based attacks , 2003, CCS '03.
[98] Olivier Thonnard,et al. VisTracer: a visual analytics tool to investigate routing anomalies in traceroutes , 2012, VizSec '12.
[99] M. Yaari. The Dual Theory of Choice under Risk , 1987 .
[100] Gilles Richard,et al. Completing Preferences by Means of Analogical Proportions , 2016, MDAI.
[101] Salvatore J. Stolfo,et al. A framework for constructing features and models for intrusion detection systems , 2000, TSEC.
[102] Eva Armengol,et al. Lazy Induction of Descriptions for Relational Case-Based Learning , 2001, ECML.
[103] Barbara Hammer,et al. Discriminative Dimensionality Reduction for the Visualization of Classifiers , 2013, ICPRAM.
[104] Ran Wolff,et al. The VLDB Journal manuscript No. (will be inserted by the editor) Providing k-Anonymity in Data Mining , 2022 .
[105] Humberto Bustince,et al. A review of the relationships between implication, negation and aggregation functions from the point of view of material implication , 2016, Inf. Sci..
[106] Didier Dubois,et al. Decision-theoretic foundations of qualitative possibility theory , 2001, Eur. J. Oper. Res..
[107] Steffen Staab,et al. Ontology Learning for the Semantic Web , 2002, IEEE Intell. Syst..
[108] Desney S. Tan,et al. Performance and Preferences: Interactive Refinement of Machine Learning Procedures , 2012, AAAI.
[109] Humberto Bustince,et al. Intuitionistic Fuzzy Implication Operators - An Expression And Main Properties , 2004, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[110] Robert LIN,et al. NOTE ON FUZZY SETS , 2014 .
[111] M. S. Ali,et al. Fuzzy Expert Systems (FES) for Medical Diagnosis , 2013 .
[112] Jiannong Cao,et al. A Distributed TCAM Coprocessor Architecture for Integrated Longest Prefix Matching, Policy Filtering, and Content Filtering , 2013, IEEE Transactions on Computers.
[113] Konrad Rieck,et al. Linear-Time Computation of Similarity Measures for Sequential Data , 2008, J. Mach. Learn. Res..
[114] Jean-Luc Marichal,et al. Aggregation of interacting criteria by means of the discrete Choquet integral , 2002 .
[115] Gilles Richard,et al. From Analogical Proportion to Logical Proportions , 2013, Logica Universalis.
[116] David Atkinson,et al. Confirmation and justification. A commentary on Shogenji’s measure , 2009, Synthese.
[117] Maria L. Rizzo,et al. Brownian distance covariance , 2009, 1010.0297.
[118] Pablo M. Granitto,et al. Abrupt change detection with One-Class Time-Adaptive Support Vector Machines , 2013, Expert Syst. Appl..
[119] Gilles Richard,et al. Analogical classification: A new way to deal with examples , 2014, ECAI.
[120] Francisco Herrera,et al. Aggregation operators for linguistic weighted information , 1997, IEEE Trans. Syst. Man Cybern. Part A.
[121] Luis Martínez-López,et al. AN EXTENDED HIERARCHICAL LINGUISTIC MODEL FOR DECISION‐MAKING PROBLEMS , 2011, Comput. Intell..
[122] Christopher Krügel,et al. Anomalous system call detection , 2006, TSEC.
[123] Silvia Calegari,et al. Fuzzy Ontology, Fuzzy Description Logics and Fuzzy-OWL , 2007, WILF.
[124] David J. DeWitt,et al. Incognito: efficient full-domain K-anonymity , 2005, SIGMOD '05.
[125] R. Narasimhan. An Analytical Approach to Supplier Selection , 1983 .
[126] Ekrem Duman,et al. A cost-sensitive decision tree approach for fraud detection , 2013, Expert Syst. Appl..
[127] Rajeev Motwani,et al. Two Can Keep A Secret: A Distributed Architecture for Secure Database Services , 2005, CIDR.
[128] Amy Nicole Langville,et al. A Survey of Eigenvector Methods for Web Information Retrieval , 2005, SIAM Rev..
[129] José María Sarabia,et al. Modelling losses and locating the tail with the Pareto Positive Stable distribution , 2011 .
[130] Xizhao Wang,et al. A comparative study on heuristic algorithms for generating fuzzy decision trees , 2001, IEEE Trans. Syst. Man Cybern. Part B.
[131] Francisco Herrera,et al. Integrating three representation models in fuzzy multipurpose decision making based on fuzzy preference relations , 1998, Fuzzy Sets Syst..
[132] Shaun S. Wang. Premium Calculation by Transforming the Layer Premium Density , 1996, ASTIN Bulletin.
[133] M. Shaw,et al. Induction of fuzzy decision trees , 1995 .
[134] Saburo Muroga,et al. Binary Decision Diagrams , 2000, The VLSI Handbook.
[135] James Stephen Marron,et al. Transformations in Density Estimation , 1991 .
[136] Nan Zhang,et al. Kernel feature selection to fuse multi-spectral MRI images for brain tumor segmentation , 2011, Comput. Vis. Image Underst..
[137] William Yurcik,et al. NVisionIP: netflow visualizations of system state for security situational awareness , 2004, VizSEC/DMSEC '04.
[138] Yuchi Kanzawa,et al. Sequential Cluster Extraction Using Power-Regularized Possibilistic c-Means , 2015, J. Adv. Comput. Intell. Intell. Informatics.
[139] Wei-Yang Lin,et al. Intrusion detection by machine learning: A review , 2009, Expert Syst. Appl..
[140] Jian Pei,et al. A brief survey on anonymization techniques for privacy preserving publishing of social network data , 2008, SKDD.
[141] Duncan J. Watts,et al. Collective dynamics of ‘small-world’ networks , 1998, Nature.
[142] N. Rescher. A Theory of Evidence , 1958, Philosophy of Science.
[143] Ian H. Witten,et al. The WEKA data mining software: an update , 2009, SKDD.
[144] Mark A. Girolami,et al. Mercer kernel-based clustering in feature space , 2002, IEEE Trans. Neural Networks.
[145] Albert,et al. Emergence of scaling in random networks , 1999, Science.
[146] L. Stein,et al. Probability and the Weighing of Evidence , 1950 .
[147] Michel Grabisch,et al. Modeling attitudes towards uncertainty through the use of Sugeno integral , 2001 .
[148] Howard J. Hamilton,et al. Interestingness measures for data mining: A survey , 2006, CSUR.
[149] Philippe Lacomme,et al. Job-shop based framework for simultaneous scheduling of machines and automated guided vehicles , 2013 .
[150] Vicenç Torra,et al. Graphic sequences, distances and k-degree anonymity , 2015, Discret. Appl. Math..
[151] Kyung Mi Lee,et al. A genetic algorithm for general machine scheduling problems , 1998, 1998 Second International Conference. Knowledge-Based Intelligent Electronic Systems. Proceedings KES'98 (Cat. No.98EX111).
[152] Hajime Inoue,et al. Comparing Anomaly Detection Techniques for HTTP , 2007, RAID.
[153] Sadaaki Miyamoto,et al. Fuzzy c-means as a regularization and maximum entropy approach , 1997 .
[154] Didier Dubois,et al. Expressing Preferences from Generic Rules and Examples - A Possibilistic Approach Without Aggregation Function , 2005, ECSQARU.
[155] Ehud Lehrer,et al. A new integral for capacities , 2005 .
[156] S. H. Ghodsypour,et al. A weighted max–min model for fuzzy multi-objective supplier selection in a supply chain , 2011 .
[157] Hideo Tanaka,et al. Fuzzy integrals based on pseudo-additions and multiplications , 1988 .
[158] Chen-Ping Yu,et al. 3D blob based brain tumor detection and segmentation in MR images , 2014, 2014 IEEE 11th International Symposium on Biomedical Imaging (ISBI).
[159] Mathieu Serrurier,et al. Elicitating Sugeno Integrals: Methodology and a Case Study , 2009, ECSQARU.
[160] Vicenç Torra,et al. Modeling decisions - information fusion and aggregation operators , 2007 .
[161] Michel Verleysen,et al. Information Visualization, Visual Data Mining and Machine Learning (Dagstuhl Seminar 12081) , 2012, Dagstuhl Reports.
[162] Didier Dubois,et al. The Use of the Discrete Sugeno Integral in Decision-Making: A Survey , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[163] Gündüz Ulusoy,et al. A Time Window Approach to Simultaneous Scheduling of Machines and Material Handling System in an FMS , 1995, Oper. Res..
[164] Dimitris Kanellopoulos,et al. Handling imbalanced datasets: A review , 2006 .
[165] J. K. Lenstra,et al. Complexity of vehicle routing and scheduling problems , 1981, Networks.
[166] Yuchi Kanzawa. A Maximizing Model of Bezdek-Like Spherical Fuzzy c-Means , 2015, J. Adv. Comput. Intell. Intell. Informatics.
[167] Humberto Bustince,et al. Image thresholding using restricted equivalence functions and maximizing the measures of similarity , 2007, Fuzzy Sets Syst..
[168] Bart Goethals,et al. On Private Scalar Product Computation for Privacy-Preserving Data Mining , 2004, ICISC.
[169] Peter Eades,et al. FADE: Graph Drawing, Clustering, and Visual Abstraction , 2000, GD.
[170] Philip K. Chan,et al. Learning rules for anomaly detection of hostile network traffic , 2003, Third IEEE International Conference on Data Mining.
[171] Pierangela Samarati,et al. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .
[172] Enrique Herrera-Viedma,et al. Decision Support System for Decision Making in Changeable and Multi-Granular Fuzzy Linguistic Contexts , 2016, J. Multiple Valued Log. Soft Comput..
[173] M. Newman,et al. Finding community structure in networks using the eigenvectors of matrices. , 2006, Physical review. E, Statistical, nonlinear, and soft matter physics.
[174] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[175] Pierangela Samarati,et al. Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..
[176] Humberto Bustince,et al. Generation of linear orders for intervals by means of aggregation functions , 2013, Fuzzy Sets Syst..
[177] Christopher Krügel,et al. Stateful intrusion detection for high-speed network's , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[178] Nahla Ben Amor,et al. Possibilistic sequential decision making , 2014, Int. J. Approx. Reason..
[179] Josep Domingo-Ferrer,et al. Semantic variance: An intuitive measure for ontology accuracy evaluation , 2015, Eng. Appl. Artif. Intell..
[180] James M. Keller,et al. The possibilistic C-means algorithm: insights and recommendations , 1996, IEEE Trans. Fuzzy Syst..
[181] Ahmed Ben Hamida,et al. 3D multimodal MRI brain glioma tumor and edema segmentation: A graph cut distribution matching approach , 2015, Comput. Medical Imaging Graph..
[182] Xiaojun Tong,et al. Pan-operations structure with non-idempotent pan-addition , 2004, Fuzzy Sets Syst..
[183] Leo Guelman,et al. A decision support framework to implement optimal personalized marketing interventions , 2015, Decis. Support Syst..
[184] Olivier Strauss,et al. An interval-valued inversion of the non-additive interval-valued F-transform: Use for upsampling a signal , 2016, Fuzzy Sets Syst..
[185] Marek Gagolewski,et al. Fuzzy K-Minpen Clustering and K-nearest-minpen Classification Procedures Incorporating Generic Distance-Based Penalty Minimizers , 2016, IPMU.
[186] Matthieu Cord,et al. Quadruplet-Wise Image Similarity Learning , 2013, 2013 IEEE International Conference on Computer Vision.
[187] Jun Li,et al. Generalized Lebesgue integral , 2011, Int. J. Approx. Reason..
[188] Yukihiro Hamasuna,et al. On even-sized clustering algorithm based on optimization , 2014, 2014 Joint 7th International Conference on Soft Computing and Intelligent Systems (SCIS) and 15th International Symposium on Advanced Intelligent Systems (ISIS).
[189] Clark F. Olson,et al. Parallel Algorithms for Hierarchical Clustering , 1995, Parallel Comput..
[190] Salvatore Greco,et al. jMAF - Dominance-Based Rough Set Data Analysis Framework , 2013, Rough Sets and Intelligent Systems.
[191] Bostjan Likar,et al. A Review of Methods for Correction of Intensity Inhomogeneity in MRI , 2007, IEEE Transactions on Medical Imaging.
[192] Daniel A. Keim,et al. Large-Scale Network Monitoring for Visual Analysis of Attacks , 2008, VizSEC.
[193] Yin Jianping,et al. Detecting Distributed Denial of Service Attack Based on Address Correlation Value , 2009 .
[194] Yoram Wind,et al. The Determinants of Vendor Selection: The Evaluation Function Approach , 1968 .
[195] Leo Katz,et al. A new status index derived from sociometric analysis , 1953 .
[196] Francisco Herrera,et al. A consensus model for multiperson decision making with different preference structures , 2002, IEEE Trans. Syst. Man Cybern. Part A.
[197] John A. Czepiel. Word-of-Mouth Processes in the Diffusion of a Major Technological Innovation , 1974 .
[198] Gary M. Weiss. Data Mining in the Real World: Experiences, Challenges, and Recommendations , 2009, DMIN.
[199] Rajeev Motwani,et al. The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.
[200] Yongchuan Tang,et al. Linguistic modelling based on semantic similarity relation among linguistic labels , 2006, Fuzzy Sets Syst..
[201] Michel Grabisch,et al. A decade of application of the Choquet and Sugeno integrals in multi-criteria decision aid , 2010, Ann. Oper. Res..
[202] Fernando Ortega. Managing vagueness in ontologies , 2011 .
[203] Benjamín R. C. Bedregal,et al. On interval fuzzy S-implications , 2010, Inf. Sci..
[204] M. Cugmas,et al. On comparing partitions , 2015 .
[205] Yannis Siskos,et al. Preference disaggregation: 20 years of MCDA experience , 2001, Eur. J. Oper. Res..
[206] Eric Medvet,et al. Anomaly detection techniques for a web defacement monitoring service , 2011, Expert Syst. Appl..
[207] Wojciech Boa,et al. The new golf neighborhood for the flexible job shop problem , 2010 .
[208] Shaun S. Wang,et al. Insurance pricing and increased limits ratemaking by proportional hazards transforms , 1995 .
[209] Francisco Herrera,et al. A Historical Account of Types of Fuzzy Sets and Their Relationships , 2016, IEEE Transactions on Fuzzy Systems.
[210] W. Zachary,et al. An Information Flow Model for Conflict and Fission in Small Groups , 1977, Journal of Anthropological Research.
[211] Tsuhan Chen,et al. Malicious web content detection by machine learning , 2010, Expert Syst. Appl..
[212] Didier Dubois,et al. Qualitative Decision Theory with Sugeno Integrals , 1998, UAI.
[213] Julián Salas,et al. A data driven anonymization system for information rich online social network graphs , 2016, Expert Syst. Appl..
[214] Gözde B. Ünal,et al. Tumor-Cut: Segmentation of Brain Tumors on Contrast Enhanced MR Images for Radiosurgery Applications , 2012, IEEE Transactions on Medical Imaging.
[215] Bernhard Schölkopf,et al. Nonlinear Component Analysis as a Kernel Eigenvalue Problem , 1998, Neural Computation.
[216] Deolinda M. L. D. Rasteiro,et al. Random decision forests for automatic brain tumor segmentation on multi-modal MRI images , 2015, 2015 IEEE 4th Portuguese Meeting on Bioengineering (ENBENG).
[217] M. Sugeno,et al. Pseudo-additive measures and integrals , 1987 .
[218] Hongfei Yan,et al. Jointly Modeling Aspects and Opinions with a MaxEnt-LDA Hybrid , 2010, EMNLP.
[219] Alain Chateauneuf,et al. Some Characterizations of Lower Probabilities and Other Monotone Capacities through the use of Möbius Inversion , 1989, Classic Works of the Dempster-Shafer Theory of Belief Functions.
[220] Francisco Herrera,et al. A Fuzzy Linguistic Methodology to Deal With Unbalanced Linguistic Term Sets , 2008, IEEE Transactions on Fuzzy Systems.
[221] Barbara Hammer,et al. Using Discriminative Dimensionality Reduction to Visualize Classifiers , 2014, Neural Processing Letters.
[222] S. H. Ghodsypour,et al. The total cost of logistics in supplier selection, under conditions of multiple sourcing, multiple criteria and capacity constraint , 2001 .
[223] S. Wasserman,et al. Blockmodels: Interpretation and evaluation , 1992 .
[224] Salvatore J. Stolfo,et al. One-Class Training for Masquerade Detection , 2003 .
[225] José Luis García-Lapresta,et al. A new class of fuzzy poverty measures , 2015, IFSA-EUSFLAT.
[226] Francisco Herrera,et al. Hesitant Fuzzy Linguistic Term Sets for Decision Making , 2012, IEEE Transactions on Fuzzy Systems.
[227] Salvatore J. Stolfo,et al. A Geometric Framework for Unsupervised Anomaly Detection , 2002, Applications of Data Mining in Computer Security.
[228] James M. Keller,et al. A possibilistic approach to clustering , 1993, IEEE Trans. Fuzzy Syst..
[229] Yuchi Kanzawa. Fuzzy clustering based on α-divergence for spherical data and for categorical multivariate data , 2015, 2015 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE).
[230] Edward M. Reingold,et al. Graph drawing by force‐directed placement , 1991, Softw. Pract. Exp..
[231] Ronald R. Yager,et al. Quantifier guided aggregation using OWA operators , 1996, Int. J. Intell. Syst..
[232] Zdzisław Pawlak,et al. Can Bayesian confirmation measures be useful for rough set decision rules? , 2004, Eng. Appl. Artif. Intell..
[233] Sigrid Knust,et al. Tabu search algorithms for job-shop problems with a single transport robot , 2005, Eur. J. Oper. Res..
[234] Vijay S. Iyengar,et al. Transforming data to satisfy privacy constraints , 2002, KDD.
[235] Marek Gagolewski,et al. Genie: A new, fast, and outlier-resistant hierarchical clustering algorithm , 2016, Inf. Sci..
[236] Christopher Krügel,et al. Automatic Network Protocol Analysis , 2008, NDSS.
[237] So Young Sohn,et al. Random effects logistic regression model for anomaly detection , 2007, Expert Syst. Appl..
[238] T. Krueger,et al. An Architecture for Inline Anomaly Detection , 2008, 2008 European Conference on Computer Network Defense.
[239] H. Prade,et al. A Choquet Integral Representation in Multicriteria Decision Making , 2002 .
[240] Dominique Brodbeck,et al. A Visual Approach for Monitoring Logs , 1998, LISA.
[241] Konrad Rieck,et al. Language models for detection of unknown attacks in network traffic , 2006, Journal in Computer Virology.
[242] Endre Pap,et al. Non-additive measures and integrals , 2006 .
[243] Ronald R. Yager,et al. On ordered weighted averaging aggregation operators in multicriteria decisionmaking , 1988, IEEE Trans. Syst. Man Cybern..
[244] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[245] Humberto Bustince,et al. A class of aggregation functions encompassing two-dimensional OWA operators , 2010, Inf. Sci..
[246] David Sánchez,et al. Semantic Noise: Privacy-Protection of Nominal Microdata through Uncorrelated Noise Addition , 2015, 2015 IEEE 27th International Conference on Tools with Artificial Intelligence (ICTAI).
[247] Inderjit S. Dhillon,et al. Concept Decompositions for Large Sparse Text Data Using Clustering , 2004, Machine Learning.
[248] Radko Mesiar,et al. Pseudo-arithmetical operations as a basis for the general measure and integration theory , 2004, Inf. Sci..
[249] Yuchi Kanzawa. On Possibilistic Clustering Methods Based on Shannon/Tsallis-Entropy for Spherical Data and Categorical Multivariate Data , 2015, MDAI.
[250] Eyke Hüllermeier,et al. Preference Learning (Dagstuhl Seminar 14101) , 2014, Dagstuhl Reports.
[251] F. R. Pitts. A GRAPH THEORETIC APPROACH TO HISTORICAL GEOGRAPHY , 1965 .
[252] Roberto Festa,et al. Towards a Grammar of Bayesian Confirmation , 2009 .
[253] J. Shaw,et al. Global estimates of the prevalence of diabetes for 2010 and 2030. , 2010, Diabetes research and clinical practice.
[254] Gilles Richard,et al. Reasoning with Logical Proportions , 2010, KR.
[255] Xindong Wu,et al. 10 Challenging Problems in Data Mining Research , 2006, Int. J. Inf. Technol. Decis. Mak..
[256] Feyzan Arikan,et al. A fuzzy solution approach for multi objective supplier selection , 2013, Expert Syst. Appl..
[257] Weijun Xia,et al. Supplier selection with multiple criteria in volume discount environments , 2007 .
[258] Ratul Mahajan,et al. CueT: human-guided fast and accurate network alarm triage , 2011, CHI.
[259] Michel Ménard,et al. Possibilistic and probabilistic fuzzy clustering: unification within the framework of the non-extensive thermostatistics , 2003, Pattern Recognit..
[260] S. Bodjanova. Fuzzy Sets and Fuzzy Partitions , 1993 .
[261] Sean Chester,et al. Complexity of social network anonymization , 2012, Social Network Analysis and Mining.
[262] László Szilágyi,et al. Automatic Brain Tumor Segmentation in Multispectral MRI Volumetric Records , 2015, ICONIP.
[263] Salvatore Greco,et al. Ordinal regression revisited: Multiple criteria ranking using a set of additive value functions , 2008, Eur. J. Oper. Res..
[264] Alina Campan,et al. A Clustering Approach for Data and Structural Anonymity in Social Networks , 2008 .
[265] Cai Zhi-ping. Research on the Technology of Quantitative Security Evaluation Based on Fuzzy Number Arithmetic Operations , 2004 .
[266] Jian Pei,et al. Preserving Privacy in Social Networks Against Neighborhood Attacks , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[267] Shahram Sarkani,et al. A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier , 2012, Expert Syst. Appl..
[268] Karl Friedrich Siburg,et al. Symmetry of functions and exchangeability of random variables , 2011 .
[269] Eva Armengol. Building Partial Domain Theories from Explanations , 2008, Künstliche Intell..
[270] Bennett A. Landman,et al. Out-of-atlas labeling: A multi-atlas approach to cancer segmentation , 2012, 2012 9th IEEE International Symposium on Biomedical Imaging (ISBI).
[271] E. Pap. Null-Additive Set Functions , 1995 .
[272] Zeshui Xu,et al. An outranking sorting method for multi-criteria group decision making using intuitionistic fuzzy sets , 2016, Inf. Sci..
[273] Orestis Tsigkas,et al. Visual spam campaigns analysis using abstract graphs representation , 2012, VizSec '12.
[274] H. Leavitt. Some effects of certain communication patterns on group performance. , 1951, Journal of abnormal psychology.
[275] Xiaowei Xu,et al. Multi-criteria decision making approaches for supplier evaluation and selection: A literature review , 2010, Eur. J. Oper. Res..
[276] David Maxwell Chickering,et al. ModelTracker: Redesigning Performance Analysis Tools for Machine Learning , 2015, CHI.
[277] J. MacQueen. Some methods for classification and analysis of multivariate observations , 1967 .
[278] Petr Ekel,et al. A flexible consensus scheme for multicriteria group decision making under linguistic assessments , 2010, Inf. Sci..
[279] Alina Campan,et al. Data and Structural k-Anonymity in Social Networks , 2009, PinKDD.
[280] Enrique Herrera-Viedma,et al. Fuzzy decision making and consensus: Challenges , 2015, J. Intell. Fuzzy Syst..
[281] Jianwu Dang,et al. Fuzzy Rough Decision Trees , 2014, Fundam. Informaticae.
[282] Yunghsiang Sam Han,et al. Privacy-Preserving Multivariate Statistical Analysis: Linear Regression and Classification , 2004, SDM.
[283] Taghi M. Khoshgoftaar,et al. Intrusion detection and Big Heterogeneous Data: a Survey , 2015, Journal of Big Data.
[284] Tiago P. Peixoto. Hierarchical block structures and high-resolution model selection in large networks , 2013, ArXiv.
[285] Pei-Chann Chang,et al. A hybrid model combining case-based reasoning and fuzzy decision tree for medical data classification , 2011, Appl. Soft Comput..
[286] G. Klir,et al. Generalized Measure Theory , 2008 .
[287] Núria Agell,et al. Modeling group assessments by means of hesitant fuzzy linguistic term sets , 2017, J. Appl. Log..
[288] Marie-Ange Manier,et al. A genetic algorithm with tabu search procedure for flexible job shop scheduling with transportation constraints and bounded processing times , 2012, Comput. Oper. Res..
[289] Hans-Peter Kriegel,et al. A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.
[290] Khaled Ghédira,et al. Optimizing Robot Movements in Flexible Job Shop Environment by Metaheuristics Based on Clustered Holonic Multiagent Model , 2016, MDAI.
[291] Navneet Gupta. Privacy and Security in the Cloud , 2014 .
[292] José Luis García-Lapresta,et al. Classical inequality indices, welfare and illfare functions, and the dual decomposition , 2013, Fuzzy Sets Syst..
[293] Ron Kohavi,et al. Lazy Decision Trees , 1996, AAAI/IAAI, Vol. 1.
[294] Andreas Tsanakas,et al. Measurement and Pricing of Risk in Insurance Markets , 2005, Risk Analysis.
[295] W. Torgerson. Multidimensional scaling: I. Theory and method , 1952 .
[296] Alina Campan,et al. Preservation of structural properties in anonymized social networks , 2012, 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom).
[297] Francisco Herrera,et al. A Sequential Selection Process in Group Decision Making with a Linguistic Assessment Approach , 1995, Inf. Sci..
[298] Elisa Bertino,et al. Efficient k -Anonymization Using Clustering Techniques , 2007, DASFAA.
[299] Pedro Romero-Aroca,et al. Changes observed in diabetic retinopathy: eight-year follow-up of a Spanish population , 2016, British Journal of Ophthalmology.
[300] Hae-Sang Park,et al. A simple and fast algorithm for K-medoids clustering , 2009, Expert Syst. Appl..
[301] Josep Domingo-Ferrer,et al. Anonymization of nominal data based on semantic marginality , 2013, Inf. Sci..
[302] E. Stefánsson,et al. Biennial eye screening in patients with diabetes without retinopathy: 10-year experience , 2007, British Journal of Ophthalmology.
[303] S. C. Johnson. Hierarchical clustering schemes , 1967, Psychometrika.
[304] Ravi Ranjan,et al. A New Clustering Approach for Anomaly Intrusion Detection , 2014, ArXiv.
[305] Chris Clifton,et al. Tools for privacy preserving distributed data mining , 2002, SKDD.
[306] Brian B. Avants,et al. Optimal Symmetric Multimodal Templates and Concatenated Random Forests for Supervised Brain Tumor Segmentation (Simplified) with ANTsR , 2014, Neuroinformatics.
[307] Satoru Kawai,et al. An Algorithm for Drawing General Undirected Graphs , 1989, Inf. Process. Lett..
[308] Gilles Richard,et al. Multiple-valued extensions of analogical proportions , 2016, Fuzzy Sets Syst..
[309] Gregory Piatetsky-Shapiro,et al. Discovery, Analysis, and Presentation of Strong Rules , 1991, Knowledge Discovery in Databases.
[310] Jerome P. Reiter,et al. Privacy-Preserving Analysis of Vertically Partitioned Data Using Secure Matrix Products , 2009 .
[311] Mohamed F. Hassan,et al. A hybrid GA/heuristic approach to the simultaneous scheduling of machines and automated guided vehicles , 2004 .
[312] Mark E. J. Newman,et al. Stochastic blockmodels and community structure in networks , 2010, Physical review. E, Statistical, nonlinear, and soft matter physics.
[313] Konrad Rieck,et al. Detecting Unknown Network Attacks Using Language Models , 2006, DIMVA.
[314] Salvatore Greco,et al. Properties of rule interestingness measures and alternative approaches to normalization of measures , 2012, Inf. Sci..
[315] Cristina Pérez-Solà,et al. The Bitcoin P2P Network , 2014, Financial Cryptography Workshops.
[316] Philip S. Yu,et al. Anonymizing Classification Data for Privacy Preservation , 2007, IEEE Transactions on Knowledge and Data Engineering.
[317] Zeshui Xu,et al. Some geometric aggregation operators based on intuitionistic fuzzy sets , 2006, Int. J. Gen. Syst..
[318] Karl Aberer,et al. A Cloud-Based eHealth Architecture for Privacy Preserving Data Integration , 2015, SEC.
[319] Humberto Bustince,et al. A New Approach to Interval-Valued Choquet Integrals and the Problem of Ordering in Interval-Valued Fuzzy Set Applications , 2013, IEEE Transactions on Fuzzy Systems.
[320] Anna Kolesárová,et al. Aggregation-based extensions of fuzzy measures , 2012, Fuzzy Sets Syst..
[321] Heng Tao Shen,et al. Principal Component Analysis , 2009, Encyclopedia of Biometrics.
[322] Dongjoon Kong,et al. A differentiated one-class classification method with applications to intrusion detection , 2012, Expert Syst. Appl..
[323] Carlos García Garino,et al. An autonomous labeling approach to support vector machines algorithms for network traffic anomaly detection , 2012, Expert Syst. Appl..
[324] J. Kruskal. Multidimensional scaling by optimizing goodness of fit to a nonmetric hypothesis , 1964 .
[325] Michel Grabisch,et al. A review of methods for capacity identification in Choquet integral based multi-attribute utility theory: Applications of the Kappalab R package , 2008, Eur. J. Oper. Res..
[326] R. Mesiar. Choquet-like Integrals , 1995 .
[327] Li Zhang,et al. An adaptive ensemble classifier for mining concept drifting data streams , 2013, Expert Syst. Appl..
[328] Humberto Bustince,et al. Relationship between restricted dissimilarity functions, restricted equivalence functions and normal EN-functions: Image thresholding invariant , 2008, Pattern Recognit. Lett..
[329] Yukihiro Hamasuna,et al. On Various Types of Even-Sized Clustering Based on Optimization , 2016, MDAI.
[330] Xiaoping Fan,et al. MVSec: multi-perspective and deductive visual analytics on heterogeneous network security data , 2014, J. Vis..
[331] อนิรุธ สืบสิงห์,et al. Data Mining Practical Machine Learning Tools and Techniques , 2014 .
[332] Slava Kisilevich,et al. A GIS-based decision support system for hotel room rate estimation and temporal price prediction: The hotel brokers' context , 2013, Decis. Support Syst..
[333] Sadaaki Miyamoto,et al. Algorithms of nonlinear document clustering based on fuzzy multiset model , 2008, Int. J. Intell. Syst..
[334] 菅野 道夫,et al. Theory of fuzzy integrals and its applications , 1975 .
[335] Larry L. Peterson,et al. binpac: a yacc for writing application protocol parsers , 2006, IMC '06.
[336] V. Rao Vemuri,et al. Using Text Categorization Techniques for Intrusion Detection , 2002, USENIX Security Symposium.
[337] Eva Armengol,et al. Relational Case-based Reasoning for Carcinogenic Activity Prediction , 2003, Artificial Intelligence Review.
[338] Konrad Rieck,et al. Machine learning for application layer intrusion detection , 2011 .
[339] Elena N. Zaitseva,et al. Usage of New Information Estimations for Induction of Fuzzy Decision Trees , 2002, IDEAL.
[340] M. Sugeno,et al. Fuzzy Measures and Integrals: Theory and Applications , 2000 .
[341] Martin Grötschel,et al. Mathematical Programming The State of the Art, XIth International Symposium on Mathematical Programming, Bonn, Germany, August 23-27, 1982 , 1983, ISMP.
[342] Xindong Wu,et al. Efficient mining of both positive and negative association rules , 2004, TOIS.
[343] Francisco Chiclana,et al. Accuracy and complexity evaluation of defuzzification strategies for the discretised interval type-2 fuzzy set , 2013, Int. J. Approx. Reason..
[344] Roberto J. Bayardo,et al. Data privacy through optimal k-anonymization , 2005, 21st International Conference on Data Engineering (ICDE'05).
[345] Sushil Jajodia,et al. Selective data outsourcing for enforcing privacy , 2011, J. Comput. Secur..
[346] José María Sarabia,et al. Simple risk measure calculations for sums of positive random variables , 2013 .
[347] Humberto Bustince,et al. Automorphisms, negations and implication operators , 2003, Fuzzy Sets Syst..
[348] Humberto Bustince,et al. Restricted equivalence functions , 2006, Fuzzy Sets Syst..
[349] Gleb Beliakov,et al. Aggregation Functions: A Guide for Practitioners , 2007, Studies in Fuzziness and Soft Computing.
[350] Lilly Suriani Affendey,et al. Intrusion detection using data mining techniques , 2010, 2010 International Conference on Information Retrieval & Knowledge Management (CAMP).
[351] Josep Domingo-Ferrer,et al. Practical Data-Oriented Microaggregation for Statistical Disclosure Control , 2002, IEEE Trans. Knowl. Data Eng..
[352] Robert Susmaga,et al. Can interestingness measures be usefully visualized? , 2015, Int. J. Appl. Math. Comput. Sci..
[353] Ludmil Mikhailov,et al. An interpretable fuzzy rule-based classification methodology for medical diagnosis , 2009, Artif. Intell. Medicine.
[354] Amit Kumar Dewangan,et al. An Ensemble Model for Classification of Attacks with Feature Selection based on KDD99 and NSL-KDD Data Set , 2014 .
[355] R. Mooney,et al. Impact of Similarity Measures on Web-page Clustering , 2000 .
[356] Ramón López de Mántaras,et al. A distance-based attribute selection measure for decision tree induction , 1991, Machine Learning.
[357] N. Shilkret. Maxitive measure and integration , 1971 .
[358] Helen J. Wang,et al. Generic Application-Level Protocol Analyzer and its Language , 2007, NDSS.
[359] K. Liu,et al. Towards identity anonymization on graphs , 2008, SIGMOD Conference.
[360] Ning Zhang,et al. Inducting Fuzzy Decision Tree Based on Discrete Attributes through Uncertainty Reduction , 2013 .
[361] Tomoji Shogenji. The degree of epistemic justification and the conjunction fallacy , 2009, Synthese.