default search action
Yu-Chuan Tsai
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c21]Tzung-Pei Hong, Da Chen, Wei-Ming Huang, Yu-Chuan Tsai:
Mining Erasable Itemsets from a Product Database with Quantitative Components. MISNC 2024: 62-66 - 2023
- [c20]Tzung-Pei Hong, Jia-Xiang Li, Yu-Chuan Tsai, Wei-Ming Huang:
Tree-Based Unified Temporal Erasable-Itemset Mining. ACIIDS (1) 2023: 224-233 - [c19]Tzung-Pei Hong, Wei-Teng Hung, Yu-Chuan Tsai, Wei-Ming Huang:
Using the Pre-Large Concept for Maintaining High Fuzzy Utility Itemsets. FUZZ 2023: 1-5 - [c18]Tzung-Pei Hong, Meng-Ping Ku, Yu-Chuan Tsai, Wei-Ming Huang, Shu-Min Li:
Trade-off Between Execution Time and Memory Consumption in Fuzzy Average-Utility Mining. iCAST 2023: 301-305 - [c17]Tzung-Pei Hong, Wei-Teng Hung, Yu-Chuan Tsai, Wei-Ming Huang:
Maintenance of High Fuzzy Utility Itemsets Using the Pre-Large-Itemset Concept and Tree Structure. MISNC 2023: 118-123 - 2022
- [c16]Tzung-Pei Hong, Wei-Teng Hung, Wei-Ming Huang, Yu-Chuan Tsai:
Incremental Fuzzy Utility Mining with Tree Structure. IEEE Big Data 2022: 6202-6206 - [c15]Tzung-Pei Hong, Jia-Xiang Li, Yu-Chuan Tsai, Wei-Ming Huang:
Unified Temporal Erasable Itemset Mining with a Lower-Bound Strategy. IEEE Big Data 2022: 6207-6211 - [c14]Tzung-Pei Hong, Wei-Teng Hung, Wei-Ming Huang, Yu-Chuan Tsai:
Incremental High Fuzzy Utility Itemset Mining. MISNC 2022: 66-69 - 2021
- [c13]Tzung-Pei Hong, Hao Chang, Shu-Min Li, Yu-Chuan Tsai:
A Dedicated Temporal Erasable-Itemset Mining Algorithm. ISDA 2021: 977-985 - [c12]Tzung-Pei Hong, Hao Chang, Shu-Min Li, Yu-Chuan Tsai:
A Unified Temporal Erasable Itemset Mining Approach. TAAI 2021: 194-198 - 2020
- [j7]Yu-Chuan Tsai, Shyue-Liang Wang, I-Hsien Ting, Tzung-Pei Hong:
Flexible sensitive K-anonymization on transactions. World Wide Web 23(4): 2391-2406 (2020)
2010 – 2019
- 2018
- [c11]Yu-Chuan Tsai, Shyue-Liang Wang, I-Hsien Ting, Tzung-Pei Hong:
Flexible Anonymization of Transactions with Sensitive Items. BESC 2018: 201-206 - 2017
- [j6]Shyue-Liang Wang, Min-Jye Hsiu, Yu-Chuan Tsai, I-Hsien Ting, Tzung-Pei Hong:
Analysis of privacy and utility tradeoffs in anonymized mobile context streams. Intell. Data Anal. 21(S1): S21-S39 (2017) - [j5]Shyue-Liang Wang, Yu-Chuan Tsai, Tzung-Pei Hong, Hung-Yu Kao:
k--anonymization of multiple shortest paths. Soft Comput. 21(15): 4215-4226 (2017) - 2016
- [c10]Yu-Chuan Tsai, Shyue-Liang Wang, Cheng-Yu Song, I-Hsien Ting:
Privacy and Utility Effects of k-anonymity on Association Rule Hiding. MISNC 2016: 42 - 2015
- [j4]Yu-Chuan Tsai, Shyue-Liang Wang, Hung-Yu Kao, Tzung-Pei Hong:
Edge types vs privacy in K-anonymization of shortest paths. Appl. Soft Comput. 31: 348-359 (2015) - [c9]Yu-Chuan Tsai, Shyue-Liang Wang, Tzung-Pei Hong, Hung-Yu Kao:
Extending [K 1 , K 2 ] Anonymization of Shortest Paths for Social Networks. MISNC 2015: 187-199 - 2014
- [j3]Shyue-Liang Wang, Yu-Chuan Tsai, Hung-Yu Kao, Tzung-Pei Hong:
On anonymizing transactions with sensitive items. Appl. Intell. 41(4): 1043-1058 (2014) - [j2]Yang-Jui Chang, Yu-Chuan Tsai, Hung-Yu Kao:
Bipartite Editing Prediction in Wikipedia. J. Inf. Sci. Eng. 30(3): 587-603 (2014) - [c8]Yu-Chuan Tsai, Shyue-Liang Wang, Tzung-Pei Hong, Hung-Yu Kao:
[K1, K2]-anonymization of Shortest Paths. MoMM 2014: 317-321 - 2013
- [j1]Shyue-Liang Wang, Yu-Chuan Tsai, Hung-Yu Kao, I-Hsien Ting, Tzung-Pei Hong:
Shortest Paths Anonymization on Weighted Graphs. Int. J. Softw. Eng. Knowl. Eng. 23(1): 65-80 (2013) - 2012
- [c7]Yu-Chuan Tsai, Shyue-Liang Wang, Hung-Yu Kao, Tzung-Pei Hong:
Confining Edge Types in K-anonymization of Shortest Paths. IBICA 2012: 318-322 - 2011
- [c6]Shyue-Liang Wang, Yu-Chuan Tsai, Hung-Yu Kao, Tzung-Pei Hong:
K-anonymity on sensitive transaction items. GrC 2011: 723-727 - [c5]Shyue-Liang Wang, Zheng-Ze Tsai, Tzung-Pei Hong, I-Hsien Ting, Yu-Chuan Tsai:
Anonymizing Multiple K-anonymous Shortest Paths for Social Graphs. IBICA 2011: 195-198 - 2010
- [c4]Shyue-Liang Wang, Tzung-Pei Hong, Yu-Chuan Tsai, Hung-Yu Kao:
Hiding Sensitive Association Rules on Stars. GrC 2010: 505-508 - [c3]Shyue-Liang Wang, Yu-Chuan Tsai, Hung-Yu Kao, Tzung-Pei Hong:
Anonymizing Set-Valued Social Data. GreenCom/CPSCom 2010: 809-812 - [c2]Shyue-Liang Wang, Tzung-Pei Hong, Yu-Chuan Tsai, Hung-Yu Kao:
Multi-table association rules hiding. ISDA 2010: 1298-1302
2000 – 2009
- 2008
- [c1]Hung-Yu Kao, Chia-Sheng Liu, Yu-Chuan Tsai, Chia Chun Shih, Tse-Ming Tsai:
DRANK+: A Directory Based Pagerank Prediction Method for Fast Pagerank Convergence. WEBIST (2) 2008: 175-180
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 20:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint