


default search action
IJCRS 2023: Krakow, Poland
- Andrea Campagner, Oliver Urs Lenz, Shuyin Xia, Dominik Slezak
, Jaroslaw Was
, JingTao Yao:
Rough Sets - International Joint Conference, IJCRS 2023, Krakow, Poland, October 5-8, 2023, Proceedings. Lecture Notes in Computer Science 14481, Springer 2023, ISBN 978-3-031-50958-2
Rough Set Models
- Malgorzata Przybyla-Kasperek
, Rafal Deja
, Alicja Wakulicz-Deja
:
Selected Approaches to Conflict Analysis Inspired by the Pawlak Model - Case Study. 3-17 - Beata Zielosko
, Evans Teiko Tetteh
, Diana Hunchak:
Multi-heuristic Induction of Decision Rules. 18-30 - Jianfeng Xu, Duoqian Miao, Li Zhang, Yiyu Yao
:
Algebraic Formulations and Geometric Interpretations of Decision-Theoretic Rough Sets. 31-45 - Piotr Wasilewski
, Janusz Kacprzyk
, Slawomir Zadrozny
:
Reduction of Binary Attributes: Rough Set Theory Versus Formal Concept Analysis. 46-61 - Chengzhi Shi, Taihua Xu, Fuhao Cheng, Xibei Yang, Jianjun Chen:
An Acceleration Method for Attribute Reduction Based on Attribute Synthesis. 62-74 - Yan Liu, Jingjing Song, Taihua Xu, Jianjun Chen:
Attribute Reduction Based on the Multi-annulus Model. 75-86
Foundations
- Azimkhon Ostonov
, Mikhail Moshkov
:
Deterministic and Nondeterministic Decision Trees for Decision Tables with Many-Valued Decisions from Closed Classes. 89-104 - Bidhan Saha, Mohua Banerjee, Soma Dutta:
Paraconsistent Logics: A Survey Focussing on the Rough Set Approach. 105-121 - Stefania Boffa
, Davide Ciucci
:
Hexagons of Opposition in Linguistic Three-Way Decisions. 122-136 - A. Mani
:
Algebraic Models for Qualified Aggregation in General Rough Sets, and Reasoning Bias Discovery. 137-153 - Prosenjit Howlader, Churn-Jung Liau:
Two-Sorted Modal Logic for Formal and Rough Concepts. 154-169 - Michinori Nakata, Norio Saito, Hiroshi Sakai, Takeshi Fujiwara:
Kryszkiewicz's Relation for Indiscernibility of Objects in Data Tables Containing Missing Values. 170-184 - A. Mani
:
Algebraic, Topological, and Mereological Foundations of Existential Granules. 185-200 - Stefania Boffa
, Andrea Campagner, Davide Ciucci
, Yiyu Yao:
Aggregation Operators on Shadowed Sets Deriving from Conditional Events and Consensus Operators. 201-215 - Salvatore Greco, Roman Slowinski:
Pawlak, Belnap and the Magical Number Seven. 216-228
Three-way Decisions
- Shuting Liu, Mengjun Hu
, Zhifei Zhang, Guangming Lang:
Three-Way Conflict Analysis for Three-Valued Situation Tables with Rankings and Reference Tuples. 231-245 - Yingxiao Chen
, Yiyu Yao, Ping Zhu:
Three-Way Social Network Analysis: Triadic Measures at Three Levels. 246-258 - Yiyu Yao
, JingTao Yao
:
Cognitive and Social Decision Making: Three-Way Decision Perspectives. 259-269 - Chengmei Lin, Qimei Xiao, Huiying Yu, Guangming Lang:
New Models of Three-Way Conflict Analysis for Incomplete Situation Tables. 270-282 - Xin Yang, Yanhua Li, Shuyin Xia, Xiaoyu Lian, Guoyin Wang, Tianrui Li:
Granular-Ball Three-Way Decision. 283-295
Granular Models
- Jie Chen, Hainan Hu, Shu Zhao, Yanping Zhang:
Unsupervised KeyPhrase Extraction Based on Multi-granular Semantics Feature Fusion. 299-310 - Ziye Wang
, Duoqian Miao
:
Multi-granularity Feature Fusion for Transformer-Based Single Object Tracking. 311-323 - Zongqiang Wang, Yan Xian, Guoyin Wang, Hong Yu:
A Multi-granularity Network for Time Series Forecasting on Multivariate Time Series Data. 324-338 - Daitianxia Li, Ye Wang
, Qun Liu:
Adaptive Multi-granularity Aggregation Transformer for Image Captioning. 339-353 - Yuan Li, Li Liu, Penggang Chen, Youmin Zhang, Guoyin Wang:
A Causal Disentangled Multi-granularity Graph Classification Method. 354-368
Distances and Similarities
- Marek Grzegorowski
, Andrzej Janusz
, Grzegorz Sliwa, Lukasz Marcinowski, Andrzej Skowron
:
Towards ML Explainability with Rough Sets, Clustering, and Dimensionality Reduction. 371-386 - Agnieszka Nowak-Brzezinska
, Igor Gaibei
:
Decision Rule Clustering - Comparison of the Algorithms. 387-401 - Oliver Urs Lenz
, Chris Cornelis
:
Classifying Token Frequencies Using Angular Minkowski p-Distance. 402-413 - Grzegorz Góra, Andrzej Skowron:
On kNN Class Weights for Optimising G-Mean and F1-Score. 414-430 - Tomasz Hachaj
, Marcin Piekarczyk
, Jaroslaw Was
:
Searching of Potentially Anomalous Signals in Cosmic-Ray Particle Tracks Images Using Rough k-Means Clustering Combined with Eigendecomposition-Derived Embedding. 431-445
Hybrid Approaches
- Tong-Jun Li, Yi-Qian Wang:
Crisp-Fuzzy Concept Lattice Based on Interval-Valued Fuzzy Sets. 449-462 - Yanhua Li, Jiafen Liu, Yihua Zhong, Xin Yang:
Normal Fuzzy Three-Way Decision Based on Prospect Theory. 463-478 - Daniel Kaluza
, Andrzej Janusz
, Dominik Slezak
:
On Several New Dempster-Shafer-Inspired Uncertainty Measures Applicable for Active Learning. 479-494 - Gaël Nguepy Dongmo
, Blaise Blériot Koguep Njionou
, Léonard Kwuida
, Mathias Onabid
:
Rough Fuzzy Concept Analysis via Multilattice. 495-508
Applications
- Adam Wasilewski
, Mateusz Przyborowski
:
Clustering Methods for Adaptive e-Commerce User Interfaces. 511-525 - Jan G. Bazan, Pawel Milan, Stanislawa Bazan-Socha, Krzysztof Wójcik:
Application of Federated Learning to Prediction of Patient Mortality in Vasculitis Disease. 526-536 - Qiuyu Mei, Hong Yu, Guoyin Wang:
A Novel Hybrid Wind Speed Interval Prediction Model Using Rough Stacked Autoencoder and LSTM. 537-548 - Aleksandra Szpakowska
, Piotr Artiemjew
, Wojciech Cybowski
:
Navigational Strategies for Mobile Robots Using Rough Mereological Potential Fields and Weighted Distance to Goal. 549-564 - Shengdan Hu, Zhifei Zhang, Jiemin Yang:
Handling Intra-class Dissimilarity and Inter-class Similarity for Imbalanced Skin Lesion Image Classification. 565-579 - Renjuan Nie, Guoyin Wang, Qun Liu, Chengxin Peng:
Link Prediction for Attribute and Structure Learning Based on Attention Mechanism. 580-595
Cybersecurity and IoT
- Marcin Michalak
, Piotr Biczyk
, Blazej Adamczyk
, Maksym Brzeczek, Marek Hermansa
, Iwona Kostorz
, Lukasz Wawrowski
, Michal Czerwinski:
A New Data Model for Behavioral Based Anomaly Detection in IoT Device Monitoring. 599-611 - Mahdee Jodayree
, Wenbo He, Ryszard Janicki:
Preventing Text Data Poisoning Attacks in Federated Machine Learning by an Encrypted Verification Key. 612-626 - Czeslaw Horyn
, Agnieszka Nowak-Brzezinska
:
Improving Detection Efficiency: Optimizing Block Size in the Local Outlier Factor (LOF) Algorithm. 627-641

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.