default search action
Kevin Chiew
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c18]Zhenguang Liu, Sihao Hu, Yifang Yin, Jianhai Chen, Kevin Chiew, Luming Zhang, Zetian Wu:
Interactive Rare-Category-of-Interest Mining from Large Datasets. AAAI 2020: 4965-4972
2010 – 2019
- 2018
- [j18]Haiqin Weng, Kevin Chiew, Zhenguang Liu, Qinming He, Roger Zimmermann:
Rare category exploration with noisy labels. Expert Syst. Appl. 114: 503-515 (2018) - [j17]Lianhang Ma, Kevin Chiew, Hao Huang, Qinming He:
Evaluation of local community metrics: from an experimental perspective. J. Intell. Inf. Syst. 51(1): 1-22 (2018) - 2017
- [j16]Jianhai Chen, Qinming He, Deshi Ye, Wenzhi Chen, Yang Xiang, Kevin Chiew, Liangwei Zhu:
Joint affinity aware grouping and virtual machine placement. Microprocess. Microsystems 52: 365-380 (2017) - 2016
- [j15]Zhenguang Liu, Kevin Chiew, Luming Zhang, Beibei Zhang, Qinming He, Roger Zimmermann:
Rare category exploration via wavelet analysis: Theory and applications. Expert Syst. Appl. 63: 173-186 (2016) - [j14]Qingyang Hu, Qinming He, Hao Huang, Kevin Chiew, Zhenguang Liu:
A formalized framework for incorporating expert labels in crowdsourcing environment. J. Intell. Inf. Syst. 47(3): 403-425 (2016) - 2015
- [j13]Yanzhe Che, Qinming He, Xiaoyan Hong, Kevin Chiew:
X-Region: A framework for location privacy preservation in mobile peer-to-peer networks. Int. J. Commun. Syst. 28(1): 167-186 (2015) - [c17]Zhenguang Liu, Hao Huang, Qinming He, Kevin Chiew, Yunjun Gao:
Rare Category Exploration on Linear Time Complexity. DASFAA (2) 2015: 37-54 - [c16]Haiqin Weng, Zhenguang Liu, Kevin Chiew, Qinming He:
Rare Category Detection Forest. KSEM 2015: 612-618 - 2014
- [j12]Hao Huang, Kevin Chiew, Yunjun Gao, Qinming He, Qing Li:
Rare category exploration. Expert Syst. Appl. 41(9): 4197-4210 (2014) - [j11]Hao Huang, Yunjun Gao, Kevin Chiew, Qinming He, Baihua Zheng:
Unsupervised analysis of top-k core members in poly-relational networks. Expert Syst. Appl. 41(13): 5689-5701 (2014) - [j10]Zhenguang Liu, Kevin Chiew, Qinming He, Hao Huang, Butian Huang:
Prior-free rare category detection: More effective and efficient solutions. Expert Syst. Appl. 41(17): 7691-7706 (2014) - [j9]Feng Qian, Kevin Chiew, Qinming He, Hao Huang:
Mining regional co-location patterns with kNNG. J. Intell. Inf. Syst. 42(3): 485-505 (2014) - [j8]Lianhang Ma, Hao Huang, Qinming He, Kevin Chiew, Zhenguang Liu:
Toward seed-insensitive solutions to local community detection. J. Intell. Inf. Syst. 43(1): 183-203 (2014) - [c15]Hao Huang, Yunjun Gao, Kevin Chiew, Lei Chen, Qinming He:
Towards effective and efficient mining of arbitrary shaped clusters. ICDE 2014: 28-39 - [c14]Qingyang Hu, Qinming He, Hao Huang, Kevin Chiew, Zhenguang Liu:
Learning from Crowds under Experts' Supervision. PAKDD (1) 2014: 200-211 - [c13]Zhenguang Liu, Hao Huang, Qinming He, Kevin Chiew, Lianhang Ma:
Rare Category Detection on O(dN) Time Complexity. PAKDD (2) 2014: 498-509 - [c12]Qingyang Hu, Kevin Chiew, Hao Huang, Qinming He:
Recovering Missing Labels of Crowdsourcing Workers. SDM 2014: 857-865 - [p2]Kevin Chiew, Yingjiu Li, Congfu Xu:
On RFID False Authentications. Big Data and Internet of Things 2014: 91-110 - 2013
- [j7]Yanzhe Che, Kevin Chiew, Xiaoyan Hong, Qiang Yang, Qinming He:
EDA: an enhanced dual-active algorithm for location privacy preservation inmobile P2P networks. J. Zhejiang Univ. Sci. C 14(5): 356-373 (2013) - [j6]Hao Huang, Qinming He, Kevin Chiew, Feng Qian, Lianhang Ma:
CLOVER: a faster prior-free approach to rare-category detection. Knowl. Inf. Syst. 35(3): 713-736 (2013) - [c11]Jianhai Chen, Kevin Chiew, Deshi Ye, Liangwei Zhu, Wenzhi Chen:
AAGA: Affinity-Aware Grouping for Allocation of Virtual Machines. AINA 2013: 235-242 - [c10]Lianhang Ma, Hao Huang, Qinming He, Kevin Chiew, Jianan Wu, Yanzhe Che:
GMAC: A Seed-Insensitive Approach to Local Community Detection. DaWaK 2013: 297-308 - [c9]Tien-Dung Cao, Kevin Chiew:
Protecting Software as a Service in the Clouds by Validation. ICSOC Workshops 2013: 35-46 - [c8]Feng Qian, Kevin Chiew, Qinming He, Hao Huang, Lianhang Ma:
Discovery of Regional Co-location Patterns with k-Nearest Neighbor Graph. PAKDD (1) 2013: 174-186 - [c7]Hao Huang, Yunjun Gao, Lu Chen, Rui Li, Kevin Chiew, Qinming He:
Browse with a social web directory. SIGIR 2013: 865-868 - [c6]Hao Huang, Yunjun Gao, Kevin Chiew, Qinming He, Lu Chen:
Commodity query by snapping. SIGIR 2013: 985-988 - 2012
- [j5]Tien-Dung Cao, Richard Castanet, Patrick Félix, Kevin Chiew:
An Approach to Automated Runtime Verification for Timed Systems: Applications to Web Services. J. Softw. 7(6): 1338-1350 (2012) - [j4]Feng Qian, Qinming He, Kevin Chiew, Jiangfeng He:
Spatial co-location pattern discovery without thresholds. Knowl. Inf. Syst. 33(2): 419-445 (2012) - [j3]Kevin Chiew:
Scheduling and routing of autonomous moving objects on a mesh topology. Oper. Res. 12(3): 385-397 (2012) - [c5]Yanzhe Che, Kevin Chiew, Xiaoyan Hong, Qinming He:
SALS: semantics-aware location sharing based on cloaking zone in mobile social networks. MobiGIS 2012: 49-56 - [c4]Jie Shi, Yingjiu Li, Robert H. Deng, Kevin Chiew:
Design and Implementation of a Secure Prototype for EPCglobal Network Services. RFIDSec Asia 2012: 45-56 - 2010
- [c3]Congfu Xu, Yafang Chen, Kevin Chiew:
An Approach to Image Spam Filtering Based on Base64 Encoding and N-Gram Feature Extraction. ICTAI (1) 2010: 171-177 - [c2]Kevin Chiew, Yingjiu Li, Tieyan Li, Robert H. Deng, Manfred Aigner:
Time cost evaluation for executing RFID authentication protocols. IOT 2010 - [c1]Bing Liang, Kevin Chiew, Yingjiu Li, Yanjiang Yang:
Privacy Disclosure Analysis and Control for 2D Contingency Tables Containing Inaccurate Data. Privacy in Statistical Databases 2010: 1-16
2000 – 2009
- 2009
- [j2]Kevin Chiew, Yingjiu Li:
Multistage Off-Line Permutation Packet Routing on a Mesh: An Approach with Elementary Mathematics. J. Comput. Sci. Technol. 24(1): 175-180 (2009) - [j1]Kevin Chiew, Shaowen Qin:
Scheduling and Routing of AMOs in an Intelligent Transport System. IEEE Trans. Intell. Transp. Syst. 10(3): 547-552 (2009) - 2008
- [p1]Kevin Chiew:
Data Mining with Privacy Preserving in Industrial Systems. Advances of Computational Intelligence in Industrial Systems 2008: 57-79
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint