Menu:

 

[By Type] [By Google Scholar] [By Microsoft] [By DBLP] [By RG] [By ORCID]

This page contains the preprint/postprint versions of my published articles. The articles are limited to personal use only. You may find the official versions and the copyright notices from the publishers' websites. Students and postdoctoral fellows under my supervision in the projects are underlined.

Selected Publications [click here for a complete list by year] 
[115] K. Al-Hussaeni, B. C. M. Fung, F. Iqbal, J. Liu, and P. C. K. Hung. Differentially-private multidimensional data publishing. Knowledge and Information Systems (KAIS): An International Journal, accepted with minior revision. Springer.
[ full paper | bibtex | JCR impact factor: 2.004, 5-year: 2.021 ]
[113] J. Guo, B. C. M. Fung, F. Iqbal, P. J. K. Kuppen, R. A. E. M. Tollenaar, W. E. Mesker, and J.-J. Lebrun. Revealing determinant factors for early breast cancer recurrence by decision tree. Information Systems Frontiers (ISF), 13 pages, in press. Springer.
[ full paper | bibtex | JCR impact factor: 1.450, 5-year: 2.248 | CiteScore: 1.89 | SJR: 0.756 ]
[109] L. Guerrouj, Z. Kermansaravi, V. Arnaoudouva, B. C. M. Fung, F. Khomh, G. Antoniol, and Y.-G. Guéhéneuc. Investigating the relation between lexical smells and change- and fault-proneness: an empirical study. Software Quality Journal (SQJO), 25(3):641-670, September 2017. Springer.
[ full paper | bibtex | JCR impact factor: 1.816, 5-year: 2.132 ]
[100] S. H. H. Ding, B. C. M. Fung, and P. Charland. Kam1n0: MapReduce-based assembly clone search for reverse engineering. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (SIGKDD), pages 461-470, San Francisco, CA: ACM Press, August 2016.
[ full paper with poster presentationbibtex | video | slides | poster | software and source code: Kam1n0 | Hex-Rays plug-in contest award | acceptance ratio: (70+72)/784 = 18% | collaborated with Defence Research & Development Canada (DRDC) ]
[97] J. Liu, K. Wang, and B. C. M. Fung. Mining high utility patterns in one phase without generating candidates. IEEE Transactions on Knowledge and Data Engineering (TKDE), 28(5):1245-1257, May 2016. IEEE Computer Society.
[ full paper | bibtex | JCR impact factor: 2.476, 5-year: 3.018 ]
[96] R. H. Khokhar, B. C. M. Fung, F. Iqbal, D. Alhadidi, and J. Bentahar. Privacy-preserving data mashup model for trading person-specific information. Electronic Commerce Research and Applications (ECRA), 17:19-37, May-June 2016. Elsevier.
[ full paper | bibtex | JCR impact factor: 2.139, 5-year: 2.831 ]
[91] M. R. Farhadi, B. C. M. Fung, Y. B. Fung, P. Charland, S. Preda, and M. Debbabi. Scalable code clone search for malware analysis. Digital Investigation (DIIN): Special Issue on Big Data and Intelligent Data Analysis, 15:46-60, December 2015. Elsevier.
[ full paper | bibtex | JCR impact factor: 1.774, 5-year: 2.367 ]
[85] M. Schmid, F. Iqbal, and B. C. M. Fung. E-mail authorship attribution using customized associative classification. Digital Investigation (DIIN), 14(1):S116-S126, August 2015. Elsevier.
[ full paper | bibtex | this journal article was presented in the 15th ACM DFRWS | acceptance ratio = 16/46 = 34.8% | JCR impact factor: 1.774, 5-year: 2.367 ]
[84] S. H. H. Ding, B. C. M. Fung, and M. Debbabi. A visualizable evidence-driven approach for authorship attribution. ACM Transactions on Information and System Security (TISSEC), 17(3):12.1-12.30, March 2015. ACM Press.
[ full paper | bibtex | JCR impact factor: 0.759, 5-year: 1.610 | SJR impact factor: 1.772 ]
[81] B. C. M. Fung, Y. Jin, J. Li, and J. Liu. Recommendation and Search in Social Networks, chapter Anonymizing social network data for maximal frequent-sharing pattern mining. Lecture Notes in Social Networks (LNSN), pages 77-100, February 2015. Springer.
[ book chapter | bibtex | This book chapter is an extension of ASONAM13. ]
[80] S. Li, K. Nahar, and B. C. M. Fung. Product customization of tablet computers based on the information of online reviews by customers. Journal of Intelligent Manufacturing (JIM), 26(1):97-110, February 2015. Springer.
[ full paper | bibtex | JCR impact factor: 1.995, 5-year: 2.159 ]
[79] K. Al-Hussaeni, B. C. M. Fung, and W. K. Cheung. Privacy-preserving trajectory stream publishing. Data & Knowledge Engineering (DKE), 94(A):89-109, November 2014. Elsevier.
[ full paper | bibtex | software with source code - ITSA | JCR impact factor in 2014: 1.115, 5-year: 1.594 ]
[78] S. Goryczka, L. Xiong, and B. C. M. Fung. m-privacy for collaborative data publishing. IEEE Transactions on Knowledge and Data Engineering (TKDE), 26(10):2520-2533, October 2014. IEEE Computer Society.
[ full paper | bibtex | JCR impact factor in 2014: 2.067, 5-year: 2.873 ]
[77] R. Chen, B. C. M. Fung, P. S. Yu, and B. C. Desai. Correlated network data publication via differential privacy. Very Large Data Bases Journal (VLDBJ), 23(4):653-676, August 2014. Springer.
[ full paper | bibtex | poster | JCR impact factor in 2014: 1.568, 5-year: 2.300 ]
[76] R. H. Khokhar, R. Chen, B. C. M. Fung, and S. M. Lui. Quantifying the costs and benefits of privacy-preserving health data publishing. Journal of Biomedical Informatics (JBI): Special Issue on Informatics Methods in Medical Privacy, 50:107-121, August 2014. Elsevier.
[ full paper | bibtex | JCR impact factor in 2014: 2.126, 5-year: 3.398 ]
[73] A. Basher and B. C. M. Fung. Analyzing topics and authors in chat logs for crime investigation. Knowledge and Information Systems (KAIS): An International Journal, 39(2):351-381, May 2014. Springer.
[ full paper | bibtex | JCR impact factor in 2014: 1.782, 5-year: 2.016 ]
[70] N. Mohammed, D. Alhadidi, B. C. M. Fung, and M. Debbabi. Secure two-party differentially private data release for vertically-partitioned data. IEEE Transactions on Dependable and Secure Computing (TDSC), 11(1):59-71, January/February 2014. IEEE Computer Society.
[ full paper | bibtex | JCR impact factor in 2014: 1.351, 5-year: 1.652 ]
[69] M. Ghasemzadeh, B. C. M. Fung, R. Chen, and A. Awasthi. Anonymizing trajectory data for passenger flow analysis. Transportation Research Part C: Emerging Technologies (TRC): An International Journal, 39:63-79, February 2014. Elsevier.
[ full paper | bibtex | source code - TALF | JCR impact factor in 2014: 2.818, 5-year: 3.402 ]
[67] B. C. M. Fung, Y. Jin, and J. Li. Preserving privacy and frequent sharing patterns for social network data publishing. In Proceedings of the 5th IEEE/ACM International Conference on Social Networks Analysis and Mining (ASONAM), pages 479-485, Niagara Falls, Canada: IEEE Computer Society, August 2013.
[ short paper | bibtex | acceptance ratio: 28% = 13% + 15% ]
[65] G. G. Dagher and B. C. M. Fung. Subject-based semantic document clustering for digital forensic investigations. Data & Knowledge Engineering (DKE), 86:224-241, July 2013. Elsevier.
[ full paper | bibtex | CTV Interview | JCR impact factor in 2013: 1.489, 5-year: 1.609 ]
[64] Z. Yu, B. C. M. Fung, and F. Haghighat. Extracting knowledge from building-related data - a data mining framework. Building Simulation (BUIL): An International Journal, 6(2):207-222, June 2013. Springer.
[ full paper | bibtex | JCR impact factor in 2013: 0.631, 5-year: 0.687 ]
[63] N. Mohammed, X. Jiang, R. Chen, B. C. M. Fung, and L. Ohno-Machado. Privacy-preserving heterogeneous health data sharing. Journal of the American Medical Informatics Association (JAMIA), 20(3):462-469, May 2013. BMJ.
[ full paper | bibtex | software with source code - DiffGen-Hetero | JCR impact factor in 2013: 3.932, 5-year: 4.182 ]
[62] R. Chen, B. C. M. Fung, N. Mohammed, B. C. Desai, and K. Wang. Privacy-preserving trajectory data publishing by local suppression. Information Sciences (INS): Special Issue on Data Mining for Information Security, 231:83-97, May 2013. Elsevier.
[ full paper | bibtex | JCR impact factor in 2013: 3.893, 5-year: 3.969 ]
[ This paper presents a local suppression method to achieve LKC-privacy for trajectory data published by a single data provider. ]
[61] F. Iqbal, H. Binsalleeh, B. C. M. Fung, and M. Debbabi. A unified data mining solution for authorship analysis in anonymous textual communications. Information Sciences (INS): Special Issue on Data Mining for Information Security, 231:98-112, May 2013. Elsevier.
[ full paper | bibtex | JCR impact factor in 2013: 3.893, 5-year: 3.969 ]
[59] Y. Zeng, K.-Y. Kim, V. Raskin, B. C. M. Fung, and Y. Kitamura (Eds.). Advanced Engineering Informatics (ADVEI): Special Issue on Modeling, Extraction, Transformation of Semantics in Computer Aided Engineering Systems, 27(1), January 2013. Elsevier.
[ editorial | bibtex | JCR impact factor in 2012: 1.593, 5-year: 1.708 ]
[58] J. Liu, K. Wang, and B. C. M. Fung. Direct discovery of high utility itemsets without candidate generation. In Proceedings of the 12th IEEE International Conference on Data Mining (ICDM), pages 984-989, Brussels, Belgium: IEEE Computer Society, December 2012.
[ short paper | bibtex | acceptance ratio: 20% = (81+70)/756 ] 
[56] L. Bonomi, L. Xiong, R. Chen, and B. C. M. Fung. Frequent grams based embedding for privacy preserving record linkage. In Proceedings of the 21st ACM Conference on Information and Knowledge Management (CIKM), pages 1597-1601, Maui, HI: ACM Press, October 2012.
[ database track short paper | bibtex | acceptance ratio: 27.7% = (146+156)/1088 ]
[55] P. Charland, B. C. M. Fung, and M. R. Farhadi. Clone search for malicious code correlation. In Proceedings of the NATO RTO Symposium on Information Assurance and Cyber Defense (STO-MP-IST-111), pages 1.1-1.12, Koblenz, Germany, September 2012.
[ full paper | bibtex | first runner-up for the best paper award ]
[54] R. Chen, B. C. M. Fung, B. C. Desai, and N. M. Sossou. Differentially private transit data publication: a case study on the Montreal transportation system. In Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (SIGKDD), pages 213-221, Beijing, China: ACM Press, August 2012.
[ full paper with oral presentation | slides | poster | bibtex | acceptance ratio: 17.6% = 133/755 ]
[ This paper presents a differentially-private sanitization method for sequential data published by a single data provider. ]
[53] B. C. M. Fung, T. Trojer, P. C. K. Hung, L. Xiong, K. Al-Hussaeni, and R. Dssouli. Service-oriented architecture for high-dimensional private data mashup. IEEE Transactions on Services Computing (TSC), 5(3):373-386, July-September 2012. IEEE Computer Society.
[ full paper | bibtex | JCR impact factor in 2012: 2.460 | the Spotlight Paper for the July-September 2012 issue ]
[ This paper presents a SOA to achieve LKC-privacy in a vertically-partitioned data owned by different data providers. ]
[52] D. Alhadidi, N. Mohammed, B. C. M. Fung, and M. Debbabi. Secure distributed framework for achieving ε-differential privacy. In Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS), LNCS 7834, pages 120-139, Vigo, Spain: Springer-Verlag, July 2012.
[ full paper | slides | bibtex | acceptance ratio: 22.2% = 16/72 ]
[ This paper presents a secure protocol to achieve differential privacy in a horizontally-partitioned data owned by different data providers. ]
[51] Z. Yu, F. Haghighat, B. C. M. Fung, and L. Zhou. A novel methodology for knowledge discovery through mining associations between building operational data. Energy and Buildings (ENB), 47:430-440, April 2012. Elsevier.
[ full paper | bibtex | JCR impact factor in 2012: 2.679, 5-year: 3.254 ]
[49] R. Al-Zaidy, B. C. M. Fung, A. M. Youssef, and F. Fortin. Mining criminal networks from unstructured text documents. Digital Investigation (DIIN), 8(3-4):147-160, February 2012. Elsevier.
[ full paper | bibtex | JCR impact factor in 2014: 1.648, 5-year: 1.318 ]
[47] Z. Yu, F. Haghighat, B. C. M. Fung, E. Morofsky, and H. Yoshino. A methodology for identifying and improving occupant behavior in residential buildings. Energy, 36(11):6596-6608, November 2011. Elsevier.
[ full paper | bibtex | JCR impact factor in 2013: 4.159, 5-year: 4.465 ]
[44] N. Mohammed, B. C. M. Fung, and M. Debbabi. Anonymity meets game theory: secure data integration with malicious participants. Very Large Data Bases Journal (VLDBJ), 20(4):567-588, August 2011. Springer.
[ full paper | bibtex | JCR impact factor in 2013: 1.701, 5-year: 2.111 ]
[ This paper presents a secure protocol to achieve k-anonymity in a vertically-partitioned data owned by different malicious data providers. ]
[43] R. Chen, N. Mohammed, B. C. M. Fung, B. C. Desai, and L. Xiong. Publishing set-valued data via differential privacy. The Proceedings of the VLDB Endowment (PVLDB), 4(11):1087-1098, August 2011. VLDB Endowment.
[ research track full paper | slides | bibtex | source code - DiffPart | this journal paper was presented at the 37th International Conference of Very Large Data Bases (VLDB 2011) | acceptance ratio: 18.1% = 100/553 ]
[ This paper presents a differentially-private sanitization method for transaction data published by a single data provider. ]
[42] N. Mohammed, R. Chen, B. C. M. Fung, and P. S. Yu. Differentially private data release for data mining. In Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (SIGKDD), pages 493-501, San Diego, CA: ACM Press, August 2011.
[ full paper with oral presentation | slides | poster | bibtex | software with source code - DiffGen | acceptance ratio (with oral presentation): 7.8% = 56/714 ]
[ This paper presents a differentially-private sanitization method for relational data published by a single data provider. ]
[41] Z. Yu, B. C. M. Fung, F. Haghighat, H. Yoshino, and E. Morofsky. A systematic procedure to study the influence of occupant behavior on building energy consumption. Energy and Buildings (ENB), 43(6):1409-1417, June 2011. Elsevier.
[ full paper | bibtex | JCR impact factor in 2012: 2.679, 5-year: 3.254 | one of the most cited articles in ENB since 2010 ]
[37] N. Mohammed, B. C. M. Fung, P. C. K. Hung, and C. Lee. Centralized and distributed anonymization for high-dimensional healthcare data. ACM Transactions on Knowledge Discovery from Data (TKDD), 4(4):18:1-18:33, October 2010. ACM Press.
[ full paper | bibtex | JCR impact factor in 2012: 1.676 ]
[ This paper presents a secure protocol to achieve LKC-privacy in a horizontally-partitioned data owned by different data providers. ]
[36] F. Iqbal, H. Binsalleeh, B. C. M. Fung, and M. Debbabi. Mining writeprints from anonymous e-mails for forensic investigation. Digital Investigation (DIIN), 7(1-2):56-64, October 2010. Elsevier.
[ full paper | bibtex | JCR impact factor in 2010: 0.836, 5-year: 1.043 ]
[34] P. Shi, L. Xiong, and B. C. M. Fung. Anonymizing data with quasi-sensitive attribute values. In Proceedings of the 19th ACM Conference on Information and Knowledge Management (CIKM), pages 1389-1392, Toronto, Canada: ACM Press, October 2010.
[ database track short paper | poster | bibtex | acceptance ratio: 34.7% = (123+171)/847 ]
[33] Z. Yu, F. Haghighat, B. C. M. Fung, and H. Yoshino. A decision tree method for building energy demand modeling. Energy and Buildings (ENB), 42(10):1637-1646, October 2010. Elsevier.
[ full paper | bibtex | JCR impact factor in 2012: 2.679, 5-year: 3.254 ]
[31] B. C. M. Fung, K. Wang, A. W.-C. Fu, and P. S. Yu. Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques, ser. Data Mining and Knowledge Discovery. 376 pages, Chapman & Hall/CRC, August 2010.
[ book | bibtex | ISBN: 9781420091489 ]
[30] B. C. M. Fung, K. Wang, R. Chen, and P. S. Yu. Privacy-preserving data publishing: a survey of recent developments. ACM Computing Surveys (CSUR), 42(4):14:1-14:53, June 2010. ACM Press.
[ full paper | bibtex | JCR impact factor in 2010: 8.000, 5-year: 10.910 | cited by the U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) in NIST IR 8053 DRAFT "De-Identification of Personally Identifiable Information" | This is the most cited article in Concordia University according to ACM Digital Library. ]
[27] N. Mohammed, B. C. M. Fung, and M. Debbabi. Walking in the crowd: anonymizing trajectory data for pattern analysis. In Proceedings of the 18th ACM Conference on Information and Knowledge Management (CIKM), pages 1441-1444, Hong Kong: ACM Press, November 2009.
[ database track short paper | poster | bibtex ]
[ This paper uses global suppressions to achieve LKC-privacy while preserving frequent sequences in trajectory data. See the technical report for details. ]
[26] T. Trojer, B. C. M. Fung, and P. C. K. Hung. Service-oriented architecture for privacy-preserving data mashup. In Proceedings of the 7th IEEE International Conference on Web Services (ICWS), pages 767-774, Los Angeles, CA: IEEE Computer Society Press, July 2009.
[ industrial track full paper | slides | bibtex | acceptance ratio: 18% = 61/339 ]
[ See TSC11 for an extended version. ]
[25] N. Mohammed, B. C. M. Fung, P. C. K. Hung, and C. Lee. Anonymizing healthcare data: a case study on the blood transfusion service. In Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (SIGKDD), pages 1285-1294, Paris, France: ACM Press, June 2009.
[ industrial track full paper | video presentation | slides | bibtex | software with source code - PAIS | acceptance ratio: 10% | best student paper award ]
[ This paper presents an anonymization method to achieve LKC-privacy for relational data published by a single data provider. See TKDD10 for an extended version. ]
[24] B. C. M. Fung, K. Wang, L. Wang, and P. C. K. Hung. Privacy-preserving data publishing for cluster analysis. Data & Knowledge Engineering (DKE), 68(6):552-575, June 2009. Elsevier.
[ full paper | bibtex | publisher link | JCR impact factor in 2009: 1.745, 5-year: 2.036 ]
[20] N. Mohammed, B. C. M. Fung, K. Wang, and P. C. K. Hung. Privacy-preserving data mashup. In Proceedings of the 12th International Conference on Extending Database Technology (EDBT), pages 228-239, Saint-Petersburg, Russia: ACM Press, March 2009.
[ research track full paper | slides | bibtex | average acceptance ratio: 16% ]
[ See VLDBJ11 for an extended version to malicious participants. ]
[ See ICWS11 and TSC11 for extensions to SOA and high-dimensional data anonymization. ]
[18] Y. Xu, B. C. M. Fung, K. Wang, A. W. C. Fu, and J. Pei. Publishing sensitive transactions for itemset utility. In Proceedings of the 8th IEEE International Conference on Data Mining (ICDM), pages 1109-1114, Pisa, Italy: IEEE Computer Society, December 2008.
[ short paper | slides | slides with audio | bibtex | acceptance ratio: 19.9% = (70+74)/724 ]
[17] F. Iqbal, R. Hadjidj, B. C. M. Fung, and M. Debbabi. A novel approach of mining write-prints for authorship attribution in e-mail forensics. Digital Investigation (DIIN), 5(1):S42-S51. September 2008. Elsevier.
[ full paper | slides | bibtex | JCR impact factor in 2008: 0.961 | accepted 17 papers | this journal paper was presented in the 8th DFRWS | The research results were reported by media worldwide. ]
[15] B. C. M. Fung, K. Wang, L. Wang, and M. Debbabi. A framework for privacy-preserving cluster analysis. In Proceedings of the 2008 IEEE International Conference on Intelligence and Security Informatics (ISI), pages 46-51, Taipei, Taiwan, June 2008.
[ full paper | slides | bibtex | acceptance ratio: 22% ]
[ See DKE09 for an extended version. ]
[14] B. C. M. Fung, K. Wang, and M. Ester. The Encyclopedia of Data Warehousing and Mining, 2nd ed., chapter Hierarchical document clustering, pages 970-975. Idea Group, Hershey, PA, August 2008.
[ book chapter | bibtex |
© Idea Group ]
[13] B. C. M. Fung, K. Wang, A. W. C. Fu, and J. Pei. Anonymity for continuous data publishing. In Proceedings of the 11th International Conference on Extending Database Technology (EDBT), pages 264-275, Nantes, France: ACM Press, March 2008.
[ research track full paper | slides | bibtex | research track acceptance ratio: 16.7% = 52/311 ]
[11] B. C. M. Fung, K. Wang, and P. S. Yu. Anonymizing classification data for privacy preservation. IEEE Transactions on Knowledge and Data Engineering (TKDE), 19(5):711-725, May 2007. IEEE Computer Society.
[ full paper | bibtex | JCR impact factor in 2009: 2.285, 5-year: 3.691 ]
[10] B. C. M. Fung. Privacy-preserving data publishing. Ph.D. thesis, Simon Fraser University, Burnaby, BC, Canada, May 2007.
[ thesis | bibtex ]
[9] K. Wang, B. C. M. Fung, and P. S. Yu. Handicapping attacker's confidence: an alternative to k-anonymization. Knowledge and Information Systems (KAIS): An International Journal, 11(3):345-368, April 2007. Springer-Verlag.
[ full paper | bibtex | JCR impact factor in 2009: 2.211, 5-year: 2.302 ]
[7] K. Wang and B. C. M. Fung. Anonymizing sequential releases. In Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (SIGKDD), pages 414-423, Philadelphia, PA: ACM Press, August 2006.
[ research track full paper | slides | bibtex | research track acceptance ratio: 10.9% = 50/457 ]
[6] K. Wang, B. C. M. Fung, and P. S. Yu. Template-based privacy preservation in classification problems. In Proceedings of the 5th IEEE International Conference on Data Mining (ICDM), pages 466-473, Houston, TX: IEEE Computer Society, November 2005.
[ full paper | slides | bibtex | acceptance ratio: 11.0% = 69/630 ]
[ Selected as one of the best papers to appear in Knowledge and Information Systems: An International Journal ]
[ See KAIS07 for an extended version. ]
[5] B. C. M. Fung, K. Wang, and M. Ester. The Encyclopedia of Data Warehousing and Mining, chapter Hierarchical document clustering, pages 555-559. Idea Group, Hershey, PA, July 2005.
[ book chapter | bibtex |
© Idea Group ]
[4] K. Wang, B. C. M. Fung, and G. Dong. Integrating private databases for data analysis. In Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics (ISI), Lecture Notes in Computer Science (LNCS), 3495, pages 171-182, Atlanta, GA: Springer-Verlag, May 2005.
[ full paper | slides | bibtex |
© Springer-Verlag | accepted 28 full papers ]
[ Selected as one of the best papers to appear in Knowledge and Information Systems ]
[ See EDBT09 for an extended version. ]
[3] B. C. M. Fung, K. Wang, and P. S. Yu. Top-down specialization for information and privacy preservation. In Proceedings of the 21st IEEE International Conference on Data Engineering (ICDE), pages 205-216, Tokyo, Japan: IEEE Computer Society, April 2005.
[ research track full paper | slides | bibtex | software with source code: enhanced version in SIGKDD09: PAIS | one of the top 3 most cited papers in ICDE05 | research track acceptance ratio: 12.9% = 67/521 ]
[ See TKDE07 for an extended version. ]
[2] B. C. M. Fung, K. Wang, and M. Ester. Hierarchical document clustering using frequent itemsets. In Proceedings of the 3rd SIAM International Conference on Data Mining (SDM), pages 59-70, San Francisco, CA: SIAM, May 2003.
[ full paper | slides | bibtex | software - FIHC | acceptance ratio: 19.8% = 21/106 | Crawl-By-Example ]