[PDF][PDF] A survey of sequential pattern mining

P Fournier-Viger, JCW Lin… - Data Science and …, 2017‏ - philippe-fournier-viger.com
Discovering unexpected and useful patterns in databases is a fundamental data mining task.
In recent years, a trend in data mining has been to design algorithms for discovering …

A survey of itemset mining

P Fournier‐Viger, JCW Lin, B Vo, TT Chi… - … : Data Mining and …, 2017‏ - Wiley Online Library
Itemset mining is an important subfield of data mining, which consists of discovering
interesting and useful patterns in transaction databases. The traditional task of frequent …

The SPMF open-source data mining library version 2

P Fournier-Viger, JCW Lin, A Gomariz… - Machine Learning and …, 2016‏ - Springer
SPMF is an open-source data mining library, specialized in pattern mining, offering
implementations of more than 120 data mining algorithms. It has been used in more than …

dbscan: Fast density-based clustering with R

M Hahsler, M Piekenbrock, D Doran - Journal of Statistical Software, 2019‏ - jstatsoft.org
This article describes the implementation and use of the R package dbscan, which provides
complete and fast implementations of the popular density-based clustering algorithm …

[PDF][PDF] Effective community search for large attributed graphs

Y Fang, CK Cheng, S Luo, J Hu - Proceedings of the VLDB Endowment, 2016‏ - hub.hku.hk
Given a graph G and a vertex q∈ G, the community search query returns a subgraph of G
that contains vertices related to q. Communities, which are prevalent in attributed graphs …

Unsupervised data analytics in mining big building operational data for energy efficiency enhancement: A review

C Fan, F **ao, Z Li, J Wang - Energy and Buildings, 2018‏ - Elsevier
Building operations account for the largest proportion of energy use throughout the building
life cycle. The energy saving potential is considerable taking into account the existence of a …

Know abnormal, find evil: frequent pattern mining for ransomware threat hunting and intelligence

S Homayoun, A Dehghantanha… - IEEE transactions on …, 2017‏ - ieeexplore.ieee.org
Emergence of crypto-ransomware has significantly changed the cyber threat landscape. A
crypto ransomware removes data custodian access by encrypting valuable data on victims' …

[HTML][HTML] Deep learning for pedestrian collective behavior analysis in smart cities: A model of group trajectory outlier detection

A Belhadi, Y Djenouri, G Srivastava, D Djenouri… - Information …, 2021‏ - Elsevier
This paper introduces a new model to identify collective abnormal human behaviors from
large pedestrian data in smart cities. To accurately solve the problem, several algorithms …

EFIM: a fast and memory efficient algorithm for high-utility itemset mining

S Zida, P Fournier-Viger, JCW Lin, CW Wu… - … and Information Systems, 2017‏ - Springer
In recent years, high-utility itemset mining has emerged as an important data mining task.
However, it remains computationally expensive both in terms of runtime and memory …

The (black) art of runtime evaluation: Are we comparing algorithms or implementations?

HP Kriegel, E Schubert, A Zimek - Knowledge and Information Systems, 2017‏ - Springer
Any paper proposing a new algorithm should come with an evaluation of efficiency and
scalability (particularly when we are designing methods for “big data”). However, there are …