Book Chapters

  • 1.洪宗貝, "模糊理論於機器學習和資料挖掘之應用,"李允中、王小璠和蘇木春編輯,模糊理論及其應用,第十四章,全華科技圖書,2003, pp. 14-1 – 14-31.
  • 2.T. P. Hong, C. H. Wang and S. S. Tseng, "Integration of fuzzy knowledge,” Accuracy Improvements in Linguistic Fuzzy Modeling, J. Casillas, O. Cordón, F. Herrera and L. Magdalena (Eds.), 2003, pp. 338 - 365.
  • 3.T. P. Hong, K. Y. Lin and S. L. Wang, "A time-completeness tradeoff on fuzzy web-browsing mining,” Fuzzy Logic and the Internet, V. Loia, M. Nikravesh and L. A. Zadeh (Eds.), Physica-Verlag, Springer, 2004, pp. 117 - 134.
  • 4.S. L. Wang, W. S. Lo and T. P. Hong, "Discovery of fuzzy multiple-level web browsing patterns", Classification and Clustering for Knowledge Discovery in Series of Studies in Computational Intelligence, Vol. 4, S. K. Halgamuge and L. Wang (Eds.), Chapter 16, Springer Verlag, 2005, pp. 251 - 266.
  • 5.C. Y. Wang, T. P. Hong and S. S. Tseng, "Multidimensional on-line mining," Foundations and Novel Approaches in Data Mining, T. Y. Lin, S. Ohsuga, C. J. Liau and X. Hu (Eds.), Springer, 2005, pp. 243 - 257.
  • 6.T. P. Hong and C. Y. Wang, "Maintenance of association rules using pre-large itemsets," Intelligent Databases: Technologies and Applications, Z. Ma (Ed.), Idea Group Inc., 2006, pp. 44-60.
  • 7.T. P. Hong and Y. C. Lee, “An overview of mining fuzzy association rules", Fuzzy Sets and Their Extensions: Representation, Aggregation and Models, H. Bustince, F. Herrera and J. Montero (Eds.), Springer Verlag, 2008, pp. 397-410.
  • 8.C. H. Chen, T. P. Hong and V. S. M. Tseng, "Mining linguistic trends from time series", accepted and to appear in Data Mining: Foundations and Practice, Springer, 2008, pp. 49 - 60.
  • 9. T. P. Hong, C. H. Chen, Y. L. Wu and V. S. M. Tseng, "Finding active membership functions in fuzzy data mining", Data Mining: Foundations and Practice, Springer, 2008, pp. 179 - 196.
  • 10. S. L. Wang, J. W. Shen and T. P. Hong, "Incremental discovery of fuzzy functional dependencies", The Handbook of Research on Fuzzy Information Processing in Databases, J. Galindo (Ed.), Information Science Reference, 2008.
  • 11. T. P. Hong, P. C. Sun and S. D. Li, “A heuristic algorithm for the scheduling problem of parallel machines with mold constraints", Recent Advances in Systems, Communications & Computers, pp. 242 – 247, WSEAS Press, 2008.
  • 12. C. W. Lin, T. P. Hong and W. H. Lu, “Maintenance of the prelarge trees for record deletion", Advances in Numerical Methods, Chapter 12, Springer Verlag, 2009, pp. 137 - 148.
  • 13. T. P. Hong, G. N. Shiu and Y. C. Lee, "Finding base-station locations in two-tiered wireless sensor networks by particle swarm optimization", Particle Swarm Optimization, Chapter 16, I-Tech Education and Publishing, pp. 261 – 274, 2009.
  • 14. T. P. Hong, T. J. Huang and C. S. Chang, "Mining multiple-level association rules based on pre-large concepts", Data Mining and Knowledge Discovery in Real Life Applications, Chapter 11, I-Tech Education and Publishing, pp. 187 – 200, 2009.
  • 15. S. L. Wang, J. D. Chen, T. P. Hong and P. A. Stirpe, “Probabilistic analysis of information center insecurity”, Opportunities and Challenges for Next- Generation Applied Intelligence, Springer Verlag, pp. 175 - 180, 2009.
  • 16. T. P. Hong, C. H. Chen and V. S. M. Tseng, "Genetic-fuzzy data mining techniques", Encyclopedia of Complexity and System Science, R. A. Meyers (Ed.), Springer Verlag, pp. 4145 - 4160, 2009.
  • 17. S. L. Wang, J. W. Shen and T. P. Hong, “Dynamic discovery of fuzzy functional dependencies using partition”, Intelligent Soft Computation and Evolving Data Mining: Integrating Advanced Technology, IGI Global, pp. 44 - 60, 2010.
  • 18. W. S. Lo and T. P. Hong, "A three-level multiple-agent early warning mechanism for preventing loss of customers in fashion supply chains," Fashion Supply Chain Management: Industry and Business Analysis, Tsan-Ming Choi (Ed.), Chapter 9, IGI Global, pp. 173 - 184, 2011.
  • 19. T. P. Le, B. Vo, T. P. Hong, B. Le and J. Jung, “Maintenance of IT-tree for transactions deletion", Advanced Methods for Computational Collective Intelligence (Studies in Computational Intelligence), pp. 157 - 166, 2013.
  • 20. B. Vo, C. W. Lin, T. P. Hong, V. V. Vu, M. Q. Nguyen and B. Le, “An efficient method for hiding high utility itemsets", Advanced Methods and Technologies for Agent and Multi-Agent Systems (Frontiers in Artificial Intelligence and Applications), D. Barbucha, M. T. Le, R. J. Howlett, L. C. Jain (Eds.), IOS Press, pp. 356-363, 2013.
  • 21. B. Vo, T. Le, T. P. Hong and B. Le, “Maintenance of a frequent-itemset lattice based on pre-large concept", Advances in Intelligent Systems and Computing, Vol. 245, V. N. Huynh, T. Denoeux, D. H. Tran, A.C. Le, and S. B. Pham, (Eds.), Springer, pp. 295-305, 2014.
  • 22. C. H. Chen, G. C. Lan, T. P. Hong, S. L. Wang and Y. K. Lin, "A projection-based approach for mining highly coherent association rules", Advances in Intelligent Systems and Computing, Vol. 297, J. S. Pan, V. Snasel, E. S. Corchado, A. Abraham, and S. L. Wang, (Eds.), Springer, pp. 69-78, 2014.
  • 23. C. W. Lin, T. P. Hong and H. C. Hsu, "Hiding sensitive itemsets with minimal side effects in privacy preserving data mining", Advances in Intelligent Systems and Computing, Vol. 297, J. S. Pan, V. Snasel, E. S. Corchado, A. Abraham, and S. L. Wang, (Eds.), Springer, pp. 87-95, 2014.
  • 24. C. W. Lin, W. Gan, T. P. Hong and R. Tso, "An incremental algorithm for maintaining the built FUSP trees based on the pre-large concepts", Advances in Intelligent Systems and Computing, Vol. 297, J. S. Pan, V. Snasel, E. S. Corchado, A. Abraham, and S. L. Wang, (Eds.), Springer, pp. 135-144, 2014.
  • 25. G. C. Lan, T. P. Hong, Y. C. Tseng and S. L. Wang, “Utility knowledge fusion in a multi-site environment”, Multidisciplinary Social Networks Research, Communications in Computer and Information Science, Vol. 473, S. L. Wang, J. J. June, C. H. Lee, K. Okuhara and H. C. Yang (Eds.), Springer, pp. 171-178, 2014.
  • 26. C. W. Lin, W. S. Gan, T. P. Hong and J. S. Pan, “Updating the built FUSP trees with sequence deletion based on prelarge concept”, Multidisciplinary Social Networks Research, Communications in Computer and Information Science, Vol. 473, S. L. Wang, J. J. June, C. H. Lee, K. Okuhara and H. C. Yang (Eds.), Springer, pp. 417-426, 2014.
  • 27. S. S. Chen, C. F. Huang, T. P. Hong and B. R. Chang, “Using a genetic model for asset allocation in stock investment", Frontiers in Artificial Intelligence and Applications, Vol. 274, C. C. Chu, H. C. Chao and J. H. Yang (Eds.), IOS Press, pp. 167-174, 2015.
  • 28. C. W. Lin, T. Y. Wu, P. Fournier-Viger, G. Lin, T. P. Hong, and J. S. Pan, "A sanitization approach of privacy preserving utility mining", Genetic and Evolutionary Computing, Series of Advances in Intelligent Systems and Computing, Vol. 388, T. T. Zin, C. W. Lin, J. S. Pan, P. Tin and M. Yokota (Eds.), Springer, pp. 47-57, 2015.
  • 29. T. P. Hong, C. H. Chen and C. W. Lin, "A survey of fuzzy data mining techniques," Fuzzy Statistical Decision-Making, C. Kahraman and O. Kabak (Eds.), Springer, Chapter 18, pp. 329-354, 2016.