Jimmy Ming‐Tai Wu

ORCID: 0000-0003-3740-2102
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Data Mining Algorithms and Applications
  • Data Management and Algorithms
  • Rough Sets and Fuzzy Logic
  • Stock Market Forecasting Methods
  • Imbalanced Data Classification Techniques
  • Privacy-Preserving Technologies in Data
  • Energy Load and Power Forecasting
  • Cryptography and Data Security
  • Financial Markets and Investment Strategies
  • Time Series Analysis and Forecasting
  • Metaheuristic Optimization Algorithms Research
  • Advanced Database Systems and Queries
  • Advanced Authentication Protocols Security
  • Blockchain Technology Applications and Security
  • Cloud Data Security Solutions
  • Forecasting Techniques and Applications
  • Computational Geometry and Mesh Generation
  • Neural Networks and Applications
  • Complexity and Algorithms in Graphs
  • Data Stream Mining Techniques
  • Chaos-based Image/Signal Encryption
  • Graph Theory and Algorithms
  • Microbial Natural Products and Biosynthesis
  • Smart Grid Security and Resilience
  • Computational Drug Discovery Methods

Shandong University of Science and Technology
2018-2024

National Kaohsiung University of Science and Technology
2023-2024

Arsenal Biosciences (United States)
2023

Shandong University of Technology
2018-2019

Stanford University
2018-2019

Toronto Metropolitan University
2019

University of Nevada, Las Vegas
2016-2018

Shenzhen Institute of Information Technology
2018

Harbin Institute of Technology
2018

Scripps Institution of Oceanography
2018

Abstract In today’s society, investment wealth management has become a mainstream of the contemporary era. Investment refers to use funds by investors arrange reasonably, for example, savings, bank financial products, bonds, stocks, commodity spots, real estate, gold, art, and many others. Wealth tools manage assign families, individuals, enterprises, institutions achieve purpose increasing maintaining value accelerate asset growth. Among them, in management, people’s favorite product often...

10.1007/s00530-021-00758-w article EN cc-by Multimedia Systems 2021-02-22

High-utility itemset mining is a popular data problem that considers utility factors, such as quantity and unit profit of items besides frequency measure from the transactional database. It helps to find most valuable profitable products/items are difficult track by using only frequent itemsets. An item might have high-profit value which rare in database has tremendous importance. While there many existing algorithms high-utility itemsets (HUIs) generate comparatively large candidate sets,...

10.1145/3363571 article EN ACM Transactions on Knowledge Discovery from Data 2019-11-11

In an era where people in the world are concerned about environmental issues, companies must reduce distribution costs while minimizing pollution generated during process. For today’s multi-depot problem, a mixed-integer programming model is proposed this paper to minimize all incurred entire transportation process, considering impact of time-varying speed, loading, and waiting time on costs. Time directional; hence, problems considered study modeled based asymmetry, making problem-solving...

10.3390/sym15010124 article EN Symmetry 2023-01-01

Over the past decade, high-utility itemset mining (HUIM) has received widespread attention that can emphasize more critical information than was previously possible using frequent (FIM). Unfortunately, HUIM is very similar to FIM since methodology determines itemsets a binary model based on pre-defined minimum utility threshold. Additionally, most previous works only focused single, small datasets in HUIM, which not realistic any real-world scenarios today containing big data environments....

10.1016/j.ins.2020.12.004 article EN cc-by Information Sciences 2020-12-13

Abstract The stock market is a capitalistic haven where the issued shares are transferred, traded, and circulated. It bases prices on issue market, however, structure trading activities of much more complicated than itself. Therefore, making an accurate prediction becomes intricate as well highly difficult task. On other hand, because potential benefits prediction, it attracts generation after scholars investors to continuously develop various methods from different perspectives, myriad...

10.1002/spe.2915 article EN Software Practice and Experience 2020-10-25

In recent years, privacy-preserving data mining (PPDM) has received a lot of attention in the field research. While some sensitive information databases cannot be revealed, PPDM can discover additional important knowledge and still hide critical information. There are different ways to approach this exhibited previous research, which applied addition deletion operations adjust an original database order However, it is NP-hard problem find appropriate set transactions/itemsets for hiding...

10.1109/access.2017.2702281 article EN cc-by-nc-nd IEEE Access 2017-01-01

With the fast development of Industrial Internet Things (IIoT), IIoT storage, which provides a lower cost, higher reliability data, remote access services, and expandable storage space, is received much attention among enterprises individual users. However, providing secure service could be challenging task for some situations, example, how to search encrypted data in IIoT. In this paper, we examine security recent proposed certificateless searchable public key encryption scheme environments...

10.1109/access.2019.2909040 article EN cc-by-nc-nd IEEE Access 2019-01-01

Internet of Things (IoT) supports high flexibility and convenience in several applications because the IoT devices continuously transfer, share, exchange data without human intervention. During shared or exchanged progress data, security privacy threats result published mainly corresponds to a raw dataset, an attacker can easily obtain details on environment. In paper, we present sanitization approach by adopting hierarchical-cluster method hide confidential information while still...

10.1109/access.2019.2899831 article EN cc-by-nc-nd IEEE Access 2019-01-01

High-utility itemset mining (HUIM) has been gaining popularity in the field of data mining. Frequent used to be main tool reveal high-frequency patterns but failed consider concept profit. HUIM, on other hand, obtains itemsets and is practical commercial applications. A challenge HUIM that should handle exponential search space for when number distinct items size database are both too large. The existing methods overlook length high-utility itemsets; hence, a large gets an unreasonable...

10.1109/access.2018.2820740 article EN cc-by-nc-nd IEEE Access 2018-01-01

Incomplete data is one major kind of multi-dimensional dataset that has random-distributed missing nodes in its dimensions. It very difficult to retrieve information from this type when it becomes large. Finding top-k dominant values a challenging procedure. Some algorithms are present enhance process, but most efficient only dealing with small incomplete data. One the make application dominating (TKD) query possible Bitmap Index Guided (BIG) algorithm. This algorithm greatly improves...

10.1109/access.2018.2797048 article EN cc-by-nc-nd IEEE Access 2018-01-01

Abstract A smart grid (SG) is an advanced power system deployed in a cloud center and meters (at the consumer end) that provides higher reliability, better data protection, improved efficiency, automatic monitoring, effective management of consumption. However, SG also poses certain challenges need to be addressed. For example, provided by meter are time-sensitive cannot handle high latency SG. Moreover, depends on memory, energy, other factors. Besides, security between critical issue needs...

10.1186/s13638-021-01930-6 article EN cc-by EURASIP Journal on Wireless Communications and Networking 2021-03-29

Rapid advancement of industrial internet things (IoT) technology has changed the supply chain network to an open system meet high demand for individualized products and provide better customer experiences. However open-system forced many small midsize enterprises (SMEs) adopt vertical integration by being divided into smaller companies with a distinctive business each SME but central alliance produce range gain competencies. Therefore, existing models do not guarantee protection data privacy...

10.1145/3532090 article EN ACM Transactions on Sensor Networks 2022-05-05

The Internet of Things (IoT) has revolutionized practically every industry, including agriculture, due to its fast expansion and integration into other industries. application IoT in agriculture motivates farmers use their resources wisely allows for better field monitoring decision-making, resulting increased agricultural productivity. Because IoT-enabled systems need the various types sensors that collect data (such as soil moisture humidity) then transmit it over network. IoT-based...

10.1155/2022/4275243 article EN Wireless Communications and Mobile Computing 2022-04-25

High utility itemset mining has become an important and critical operation in the Data Mining field. generates more profitable itemsets association among these itemsets, to make business decisions strategies. Although, high is important, it not sole measure decide efficient strategies such as discount offers. It very consider pattern of based on frequency well predict itemsets. For example, a supermarket or restaurant, beverages like champagne wine might generate (profit), but also sell less...

10.1371/journal.pone.0198066 article EN cc-by PLoS ONE 2018-07-23

Privacy-preserving data mining has become an interesting and emerging issue in recent years since it can, not only hide the sensitive information but still mine meaningful knowledge at same time. Since privacy-preserving is a non-trivial task, which also concerned as NP-hard problem, several evolutionary algorithms were presented to find optimized solutions most of them focus on considering single-objective function with pre-defined weight values three side effects (<i>hiding failure,...

10.3934/mbe.2019082 article EN Mathematical Biosciences & Engineering 2019-01-01

In Cyber-Physical Systems (CPS), especially in human-in-the-loop situations (also known as HitLCPS), the security and privacy for keeping sensitive information private is considered an emerging topic recent decades. Many techniques privacy-preserving data mining (PPDM) can be applied directly to HitLCPS. However, most of them date have focused on handling singular threshold problems sanitization. If a itemset includes more items, it has higher probability being identified due its...

10.1109/tetci.2020.3032701 article EN IEEE Transactions on Emerging Topics in Computational Intelligence 2021-09-21

The Internet of Things (IoT) play an important role in the financial sector recent decades since several stock prediction models can be performed accurately according to IoT-based services. In real-time applications, accuracy price fluctuation forecast is very investors, and it helps investors better manage their funds when formulating trading strategies. It has always been a goal difficult problem for researchers use predictive tools obtain predicted values closer actual from given data...

10.1155/2021/6706345 article EN cc-by Mobile Information Systems 2021-07-24

Abstract Privacy‐preserving data mining (PPDM) is a popular research topic in the field. For individual information protection, it vital to protect sensitive during procedures. Furthermore, also serious offense spill private knowledge. Recently, many PPDM algorithms have been proposed conceal items given database disclose high‐frequency items. These recent methods already proven be excellent protecting confidential and maintaining integrity of input database. All prior techniques, however,...

10.1002/ett.4209 article EN Transactions on Emerging Telecommunications Technologies 2021-01-05
Coming Soon ...