|
[1]R. Agrawal, T. Imielińsk, and A. Swami, “Mining association rules between sets of items in large database,” The ACM SIGMOD International Conference on Management of Data, pp. 207-216, 1993. [2]P. Fournier-Viger, C. W. Lin, A. Gomariz, T. Gueniche, A. Soltani, Z. Deng, and H. T. Lam, The SPMF Open-Source Data Mining Library Version 2. Proc. 19th European Conference on Principles of Data Mining and Knowledge Discovery, Part III, Springer LNCS 9853, pp. 36-40. [3]T. Y. Chen, S. C. Cheung, and S. M. Yiu, “Metamorphic testing: a new approach for generating next test cases,” Technical Report HKUST-CS98-01, Department of Computer Science, Hong Kong University of Science and Technology, 1998. [4]H. Yao, H. J. Hamilton, and C. J. Butz, “A foundational approach to mining itemset utilities from databases,” The Third SIAM International Conference on Data Mining, pp. 482-486, 2004. [5]H. Yao and H. J. Hamilton, “Mining itemset utilities from transaction database,” Data and Knowledge Engineering, Vol. 59, No. 3, pp. 603-626, 2006. [6]Y. Liu, W. Liao, and A. Choudhary, “A two-phase algorithm for fast discovery of high utility itemsets,” The Pacific-Asia Conference on Knowledge Discovery and Data Mining, 2005. [7]B. Vo, L. V. Nguyen, V. V. Vu, M. T. H. Lam, T. T. M. Duong, T. T. Manh, T. T. T. Nguyen, L. T. T. Nguyen, and T. P. Hong, "Mining correlated high utility itemsets in one phase," IEEE Access, Vol. 8, pp. 90465-90477, 2020 [8]T. Y. Chen, J. W. Ho, H. Liu, and X. Xie, “An innovative approach for testing bioinformatics programs using metamorphic testing,” BMC Bioinformatics, Vol. 10, Issue 1, pp. 24, 2009. [9]S. Segura, G. Fraser, A. B. Sanchez, and A. Ruiz-Cortes, “A survey on metamorphic testing,” IEEE Transactions on Software Engineering, Vol. 42, No. 9, 2016. [10]J. W. Zhang, X. Y. Xie, and Z. Y. Zhang, “How reliable is your outsourcing service for data mining? A metamorphic method for verifying the result integrity,” International Conference on Software Analysis, Testing, and Evolution, pp. 120-136, 2018. [11]X. Xie, Z. Y. Zhang, T. Y. Chen, Y. Liu, P. L. Poon, and B. Xu, “METTLE: a metamorphic testing approach to assessing and validating unsupervised machine learning systems,” IEEE Transactions on Reliability, 2020. [12]J. C. W. Lin, Y. Djenouri, G. Srivastava and J. M. -T. Wu, “Large-scale closed high-utility itemset mining,” 2021 International Conference on Data Mining Workshops (ICDMW), pp. 591-598, 2021. [13]T.P. Hong, C.C. Chiu, J.H. Su, and C.H. Chen, “Applicable metamorphic testing for erasable-itemset mining,” IEEE Access, Vol. 10, pp. 38545-38554, 2022. [14]T. P. Hong, C. Y. Lin, W. M. Huang, K. S. M. Li, L. S. L. Wang, and J. C. W. Lin, “Using tree structure to mine high temporal fuzzy utility itemsets,” IEEE Access, Vol. 8, pp. 153692-153706, 2020. [15]C. X. Ma and J. Zhang, “DHUI: a new algorithm for mining high utility itemsets,” 2009 International Conference on Machine Learning and Cybernetics, pp. 173-177, 2009. [16] Y. S. Ma, J. Offutt and Y. R. Kwon, “MuJava: an automated class mutation system,” Software Testing, Verification and Reliability, Vol. 15, Issue 2, pp. 97-133, 2015. [17]Pushp and S. Chand, “Mining of high utility itemsets with negative utility values for incremental datasets,” 2021 International Conference on Computational Performance Evaluation (ComPE), Shillong, India, pp. 431-436, 2021. [18]T. P. Hong, W. T. Hung, W. M. Huang and Y. C. Tsai, “Incremental fuzzy utility mining with tree structure,” 2022 IEEE International Conference on Big Data (Big Data), pp. 6202-6206, 2022. [19]J. F. Qu, P. Fournier-Viger, M. Liu, B. Hang and C. Hu, “Mining high utility item-sets using prefix trees and utility vectors,” IEEE Transactions on Knowledge and Data Engineering, Vol. 35, No. 10, pp. 10224-10236, 2023. [20]Y. Ma, D. Towey, T. Yueh Chen and Z. Quan Zhou, “Metamorphic testing of fake news detection software,” 2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC), pp. 1508-1513, 2021. [21]F. U. Rehman and M. Srinivasan, “Metamorphic testing for machine learning: applicability, challenges, and research opportunities,” 2023 IEEE International Conference On Artificial Intelligence Testing (AITest), pp. 34-39, 2023. [22]D. Towey, Z. Luo, Z. Zheng, P. Zhou, J. Yang, P. Ingkasit, C. Lao, M. Pike, and Y. Zhang, “Metamorphic testing of an automated parking system: an experience report,” 2023 IEEE 47th Annual Computers, Software, and Applications Conference, pp. 1774-1779, 2023. [23]N. B. Chaleshtari, F. Pastore, A. Goknil and L. C. Briand, “Metamorphic testing for web system security,” IEEE Transactions on Software Engineering, Vol. 49, No. 6, pp. 3430-3471, 2023. [24]U. Yun, H. Kim, T. Ryu, Y. Baek, H. Nam, J. Lee, B. Vo, and W. Pedrycz, “Prelarge-based utility-oriented data analytics for transaction modifications in Internet of Things,” IEEE Internet of Things Journal, Vol. 8, No. 24, pp. 17333-17344, 2021 [25]H. Kim, T. Ryu, C. Lee, S. Kim, B. Vo, J. C. W. Lin, and U. Yun, “Efficient method for mining high utility occupancy patterns based on indexed list structure,” IEEE Access, Vol. 11, pp. 43140-43158, 2023 [26]IBM Quest Data Mining Projection, Quest synthetic data generation code, 1996, Available at http://www.almaden.ibm.com/cs/quest/syndata.htm.
|