Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

国家电网边缘计算信息系统安全风险评估方法研究 (Research on Security Risk Assessment Method of State Grid Edge Computing Information System)., , , , , and . 计算机科学, 46 (11A): 428-432 (2019)Catch a Fad or Capture a Value?: Social Media Leverage in SMEs., and . JOEUC, 28 (3): 67-81 (2016)Quantum classification algorithm with multi-class parallel training., , and . Quantum Inf. Process., 21 (10): 358 (2022)Effective anonymization of query logs., , , , and . CIKM, page 1465-1468. ACM, (2009)Mining Public Opinion about Economic Issues: Twitter and the U.S. Presidential Election., , and . Int. J. Strateg. Decis. Sci., 9 (1): 18-28 (2018)Examining the effects of online social relations on product ratings and adoption: evidence from an online social networking and rating site., , and . Int. J. Web Based Communities, 13 (3): 344-363 (2017)Quantum locality preserving projection algorithm., , and . Quantum Inf. Process., 21 (3): 86 (2022)The Effects of Consumer Engagement Behavior on the Growth of Social Media Brand Community: Evidence from an SME., and . IJEBR, 13 (1): 25-43 (2017)Secure Construction of Contingency Tables from Distributed Data., , , and . DBSec, volume 5094 of Lecture Notes in Computer Science, page 144-157. Springer, (2008)Privacy Preserving Integration of Health Care Data., , , , and . Int. J. Comput. Model. Algorithms Medicine, 1 (2): 22-36 (2010)