Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dually Enhanced Propensity Score Estimation in Sequential Recommendation., , , , and . CIKM, page 2260-2269. ACM, (2022)Dually Enhanced Propensity Score Estimation in Sequential Recommendation., , , , and . CoRR, (2023)Investigation of the thermal drift of open-loop Hall effect current sensor and its improvement., , , , and . AMPS, page 1-6. IEEE, (2015)Ensuring supply chain quality performance through applying the SCOR model, , and . Int'l J. Production Research, 49 (1): 33--57 (2011)An Application of Continuous Wavelet Transform in Differential Equations., , and . WAA, volume 2251 of Lecture Notes in Computer Science, page 107-116. Springer, (2001)A 1/2.5 inch 8.1Mpixel CMOS Image Sensor for Digital Cameras., , , , , , , and . ISSCC, page 508-618. IEEE, (2007)Evolutionary snowdrift game with an additional strategy in fully connected networks and regular lattices, , , , and . Physica A: Statistical Mechanics and its Applications, 383 (2): 631--642 (Sep 15, 2007)Real-time affine invariant gesture recognition for LED smart lighting control., , and . Image Processing: Algorithms and Systems, volume 9399 of SPIE Proceedings, page 939906. SPIE, (2015)A hybrid malware detecting scheme for mobile Android applications., , , and . ICCE, page 155-156. IEEE, (2016)Social group utility maximization in mobile networks: From altruistic to malicious behavior., , and . CISS, page 1-6. IEEE, (2014)