Author of the publication

Research on How to Use OUC Cloud Classroom to Assist Education Development in Tibet.

, , , and . ICBL, volume 9757 of Lecture Notes in Computer Science, page 139-149. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

基于语义相似度的静态安全策略一致性检测 (Static Security Policy Consistency Detection Based on Semantic Similarity)., , , , and . 计算机科学, 42 (8): 166-169 (2015)Analysis of the Use of "MOOC + flipped classrooms" in the Practice of Design and Producing of Webpage., , and . ICKII, page 130-133. IEEE, (2019)LSH-aware multitype health data prediction with privacy preservation in edge environment., , , , , and . World Wide Web, 25 (5): 1793-1808 (2022)Adaptive time-stepping and computational stability, and . Journal of Computational and Applied Mathematics, 185 (2): 225--243 (January 2006)Deep Learning Hierarchical Representation From Heterogeneous Flow-Level Communication Data., , , and . IEEE Trans. Inf. Forensics Secur., (2020)A Multi-Target Track Association Algorithm in Underwater Multi-Sensors Environments., , , and . CSCWD, page 806-812. IEEE, (2021)Chronic Poisoning: Backdoor Attack against Split Learning., , , , and . AAAI, page 16531-16538. AAAI Press, (2024)Annealing Attention Networks for User Feature-Based Rumor Early Detection on Weibo., , , and . IJCNN, page 1-8. IEEE, (2021)Combating Multi-level Adversarial Text with Pruning based Adversarial Training., , , and . IJCNN, page 1-8. IEEE, (2022)A Direct Anonymous Attestation Protocol Based on Hierarchical Group Signature., , , and . CSE (2), page 721-726. IEEE Computer Society, (2009)