Author of the publication

How to Find It Better?: Cross-Learning for WeChat Mini Programs.

, , , , and . CIKM, page 2753-2761. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New End-to-End Authentication Protocol for Mobile Users to Access Internet Services., , and . SEC, volume 214 of IFIP Conference Proceedings, page 239-250. Kluwer, (2002)Secure M-commerce Transactions: A Third Party Based Signature Protocol., , , and . IAS, page 3-8. IEEE Computer Society, (2007)The War in the Wearable Device Market: the Analysis from Economic Perspective., and . PACIS, page 147. (2014)Deficiency in anterior-posterior connectivity of default-mode network in amnestic mild cognitive impairment: A combined task-related and resting-state fMRI study., , , , , , , and . BMEI, page 228-232. IEEE, (2011)Sequence Analysis of rDNA ITS of Clinical Fusarium Species., , and . BMEI, page 1-3. IEEE, (2009)Nonholonomic constrained navigation algorithm for MIMU/odometer integration., , , and . ITSC, page 2440-2445. IEEE, (2014)A 60GHz power amplifier using 90-nm RF-CMOS technology., , , , , , and . ASICON, page 933-936. IEEE, (2011)Adaptive Decoder Complexity Reduction for Coarse Granular Scalability., , and . ICASSP (1), page 1145-1148. IEEE, (2007)Cross-modal Retrieval with Label Completion., , , , , and . ACM Multimedia, page 302-306. ACM, (2016)Spatial subsampling-based multiple description video coding with adaptive temporal-spatial error concealment., , and . PCS, page 90-94. IEEE, (2015)