Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Study on the influencing factors of unplanned consumption in a large online promotion activity., , , and . Electron. Commer. Res., 16 (4): 453-477 (2016)A text analytics framework for understanding the relationships among host self-description, trust perception and purchase behavior on Airbnb., , and . Decis. Support Syst., (2020)A computational framework for understanding antecedents of guests' perceived trust towards hosts on Airbnb., , and . Decis. Support Syst., (2018)DVREI: Dynamic Verifiable Retrieval Over Encrypted Images., , , , , , , and . IEEE Trans. Computers, 71 (8): 1755-1769 (2022)Metabolic characterization of the chitinolytic bacterium Serratia marcescens using a genome-scale metabolic model., , , and . BMC Bioinform., 20 (1): 227:1-227:13 (2019)Pulmonary nodule diagnosis using dual-modal supervised autoencoder based on extreme learning machine., , , , and . Expert Syst. J. Knowl. Eng., (2017)Two-stream vision transformer based multi-label recognition for TCM prescriptions construction., , , , , and . Comput. Biol. Medicine, (March 2024)Leveraging online behaviors for interpretable knowledge-aware patent recommendation., , , and . Internet Res., 32 (2): 568-587 (2022)Leakage Resilient Password Systems, , and . Springer Briefs in Computer Science Springer, (2015)Empirical Study of Face Authentication Systems Under OSNFD Attacks., , , , and . IEEE Trans. Dependable Secur. Comput., 15 (2): 231-245 (2018)