Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A study on the influence of internet addiction and online interpersonal influences on health-related quality of life in young Vietnamese, , , , , , , , , and 1 other author(s). BMC Public Health, (December 2017)Secure roaming with identity metasystems., , and . IDtrust, volume 283 of ACM International Conference Proceeding Series, page 36-47. ACM, (2008)Serendipity-based storification: from lifelogging to storytelling., , and . Multimedia Tools Appl., 76 (8): 10345-10356 (2017)Towards Social Signal Separation Based on Reconstruction Independent Component Analysis., , , , and . IDCS, volume 11226 of Lecture Notes in Computer Science, page 185-196. Springer, (2018)Short-Output Universal Hash Functions and Their Use in Fast and Secure Data Authentication., and . FSE, volume 7549 of Lecture Notes in Computer Science, page 326-345. Springer, (2012)Application of “key and lock” principle in the treatment of traumatic cervical Spondyloptosis of c6-7: Case report and literature review, , , , and . GSC Advanced Research and Reviews, 13 (1): 181–187 (October 2022)OnlineDC: Leveraging Temporal Driving Behavior to Facilitate Driver Classification., , , , and . IEEE BigData, page 2857-2866. IEEE, (2021)Opioid relapse prediction with GAN., , and . ASONAM, page 560-567. ACM, (2019)KELabTeam: A Statistical Approach on Figurative Language Sentiment Analysis in Twitter., , , and . SemEval@NAACL-HLT, page 679-683. The Association for Computer Linguistics, (2015)Trusternity: Auditing Transparent Log Server with Blockchain., , and . WWW (Companion Volume), page 79-80. ACM, (2018)