Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis., , , and . IEEE Trans. Inf. Forensics Secur., 8 (6): 936-948 (2013)Rationality Analytics from Trajectories., , and . ACM Trans. Knowl. Discov. Data, 10 (1): 10:1-10:22 (2015)Geometric Auto-Calibration of SAR Images Utilizing Constraints of Symmetric Geometry., , , , , and . IEEE Geosci. Remote. Sens. Lett., (2022)Anomaly Detection from Incomplete Data., , and . ACM Trans. Knowl. Discov. Data, 9 (2): 11:1-11:22 (2014)Efficient Online Summarization of Large-Scale Dynamic Networks., , , and . IEEE Trans. Knowl. Data Eng., 28 (12): 3231-3245 (2016)Persistent Community Detection in Dynamic Social Networks., , and . PAKDD (1), volume 8443 of Lecture Notes in Computer Science, page 78-89. Springer, (2014)Visual Fingerprinting: A New Visual Mining Approach for Large-Scale Spatio-temporal Evolving Data., , , and . ADMA, volume 7713 of Lecture Notes in Computer Science, page 502-515. Springer, (2012)Strategy Dynamics with Feedback Control in the Global Climate Dilemma Games., , and . SMC, page 518-522. IEEE, (2019)Learning from the Offline Trace: A Case Study of the Taxi Industry., , , and . ICIS, Association for Information Systems, (2015)A Method for Measuring Shaft Diameter Based on Light Stripe Image Enhancement., , , and . Sensors, 24 (1): 303 (2024)