Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Note on Dependence of Epidemic Threshold on State Transition Diagram in the SEIC Cybersecurity Dynamical System Model., and . SciSec, volume 11287 of Lecture Notes in Computer Science, page 51-64. Springer, (2018)Automatic Identification of Ineffective Online Student Questions in Computing Education., , , , and . FIE, page 1-5. IEEE, (2018)From one tree to a forest: a unified solution for structured web data extraction., , , and . SIGIR, page 775-784. ACM, (2011)The influence of achievement goals on online help seeking of computer science students., , , and . Br. J. Educ. Technol., 48 (6): 1273-1283 (2017)Quantifying the effects of active learning environments: separating physical learning classrooms from pedagogical approaches, , and . Learning Environments Research, (April 2021)Improved Path Planning for Indoor Patrol Robot Based on Deep Reinforcement Learning., , , , and . Symmetry, 14 (1): 132 (2022)A Security Design for the Detecting of Buffer Overflow Attacks in IoT Device., , , , , , , and . IEEE Access, (2018)Data Communication Security Based on Novel Reversible Mean Shift Steganography Algorithm., , , , , , , and . ICCE, page 1-5. IEEE, (2019)From One Tree to a Forest : a Unified Solution for Structured Web Data Extraction Categories and Subject Descriptors, , , and . ACM SIGIR conference on Research and development in Information Retrieval, page 775--784. (2011)Origin of the scaling law in human mobility: Hierarchy of traffic systems, , , and . Phys. Rev. E, 83 (3): 036117 (March 2011)