Author of the publication

Study on the Knowledge -Sharing Network of Innovation Teams using Social Network Analysis.

, , and . ICEIS (2), page 438-443. SciTePress, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel routing verification approach based on blockchain for inter-domain routing in smart metropolitan area networks., , , , , , and . J. Parallel Distributed Comput., (2020)Power Grid-Oriented Cascading Failure Vulnerability Identifying Method Based on Wireless Sensors., , , , and . J. Sensors, (2021)Personalized sampling graph collection with local differential privacy for link prediction., , , , and . World Wide Web (WWW), 26 (5): 2669-2689 (September 2023)Lightweight Anonymous Geometric Routing for Internet of Things., , , , , , and . IEEE Access, (2019)Erratum: Wang, Y. et al., A Privacy Preserving Scheme for Nearest Neighbor Query. Sensors 2018, 18, 2440., , , , and . Sensors, 19 (14): 3187 (2019)A method of chained recommendation for charging piles in internet of vehicles., , , , , and . Computing, 103 (2): 231-249 (2021)PRGAN: Personalized Recommendation with Conditional Generative Adversarial Networks., , , and . ICDM, page 729-738. IEEE, (2021)Defending Against Flash Crowds and Malicious Traffic Attacks with An Auction-Based Method., , and . Web Intelligence, page 24-28. IEEE Computer Society, (2004)UBSF: A novel online URL-Based Spam Filter., , , , , and . ISCC, page 332-339. IEEE Computer Society, (2008)Optimal Network Security Strengthening Using Attack-Defense Game Model., , , , and . ITNG, page 475-480. IEEE Computer Society, (2009)