Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Let Them Play: The Impact of Mechanics and Dynamics of a Serious Game on Student Perceptions of Learning Engagement., , , and . IEEE Trans. Learn. Technol., 10 (4): 514-525 (2017)Big Data Analytics for New Product Success (Product Innovation)., , and . AMCIS, Association for Information Systems, (2018)Introduction to the Minitrack on The Technical, Socio-Economic, and Ethical Aspects of AI., , and . HICSS, page 5574-5575. ScholarSpace, (2024)Trusted Storage Architecture for Machine Reasoning based on Blockchain., , , and . INFOCOM Workshops, page 1-6. IEEE, (2022)A limited-trust capacity model for mitigating threats of internal malicious services in cloud computing., , , and . Clust. Comput., 19 (2): 647-662 (2016)Towards building a value co-creation circle in social commerce., , , , and . Comput. Hum. Behav., (2020)Cross-Level Network Security Element Fusion Extraction Method Based on Deep Learning., , , , and . ICCSIE, page 247-254. ACM, (2023)Network Flow Analytics: Multi-Class Classification of DDoS Attacks Based on OKNN., , , , and . NaNA, page 271-276. IEEE, (2020)A study on exercise recommendation method using Knowledge Graph for computer network course., , , , , , and . NaNA, page 436-442. IEEE, (2020)A Pseudonym Exchange-Based Traceable Location Privacy Protection Scheme for IoV., , , , and . NaNA, page 287-292. IEEE, (2023)