Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficiently Achieving Privacy Preservation and Poisoning Attack Resistance in Federated Learning., , , and . IEEE Trans. Inf. Forensics Secur., (2024)Prediction of O-Glycosylation Sites in Protein Sequence by Kernel Principal Component Analysis., , and . CASoN, page 267-270. IEEE Computer Society, (2010)A Blockchain Based Online Trading System for DDoS Mitigation Services., , , and . ISPA/IUCC/BDCloud/SocialCom/SustainCom, page 1036-1037. IEEE, (2018)Rotating periodic solutions for convex Hamiltonian systems., , and . Appl. Math. Lett., (2019)Recent Development in Analog Computation - A Brief Overview.. CoRR, (2015)A Fine-Grained and Privacy-Preserving Query Scheme for Fog Computing-Enhanced Location-Based Service., , and . Sensors, 17 (7): 1611 (2017)Turnover intentions of IT employees in non-IT organizations: effects of organizational and professional identification., , and . CPR, page 100-104. ACM, (2010)The Motivators of Students' Behavioral Intention Towards Online Discussion Forum Participation., , , and . AMCIS, page 311. Association for Information Systems, (2005)How Do Users Cope with Trial Restrictions? A Longitudinal Field Experiment on Free Trial Software., and . ICIS, page 130. Association for Information Systems, (2007)A Psychological Reactance Perspective on Time and Functionality Restrictions of Free Trial Software: Are You Willing to Evaluate the Software?, , and . ICIS, page 92. Association for Information Systems, (2006)