Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting abnormal attention in online social networks from local views., , , and . ICA, page 2-7. IEEE, (2017)Community Discovery for Knowledge Collaborations in Collective intelligence Systems., , , and . J. Inf. Process., 22 (2): 243-252 (2014)Trustworthy Stigmergic Service Compositionand Adaptation in Decentralized Environments., , and . IEEE Trans. Serv. Comput., 9 (2): 317-329 (2016)Specifying and Reasoning about Contextual Preferences in the Goal-oriented Requirements Modelling., , , , and . CoRR, (2019)P2P Distributed Intrusion Detections by Using Mobile Agents., , , and . ACIS-ICIS, page 259-265. IEEE Computer Society, (2008)Hybrid CNN-Interpreter: Interprete Local and Global Contexts for CNN-Based Models., , , , , and . AI (2), volume 14472 of Lecture Notes in Computer Science, page 197-208. Springer, (2023)Simmelian Ties and Structural Holes: Exploring Their Topological Roles in Forming Trust for Securing Wireless Sensor Networks., , , and . TrustCom/BigDataSE/ISPA (1), page 96-103. IEEE, (2015)SWARM: An Approach for Mining Semantic Association Rules from Semantic Web Data., , and . PRICAI, volume 9810 of Lecture Notes in Computer Science, page 30-43. Springer, (2016)GTrust: An Innovated Trust Model for Group Services Selection in Web-Based Service-Oriented Environments., , , and . WISE, volume 6997 of Lecture Notes in Computer Science, page 306-313. Springer, (2011)Stigmergic Modeling for Web Service Composition and Adaptation., , and . PRICAI, volume 7458 of Lecture Notes in Computer Science, page 324-334. Springer, (2012)