Author of the publication

Building Water Resource Management and Decision Service: In Case Study of Qingyi River in China.

, , and . Agro-Geoinformatics, page 1-5. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PrivacyContext: identifying malicious mobile privacy leak using program context., and . Int. J. Inf. Comput. Secur., 11 (6): 562-584 (2019)The study about flow velocity measurement with spatial filter principle based on the electrostatic sensor., , , and . EMEIT, page 2865-2868. IEEE, (2011)A Calibration Method for Vehicular Dual-channel Radar Doppler Velocimeter with Janus Configuration., , , , and . I2MTC, page 1-5. IEEE, (2021)A UAV Cluster Goods Delivery Task Assignment Method Based on Graph Matching and Reinforcement Learning., , , , and . JCRAI, page 184-192. ACM, (2023)Web service sub-chain recommendation leveraging graph searching., , , and . ComComAP, page 271-275. IEEE, (2014)How to Develop Service Climate in G2B E-Service Industry: a Multi-method Study., , and . PACIS, page 351. (2016)Hadoop-RINS - A Hadoop Accelerated Pipeline for Rapid Nonhuman Sequence Identification., , , , , and . BIOINFORMATICS, page 296-299. SciTePress, (2013)A Survey of Large Language Models, , , , , , , , , and 12 other author(s). (2023)cite arxiv:2303.18223Comment: ongoing work; 85 pages, 610 citations.LeakDoctor: Toward Automatically Diagnosing Privacy Leaks in Mobile Applications., , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 3 (1): 28:1-28:25 (2019)Image-Based Insider Threat Detection via Geometric Transformation., , , , , and . Secur. Commun. Networks, (2021)