Author of the publication

Using a coordination degree model to evaluate intensive urban land utilization.

, , , , , and . Geoinformatics, page 1-5. IEEE, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Augmenting matrix factorization technique with the combination of tags and genres, , , , , , , and . Physica A: Statistical Mechanics and its Applications, (2016)Towards Unified Representations of Knowledge Graph and Expert Rules for Machine Learning and Reasoning., , , , , , , and . AACL/IJCNLP (1), page 240-253. Association for Computational Linguistics, (2022)Hardware/Software Security Patches for the Internet of Things., , , and . SMARTCOMP, page 240-245. IEEE, (2021)Cerberus: Query-driven Scalable Vulnerability Detection in OAuth Service Provider Implementations., , and . CCS, page 2459-2473. ACM, (2022)SMS Goes Nuclear: Fortifying SMS-Based MFA in Online Account Ecosystem., , , , , and . DSN Workshops, page 7-14. IEEE, (2021)Using Prior Knowledge to Guide BERT's Attention in Semantic Textual Matching Tasks., , , and . WWW, page 2466-2475. ACM / IW3C2, (2021)Read Between the Lines: An Empirical Measurement of Sensitive Applications of Voice Personal Assistant Systems., , , , and . WWW, page 1006-1017. ACM / IW3C2, (2020)A Vulnerability Detection Algorithm Based on Transformer Model., , , , , and . ICAIS (3), volume 13340 of Lecture Notes in Computer Science, page 43-55. Springer, (2022)Node Deployment and Confident Information Coverage for WSN-based Air Quality Monitoring., , and . iThings/GreenCom/CPSCom/SmartData/Cybermatics, page 101-106. IEEE, (2022)UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware., , , , , , , and . USENIX Security Symposium, page 3421-3438. USENIX Association, (2023)