Author of the publication

Information Recommendation Method Research Based on Trust Network and Collaborative Filtering.

, , and . ICEBE, page 386-391. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IoT-Based Configurable Information Service Platform for Product Lifecycle Management., , , , , and . IEEE Trans. Ind. Informatics, 10 (2): 1558-1567 (2014)A distributed dynamic authorisation method for Internet+ medical & healthcare data access based on consortium blockchain., , , and . Enterp. Inf. Syst., (2022)Context-aware emergency detection method for edge computing-based healthcare monitoring system., , , and . Trans. Emerg. Telecommun. Technol., (2022)An Anomaly Detection Model for Network Intrusions Using One-Class SVM and Scaling Strategy., , and . CollaborateCom, volume 163 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 267-278. Springer, (2015)An Anomaly Detection Model Based on One-Class SVM to Detect Network Intrusions., , and . MSN, page 102-107. IEEE Computer Society, (2015)Information Recommendation Method Research Based on Trust Network and Collaborative Filtering., , and . ICEBE, page 386-391. IEEE Computer Society, (2011)Personal Healthcare Record Integration Method Based on Linked Data Model., , , , and . ICEBE, page 38-43. IEEE Computer Society, (2014)An Anomaly Detection Method Based on Multi-models to Detect Web Attacks., , and . ISCID (2), page 404-409. IEEE, (2017)The design of an m-Health monitoring system based on a cloud computing platform., , , , , and . Enterprise IS, (2017)A method of demand-driven and data-centric Web service configuration for flexible business process implementation., , , , , and . Enterprise IS, 11 (7): 988-1004 (2017)