Author of the publication

Social media policies as responses for social media affordances: The case of China.

, , , and . Gov. Inf. Q., 33 (2): 313-324 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ACStor: Optimizing Access Performance of Virtual Disk Images in Clouds., , , , , , , and . IEEE Trans. Parallel Distributed Syst., 28 (9): 2414-2427 (2017)Demand Pooling in Omnichannel Operations., , , and . Manag. Sci., 68 (2): 883-894 (2022)Dynamic Database by Inconsistency and Morphogenetic Computing., , and . Trans. Computational Collective Intelligence, (2016)Many-Criteria Evaluation of Infrastructure Investment Priorities for Distribution Network Planning., , , , , , and . IEEE Access, (2020)Development and Evaluation of Hardware Obfuscation Benchmarks., , , , , , and . J. Hardw. Syst. Secur., 2 (2): 142-161 (2018)Short Hierarchical Identity-based Encryption in the Selective-ID Model., , , , and . J. Softw., 8 (7): 1613-1619 (2013)Efficient Erasable PUFs from Programmable Logic and Memristors., , , , , , , , , and . IACR Cryptology ePrint Archive, (2018)Rethinking FPGA Security in the New Era of Artificial Intelligence., and . ISQED, page 46-51. IEEE, (2020)A Dynamic Frequency Scaling Framework Against Reliability and Security Issues in Multi-tenant FPGA., and . FCCM, page 210. IEEE, (2020)Event source identification and strength estimation in wireless sensor networks., , , and . ICNSC, page 1-5. IEEE, (2016)