Author of the publication

Research on user relationship networks of SNS based on the Forest Fire model.

, , , and . CCIS, page 165-170. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Construction of the Enterprise-level RFID Security and Privacy Management Using Role-Based Key Management., , , and . SMC, page 3310-3317. IEEE, (2006)An Approach of Digital Rights Management for E-Museum with Enforce Context Constraints in RBAC Environments., , , and . SMC, page 1871-1878. IEEE, (2006)ROLIG3A: Protecting Group Secret Key Generation Procedures against Malicious Attackers., , , , and . VTC Fall, page 1-5. IEEE, (2021)Feature enhancement modules applied to a feature pyramid network for object detection., , , , and . Pattern Anal. Appl., 26 (2): 617-629 (May 2023)WSMeter: A Performance Evaluation Methodology for Google's Production Warehouse-Scale Computers., , , , , and . ASPLOS, page 549-563. ACM, (2018)cHRV Uncovering Daily Stress Dynamics Using Bio-Signal from Consumer Wearables., , , , and . MedInfo, volume 245 of Studies in Health Technology and Informatics, page 98-102. IOS Press, (2017)Application of Web Data Mining Based on the Neural Network Algorithms in E-Commerce.. ICEBE, page 509-512. IEEE Computer Society, (2010)An Adaptive, Data-Driven Personalized Advisor for Increasing Physical Activity., , , , , , and . IEEE J. Biomed. Health Informatics, 23 (3): 999-1010 (2019)Graphene-Ag Hybrids on Laser-Textured Si Surface for SERS Detection., , , and . Sensors, 17 (7): 1462 (2017)A Case Against CXL Memory Pooling., , and . HotNets, page 18-24. ACM, (2023)