Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Risk comprehensive evaluation of urban network planning based on fuzzy Bayesian LS_SVM., , , , , and . Kybernetes, 39 (5): 707-722 (2010)Probabilistic Modeling of IEEE 802.11 Distributed Coordination Functions., , , and . CoRR, (2014)Automatically constructing trusted cluster computing environment., , , , , , and . J. Supercomput., 55 (1): 51-68 (2011)Collaborative Language Grounding Toward Situated Human-Robot Dialogue., , , and . AI Magazine, 37 (4): 32-45 (2016)STAGE: Span Tagging and Greedy Inference Scheme for Aspect Sentiment Triplet Extraction., , , , , and . CoRR, (2022)Exploiting Group-Level Behavior Pattern for Session-Based Recommendation., , , , , , and . IEEE Trans. Knowl. Data Eng., 36 (1): 152-166 (January 2024)Determination of ransomware payment based on Bayesian game models., , and . Comput. Secur., (2022)Quantum Approximate Optimization Algorithm for PD-NOMA User Pairing., , , , , and . ICC, page 2680-2685. IEEE, (2023)Research on Innovative Application Mode of Human-Computer Interaction Design in Data Journalism., , and . HCI (4), volume 12765 of Lecture Notes in Computer Science, page 182-191. Springer, (2021)Improving Personality Consistency in Conversation by Persona Extending., , , , , and . CIKM, page 1350-1359. ACM, (2022)