Author of the publication

Proceedings of the 2014 International Conference on Social Computing, Beijing, China, August 04 - 07, 2014

, , , and (Eds.) ACM, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Closed-Form Equations and Experimental Verification for Soft Robot Arm Based on Cosserat Theory*., , , , , and . IROS, page 6630-6635. IEEE, (2019)Memory Network-Based Quality Normalization of Magnetic Resonance Images for Brain Segmentation., , , , and . IScIDE (1), volume 11935 of Lecture Notes in Computer Science, page 58-67. Springer, (2019)Reference-Guided Large-Scale Face Inpainting With Identity and Texture Control., , and . IEEE Trans. Circuits Syst. Video Technol., 33 (10): 5498-5509 (October 2023)RankGene: identification of diagnostic genes based on expression data., , , , and . Bioinform., 19 (12): 1578-1579 (2003)Enhancing OSS Patch Backporting with Semantics., , , , , and . CCS, page 2366-2380. ACM, (2023)Hash Hardware Generator Based on Mutual Perturbed Logistic Map., , , , and . HPCC/SmartCity/DSS, page 353-358. IEEE, (2019)USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs., , , and . USENIX Security Symposium, page 1145-1161. USENIX Association, (2017)Hardware Tripartite Synapse Architecture based on Stochastic Computing., , , , and . TASE, page 81-85. IEEE, (2019)Leaving Your Things Unattended is No Joke! Memory Bus Snooping and Open Debug Interface Exploits., and . PerCom Workshops, page 643-648. IEEE, (2022)Joint Node and Resource Scheduling Strategy for the Distributed MIMO Radar Network Target Tracking via Convex Programming., , , and . IGARSS, page 4098-4101. IEEE, (2022)