Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Study of Personalized Network Tutoring System Based on Emotional-cognitive Interaction., , and . Intelligent Information Processing, volume 288 of IFIP Advances in Information and Communication Technology, page 148-154. Springer, (2008)Case-based reasoning application in e-learning., , and . FSKD, page 930-933. IEEE, (2012)An Automated Analyzer for Financial Security of Ethereum Smart Contracts., , , , , , , and . CoRR, (2022)Face detection based on improved AdaBoost algorithm in E-Learning., and . CCIS, page 924-927. IEEE, (2012)Lattice-valued interval soft sets - A general frame of many soft set models., and . J. Intell. Fuzzy Syst., 26 (3): 1311-1321 (2014)SolScope: Effectively Hunting Potential Permission Backdoor Threats in Smart Contracts., , , and . BIGCOM, page 88-95. IEEE, (2023)SmartVerif: Push the Limit of Automation Capability of Verifying Security Protocols by Dynamic Strategies., , , , , and . USENIX Security Symposium, page 253-270. USENIX Association, (2020)Research of improved SVM model based on GA in E-learning emotion classification., and . CCIS, page 919-923. IEEE, (2012)Application research of support vector machine in E-Learning for personality., and . CCIS, page 638-642. IEEE, (2011)Face detection based on adaboost and face contour in e-learning., and . ICNC, page 1026-1030. IEEE, (2013)