Author of the publication

Author Name Disambiguation for Citations Using Topic and Web Correlation.

, , , , and . ECDL, volume 5173 of Lecture Notes in Computer Science, page 185-196. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DroidCIA: A Novel Detection Method of Code Injection Attacks on HTML5-Based Mobile Apps., , , and . TrustCom/BigDataSE/ISPA (1), page 1014-1021. IEEE, (2015)Trading Decision Maker: Stock Trading Decision by Price Series Smoothing and Tendency Transition Inference., , and . EEE, page 359-362. IEEE Computer Society, (2005)How to solve collision and authentication issues using RFID protocol technology., , , , and . ICMLC, page 454-460. IEEE, (2011)Efficiency validation of fuzzy domain theories using a neural network model., , and . ICTAI, page 81-88. IEEE Computer Society, (1998)DDIM-CAPTCHA: A Novel Drag-n-Drop Interactive Masking CAPTCHA against the Third Party Human Attacks., , , , and . TAAI, page 158-163. IEEE Computer Society, (2013)Efficient GML-native processors for web-based GIS: techniques and tools., , , and . GIS, page 91-98. ACM, (2006)SBAD: Sequence Based Attack Detection via Sequence Comparison., , , and . PSDML, volume 6549 of Lecture Notes in Computer Science, page 78-91. Springer, (2010)Semantic Similarity Measurement of Chinese Financial News Titles Based on Event Frame Extracting., , , and . ICEBE, page 229-236. IEEE Computer Society, (2006)A multiclass neural network classifier with fuzzy teaching inputs., , and . Fuzzy Sets Syst., 91 (1): 15-35 (1997)Personalized e-learning system using Item Response Theory., , and . Comput. Educ., 44 (3): 237-255 (2005)