Author of the publication

Exploring the Individual's Behavior on Self-Disclosure Online.

, , , and . Int. J. Hum. Comput. Interaction, 28 (10): 627-645 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploring the Individual's Behavior on Self-Disclosure Online., , , and . Int. J. Hum. Comput. Interaction, 28 (10): 627-645 (2012)Apply Data Mining to Defense-in-Depth Network Security System., , , , and . AINA, page 159-162. IEEE Computer Society, (2005)Transferring fashion to surveillance with weak labels., , , , , and . Neural Comput. Appl., 35 (18): 13021-13035 (June 2023)A Novel Image Ownership Protection Scheme Based on Rehashing Concept and Vector Quantization., , and . Fundam. Informaticae, 71 (4): 443-451 (2006)PALF: compiler supports for irregular register files in clustered VLIW DSP processors., , and . Concurr. Comput. Pract. Exp., 19 (18): 2391-2406 (2007)Correlated activity supports efficient cortical processing., , , , and . Frontiers Comput. Neurosci., (2014)Low Computational Complexity, Low Power, and Low Area Design for the Implementation of Recursive DFT and IDFT Algorithms., , , , and . IEEE Trans. Circuits Syst. II Express Briefs, 56-II (12): 921-925 (2009)Memory access aware power gating for MPSoCs., , , and . ASP-DAC, page 121-126. IEEE, (2012)An ADC-free adaptive interface circuit of resistive sensor for electronic nose system., , and . EMBC, page 2012-2015. IEEE, (2013)Development of an App to Support Self-monitoring Smartphone Usage and Healthcare Behaviors in Daily Life., , and . BDIOT, page 29-34. ACM, (2019)