Author of the publication

Theft prediction with individual risk factor of visitors.

, , and . SIGSPATIAL/GIS, page 552-555. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effect of node deleting on network structure, , and . Physica A: Statistical Mechanics and its Applications, 379 (2): 714--726 (Jun 15, 2007)Telco Churn Prediction with Big Data, , , , , , , , and . Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, page 607--618. New York, NY, USA, ACM, (2015)Structural Learning of Graphical Models and Its Applications to Traditional Chinese Medicine., , , and . FSKD (2), volume 3614 of Lecture Notes in Computer Science, page 362-367. Springer, (2005)Best point detour query in road networks., , and . GIS, page 71-80. ACM, (2010)Finding the most accessible locations: reverse path nearest neighbor query in road networks., , , , and . GIS, page 181-190. ACM, (2011)Exemplar-Based Human Action Pose Correction., , , , , and . IEEE Trans. Cybern., 44 (7): 1053-1066 (2014)Discrete-Time Direct Model Reference Adaptive Control Application in a High-Precision Inertially Stabilized Platform., , , and . IEEE Trans. Ind. Electron., 66 (1): 358-367 (2019)Efficient profiling for estimation of query result quality., , , and . ICIQ, MIT Information Quality Program, (2011)Analysis and Applications of Location-Aware Big Complex Network Data., , , and . Complex., (2019)Toward Enhancing Room Layout Estimation by Feature Pyramid Networks., , , , , and . Data Sci. Eng., 7 (3): 213-224 (2022)