Author of the publication

You Are How You Behave - Spatiotemporal Representation Learning for College Student Academic Achievement.

, , , and . J. Comput. Sci. Technol., 35 (2): 353-367 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning Bayesian Networks Structures from Incomplete Data: An Efficient Approach Based on Extended Evolutionary Programming., , and . PAKDD, volume 3518 of Lecture Notes in Computer Science, page 474-479. Springer, (2005)Learning Bayesian Networks Structure with Continuous Variables., , and . ADMA, volume 4093 of Lecture Notes in Computer Science, page 448-456. Springer, (2006)Hybrid Data Clustering Based on Dependency Structure and Gibbs Sampling., , and . Australian Conference on Artificial Intelligence, volume 4304 of Lecture Notes in Computer Science, page 1145-1151. Springer, (2006)Learning Bayesian Networks Structures Based on Memory Binary Particle Swarm Optimization., , and . SEAL, volume 4247 of Lecture Notes in Computer Science, page 568-574. Springer, (2006)A hybrid particle swarm optimization method for structure learning of probabilistic relational models., and . Inf. Sci., (2014)Bose–Einstein condensation on an atom chip, , , , , and . Chinese Physics B, 18 (10): 4259+ (Oct 1, 2009)A Method for Learning Bayesian Networks by Using Immune Binary Particle Swarm Optimization., , and . FGIT-DTA, volume 64 of Communications in Computer and Information Science, page 115-121. Springer, (2009)Efficient vulnerability detection based on an optimized rule-checking static analysis technique., , , , , , , and . Frontiers Inf. Technol. Electron. Eng., 18 (3): 332-345 (2017)A multi-component PSO algorithm with leader learning mechanism for structural damage detection., , and . Appl. Soft Comput., (2022)Research on the application of LDPC code in chaotic sequence image encryption., , , , and . Clust. Comput., 22 (Supplement): 6359-6370 (2019)