Author of the publication

Misinformation in the Chinese Weibo.

, and . HCI (14), volume 12194 of Lecture Notes in Computer Science, page 407-418. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

White noise Hinfinity fixed-lag smoothing for continuous time systems, , and . Signal Processing, 87 (3): 432--440 (March 2007)Computational Analysis of Emotions and Topics in Survivor Interviews about Nanking Massacre., , , and . DH, (2020)Research Progress and Trend of Coflow Time-Optimal Scheduling in Data Center Network., , , , and . ICAIS (2), volume 13339 of Lecture Notes in Computer Science, page 560-572. Springer, (2022)The effects of awareness of group members' rationale on collaborative learning activities.. CSCL, page 874-876. International Society of the Learning Sciences / ACM DL, (2007)Privacy Behaviour and Profile Configuration in Twitter., , , and . WWW (Companion Volume), page 575-580. ACM, (2016)Application and evaluation about obstacle edge extraction technology in the parking assistant system., , , and . Int. J. Comput. Intell. Syst., 4 (6): 1342-1349 (2011)The effect of prediscussion note-taking in hidden profile tasks., , , and . J. Assoc. Inf. Sci. Technol., 69 (4): 566-577 (2018)Does Social Network Always Promote Entrepreneurial Intentions? Part I: Theoretical Model., and . ICONIP (1), volume 7663 of Lecture Notes in Computer Science, page 1-7. Springer, (2012)Supporting parent-young child activities with interactive tabletops: a conceptual analysis., and . CSCW (Companion), page 301-310. ACM, (2012)Architecture Anti-Patterns: Automatically Detectable Violations of Design Principles., , , , and . IEEE Trans. Software Eng., 47 (5): 1008-1028 (2021)