Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A trust model for vehicular network-based incident reports., , , and . WiVeC, page 1-5. IEEE, (2013)Optimizing the spatial assignment of schools through a random mechanism towards equal educational opportunity: A resemblance approach., , and . Computers, Environment and Urban Systems, (2019)Epidemic Behavior of Negative Users in Online Social Sites., , and . CODASPY, page 143-145. ACM, (2015)A hybrid epidemic model for deindividuation and antinormative behavior in online social networks., , , and . Social Netw. Analys. Mining, 6 (1): 13:1-13:11 (2016)A Hybrid Epidemic Model for Antinormative Behavior in Online Social Networks., , , and . ASONAM, page 1563-1564. ACM, (2015)Examining the Driving Factors Causing Rapid Urban Expansion in China: An Analysis Based on GlobeLand30 Data., , , and . ISPRS Int. J. Geo-Information, 6 (9): 264 (2017)Towards Provenance-Based Anomaly Detection in MapReduce., and . CCGRID, page 647-656. IEEE Computer Society, (2015)Weighing Technology for High-Speed Moving Vehicle Based on Wireless Sensor Networks., , and . JNW, 9 (10): 2821-2827 (2014)Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation., , , , and . CoRR, (2018)LAST-HDFS: Location-Aware Storage Technique for Hadoop Distributed File System., , and . CLOUD, page 662-669. IEEE, (2016)