Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "Lijiao Qin"
@inproceedings{DBLP:conf/ksem/QinL22, author = {Lijiao Qin and Defu Lian}, editor = {G{\'{e}}rard Memmi and Baijian Yang and Linghe Kong and Tianwei Zhang and Meikang Qiu}, title = {Adversarial Cycle-Consistent Autoencoder for Category-Aware Out-of-Town Recommendation}, booktitle = {Knowledge Science, Engineering and Management - 15th International Conference, {KSEM} 2022, Singapore, August 6-8, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13370}, pages = {501--515}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-10989-8\_40}, doi = {10.1007/978-3-031-10989-8\_40}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ksem/QinL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/ZhaoCLZC19, author = {Ling Zhao and Lijiao Chen and Qing Liu and Mingyao Zhang and Henry Copland}, title = {Artificial intelligence-based platform for online teaching management systems}, journal = {J. Intell. Fuzzy Syst.}, volume = {37}, number = {1}, pages = {45--51}, year = {2019}, url = {https://doi.org/10.3233/JIFS-179062}, doi = {10.3233/JIFS-179062}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jifs/ZhaoCLZC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chb/ChengLZS14, author = {Lijiao Cheng and Wenli Li and Qingguo Zhai and Russell Smyth}, title = {Understanding personal use of the Internet at work: An integrated model of neutralization techniques and general deterrence theory}, journal = {Comput. Hum. Behav.}, volume = {38}, pages = {220--228}, year = {2014}, url = {https://doi.org/10.1016/j.chb.2014.05.043}, doi = {10.1016/J.CHB.2014.05.043}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chb/ChengLZS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChengLLHZ13, author = {Lijiao Cheng and Ying Li and Wenli Li and Eric Holm and Qingguo Zhai}, title = {Understanding the violation of {IS} security policy in organizations: An integrated model based on social control and deterrence theory}, journal = {Comput. Secur.}, volume = {39}, pages = {447--459}, year = {2013}, url = {https://doi.org/10.1016/j.cose.2013.09.009}, doi = {10.1016/J.COSE.2013.09.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChengLLHZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.