Search dblp for Publications

export results for "Lijiao Qin"

 download as .bib file

@inproceedings{DBLP:conf/ksem/QinL22,
  author       = {Lijiao Qin and
                  Defu Lian},
  editor       = {G{\'{e}}rard Memmi and
                  Baijian Yang and
                  Linghe Kong and
                  Tianwei Zhang and
                  Meikang Qiu},
  title        = {Adversarial Cycle-Consistent Autoencoder for Category-Aware Out-of-Town
                  Recommendation},
  booktitle    = {Knowledge Science, Engineering and Management - 15th International
                  Conference, {KSEM} 2022, Singapore, August 6-8, 2022, Proceedings,
                  Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13370},
  pages        = {501--515},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-10989-8\_40},
  doi          = {10.1007/978-3-031-10989-8\_40},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ksem/QinL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/ZhaoCLZC19,
  author       = {Ling Zhao and
                  Lijiao Chen and
                  Qing Liu and
                  Mingyao Zhang and
                  Henry Copland},
  title        = {Artificial intelligence-based platform for online teaching management
                  systems},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {37},
  number       = {1},
  pages        = {45--51},
  year         = {2019},
  url          = {https://doi.org/10.3233/JIFS-179062},
  doi          = {10.3233/JIFS-179062},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jifs/ZhaoCLZC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chb/ChengLZS14,
  author       = {Lijiao Cheng and
                  Wenli Li and
                  Qingguo Zhai and
                  Russell Smyth},
  title        = {Understanding personal use of the Internet at work: An integrated
                  model of neutralization techniques and general deterrence theory},
  journal      = {Comput. Hum. Behav.},
  volume       = {38},
  pages        = {220--228},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.chb.2014.05.043},
  doi          = {10.1016/J.CHB.2014.05.043},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chb/ChengLZS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChengLLHZ13,
  author       = {Lijiao Cheng and
                  Ying Li and
                  Wenli Li and
                  Eric Holm and
                  Qingguo Zhai},
  title        = {Understanding the violation of {IS} security policy in organizations:
                  An integrated model based on social control and deterrence theory},
  journal      = {Comput. Secur.},
  volume       = {39},
  pages        = {447--459},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.cose.2013.09.009},
  doi          = {10.1016/J.COSE.2013.09.009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChengLLHZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics