Qi, Jia-yin
20400  results:
Search for persons X
?
1

A Practical Non-Intrusive Cyber Security Vulnerability Asse..:

, In: 2023 8th International Conference on Data Science in Cyberspace (DSC),
Yang, Jun-zheng ; Liang, Lu-lu ; Qi, Jia-yin - p. 261-269 , 2023
 
?
2

OPO-FCM: A Computational Affection Based OCC-PAD-OCEAN Fede..:

Liu, Feng ; Wang, Han-Yang ; Shen, Si-Yuan...
IEEE Transactions on Computational Social Systems.  10 (2023)  4 - p. 1813-1825 , 2023
 
?
7

NiNSRAPM: An Ensemble Learning Based Non-intrusive Network ..:

, In: 2022 7th IEEE International Conference on Data Science in Cyberspace (DSC),
Yang, Jun-Zheng ; Liu, Feng ; Zhao, Yuan-Jie.. - p. 17-23 , 2022
 
?
 
?
9

The impact of users' characteristics on customer lifetime v..:

Qi, Jia-Yin ; Qu, Qi-Xing ; Zhou, Yong-Pin.
Information Technology and Management.  16 (2014)  4 - p. 273-290 , 2014
 
?
10

How does customer self-construal moderate CRM value creatio..:

Qi, Jia-Yin ; Qu, Qi-Xing ; Zhou, Yong-Pin
Electronic Commerce Research and Applications.  13 (2014)  5 - p. 295-304 , 2014
 
?
11

Are customer satisfaction and customer loyalty drivers of c..:

Qi, Jia-Yin ; Zhou, Yong-Pin ; Chen, Wen-Jing.
Information Technology and Management.  13 (2012)  4 - p. 281-296 , 2012
 
?
12

Advances in intelligent information processing:

Li, Ling ; Warfield, John ; Guo, Shuo Jia..
Information Systems.  32 (2007)  7 - p. 941-943 , 2007
 
?
14

Author Correction: A hybrid with distributed pooling blockc..:

Liu, Feng ; Yang, Cheng-yi ; Yang, Jie...
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC8960868/.  , 2022
 
?
15

Novel Hash-time-lock-contract Based Cross-chain Token Swap ..:

LIU Feng ; ZHANG Jia-hao ; ZHOU Jun-jie...
https://www.jsjkx.com/fileup/1002-137X/PDF/1002-137X-2022-1-336.pdf.  , 2022
 
1-15