Author of the publication

Reconnecting the Estranged Relationships: Optimizing the Influence Propagation in Evolving Networks.

, , , , , , , and . IEEE Trans. Knowl. Data Eng., 36 (5): 2151-2165 (May 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure range query over encrypted data in outsourced environments., , , , and . World Wide Web, 23 (1): 491-517 (2020)Parallel DICE Cells and Dual-Level CEs based 3-Node-Upset Tolerant Latch Design for Highly Robust Computing., , , , , , and . ITC-Asia, page 1-5. IEEE, (2021)A Novel Spatial Cloaking Scheme Using Hierarchical Hilbert Curve for Location-Based Services., , and . WAIM (2), volume 9659 of Lecture Notes in Computer Science, page 15-27. Springer, (2016)Towards multi-dimensional knowledge-aware approach for effective community detection in LBSN., , , and . World Wide Web (WWW), 26 (4): 1435-1458 (July 2023)A Trust-Based Security System for Data Collection in Smart City., , , , and . IEEE Trans. Ind. Informatics, 17 (6): 4131-4140 (2021)Secure Boolean Spatial Keyword Query With Lightweight Access Control in Cloud Environments., , , , , and . IEEE Internet Things J., 9 (12): 9503-9514 (2022)Efficient Strategy Mining for Football Social Network., , , and . Complex., (2020)Code Property Graph based Vulnerability Type Identification with Fusion Representation., , , , , and . CSCWD, page 1908-1913. IEEE, (2023)Cross Domain on Snippets: BiLSTM-TextCNN based Vulnerability Detection with Domain Adaptation., , , , , and . CSCWD, page 1896-1901. IEEE, (2023)A Sextuple Cross-Coupled Dual-Interlocked-Storage-Cell based Multiple-Node-Upset Self-Recoverable Latch., , , , , , and . NANOARCH, page 1-6. IEEE, (2021)