Author of the publication

Finding δ-Closure Property of BitTorrent System and Applications Based on This Property.

, , , , and . ISCTCS, volume 320 of Communications in Computer and Information Science, page 530-538. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Multi-layer Event Detection Algorithm for Detecting Global and Local Hot Events in Social Networks., , , and . ICCS, volume 29 of Procedia Computer Science, page 2080-2089. Elsevier, (2014)IEEE Access Special Section: Curbing Crowdturfing in Online Social Networks., , , and . IEEE Access, (2018)Exploring probabilistic follow relationship to prevent collusive peer-to-peer piracy., , , , , , and . Knowl. Inf. Syst., 48 (1): 111-141 (2016)Knowledge Graph Embedding by Double Limit Scoring Loss., , , , , , and . IEEE Trans. Knowl. Data Eng., 34 (12): 5825-5839 (2022)Research of Security Relationship Based on Social Networks., , , and . ISCTCS, volume 320 of Communications in Computer and Information Science, page 547-554. Springer, (2012)A co-training method for identifying the same person across social networks., , , , , and . GlobalSIP, page 1412-1416. IEEE, (2017)RLINK: Deep Reinforcement Learning for User Identity Linkage., , , , , and . CoRR, (2019)Learning Knowledge Graph Embeddings via Generalized Hyperplanes., , , , and . ICCS (1), volume 10860 of Lecture Notes in Computer Science, page 624-638. Springer, (2018)DAN: Deep Attention Neural Network for News Recommendation., , , , and . AAAI, page 5973-5980. AAAI Press, (2019)Malicious Domain Detection with Heterogeneous Graph Propagation Network., , , , , and . WASA (1), volume 13471 of Lecture Notes in Computer Science, page 545-556. Springer, (2022)