From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Transitivity Demolition and the Falls of Social Networks., , , , и . CoRR, (2017)An efficient spectral bound for link vulnerability assessment in large-scale networks., , и . MILCOM, стр. 1-6. IEEE, (2012)A method to detect communities with stability in social networks., , , и . Soc. Netw. Anal. Min., 4 (1): 224 (2014)Interest-matching information propagation in multiple online social networks., , , и . CIKM, стр. 1824-1828. ACM, (2012)Cost-aware Targeted Viral Marketing in billion-scale networks., , и . INFOCOM, стр. 1-9. IEEE, (2016)Why approximate when you can get the exact? Optimal targeted viral marketing at scale., , , и . INFOCOM, стр. 1-9. IEEE, (2017)Targeted cyber-attacks: Unveiling target reconnaissance strategy via Social Networks., и . INFOCOM Workshops, стр. 288-293. IEEE, (2016)Hop-Based Sketch for Large-Scale Influence Analysis., и . CSoNet, том 11917 из Lecture Notes in Computer Science, стр. 95-107. Springer, (2019)Multiple Infection Sources Identification with Provable Guarantees., , , и . CIKM, стр. 1663-1672. ACM, (2016)Optimal topology of gene-regulatory networks: role of the average shortest path., , , и . EAI Endorsed Trans. Self Adapt. Syst., 2 (7): e3 (2016)