Author of the publication

Analyzing the Proximity and Interactions of Friends in Communities in Gowalla.

, , and . ICDM Workshops, page 1036-1044. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

K-core-based attack to the internet: Is it more malicious than degree-based attack?, , , , , and . World Wide Web, 18 (3): 749-766 (2015)LabelRankT: incremental community detection in dynamic networks via label propagation., , and . DyNetMM@SIGMOD, page 25-32. ACM, (2013)FCM technique for efficient intrusion detection system for wireless networks in cloud environment., , , and . Comput. Electr. Eng., (2018)A Kind of Variation Symmetry: Tarski Associative Groupoids (TA-Groupoids) and Tarski Associative Neutrosophic Extended Triplet Groupoids (TA-NET-Groupoids)., , , and . Symmetry, 12 (5): 714 (2020)A Fast Algorithm for Solving a Kind of Gauss Hypergeometric Functions in Wireless Communication Based on Pfaff Transformation., , , , and . NaNA, page 85-89. IEEE, (2019)Improving native accent identification using deep neural networks., , , and . INTERSPEECH, page 2170-2174. ISCA, (2014)K-core-preferred Attack to the Internet: Is It More Malicious Than Degree Attack?, , , , and . WAIM, volume 7923 of Lecture Notes in Computer Science, page 717-728. Springer, (2013)Improving Network Community Structure with Link Prediction Ranking., , , and . CompleNet, volume 644 of Studies in Computational Intelligence, page 145-158. Springer, (2016)Identifying robust clusters and multi-community nodes by combining top-down and bottom-up approaches to clustering., , , , , , , , , and 2 other author(s). CoRR, (2015)Weighted Shortest Path Models: A Revisit to the Simulation of Internet Routing., , , and . CoRR, (2014)