Author of the publication

Misinformation influence minimization problem based on group disbanded in social networks.

, , , and . Inf. Sci., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TrustAccess: A Trustworthy Secure Ciphertext-Policy and Attribute Hiding Access Control Scheme Based on Blockchain., , , , and . IEEE Trans. Veh. Technol., 69 (6): 5784-5798 (2020)Novel artificial bee colony based feature selection method for filtering redundant information., , and . Appl. Intell., 48 (4): 868-885 (2018)Measurement and Analysis of Network Data Based on MQTT Protocol., , , , , and . ICCT, page 92-96. IEEE, (2020)Empirical Study on the Correlation and Volatility between Bitcoin and the Blockchain Index: Based on Granger causality test and GARCH-class model., , , and . ICCSE, page 28-32. ACM, (2019)Power allocation algorithm in MC-CDMA., and . ICC, page 931-935. IEEE, (2002)New Algorithm for Minimum Multicast Time Problem in Wireless Sensor Networks., , and . WCNC, page 3529-3534. IEEE, (2007)Research on the Security Criteria of Hash Functions in the Blockchain., , and . BCC@AsiaCCS, page 47-55. ACM, (2018)A Review on the Study on MQTT Security Challenge., , , and . SmartCloud, page 128-133. IEEE, (2020)A New Attack Method for Malicious Nodes in Tangle Network., , , , , and . SmartCloud, page 84-87. IEEE, (2020)Locally Differential Private Federated Learning with Controllable Perturbation Domains., and . NaNA, page 637-644. IEEE, (2023)