Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploring the efficiency and mechanism of whistleblowing system on social networking site., , and . ICC, page 3740-3745. IEEE, (2014)Learning Graph Embedding with Limited Labeled Data: An Efficient Sampling Approach., , , , , and . CoRR, (2020)CORA: Conflict Razor for Policies in SDN., , , , , , , , , and . INFOCOM, page 423-431. IEEE, (2018)Data Protection Method Against Cross-Domain Inference Threat in Cyber-Physical Power Grid., , , , , and . IEEE Trans. Smart Grid, 15 (4): 4170-4181 (July 2024)Routing optimization for server-centric data center networks., , , , and . Comput. Sci. Inf. Syst., 13 (2): 593-608 (2016)A Co-Evolutionary Model for Inferring Online Social Network User Behaviors., , , , , and . SPAC, page 85-90. IEEE, (2018)MIRACLE: A multiple independent random walks community parallel detection algorithm for big graphs., , , and . J. Netw. Comput. Appl., (2016)A time-varying propagation model of hot topic on BBS sites and Blog networks., , , and . Inf. Sci., (2012)The popularity of contradictory information about COVID-19 vaccine on social media in China., and . Comput. Hum. Behav., (2022)An Unsupervised-Learning Based Method for Detecting Groups of Malicious Web Crawlers in Internet., , , , , , and . CASE, page 367-372. IEEE, (2021)