Author of the publication

Stochastic Model for Rumor Blocking Problem in Social Networks Under Rumor Source Uncertainty.

, , , and . COCOON (2), volume 14423 of Lecture Notes in Computer Science, page 329-339. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Power allocation algorithm in MC-CDMA., and . ICC, page 931-935. IEEE, (2002)Measurement and Analysis of Network Data Based on MQTT Protocol., , , , , and . ICCT, page 92-96. IEEE, (2020)Empirical Study on the Correlation and Volatility between Bitcoin and the Blockchain Index: Based on Granger causality test and GARCH-class model., , , and . ICCSE, page 28-32. ACM, (2019)TrustAccess: A Trustworthy Secure Ciphertext-Policy and Attribute Hiding Access Control Scheme Based on Blockchain., , , , and . IEEE Trans. Veh. Technol., 69 (6): 5784-5798 (2020)Novel artificial bee colony based feature selection method for filtering redundant information., , and . Appl. Intell., 48 (4): 868-885 (2018)New Algorithm for Minimum Multicast Time Problem in Wireless Sensor Networks., , and . WCNC, page 3529-3534. IEEE, (2007)Effects of Phase Noise at Both Transmitter and Receiver on the Performance of OFDM Systems., , and . CISS, page 312-316. IEEE, (2006)A Review on the Study on MQTT Security Challenge., , , and . SmartCloud, page 128-133. IEEE, (2020)A New Attack Method for Malicious Nodes in Tangle Network., , , , , and . SmartCloud, page 84-87. IEEE, (2020)Research on the Security Criteria of Hash Functions in the Blockchain., , and . BCC@AsiaCCS, page 47-55. ACM, (2018)