Author of the publication

Influence maximization in the presence of vulnerable nodes: A ratio perspective.

, , , and . Theor. Comput. Sci., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Where Graph Topology Matters: The Robust Subgraph Problem., , and . SDM, page 10-18. SIAM, (2015)Limiting the Influence to Vulnerable Users in Social Networks: A Ratio Perspective., , , and . AINA, volume 926 of Advances in Intelligent Systems and Computing, page 1106-1122. Springer, (2019)Altruism in Facility Location Problems., , and . AAAI, page 9993-10001. AAAI Press, (2024)Strategyproof Mechanisms for Group-Fair Obnoxious Facility Location Problems., , and . AAAI, page 9832-9839. AAAI Press, (2024)Computing Nash Equilibrium in Interdependent Defense Games., and . AAAI, page 842-850. AAAI Press, (2015)Computing Nash Equilibria in Generalized Interdependent Security Games., and . NIPS, page 2735-2743. (2014)The Price of Anarchy of Self-Selection in Tullock Contests., , and . AAMAS, page 1795-1797. International Foundation for Autonomous Agents and Multiagent Systems, (2020)From Empirical Analysis to Public Policy: Evaluating Housing Systems for Homeless Youth., , , , and . ECML/PKDD (3), volume 11053 of Lecture Notes in Computer Science, page 69-85. Springer, (2018)External Evaluation of Topic Models: A Graph Mining Approach., and . ICDM, page 973-978. IEEE Computer Society, (2013)Truthful Multi-unit Procurements with Budgets., and . WINE, volume 8877 of Lecture Notes in Computer Science, page 89-105. Springer, (2014)