Author of the publication

Understanding Network Characteristics of Spam Users in Social Media.

, , and . CBD, page 171-176. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Replica Replacement Algorithm Based on Value-Cost Prediction., , and . CSCWD (Selected Papers), volume 5236 of Lecture Notes in Computer Science, page 365-373. Springer, (2007)Link prediction in temporal networks: Integrating survival analysis and game theory., , , , , and . Inf. Sci., (2019)Efficient batch similarity join processing of social images based on arbitrary features., , , , and . World Wide Web, 19 (4): 725-753 (2016)Efficiently Translating Complex SQL Query to MapReduce Jobflow on Cloud., , , , and . IEEE Trans. Cloud Comput., 8 (2): 508-517 (2020)QoS Deviation Distance Based Negotiation Algorithm in Grid Resource Advance Reservation., , , and . CSCWD, page 605-610. IEEE, (2007)Online Matching with Stochastic Rewards: Advanced Analyses Using Configuration Linear Programs., , , , , and . WINE, volume 14413 of Lecture Notes in Computer Science, page 384-401. Springer, (2023)Understanding Network Characteristics of Spam Users in Social Media., , and . CBD, page 171-176. IEEE, (2020)Towards a Tricksy Group Shilling Attack Model against Recommender Systems., , , and . ADMA, volume 7713 of Lecture Notes in Computer Science, page 675-688. Springer, (2012)Popular Items or Niche Items: Flexible Recommendation Using Cosine Patterns., , , , and . ICDM Workshops, page 205-212. IEEE Computer Society, (2014)SEA: a system for event analysis on chinese tweets., , , , , and . KDD, page 1498-1501. ACM, (2013)