Author of the publication

Information Spreading Forensics via Sequential Dependent Snapshots.

, , and . IEEE/ACM Trans. Netw., 26 (1): 478-491 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Beyond the Click-Through Rate: Web Link Selection with Multi-level Feedback., , , and . IJCAI, page 3308-3314. ijcai.org, (2018)Exploiting the Overheard Information of Coded Caching for Heterogeneous Lossy Channels., , , , and . VTC Fall, page 1-6. IEEE, (2023)Quantum Networks with Multiple Service Providers: Transport Layer Protocols and Research Opportunities., , , , and . IEEE Netw., 36 (5): 56-62 (2022)Merit-Based Fair Combinatorial Semi-Bandit with Unrestricted Feedback Delays., , , , and . ECAI, volume 392 of Frontiers in Artificial Intelligence and Applications, page 2058-2065. IOS Press, (2024)Data-Driven Rate Control for RDMA Networks: A Lightweight Online Learning Approach., , , , , and . ICDCS, page 1-11. IEEE, (2023)Fair Distributed Cooperative Bandit Learning on Networks for Intelligent Internet of Things Systems (Technical Report)., , , and . CoRR, (2024)Incremental Least-Recently-Used Algorithm: Good, Robust, and Predictable Performance., , and . ICC Workshops, page 514-519. IEEE, (2024)New Results on Coded Caching in Partially Cooperative D2D Networks., , , , , and . ISIT, page 1556-1561. IEEE, (2024)Skeleton Extraction from Incomplete Boundaries in Sensor Networks Based on Distance Transform., , , , , , and . ICDCS, page 42-51. IEEE Computer Society, (2012)BAGEL: Backdoor Attacks against Federated Contrastive Learning., , , , , , , and . CoRR, (2023)