BibTeX records: Jiaojiao Jiang

download as .bib file

@article{DBLP:journals/tifs/KarunanayakeJAJ24,
  author       = {Ishan Karunanayake and
                  Jiaojiao Jiang and
                  Nadeem Ahmed and
                  Sanjay K. Jha},
  title        = {Exploring Uncharted Waters of Website Fingerprinting},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1840--1854},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3342607},
  doi          = {10.1109/TIFS.2023.3342607},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/KarunanayakeJAJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecir/MalikJSJ24,
  author       = {Marium Malik and
                  Jiaojiao Jiang and
                  Yang Song and
                  Sanjay Jha},
  editor       = {Nazli Goharian and
                  Nicola Tonellotto and
                  Yulan He and
                  Aldo Lipani and
                  Graham McDonald and
                  Craig Macdonald and
                  Iadh Ounis},
  title        = {{MFVIEW:} Multi-modal Fake News Detection with View-Specific Information
                  Extraction},
  booktitle    = {Advances in Information Retrieval - 46th European Conference on Information
                  Retrieval, {ECIR} 2024, Glasgow, UK, March 24-28, 2024, Proceedings,
                  Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14610},
  pages        = {345--353},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-56063-7\_26},
  doi          = {10.1007/978-3-031-56063-7\_26},
  timestamp    = {Fri, 29 Mar 2024 23:01:35 +0100},
  biburl       = {https://dblp.org/rec/conf/ecir/MalikJSJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/SunDJXMTZ23,
  author       = {Nan Sun and
                  Ming Ding and
                  Jiaojiao Jiang and
                  Weikang Xu and
                  Xiaoxing Mo and
                  Yonghang Tai and
                  Jun Zhang},
  title        = {Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense:
                  {A} Survey and New Perspectives},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {25},
  number       = {3},
  pages        = {1748--1774},
  year         = {2023},
  url          = {https://doi.org/10.1109/COMST.2023.3273282},
  doi          = {10.1109/COMST.2023.3273282},
  timestamp    = {Tue, 31 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comsur/SunDJXMTZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/YangVCJY0023,
  author       = {Shuiqiao Yang and
                  Sunny Verma and
                  Borui Cai and
                  Jiaojiao Jiang and
                  Kun Yu and
                  Fang Chen and
                  Shui Yu},
  title        = {Variational co-embedding learning for attributed network clustering},
  journal      = {Knowl. Based Syst.},
  volume       = {270},
  pages        = {110530},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.knosys.2023.110530},
  doi          = {10.1016/J.KNOSYS.2023.110530},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/kbs/YangVCJY0023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/complexnetworks/MaRJ23,
  author       = {Boqian Ma and
                  Hao Ren and
                  Jiaojiao Jiang},
  editor       = {Hocine Cherifi and
                  Luis M. Rocha and
                  Chantal Cherifi and
                  Murat Donduran},
  title        = {Influence Robustness of Nodes in Multiplex Networks Against Attacks},
  booktitle    = {Complex Networks {\&} Their Applications {XII} - Proceedings of
                  The Twelfth International Conference on Complex Networks and their
                  Applications: {COMPLEX} {NETWORKS} 2023, Menton, France, 28-30 November,
                  2023, Volume 3},
  series       = {Studies in Computational Intelligence},
  volume       = {1143},
  pages        = {62--74},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-53472-0\_6},
  doi          = {10.1007/978-3-031-53472-0\_6},
  timestamp    = {Mon, 15 Apr 2024 15:50:21 +0200},
  biburl       = {https://dblp.org/rec/conf/complexnetworks/MaRJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-07617,
  author       = {Boqian Ma and
                  Hao Ren and
                  Jiaojiao Jiang},
  title        = {Influence Robustness of Nodes in Multiplex Networks against Attacks},
  journal      = {CoRR},
  volume       = {abs/2309.07617},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.07617},
  doi          = {10.48550/ARXIV.2309.07617},
  eprinttype    = {arXiv},
  eprint       = {2309.07617},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-07617.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/infsof/HossainJHKSL22,
  author       = {Md. Arafat Hossain and
                  Jiaojiao Jiang and
                  Jun Han and
                  Muhammad Ashad Kabir and
                  Jean{-}Guy Schneider and
                  Chengfei Liu},
  title        = {Inferring data model from service interactions for response generation
                  in service virtualization},
  journal      = {Inf. Softw. Technol.},
  volume       = {145},
  pages        = {106803},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.infsof.2021.106803},
  doi          = {10.1016/J.INFSOF.2021.106803},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/infsof/HossainJHKSL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/YangCCSJLL22,
  author       = {Shuiqiao Yang and
                  Borui Cai and
                  Taotao Cai and
                  Xiangyu Song and
                  Jiaojiao Jiang and
                  Bing Li and
                  Jianxin Li},
  title        = {Robust cross-network node classification via constrained graph mutual
                  information},
  journal      = {Knowl. Based Syst.},
  volume       = {257},
  pages        = {109852},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.knosys.2022.109852},
  doi          = {10.1016/J.KNOSYS.2022.109852},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/kbs/YangCCSJLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/JiangYJ22,
  author       = {Jiaojiao Jiang and
                  Shuiqiao Yang and
                  Sanjay Jha},
  title        = {Network Growth From Global and Local Influential Nodes},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {9},
  number       = {4},
  pages        = {2549--2561},
  year         = {2022},
  url          = {https://doi.org/10.1109/TNSE.2022.3165528},
  doi          = {10.1109/TNSE.2022.3165528},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnse/JiangYJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/HossainHSJKV22,
  author       = {Md. Arafat Hossain and
                  Jun Han and
                  Jean{-}Guy Schneider and
                  Jiaojiao Jiang and
                  Muhammad Ashad Kabir and
                  Steve Versteeg},
  title        = {Extracting Formats of Service Messages with Varying Payloads},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {22},
  number       = {3},
  pages        = {71:1--71:31},
  year         = {2022},
  url          = {https://doi.org/10.1145/3503159},
  doi          = {10.1145/3503159},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/toit/HossainHSJKV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/QuCWJW22,
  author       = {Danni Qu and
                  Qi Chen and
                  Jiahui Wang and
                  Jiaojiao Jiang and
                  Zhen Wang},
  title        = {The Effect of Source Location on the Effectiveness of Source Detection
                  in Finite Networks},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2022, Seoul,
                  Korea, May 16-20, 2022},
  pages        = {4104--4113},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICC45855.2022.9838272},
  doi          = {10.1109/ICC45855.2022.9838272},
  timestamp    = {Sun, 30 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/QuCWJW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-07039,
  author       = {Jin Ho Go and
                  Alina Sari and
                  Jiaojiao Jiang and
                  Shuiqiao Yang and
                  Sanjay K. Jha},
  title        = {Fake News Quick Detection on Dynamic Heterogeneous Information Networks},
  journal      = {CoRR},
  volume       = {abs/2205.07039},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.07039},
  doi          = {10.48550/ARXIV.2205.07039},
  eprinttype    = {arXiv},
  eprint       = {2205.07039},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-07039.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/JiangSVHHL21,
  author       = {Jiaojiao Jiang and
                  Jean{-}Guy Schneider and
                  Steve Versteeg and
                  Jun Han and
                  Md. Arafat Hossain and
                  Chengfei Liu},
  title        = {R-gram: Inferring message formats of service protocols with relative
                  positional n-grams},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {196},
  pages        = {103247},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jnca.2021.103247},
  doi          = {10.1016/J.JNCA.2021.103247},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/JiangSVHHL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-00487,
  author       = {Jiaojiao Jiang and
                  Sanjay Jha},
  title        = {Network Growth From Global and Local Influential Nodes},
  journal      = {CoRR},
  volume       = {abs/2103.00487},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.00487},
  eprinttype    = {arXiv},
  eprint       = {2103.00487},
  timestamp    = {Tue, 03 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-00487.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2104-07295,
  author       = {Shuiqiao Yang and
                  Sunny Verma and
                  Borui Cai and
                  Jiaojiao Jiang and
                  Kun Yu and
                  Fang Chen and
                  Shui Yu},
  title        = {Variational Co-embedding Learning for Attributed Network Clustering},
  journal      = {CoRR},
  volume       = {abs/2104.07295},
  year         = {2021},
  url          = {https://arxiv.org/abs/2104.07295},
  eprinttype    = {arXiv},
  eprint       = {2104.07295},
  timestamp    = {Thu, 01 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2104-07295.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/JiangVHHS20,
  author       = {Jiaojiao Jiang and
                  Steve Versteeg and
                  Jun Han and
                  Md. Arafat Hossain and
                  Jean{-}Guy Schneider},
  title        = {A positional keyword-based approach to inferring fine-grained message
                  formats},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {102},
  pages        = {369--381},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.future.2019.08.011},
  doi          = {10.1016/J.FUTURE.2019.08.011},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/JiangVHHS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ojcomps/YangJPYCY20,
  author       = {Shuiqiao Yang and
                  Jiaojiao Jiang and
                  Arindam Pal and
                  Kun Yu and
                  Fang Chen and
                  Shui Yu},
  title        = {Analysis and Insights for Myths Circulating on Twitter During the
                  {COVID-19} Pandemic},
  journal      = {{IEEE} Open J. Comput. Soc.},
  volume       = {1},
  pages        = {209--219},
  year         = {2020},
  url          = {https://doi.org/10.1109/OJCS.2020.3028573},
  doi          = {10.1109/OJCS.2020.3028573},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ojcomps/YangJPYCY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/JiangWYLXZ19,
  author       = {Jiaojiao Jiang and
                  Sheng Wen and
                  Shui Yu and
                  Bo Liu and
                  Yang Xiang and
                  Wanlei Zhou},
  title        = {Malicious Attack Propagation and Source Identification},
  series       = {Advances in Information Security},
  volume       = {73},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-02179-5},
  doi          = {10.1007/978-3-030-02179-5},
  isbn         = {978-3-030-02178-8},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/JiangWYLXZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/JiangVHHSLF19,
  author       = {Jiaojiao Jiang and
                  Steve Versteeg and
                  Jun Han and
                  Md. Arafat Hossain and
                  Jean{-}Guy Schneider and
                  Christopher Leckie and
                  Zeinab Farahmandpour},
  title        = {P-Gram: Positional N-Gram for the Clustering of Machine-Generated
                  Messages},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {88504--88516},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2924928},
  doi          = {10.1109/ACCESS.2019.2924928},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/JiangVHHSLF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/JiangGJLYXG19,
  author       = {Jiaojiao Jiang and
                  Longxiang Gao and
                  Jiong Jin and
                  Tom H. Luan and
                  Shui Yu and
                  Yong Xiang and
                  Saurabh Kumar Garg},
  title        = {Sustainability Analysis for Fog Nodes With Renewable Energy Supplies},
  journal      = {{IEEE} Internet Things J.},
  volume       = {6},
  number       = {4},
  pages        = {6725--6735},
  year         = {2019},
  url          = {https://doi.org/10.1109/JIOT.2019.2910875},
  doi          = {10.1109/JIOT.2019.2910875},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/JiangGJLYXG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JiangWYXZ18,
  author       = {Jiao Jiao Jiang and
                  Sheng Wen and
                  Shui Yu and
                  Yang Xiang and
                  Wanlei Zhou},
  title        = {Rumor Source Identification in Social Networks with Time-Varying Topology},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {15},
  number       = {1},
  pages        = {166--179},
  year         = {2018},
  url          = {https://doi.org/10.1109/TDSC.2016.2522436},
  doi          = {10.1109/TDSC.2016.2522436},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/JiangWYXZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcre/HossainVHKJS18,
  author       = {Md. Arafat Hossain and
                  Steve Versteeg and
                  Jun Han and
                  Muhammad Ashad Kabir and
                  Jiaojiao Jiang and
                  Jean{-}Guy Schneider},
  editor       = {Rocco Oliveto and
                  Massimiliano Di Penta and
                  David C. Shepherd},
  title        = {Mining accurate message formats for service APIs},
  booktitle    = {25th International Conference on Software Analysis, Evolution and
                  Reengineering, {SANER} 2018, Campobasso, Italy, March 20-23, 2018},
  pages        = {266--276},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SANER.2018.8330215},
  doi          = {10.1109/SANER.2018.8330215},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcre/HossainVHKJS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/JiangWYXZ17,
  author       = {Jiaojiao Jiang and
                  Sheng Wen and
                  Shui Yu and
                  Yang Xiang and
                  Wanlei Zhou},
  title        = {Identifying Propagation Sources in Networks: State-of-the-Art and
                  Comparative Studies},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {19},
  number       = {1},
  pages        = {465--481},
  year         = {2017},
  url          = {https://doi.org/10.1109/COMST.2016.2615098},
  doi          = {10.1109/COMST.2016.2615098},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comsur/JiangWYXZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/JiangWYXZH17,
  author       = {Jiao Jiao Jiang and
                  Sheng Wen and
                  Shui Yu and
                  Yang Xiang and
                  Wanlei Zhou and
                  Houcine Hassan},
  title        = {The structure of communities in scale-free networks},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {29},
  number       = {14},
  year         = {2017},
  url          = {https://doi.org/10.1002/cpe.4040},
  doi          = {10.1002/CPE.4040},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/JiangWYXZH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/WenJLXZ17,
  author       = {Sheng Wen and
                  Jiao Jiao Jiang and
                  Bo Liu and
                  Yang Xiang and
                  Wanlei Zhou},
  title        = {Using epidemic betweenness to measure the influence of users in complex
                  networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {78},
  pages        = {288--299},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jnca.2016.10.018},
  doi          = {10.1016/J.JNCA.2016.10.018},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/WenJLXZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccchina/JiangGYJY17,
  author       = {Jiao Jiao Jiang and
                  Longxiang Gao and
                  Shui Yu and
                  Jiong Jin and
                  Dongfeng Yuan},
  title        = {Preferential attachment and the spreading influence of users in online
                  social networks},
  booktitle    = {2017 {IEEE/CIC} International Conference on Communications in China,
                  {ICCC} 2017, Qingdao, China, October 22-24, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICCChina.2017.8330470},
  doi          = {10.1109/ICCCHINA.2017.8330470},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccchina/JiangGYJY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispa/ZhengJZDFZL17,
  author       = {Xi Zheng and
                  Jiaojiao Jiang and
                  Yuqun Zhang and
                  Yao Deng and
                  Min Fu and
                  Tianlei Zheng and
                  Xiao Liu},
  title        = {SmartVM: {A} Multi-Layer Microservice-Based Platform for Deploying
                  SaaS},
  booktitle    = {2017 {IEEE} International Symposium on Parallel and Distributed Processing
                  with Applications and 2017 {IEEE} International Conference on Ubiquitous
                  Computing and Communications (ISPA/IUCC), Guangzhou, China, December
                  12-15, 2017},
  pages        = {470--474},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ISPA/IUCC.2017.00077},
  doi          = {10.1109/ISPA/IUCC.2017.00077},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispa/ZhengJZDFZL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobiquitous/JiangGJLYYXY17,
  author       = {Jiaojiao Jiang and
                  Longxiang Gao and
                  Jiong Jin and
                  Tom H. Luan and
                  Shui Yu and
                  Dong Yuan and
                  Yong Xiang and
                  Dongfeng Yuan},
  editor       = {Tao Gu and
                  Ramamohanarao Kotagiri and
                  Huai Liu},
  title        = {Towards an Analysis of Traffic Shaping and Policing in Fog Networks
                  Using Stochastic Fluid Models},
  booktitle    = {Proceedings of the 14th {EAI} International Conference on Mobile and
                  Ubiquitous Systems: Computing, Networking and Services, Melbourne,
                  Australia, November 7-10, 2017},
  pages        = {196--204},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3144457.3144496},
  doi          = {10.1145/3144457.3144496},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobiquitous/JiangGJLYYXY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/JiangQYZW16,
  author       = {Jiao Jiao Jiang and
                  Youyang Qu and
                  Shui Yu and
                  Wanlei Zhou and
                  Wei Wu},
  title        = {Studying the Global Spreading Influence and Local Connections of Users
                  in Online Social Networks},
  booktitle    = {2016 {IEEE} International Conference on Computer and Information Technology,
                  {CIT} 2016, Nadi, Fiji, December 8-10, 2016},
  pages        = {431--435},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CIT.2016.15},
  doi          = {10.1109/CIT.2016.15},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEcit/JiangQYZW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/FengZZJY16,
  author       = {Bohao Feng and
                  Huachun Zhou and
                  Hongke Zhang and
                  Jiao Jiao Jiang and
                  Shui Yu},
  title        = {A Popularity-Based Cache Consistency Mechanism for Information-Centric
                  Networking},
  booktitle    = {2016 {IEEE} Global Communications Conference, {GLOBECOM} 2016, Washington,
                  DC, USA, December 4-8, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/GLOCOM.2016.7841535},
  doi          = {10.1109/GLOCOM.2016.7841535},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/FengZZJY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/JiangWYZQ16,
  author       = {Jiao Jiao Jiang and
                  Sheng Wen and
                  Shui Yu and
                  Wanlei Zhou and
                  Yi Qian},
  title        = {Analysis of the Spreading Influence Variations for Online Social Users
                  under Attacks},
  booktitle    = {2016 {IEEE} Global Communications Conference, {GLOBECOM} 2016, Washington,
                  DC, USA, December 4-8, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/GLOCOM.2016.7841605},
  doi          = {10.1109/GLOCOM.2016.7841605},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/JiangWYZQ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcsp/LiuZJW16,
  author       = {Bo Liu and
                  Wanlei Zhou and
                  Jiao Jiao Jiang and
                  Kun Wang},
  title        = {K-Source: Multiple source selection for traffic offloading in mobile
                  social networks},
  booktitle    = {8th International Conference on Wireless Communications {\&} Signal
                  Processing, {WCSP} 2016, Yangzhou, China, October 13-15, 2016},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WCSP.2016.7752474},
  doi          = {10.1109/WCSP.2016.7752474},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcsp/LiuZJW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/coap/ZhangJZ15,
  author       = {Hai{-}Bin Zhang and
                  Jiao{-}Jiao Jiang and
                  Yun{-}Bin Zhao},
  title        = {On the proximal Landweber Newton method for a class of nonsmooth convex
                  problems},
  journal      = {Comput. Optim. Appl.},
  volume       = {61},
  number       = {1},
  pages        = {79--99},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10589-014-9703-7},
  doi          = {10.1007/S10589-014-9703-7},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/coap/ZhangJZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JiangWYXZ15,
  author       = {Jiao Jiao Jiang and
                  Sheng Wen and
                  Shui Yu and
                  Yang Xiang and
                  Wanlei Zhou},
  title        = {K-Center: An Approach on the Multi-Source Identification of Information
                  Diffusion},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {12},
  pages        = {2616--2626},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2469256},
  doi          = {10.1109/TIFS.2015.2469256},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/JiangWYXZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialsec/WenJY0Z15,
  author       = {Sheng Wen and
                  Jiaojiao Jiang and
                  Kasra Majbouri Yazdi and
                  Yang Xiang and
                  Wanlei Zhou},
  title        = {The Relation Between Local and Global Influence of Individuals in
                  Scale-Free Networks},
  booktitle    = {International Symposium on Security and Privacy in Social Networks
                  and Big Data, SocialSec 2015, Hangzhou, China, November 16-18, 2015},
  pages        = {80--84},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SocialSec2015.20},
  doi          = {10.1109/SOCIALSEC2015.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socialsec/WenJY0Z15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JiangZYWYX15,
  author       = {Jiao Jiao Jiang and
                  Andi Zhou and
                  Kasra Majbouri Yazdi and
                  Sheng Wen and
                  Shui Yu and
                  Yang Xiang},
  title        = {Identifying Diffusion Sources in Large Networks: {A} Community Structure
                  Based Approach},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {302--309},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.388},
  doi          = {10.1109/TRUSTCOM.2015.388},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/JiangZYWYX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/WenJXYZ14,
  author       = {Sheng Wen and
                  Jiao Jiao Jiang and
                  Yang Xiang and
                  Shui Yu and
                  Wanlei Zhou},
  title        = {Are the popular users always important for information dissemination
                  in online social networks?},
  journal      = {{IEEE} Netw.},
  volume       = {28},
  number       = {5},
  pages        = {64--67},
  year         = {2014},
  url          = {https://doi.org/10.1109/MNET.2014.6915441},
  doi          = {10.1109/MNET.2014.6915441},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/network/WenJXYZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/WenJXYZJ14,
  author       = {Sheng Wen and
                  Jiao Jiao Jiang and
                  Yang Xiang and
                  Shui Yu and
                  Wanlei Zhou and
                  Weijia Jia},
  title        = {To Shut Them Up or to Clarify: Restraining the Spread of Rumors in
                  Online Social Networks},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {25},
  number       = {12},
  pages        = {3306--3316},
  year         = {2014},
  url          = {https://doi.org/10.1109/TPDS.2013.2297115},
  doi          = {10.1109/TPDS.2013.2297115},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tpds/WenJXYZJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/JiangZY12,
  author       = {Jiao Jiao Jiang and
                  Haibin Zhang and
                  Shui Yu},
  title        = {An interior point trust region method for nonnegative matrix factorization},
  journal      = {Neurocomputing},
  volume       = {97},
  pages        = {309--316},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.neucom.2012.05.008},
  doi          = {10.1016/J.NEUCOM.2012.05.008},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijon/JiangZY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics