Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Jiaojiao Jiang
@article{DBLP:journals/tifs/KarunanayakeJAJ24, author = {Ishan Karunanayake and Jiaojiao Jiang and Nadeem Ahmed and Sanjay K. Jha}, title = {Exploring Uncharted Waters of Website Fingerprinting}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1840--1854}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3342607}, doi = {10.1109/TIFS.2023.3342607}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/KarunanayakeJAJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecir/MalikJSJ24, author = {Marium Malik and Jiaojiao Jiang and Yang Song and Sanjay Jha}, editor = {Nazli Goharian and Nicola Tonellotto and Yulan He and Aldo Lipani and Graham McDonald and Craig Macdonald and Iadh Ounis}, title = {{MFVIEW:} Multi-modal Fake News Detection with View-Specific Information Extraction}, booktitle = {Advances in Information Retrieval - 46th European Conference on Information Retrieval, {ECIR} 2024, Glasgow, UK, March 24-28, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14610}, pages = {345--353}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-56063-7\_26}, doi = {10.1007/978-3-031-56063-7\_26}, timestamp = {Fri, 29 Mar 2024 23:01:35 +0100}, biburl = {https://dblp.org/rec/conf/ecir/MalikJSJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/SunDJXMTZ23, author = {Nan Sun and Ming Ding and Jiaojiao Jiang and Weikang Xu and Xiaoxing Mo and Yonghang Tai and Jun Zhang}, title = {Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: {A} Survey and New Perspectives}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {25}, number = {3}, pages = {1748--1774}, year = {2023}, url = {https://doi.org/10.1109/COMST.2023.3273282}, doi = {10.1109/COMST.2023.3273282}, timestamp = {Tue, 31 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comsur/SunDJXMTZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/YangVCJY0023, author = {Shuiqiao Yang and Sunny Verma and Borui Cai and Jiaojiao Jiang and Kun Yu and Fang Chen and Shui Yu}, title = {Variational co-embedding learning for attributed network clustering}, journal = {Knowl. Based Syst.}, volume = {270}, pages = {110530}, year = {2023}, url = {https://doi.org/10.1016/j.knosys.2023.110530}, doi = {10.1016/J.KNOSYS.2023.110530}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/kbs/YangVCJY0023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/complexnetworks/MaRJ23, author = {Boqian Ma and Hao Ren and Jiaojiao Jiang}, editor = {Hocine Cherifi and Luis M. Rocha and Chantal Cherifi and Murat Donduran}, title = {Influence Robustness of Nodes in Multiplex Networks Against Attacks}, booktitle = {Complex Networks {\&} Their Applications {XII} - Proceedings of The Twelfth International Conference on Complex Networks and their Applications: {COMPLEX} {NETWORKS} 2023, Menton, France, 28-30 November, 2023, Volume 3}, series = {Studies in Computational Intelligence}, volume = {1143}, pages = {62--74}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-53472-0\_6}, doi = {10.1007/978-3-031-53472-0\_6}, timestamp = {Mon, 15 Apr 2024 15:50:21 +0200}, biburl = {https://dblp.org/rec/conf/complexnetworks/MaRJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-07617, author = {Boqian Ma and Hao Ren and Jiaojiao Jiang}, title = {Influence Robustness of Nodes in Multiplex Networks against Attacks}, journal = {CoRR}, volume = {abs/2309.07617}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.07617}, doi = {10.48550/ARXIV.2309.07617}, eprinttype = {arXiv}, eprint = {2309.07617}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-07617.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/infsof/HossainJHKSL22, author = {Md. Arafat Hossain and Jiaojiao Jiang and Jun Han and Muhammad Ashad Kabir and Jean{-}Guy Schneider and Chengfei Liu}, title = {Inferring data model from service interactions for response generation in service virtualization}, journal = {Inf. Softw. Technol.}, volume = {145}, pages = {106803}, year = {2022}, url = {https://doi.org/10.1016/j.infsof.2021.106803}, doi = {10.1016/J.INFSOF.2021.106803}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/infsof/HossainJHKSL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/YangCCSJLL22, author = {Shuiqiao Yang and Borui Cai and Taotao Cai and Xiangyu Song and Jiaojiao Jiang and Bing Li and Jianxin Li}, title = {Robust cross-network node classification via constrained graph mutual information}, journal = {Knowl. Based Syst.}, volume = {257}, pages = {109852}, year = {2022}, url = {https://doi.org/10.1016/j.knosys.2022.109852}, doi = {10.1016/J.KNOSYS.2022.109852}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/kbs/YangCCSJLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/JiangYJ22, author = {Jiaojiao Jiang and Shuiqiao Yang and Sanjay Jha}, title = {Network Growth From Global and Local Influential Nodes}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {9}, number = {4}, pages = {2549--2561}, year = {2022}, url = {https://doi.org/10.1109/TNSE.2022.3165528}, doi = {10.1109/TNSE.2022.3165528}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnse/JiangYJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/HossainHSJKV22, author = {Md. Arafat Hossain and Jun Han and Jean{-}Guy Schneider and Jiaojiao Jiang and Muhammad Ashad Kabir and Steve Versteeg}, title = {Extracting Formats of Service Messages with Varying Payloads}, journal = {{ACM} Trans. Internet Techn.}, volume = {22}, number = {3}, pages = {71:1--71:31}, year = {2022}, url = {https://doi.org/10.1145/3503159}, doi = {10.1145/3503159}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/toit/HossainHSJKV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/QuCWJW22, author = {Danni Qu and Qi Chen and Jiahui Wang and Jiaojiao Jiang and Zhen Wang}, title = {The Effect of Source Location on the Effectiveness of Source Detection in Finite Networks}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2022, Seoul, Korea, May 16-20, 2022}, pages = {4104--4113}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICC45855.2022.9838272}, doi = {10.1109/ICC45855.2022.9838272}, timestamp = {Sun, 30 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/QuCWJW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-07039, author = {Jin Ho Go and Alina Sari and Jiaojiao Jiang and Shuiqiao Yang and Sanjay K. Jha}, title = {Fake News Quick Detection on Dynamic Heterogeneous Information Networks}, journal = {CoRR}, volume = {abs/2205.07039}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.07039}, doi = {10.48550/ARXIV.2205.07039}, eprinttype = {arXiv}, eprint = {2205.07039}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-07039.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/JiangSVHHL21, author = {Jiaojiao Jiang and Jean{-}Guy Schneider and Steve Versteeg and Jun Han and Md. Arafat Hossain and Chengfei Liu}, title = {R-gram: Inferring message formats of service protocols with relative positional n-grams}, journal = {J. Netw. Comput. Appl.}, volume = {196}, pages = {103247}, year = {2021}, url = {https://doi.org/10.1016/j.jnca.2021.103247}, doi = {10.1016/J.JNCA.2021.103247}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/JiangSVHHL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-00487, author = {Jiaojiao Jiang and Sanjay Jha}, title = {Network Growth From Global and Local Influential Nodes}, journal = {CoRR}, volume = {abs/2103.00487}, year = {2021}, url = {https://arxiv.org/abs/2103.00487}, eprinttype = {arXiv}, eprint = {2103.00487}, timestamp = {Tue, 03 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-00487.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-07295, author = {Shuiqiao Yang and Sunny Verma and Borui Cai and Jiaojiao Jiang and Kun Yu and Fang Chen and Shui Yu}, title = {Variational Co-embedding Learning for Attributed Network Clustering}, journal = {CoRR}, volume = {abs/2104.07295}, year = {2021}, url = {https://arxiv.org/abs/2104.07295}, eprinttype = {arXiv}, eprint = {2104.07295}, timestamp = {Thu, 01 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-07295.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/JiangVHHS20, author = {Jiaojiao Jiang and Steve Versteeg and Jun Han and Md. Arafat Hossain and Jean{-}Guy Schneider}, title = {A positional keyword-based approach to inferring fine-grained message formats}, journal = {Future Gener. Comput. Syst.}, volume = {102}, pages = {369--381}, year = {2020}, url = {https://doi.org/10.1016/j.future.2019.08.011}, doi = {10.1016/J.FUTURE.2019.08.011}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/JiangVHHS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ojcomps/YangJPYCY20, author = {Shuiqiao Yang and Jiaojiao Jiang and Arindam Pal and Kun Yu and Fang Chen and Shui Yu}, title = {Analysis and Insights for Myths Circulating on Twitter During the {COVID-19} Pandemic}, journal = {{IEEE} Open J. Comput. Soc.}, volume = {1}, pages = {209--219}, year = {2020}, url = {https://doi.org/10.1109/OJCS.2020.3028573}, doi = {10.1109/OJCS.2020.3028573}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ojcomps/YangJPYCY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/JiangWYLXZ19, author = {Jiaojiao Jiang and Sheng Wen and Shui Yu and Bo Liu and Yang Xiang and Wanlei Zhou}, title = {Malicious Attack Propagation and Source Identification}, series = {Advances in Information Security}, volume = {73}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-02179-5}, doi = {10.1007/978-3-030-02179-5}, isbn = {978-3-030-02178-8}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/JiangWYLXZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/JiangVHHSLF19, author = {Jiaojiao Jiang and Steve Versteeg and Jun Han and Md. Arafat Hossain and Jean{-}Guy Schneider and Christopher Leckie and Zeinab Farahmandpour}, title = {P-Gram: Positional N-Gram for the Clustering of Machine-Generated Messages}, journal = {{IEEE} Access}, volume = {7}, pages = {88504--88516}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2924928}, doi = {10.1109/ACCESS.2019.2924928}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/JiangVHHSLF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/JiangGJLYXG19, author = {Jiaojiao Jiang and Longxiang Gao and Jiong Jin and Tom H. Luan and Shui Yu and Yong Xiang and Saurabh Kumar Garg}, title = {Sustainability Analysis for Fog Nodes With Renewable Energy Supplies}, journal = {{IEEE} Internet Things J.}, volume = {6}, number = {4}, pages = {6725--6735}, year = {2019}, url = {https://doi.org/10.1109/JIOT.2019.2910875}, doi = {10.1109/JIOT.2019.2910875}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/JiangGJLYXG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JiangWYXZ18, author = {Jiao Jiao Jiang and Sheng Wen and Shui Yu and Yang Xiang and Wanlei Zhou}, title = {Rumor Source Identification in Social Networks with Time-Varying Topology}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {1}, pages = {166--179}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2522436}, doi = {10.1109/TDSC.2016.2522436}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/JiangWYXZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcre/HossainVHKJS18, author = {Md. Arafat Hossain and Steve Versteeg and Jun Han and Muhammad Ashad Kabir and Jiaojiao Jiang and Jean{-}Guy Schneider}, editor = {Rocco Oliveto and Massimiliano Di Penta and David C. Shepherd}, title = {Mining accurate message formats for service APIs}, booktitle = {25th International Conference on Software Analysis, Evolution and Reengineering, {SANER} 2018, Campobasso, Italy, March 20-23, 2018}, pages = {266--276}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SANER.2018.8330215}, doi = {10.1109/SANER.2018.8330215}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wcre/HossainVHKJS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/JiangWYXZ17, author = {Jiaojiao Jiang and Sheng Wen and Shui Yu and Yang Xiang and Wanlei Zhou}, title = {Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {19}, number = {1}, pages = {465--481}, year = {2017}, url = {https://doi.org/10.1109/COMST.2016.2615098}, doi = {10.1109/COMST.2016.2615098}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comsur/JiangWYXZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/JiangWYXZH17, author = {Jiao Jiao Jiang and Sheng Wen and Shui Yu and Yang Xiang and Wanlei Zhou and Houcine Hassan}, title = {The structure of communities in scale-free networks}, journal = {Concurr. Comput. Pract. Exp.}, volume = {29}, number = {14}, year = {2017}, url = {https://doi.org/10.1002/cpe.4040}, doi = {10.1002/CPE.4040}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/JiangWYXZH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/WenJLXZ17, author = {Sheng Wen and Jiao Jiao Jiang and Bo Liu and Yang Xiang and Wanlei Zhou}, title = {Using epidemic betweenness to measure the influence of users in complex networks}, journal = {J. Netw. Comput. Appl.}, volume = {78}, pages = {288--299}, year = {2017}, url = {https://doi.org/10.1016/j.jnca.2016.10.018}, doi = {10.1016/J.JNCA.2016.10.018}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/WenJLXZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccchina/JiangGYJY17, author = {Jiao Jiao Jiang and Longxiang Gao and Shui Yu and Jiong Jin and Dongfeng Yuan}, title = {Preferential attachment and the spreading influence of users in online social networks}, booktitle = {2017 {IEEE/CIC} International Conference on Communications in China, {ICCC} 2017, Qingdao, China, October 22-24, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICCChina.2017.8330470}, doi = {10.1109/ICCCHINA.2017.8330470}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccchina/JiangGYJY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispa/ZhengJZDFZL17, author = {Xi Zheng and Jiaojiao Jiang and Yuqun Zhang and Yao Deng and Min Fu and Tianlei Zheng and Xiao Liu}, title = {SmartVM: {A} Multi-Layer Microservice-Based Platform for Deploying SaaS}, booktitle = {2017 {IEEE} International Symposium on Parallel and Distributed Processing with Applications and 2017 {IEEE} International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), Guangzhou, China, December 12-15, 2017}, pages = {470--474}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISPA/IUCC.2017.00077}, doi = {10.1109/ISPA/IUCC.2017.00077}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispa/ZhengJZDFZL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobiquitous/JiangGJLYYXY17, author = {Jiaojiao Jiang and Longxiang Gao and Jiong Jin and Tom H. Luan and Shui Yu and Dong Yuan and Yong Xiang and Dongfeng Yuan}, editor = {Tao Gu and Ramamohanarao Kotagiri and Huai Liu}, title = {Towards an Analysis of Traffic Shaping and Policing in Fog Networks Using Stochastic Fluid Models}, booktitle = {Proceedings of the 14th {EAI} International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Melbourne, Australia, November 7-10, 2017}, pages = {196--204}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3144457.3144496}, doi = {10.1145/3144457.3144496}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobiquitous/JiangGJLYYXY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcit/JiangQYZW16, author = {Jiao Jiao Jiang and Youyang Qu and Shui Yu and Wanlei Zhou and Wei Wu}, title = {Studying the Global Spreading Influence and Local Connections of Users in Online Social Networks}, booktitle = {2016 {IEEE} International Conference on Computer and Information Technology, {CIT} 2016, Nadi, Fiji, December 8-10, 2016}, pages = {431--435}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CIT.2016.15}, doi = {10.1109/CIT.2016.15}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEcit/JiangQYZW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/FengZZJY16, author = {Bohao Feng and Huachun Zhou and Hongke Zhang and Jiao Jiao Jiang and Shui Yu}, title = {A Popularity-Based Cache Consistency Mechanism for Information-Centric Networking}, booktitle = {2016 {IEEE} Global Communications Conference, {GLOBECOM} 2016, Washington, DC, USA, December 4-8, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/GLOCOM.2016.7841535}, doi = {10.1109/GLOCOM.2016.7841535}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/FengZZJY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/JiangWYZQ16, author = {Jiao Jiao Jiang and Sheng Wen and Shui Yu and Wanlei Zhou and Yi Qian}, title = {Analysis of the Spreading Influence Variations for Online Social Users under Attacks}, booktitle = {2016 {IEEE} Global Communications Conference, {GLOBECOM} 2016, Washington, DC, USA, December 4-8, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/GLOCOM.2016.7841605}, doi = {10.1109/GLOCOM.2016.7841605}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/JiangWYZQ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcsp/LiuZJW16, author = {Bo Liu and Wanlei Zhou and Jiao Jiao Jiang and Kun Wang}, title = {K-Source: Multiple source selection for traffic offloading in mobile social networks}, booktitle = {8th International Conference on Wireless Communications {\&} Signal Processing, {WCSP} 2016, Yangzhou, China, October 13-15, 2016}, pages = {1--5}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/WCSP.2016.7752474}, doi = {10.1109/WCSP.2016.7752474}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wcsp/LiuZJW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/coap/ZhangJZ15, author = {Hai{-}Bin Zhang and Jiao{-}Jiao Jiang and Yun{-}Bin Zhao}, title = {On the proximal Landweber Newton method for a class of nonsmooth convex problems}, journal = {Comput. Optim. Appl.}, volume = {61}, number = {1}, pages = {79--99}, year = {2015}, url = {https://doi.org/10.1007/s10589-014-9703-7}, doi = {10.1007/S10589-014-9703-7}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/coap/ZhangJZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JiangWYXZ15, author = {Jiao Jiao Jiang and Sheng Wen and Shui Yu and Yang Xiang and Wanlei Zhou}, title = {K-Center: An Approach on the Multi-Source Identification of Information Diffusion}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {12}, pages = {2616--2626}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2469256}, doi = {10.1109/TIFS.2015.2469256}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/JiangWYXZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialsec/WenJY0Z15, author = {Sheng Wen and Jiaojiao Jiang and Kasra Majbouri Yazdi and Yang Xiang and Wanlei Zhou}, title = {The Relation Between Local and Global Influence of Individuals in Scale-Free Networks}, booktitle = {International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2015, Hangzhou, China, November 16-18, 2015}, pages = {80--84}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SocialSec2015.20}, doi = {10.1109/SOCIALSEC2015.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/socialsec/WenJY0Z15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JiangZYWYX15, author = {Jiao Jiao Jiang and Andi Zhou and Kasra Majbouri Yazdi and Sheng Wen and Shui Yu and Yang Xiang}, title = {Identifying Diffusion Sources in Large Networks: {A} Community Structure Based Approach}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {302--309}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.388}, doi = {10.1109/TRUSTCOM.2015.388}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/JiangZYWYX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/WenJXYZ14, author = {Sheng Wen and Jiao Jiao Jiang and Yang Xiang and Shui Yu and Wanlei Zhou}, title = {Are the popular users always important for information dissemination in online social networks?}, journal = {{IEEE} Netw.}, volume = {28}, number = {5}, pages = {64--67}, year = {2014}, url = {https://doi.org/10.1109/MNET.2014.6915441}, doi = {10.1109/MNET.2014.6915441}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/network/WenJXYZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/WenJXYZJ14, author = {Sheng Wen and Jiao Jiao Jiang and Yang Xiang and Shui Yu and Wanlei Zhou and Weijia Jia}, title = {To Shut Them Up or to Clarify: Restraining the Spread of Rumors in Online Social Networks}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {25}, number = {12}, pages = {3306--3316}, year = {2014}, url = {https://doi.org/10.1109/TPDS.2013.2297115}, doi = {10.1109/TPDS.2013.2297115}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tpds/WenJXYZJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/JiangZY12, author = {Jiao Jiao Jiang and Haibin Zhang and Shui Yu}, title = {An interior point trust region method for nonnegative matrix factorization}, journal = {Neurocomputing}, volume = {97}, pages = {309--316}, year = {2012}, url = {https://doi.org/10.1016/j.neucom.2012.05.008}, doi = {10.1016/J.NEUCOM.2012.05.008}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijon/JiangZY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.