


default search action
CSoNet 2018: Shanghai, China
- Xuemin Chen

, Arunabha Sen, Wei Wayne Li, My T. Thai:
Computational Data and Social Networks - 7th International Conference, CSoNet 2018, Shanghai, China, December 18-20, 2018, Proceedings. Lecture Notes in Computer Science 11280, Springer 2018, ISBN 978-3-030-04647-7 - Ruidong Yan, Deying Li, Weili Wu, Ding-Zhu Du:

Minimizing Influence of Rumors by Blockers on Social Networks. 1-12 - Canh V. Pham, Hieu V. Duong, Bao Q. Bui, My T. Thai:

Budgeted Competitive Influence Maximization on Online Social Networks. 13-24 - Quan-Lin Li, Jing-Yu Ma, Yan-Xia Chang:

Blockchain Queue Theory. 25-40 - Gaocai Wang, Ying Peng, Qifei Zhao:

Optimal Energy Efficiency Data Dissemination Strategy Based on Optimal Stopping Theory in Mobile Network. 41-52 - Quanquan Chu, Zhenhao Cao, Xiaofeng Gao, Peng He, Qianni Deng, Guihai Chen

:
Cease with Bass: A Framework for Real-Time Topic Detection and Popularity Prediction Based on Long-Text Contents. 53-65 - Yuwei Zhang, Guanjun Liu, Wenjing Luan, Chungang Yan, Changjun Jiang:

Application of SIRUS in Credit Card Fraud Detection. 66-78 - Si Zhang, Hanghang Tong

, Jiejun Xu, Ross Maciejewski:
Graph Convolutional Networks: Algorithms, Applications and Open Challenges. 79-91 - Mengran Xu, Demin Li, Guanglin Zhang, Mengqi Cao, Shuya Liao:

A Path Planning Approach with Maximum Traffic Flow and Minimum Breakdown Probability in Complex Road Network. 92-102 - Wenlong Ni, Wei Wayne Li:

Optimal Resource Allocation for Brokers in Media Cloud. 103-115 - Pavel Krömer, Jana Nowaková

, Martin Hasal:
Towards a New Evolutionary Algorithm for the Minimum Tollbooth Problem. 116-125 - Wenan Tan, Lu Zhao, Na Xie, Anqiong Tang, Xiaoming Hu, Shan Tang:

Methods for Optimal Resource Allocation on Cooperative Task Scheduling in Cross-Organizational Business Process. 126-138 - Aiping Zhang, Demin Li, Guanglin Zhang, Junjie Wang, Mengqi Cao:

A Vehicular Collision Avoidance Routing Algorithm based on V2V. 139-151 - Yizhi Wu, Biao Luo, Hairui Zhu:

Embedded Software-Define Radio for Wearable Microware Detection. 152-161 - Chandni Saxena

, Mohammad Najmud Doja, Tanvir Ahmad
:
Group Based Immunization Strategy on Networks with Nonlinear Infectivity. 162-173 - Phuc H. Duong

, Hien T. Nguyen
, Hao T. Do:
Question Understanding in Community-Based Question Answering Systems. 174-185 - Chao Kong

, Wan Tao, Sanmin Liu, Qiang Zhang:
User Linkage Across Anonymizd Social Networks. 186-197 - Akrati Saxena

, S. R. S. Iyengar:
K-Shell Rank Analysis Using Local Information. 198-210 - Truc D. T. Nguyen

, Hoang-Anh Pham
, My T. Thai:
Leveraging Blockchain to Enhance Data Privacy in IoT-Based Applications. 211-221 - Na Wang, Xuemin Chen

:
A Formal Model for Temporal - Spatial Event in Internet of Vehicles. 222-234 - Christopher Diaz, Alexander G. Nikolaev, Eduardo L. Pasiliao:

A Decentralized Deterministic Information Propagation Model for Robust Communication. 235-246 - Denis Kotkov, Gaurav Pandey, Alexander Semenov:

Gaming Bot Detection: A Systematic Literature Review. 247-258 - Hisham Alasmary

, Afsah Anwar, Jeman Park
, Jinchun Choi, DaeHun Nyang, Aziz Mohaisen:
Graph-Based Comparison of IoT and Android Malware. 259-272 - Hung T. Nguyen, Thang N. Dinh

, My T. Thai:
Revisiting of 'Revisiting the Stop-and-Stare Algorithms for Influence Maximization'. 273-285 - Wei Chen

:
An Issue in the Martingale Analysis of the Influence Maximization Algorithm IMM. 286-297 - Quan-Lin Li, Fan-Qi Ma, Jing-Yu Ma:

A Stochastic Model for File Lifetime and Security in Data Center Networks. 298-309 - Mingzhang Luo, Hao Zhang, Qiang Liu

, Yang Xu, Chong Luo, Zhongyuan Wang:
The Design of Real Time Recording System for Electric Spark Source Parameters Based on the Internet of Things. 310-317 - Wenrong Jiang:

App Tamper Detection and Retrospective Program Research. 318-329 - Han Hu, NhatHai Phan, James Geller, Huy T. Vo, Manasi Bhole, Xueqi Huang, Sophie Di Lorio, Thang Dinh

, Soon Ae Chun:
Deep Self-Taught Learning for Detecting Drug Abuse Risk Behavior in Tweets. 330-342 - Shiyang Xuan, Guanjun Liu, Zhenchuan Li

:
Refined Weighted Random Forest and Its Application to Credit Card Fraud Detection. 343-355 - Chuang Ma:

A Congestion Control Protocol for Wireless Sensor Networks. 356-367 - Trong Nhan Le, Nguyen Tran Huu Nguyen, Tan-Phuong Vo, The-Duy Phan-Dinh, Hoang-Anh Pham

:
Penalty Shutdown Mitigation in Wireless Sensor Networks Powered by Ambient Energy. 368-379 - Jian Wang, Xiaolin Xu, Xiaoming Hu, Wei Wayne Li:

On Forwarding Protocols in Linear Topology Wake-up Wireless Sensor Networks. 380-391 - Rajesh Kumar, Anurag Singh

, Hocine Cherifi:
Effect of Topological Structure and Coupling Strength in Weighted Multiplex Networks. 392-403 - Yizhi Wu, Bingshuai Liu, Mingda Zhu:

A Single-Pair Antenna Microwave Medical Detection System Based on Unsupervised Feature Learning. 404-414 - Yanxia Pang, Liping Li, Wenan Tan, Yuanyuan Jin, Ying Zhang:

Forgetting Punished Recommendations for MOOC. 415-426 - Thomas H. Yang, Franklin Liu, Weiguo Yang, Hang Liu:

Internet Rurality: Developing an Index for Network Distance from Popular Internet Services. 427-436 - Alexander Semenov, Alexander Veremyev, Alexander G. Nikolaev, Eduardo L. Pasiliao, Vladimir Boginski:

Ranking Academic Advisors: Analyzing Scientific Advising Impact Using MathGenealogy Social Network. 437-449 - Jinzhong Li, Guanjun Liu:

A Rich Ranking Model Based on the Matthew Effect Optimization. 450-459 - Xiaoyan Kui, Junbin Liang, Huakun Du, Shaojun Zou, Zhixiong Liu:

A Load-Balanced and Low-Delay Data Collection for Wireless Sensor Networks. 460-476 - Feng Wang, Weidong Huang, Yuan Xu:

Research on Telecom Flow Operation Based on User Profile. 477-486 - Xiaoxia Zhu, Jiaxin Song, Jianfang Meng, Jia Liu:

Information Spreading in Social Network Through Explosive Percolation Theory. 487-497 - Tero Bodström

, Timo Hämäläinen
:
A Novel Method for Detecting APT Attacks by Using OODA Loop and Black Swan Theory. 498-509 - Sanjay Kumar, Azfar Faizan, Ari Viinikainen

, Timo Hämäläinen
:
MLSPD - Machine Learning Based Spam and Phishing Detection. 510-522 - Kishor Datta Gupta

, Dipankar Dasgupta, Sajib Sen:
Smart Crowdsourcing Based Content Review System (SCCRS): An Approach to Improve Trustworthiness of Online Contents. 523-535

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














