


default search action
IEEE Transactions on Computational Social Systems, Volume 2
Volume 2, Number 1, March 2015
- Md. Imrul Kayes, Jacob Chakareski:

Retention in Online Blogging: A Case Study of the Blogster Community. 1-14
Volume 2, Number 2, June 2015
- Noseong Park, Edoardo Serra

, Tom Snitch, V. S. Subrahmanian:
APE: A Data-Driven, Behavioral Model-Based Anti-Poaching Engine. 15-37
Volume 2, Number 3, September 2015
- Mianxiong Dong, Rajiv Ranjan

, Albert Y. Zomaya
, Man Lin:
Guest Editorial on Advances in Tools and Techniques for Enabling Cyber-Physical-Social Systems - Part I. 38-40 - Kuan Zhang

, Xiaohui Liang
, Rongxing Lu, Xuemin Shen
:
PIF: A Personalized Fine-Grained Spam Filtering Scheme With Privacy Preservation in Mobile Social Networks. 41-52 - Li Lu, Yongshuai Liu

:
Safeguard: User Reauthentication on Smartphones via Behavioral Biometrics. 53-64 - Chao Chen, Jun Zhang, Yi Xie, Yang Xiang, Wanlei Zhou

, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi, Majed A. AlRubaian:
A Performance Evaluation of Machine Learning-Based Streaming Spam Tweets Detection. 65-76 - Hongyang Zhao, Huan Zhou, Chengjue Yuan, Yinghua Huang, Jiming Chen:

Social Discovery: Exploring the Correlation Among Three-Dimensional Social Relationships. 77-87 - Zheng Yan

, Wei Feng
, Pu Wang:
Anonymous Authentication for Trustworthy Pervasive Social Networking. 88-98 - Gang Liang, Wenbo He

, Chun Xu, Liangyin Chen, Jinquan Zeng:
Rumor Identification in Microblogging Systems Based on Users' Behavior. 99-108 - Prem Prakash Jayaraman

, João Bártolo Gomes, Hai-Long Nguyen, Zahraa Said Abdallah
, Shonali Krishnaswamy, Arkady B. Zaslavsky:
Scalable Energy-Efficient Distributed Data Analytics for Crowdsensing Applications in Mobile Environments. 109-123
Volume 2, Number 4, December 2015
- Mianxiong Dong, Rajiv Ranjan

, Albert Y. Zomaya
, Man Lin:
Guest Editorial on Advances in Tools and Techniques for Enabling Cyber-Physical-Social Systems - Part II. 124-126 - Katsuya Suto

, Keisuke Miyanabe, Hiroki Nishiyama
, Nei Kato
, Hirotaka Ujikawa, Ken-Ichi Suzuki:
QoE-Guaranteed and Power-Efficient Network Operation for Cloud Radio Access Network With Power Over Fiber. 127-136 - Mi Wen, Kaoru Ota

, He Li
, Jingsheng Lei, Chunhua Gu, Zhou Su:
Secure Data Deduplication With Reliable Key Management for Dynamic Updates in CPSS. 137-147 - Yang Liu, Shiyan Hu

:
Cyberthreat Analysis and Detection for Energy Theft in Social Networking of Smart Homes. 148-158 - Yuan Zhang

, Chunxiang Xu, Shui Yu
, Hongwei Li, Xiaojun Zhang:
SCLPV: Secure Certificateless Public Verification for Cloud-Based Cyber-Physical-Social Systems Against Malicious Auditors. 159-170 - Charith Perera, Dumidu S. Talagala, Chi Harold Liu

, Júlio Cezar Estrella:
Energy-Efficient Location and Activity-Aware On-Demand Mobile Distributed Sensing Platform for Sensing as a Service in IoT Clouds. 171-181 - Nikos Tziritas, Thanasis Loukopoulos, Samee U. Khan

, Cheng-Zhong Xu
:
Distributed Algorithms for the Operator Placement Problem. 182-196

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














