


default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 44 matches
- 2020
- Maneesh Babu Adhikari, Vorapong Suppakitpaisarn, Arinjita Paul, C. Pandu Rangan:
Two-Stage Framework for Accurate and Differentially Private Network Information Publication. CSoNet 2020: 267-279 - Sultan Alshamrani, Ahmed Abusnaina, Mohammed Abuhamad
, Anho Lee, DaeHun Nyang, David Mohaisen:
An Analysis of Users Engagement on Twitter During the COVID-19 Pandemic: Topical Trends and Sentiments. CSoNet 2020: 73-86 - Sahar Bakhtar, Mohammad Saber Gholami
, Hovhannes A. Harutyunyan:
A New Metric to Evaluate Communities in Social Networks Using Geodesic Distance. CSoNet 2020: 202-216 - Asif Ali Banka
, Roohie Naaz Mir:
Large Scale Graph Analytics for Communities Using Graph Neural Networks. CSoNet 2020: 39-47 - Mario Casillo
, Francesco Colace
, Dajana Conte
, Massimo De Santo, Marco Lombardi
, Serena Mottola, Domenico Santaniello
:
A Multi-feature Bayesian Approach for Fake News Detection. CSoNet 2020: 333-344 - Pooja Chaudhary
, Brij Bhooshan Gupta
, Chang Choi, Kwok Tai Chui
:
XSSPro: XSS Attack Detection Proxy to Defend Social Networking Platforms. CSoNet 2020: 411-422 - Cheng-Lung Chen
, Eduardo L. Pasiliao
, Vladimir Boginski
:
A Cutting Plane Method for Least Cost Influence Maximization. CSoNet 2020: 499-511 - Thomas Dalton, Mauritius Schmidtler, Alireza Hadj Khodabakhshi:
Classifying Malware Using Function Representations in a Static Call Graph. CSoNet 2020: 243-254 - Amit Kumar Dhar, Shivam Sharma, Rishi Ranjan Singh:
Network Based Comparison of Indian Railways and Airways. CSoNet 2020: 100-112 - Nguyen Tien Dong, Hai Pham Van:
Graph Neural Network Combined Knowledge Graph for Recommendation System. CSoNet 2020: 59-70 - Liman Du, Shengminjie Chen, Suixiang Gao, Wenguo Yang
:
Nonsubmodular Constrained Profit Maximization from Increment Perspective. CSoNet 2020: 451-463 - Hongbin George Du, Yanke Hu:
SqueezeBioBERT: BioBERT Distillation for Healthcare Natural Language Processing. CSoNet 2020: 193-201 - Akshat Gaurav
, Brij B. Gupta
, Arcangelo Castiglione
, Kostas E. Psannis
, Chang Choi:
A Novel Approach for Fake News Detection in Vehicular Ad-Hoc Network (VANET). CSoNet 2020: 386-397 - Saqib Hakak, Wazir Zada Khan
, Sweta Bhattacharya
, G. Thippa Reddy
, Kim-Kwang Raymond Choo:
Propagation of Fake News on Social Media: Challenges and Opportunities. CSoNet 2020: 345-353 - Btool Hamoui, Abdulaziz Alashaikh, Eisa Alanazi:
COVID-19: What Are Arabic Tweeters Talking About? CSoNet 2020: 425-436 - Henri T. Heinonen
, Alexander Semenov, Vladimir Boginski:
Collective Behavior of Price Changes of ERC-20 Tokens. CSoNet 2020: 487-498 - Kin-Hon Ho, Wai-Han Chiu, Chin Li:
Characterizing the Cryptocurrency Market During Crisis. CSoNet 2020: 255-266 - Xingxing Hu, Demin Li, Chang Guo, Wei Hu, Lei Zhang, Menglin Zhai:
Maximum Channel Access Probability Based on Post-Disaster Ground Terminal Distribution Density. CSoNet 2020: 164-175 - Dongyan Huang, Bin Chen
, Lang Li, Yong Ding:
Anomaly Detection for Consortium Blockchains Based on Machine Learning Classification Algorithm. CSoNet 2020: 307-318 - Hiep Xuan Huynh, Man Ba Huynh, Hoa Thi Tran, Hai Thanh Nguyen
:
A Data Conversion Approach Between GAMA and DIGIPLANT Simulating Rice Plant Growth Under Brown Planthopper Infestation. CSoNet 2020: 87-99 - Abdullah Al Imran
, Zaman Wahid
, Tanvir Ahmed:
BNnet: A Deep Neural Network for the Identification of Satire and Fake Bangla News. CSoNet 2020: 464-475 - Andrzej Jarynowski
, Alexander Semenov, Vitaly Belik:
Protest Perspective Against COVID-19 Risk Mitigation Strategies on the German Internet. CSoNet 2020: 524-535 - Ricky Chandra Johanes, Rahmad Mahendra
, Brahmastro Kresnaraman:
Structuring Code-Switched Product Titles in Indonesian e-Commerce Platform. CSoNet 2020: 217-227 - Alexander A. Kharlamov
, Maria Pilgun
:
Hierarchies in Inter-personal and Intergroup Communication in Social Media: Case 'Smart Voting'. CSoNet 2020: 127-138 - Chao Kong, Bao-Xiang Chen, Shaoying Li, Yifan Chen, Jiahui Chen, Qi Zhou, Dongfang Wang, Liping Zhang:
Privacy Attack and Defense in Network Embedding. CSoNet 2020: 231-242 - Hao Li
, Xiaoshuang Xing
:
Flexible Interval Intermittent Jamming Against Eavesdropping in WAVE Based Vehicular Networks. CSoNet 2020: 48-58 - Allan Lobo, Yukta Mandekar, Sonali Pundpal, Bidisha Roy:
Detection of Sybil Attacks in Social Networks. CSoNet 2020: 366-377 - Weilong Lv, Songjie Wei, Shasha Li, Minghui Yu:
Verifiable Blockchain Redacting Method for a Trusted Consortium with Distributed Chameleon Hash Authority. CSoNet 2020: 295-306 - Mamta
, Brij Bhooshan Gupta
, Kwok Tai Chui
, Konstantinos E. Psannis
:
Metadata Security Measures for Protecting Confidential Information on the Cloud. CSoNet 2020: 398-410 - Md Moniruzzaman Monir, Ahmet Erdem Sariyüce:
Using Large Cliques for Hierarchical Dense Subgraph Discovery. CSoNet 2020: 179-192
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-05-17 18:14 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint
