From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Breakdown by Rumors: Vulnerability of D2D Communications from Online Social Networks., , , и . WASA, том 10251 из Lecture Notes in Computer Science, стр. 496-508. Springer, (2017)Scalable bicriteria algorithms for the threshold activation problem in online social networks., , , и . INFOCOM, стр. 1-9. IEEE, (2017)Threat from being Social: Vulnerability Analysis of Social Network Coupled Smart Grid., , , , , , и . CoRR, (2020)Pseudo-Separation for Assessment of Structural Vulnerability of a Network., , , , и . SIGMETRICS (Abstracts), стр. 13-14. ACM, (2017)Vulnerability of Interdependent Networks with Heterogeneous Cascade Models and Timescales., , , и . ICDCS, стр. 290-299. IEEE Computer Society, (2018)Leveraging Social Communities for Optimizing Cellular Device-to-Device Communications., , , и . IEEE Trans. Wirel. Commun., 16 (1): 551-564 (2017)Collaborative production planning with production time windows and order splitting in make-to-order manufacturing., , и . Comput. Ind. Eng., (2014)Leveraging Social Communities for Optimizing Cellular Device-to-Device Communications., , , и . CoRR, (2016)Quantifying Privacy Vulnerability to Socialbot Attacks: An Adaptive Non-Submodular Model., , , , и . IEEE Trans. Emerg. Top. Comput., 8 (3): 855-868 (2020)Adaptive Crawling in Online Social Networks: a Matrix Factorization Based Approach., и . SocialSec, стр. 5-10. IEEE, (2018)