Author of the publication

Understanding information interactions in diffusion: an evolutionary game-theoretic perspective.

, , , , and . Frontiers Comput. Sci., 10 (3): 518-531 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Text Classification Approach Based on Word2vec and TextRank Keyword Extraction., , , , and . DSC, page 536-543. IEEE, (2019)A new lightweight public key encryption with equality test for cloud storage., , , , and . Multim. Tools Appl., 83 (10): 28947-28968 (March 2024)Understanding information interactions in diffusion: an evolutionary game-theoretic perspective., , , , and . Frontiers Comput. Sci., 10 (3): 518-531 (2016)Framework for understanding intention-unbreakable malware., , , , , and . Sci. China Inf. Sci., (April 2023)Towards Accurate and Efficient Super Spreader Detection with Sketching., , , , and . DSC, page 506-511. IEEE, (2023)A DNS-based Data Exfiltration Traffic Detection Method for Unknown Samples., , , and . DSC, page 191-198. IEEE, (2022)Intrusion Detection and Network Information Security Based on Deep Learning Algorithm in Urban Rail Transit Management System., , , , and . IEEE Trans. Intell. Transp. Syst., 24 (2): 2135-2143 (February 2023)Human Mobility Simulation in Smart Energy Grid., , , and . ISCTCS, volume 520 of Communications in Computer and Information Science, page 229-237. Springer, (2014)From Passive to Active: Near-optimal DNS-based Data Exfiltration Defense Method Based on Sticky Mechanism., , , , , and . TrustCom, page 159-166. IEEE, (2022)