Author of the publication

Understanding Information Diffusion under Interactions.

, , , , , and . IJCAI, page 3875-3881. IJCAI/AAAI Press, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Improving Service Accessibility by Adaptive Resource Distribution Strategy., , , , and . SecureComm (1), volume 152 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 535-540. Springer, (2014)A Novel Dynamic Self-adaptive Framework for Network Security Evaluation., , and . ISCTCS, volume 320 of Communications in Computer and Information Science, page 604-612. Springer, (2012)Some Remarks on Universal Re-encryption and A Novel Practical Anonymous Tunnel., , , and . ICCNMC, volume 3619 of Lecture Notes in Computer Science, page 853-862. Springer, (2005)You Have More Abbreviations Than You Know: A Study of AbbrevSquatting Abuse., , , , , and . ICCS (1), volume 10860 of Lecture Notes in Computer Science, page 221-233. Springer, (2018)Evolving Chinese Restaurant Processes for Modeling Evolutionary Traces in Temporal Data., , , , , and . PAKDD (2), volume 9078 of Lecture Notes in Computer Science, page 79-91. Springer, (2015)Query Recovery Attacks on Searchable Encryption Based on Partial Knowledge., , , , , and . SecureComm, volume 238 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 530-549. Springer, (2017)Linear Nondeterministic Dawg String Matching Algorithm., and . SPIRE, volume 3246 of Lecture Notes in Computer Science, page 70-71. Springer, (2004)Optimally Selecting the Timing of Zero-Day Attack via Spatial Evolutionary Game., , , , and . ICA3PP, volume 10393 of Lecture Notes in Computer Science, page 313-327. Springer, (2017)An Experimental Study on Instance Selection Schemes for Efficient Network Anomaly Detection., , , , and . RAID, volume 5758 of Lecture Notes in Computer Science, page 346-347. Springer, (2009)Efficient Revenue Maximization for Viral Marketing in Social Networks., , , , and . ADMA, volume 10604 of Lecture Notes in Computer Science, page 209-224. Springer, (2017)