Author of the publication

Information Diffusion and Influence Measurement Based on Interaction in Microblogging.

, , , , and . SMP, volume 489 of Communications in Computer and Information Science, page 129-140. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

KIND: A Novel Image-Mutual-Information-Based Decision Fusion Method for Saturation Attack Detection in SD-IoT., , , and . IEEE Internet Things J., 9 (23): 23750-23771 (2022)Defending saturation attacks on SDN controller: A confusable instance analysis-based algorithm., , , , , and . Comput. Networks, (2022)Towards DDoS detection mechanisms in Software-Defined Networking., , , , , , and . J. Netw. Comput. Appl., (2021)Image-based malware classification using section distribution information., , , , and . Comput. Secur., (2021)Heterogeneous Sparse Relational Data Co-clustering in Social Network., , , , and . UIC/ATC/ScalCom, page 77-84. IEEE Computer Society, (2015)Information Diffusion and Influence Measurement Based on Interaction in Microblogging., , , , and . SMP, volume 489 of Communications in Computer and Information Science, page 129-140. Springer, (2014)BFLS: Blockchain and Federated Learning for sharing threat detection models as Cyber Threat Intelligence., , , , and . Comput. Networks, (April 2023)Data-Driven Cybersecurity Knowledge Graph Construction for Industrial Control System Security., , , , , and . Wirel. Commun. Mob. Comput., (2020)DataSESec: Security Monitoring for Data Share and Exchange Platform., , , , and . APWeb/WAIM (2), volume 11642 of Lecture Notes in Computer Science, page 422-427. Springer, (2019)Anomaly Detection in Microblogging via Co-Clustering., , , , , and . J. Comput. Sci. Technol., 30 (5): 1097-1108 (2015)