Author of the publication

Epidemic Spread in Mobile Ad Hoc Networks: Determining the Tipping Point.

, , , , and . Networking (1), volume 6640 of Lecture Notes in Computer Science, page 266-280. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SuGeR: A Subgraph-based Graph Convolutional Network Method for Bundle Recommendation., , and . CIKM, page 4712-4716. ACM, (2022)Evaluating Graph Vulnerability and Robustness using TIGER., , , , and . CIKM, page 4495-4503. ACM, (2021)Few-shot Insider Threat Detection., , , and . CIKM, page 2289-2292. ACM, (2020)Calliope-Net: Automatic Generation of Graph Data Facts via Annotated Node-Link Diagrams., , , , , , and . IEEE Trans. Vis. Comput. Graph., 30 (1): 562-572 (January 2024)Graph Vulnerability and Robustness: A Survey., , , , and . CoRR, (2021)MultiFair: Multi-Group Fairness in Machine Learning., , , , and . CoRR, (2021)KHAN: Knowledge-Aware Hierarchical Attention Networks for Political Stance Prediction., , , , , , , , and . CoRR, (2023)Large-Scale Off-Target Identification Using Fast and Accurate Dual Regularized One-Class Collaborative Filtering and Its Application to Drug Repurposing., , , , , , , and . PLoS Comput. Biol., (2016)How to Optimize an Academic Team When the Outlier Member is Leaving?, , , , and . IEEE Intell. Syst., 36 (3): 23-30 (2021)Few-shot Network Anomaly Detection via Cross-network Meta-learning., , , and . WWW, page 2448-2456. ACM / IW3C2, (2021)