Author of the publication

Fast Overlapping and Hierarchical Community Detection via Local Dynamic Interaction.

, , , and . CoRR, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Swap-aware garbage collection algorithm for NAND flash-based consumer electronics., , and . IEEE Trans. Consumer Electronics, 60 (1): 60-65 (2014)Routing Attribute Data Mining Based on Rough Set Theory., , , and . ADMA, volume 3584 of Lecture Notes in Computer Science, page 276-283. Springer, (2005)A Verifiable $(t, n)$ Threshold Quantum State Sharing Against Denial Attack., , , and . IEEE Access, (2019)Deep CNNs With Self-Attention for Speaker Identification., , and . IEEE Access, (2019)Efficient Privacy-Preserving Dual Authentication and Key Agreement Scheme for Secure V2V Communications in an IoV Paradigm., , and . IEEE Trans. Intell. Transp. Syst., 18 (10): 2740-2749 (2017)Cryptanalysis and improvement of verifiable quantum (k, n) secret sharing., and . Quantum Inf. Process., 15 (2): 851-868 (2016)SDN-Based Data Transfer Security for Internet of Things., , , and . IEEE Internet Things J., 5 (1): 257-268 (2018)Consensus of delayed multi-agent dynamical systems with stochastic perturbation via impulsive approach., , , and . Neural Comput. Appl., 28 (S-1): 647-657 (2017)A Three-Factor Based Trust Model for Anonymous Bacon Message in VANETs., , , and . IEEE Trans. Veh. Technol., 72 (9): 11304-11317 (September 2023)A parallel matching algorithm based on order relation for HLA data distribution management., , , and . Int. J. Model. Simul. Sci. Comput., 6 (2): 1540002:1-1540002:15 (2015)