Author of the publication

Scalable Bicriteria Algorithms for the Threshold Activation Problem in Online Social Networks.

, , , and . CoRR, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scalable bicriteria algorithms for the threshold activation problem in online social networks., , , and . INFOCOM, page 1-9. IEEE, (2017)Threat from being Social: Vulnerability Analysis of Social Network Coupled Smart Grid., , , , , , and . CoRR, (2020)Breakdown by Rumors: Vulnerability of D2D Communications from Online Social Networks., , , and . WASA, volume 10251 of Lecture Notes in Computer Science, page 496-508. Springer, (2017)Pseudo-Separation for Assessment of Structural Vulnerability of a Network., , , , and . SIGMETRICS (Abstracts), page 13-14. ACM, (2017)Vulnerability of Interdependent Networks with Heterogeneous Cascade Models and Timescales., , , and . ICDCS, page 290-299. IEEE Computer Society, (2018)Collaborative production planning with production time windows and order splitting in make-to-order manufacturing., , and . Comput. Ind. Eng., (2014)Leveraging Social Communities for Optimizing Cellular Device-to-Device Communications., , , and . IEEE Trans. Wirel. Commun., 16 (1): 551-564 (2017)Quantifying Privacy Vulnerability to Socialbot Attacks: An Adaptive Non-Submodular Model., , , , and . IEEE Trans. Emerg. Top. Comput., 8 (3): 855-868 (2020)Leveraging Social Communities for Optimizing Cellular Device-to-Device Communications., , , and . CoRR, (2016)Threat From Being Social: Vulnerability Analysis of Social Network Coupled Smart Grid., , , , , , and . IEEE Access, (2017)