Author of the publication

A Second-Order Diffusion Model for Influence Maximization in Social Networks.

, , , , , and . IEEE Trans. Comput. Soc. Syst., 6 (4): 702-714 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Latent-Data Privacy Preserving With Customized Data Utility for Social Network Data., , and . IEEE Trans. Veh. Technol., 67 (1): 665-673 (2018)Privacy-preserved distinct content collection in human-assisted ubiquitous computing systems., , , , and . Inf. Sci., (2019)Functional dependency restricted insertion propagation., , , and . Theor. Comput. Sci., (2020)Differentially Private Recommendation System Based on Community Detection in Social Network Applications., , , , and . Secur. Commun. Networks, (2018)Technique Report: Scheduling Flows with Multiple Service Frequency Constraints., , , and . CoRR, (2016)Microarray Missing Value Imputation by Iterated Local Least Squares., , and . APBC, page 159-168. Imperial College Press, London, (2006)A Model-Free Greedy Gene Selection for Microarray Sample Class Prediction., , , , , and . CIBCB, page 1-8. IEEE, (2006)ComPhy: prokaryotic composite distance phylogenies inferred from whole-genome gene sets., , , , and . BMC Bioinform., (2009)Cost-Efficient Strategies for Restraining Rumor Spreading in Mobile Social Networks., , , , , and . IEEE Trans. Veh. Technol., 66 (3): 2789-2800 (2017)Multi-Source Adversarial Sample Attack on Autonomous Vehicles., , , and . IEEE Trans. Veh. Technol., 70 (3): 2822-2835 (2021)