Author of the publication

Breakdown by Rumors: Vulnerability of D2D Communications from Online Social Networks.

, , , and . WASA, volume 10251 of Lecture Notes in Computer Science, page 496-508. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantifying Privacy Vulnerability to Socialbot Attacks: An Adaptive Non-Submodular Model., , , , and . IEEE Trans. Emerg. Top. Comput., 8 (3): 855-868 (2020)Leveraging Social Communities for Optimizing Cellular Device-to-Device Communications., , , and . CoRR, (2016)Breakdown by Rumors: Vulnerability of D2D Communications from Online Social Networks., , , and . WASA, volume 10251 of Lecture Notes in Computer Science, page 496-508. Springer, (2017)Threat from being Social: Vulnerability Analysis of Social Network Coupled Smart Grid., , , , , , and . CoRR, (2020)Scalable bicriteria algorithms for the threshold activation problem in online social networks., , , and . INFOCOM, page 1-9. IEEE, (2017)Pseudo-Separation for Assessment of Structural Vulnerability of a Network., , , , and . SIGMETRICS (Abstracts), page 13-14. ACM, (2017)Vulnerability of Interdependent Networks with Heterogeneous Cascade Models and Timescales., , , and . ICDCS, page 290-299. IEEE Computer Society, (2018)Leveraging Social Communities for Optimizing Cellular Device-to-Device Communications., , , and . IEEE Trans. Wirel. Commun., 16 (1): 551-564 (2017)Collaborative production planning with production time windows and order splitting in make-to-order manufacturing., , and . Comput. Ind. Eng., (2014)Threat From Being Social: Vulnerability Analysis of Social Network Coupled Smart Grid., , , , , , and . IEEE Access, (2017)