2020 Volume 23 Issue 2
- Anthology ID:
- 2020.wwwjournals_journal-ir0anthology0volumeA23A2
- Year:
- 2020
Preface to the Special Issue on Graph Data Management in Online Social Networks
Kai Zheng
|
Guanfeng Liu
|
Mehmet A. Orgun
|
Junping Du
Misinformation-oriented expert finding in social networks
GuoHui Li
|
Ming Dong
|
Fuming Yang
|
Jun Zeng
|
Jiansen Yuan
|
Congyuan Jin
|
Nguyen Quoc Viet Hung
|
Phan Thanh Cong
|
Bolong Zheng
Detecting the evolving community structure in dynamic social networks
Fanzhen Liu
|
Jia Wu
|
Shan Xue
|
Chuan Zhou
|
Jian Yang
|
Quanzheng Sheng
A relationship extraction method for domain knowledge graph construction
Haoze Yu
|
Haisheng Li
|
Dianhui Mao
|
Qiang Cai
Cluster query: a new query pattern on temporal knowledge graph
Jinjing Huang
|
Wei Chen
|
An Liu
|
Weiqing Wang
|
Hongzhi Yin
|
Lei Zhao
Semi-supervised clustering with deep metric learning and graph embedding
Xiaocui Li
|
Hongzhi Yin
|
Ke Zhou
|
Xiaofang Zhou
Towards k-vertex connected component discovery from large networks
Yuan Li
|
Guoren Wang
|
Yuhai Zhao
|
Feida Zhu
|
Yubao Wu
Detecting topic-level influencers in large-scale scientific networks
Yang Qian
|
Yezheng Liu
|
Yuanchun Jiang
|
Xiao Liu
Matching of social events and users: a two-way selection perspective
Zikai Yin
|
Tong Xu
|
Hengshu Zhu
|
Chen Zhu
|
Enhong Chen
|
Hui Xiong
Dolha - an efficient and exact data structure for streaming graphs
Fan Zhang
|
Lei Zou
|
Li Zeng
|
Xiangyang Gou
Distributed and parallel processing for real-time and dynamic spatio-temporal graph
Junhua Fang
|
Jiafeng Ding
|
Pengpeng Zhao
|
Jiajie Xu
|
An Liu
|
Zhixu Li
Gaussian mixture embedding of multiple node roles in networks
Yujun Chen
|
Juhua Pu
|
Xingwu Liu
|
Xiangliang Zhang
Editorial: Special issue on security and privacy in network computing
Hua Wang
|
Yongzhi Wang
|
Tarek Taleb
|
Xiaohong Jiang
Privacy-preserving conjunctive keyword search on encrypted data with enhanced fine-grained access control
Qiang Cao
|
Yanping Li
|
Zhenqiang Wu
|
Yinbin Miao
|
Jianqing Liu
MALDC: a depth detection method for malware based on behavior chains
Hao Zhang
|
Wenjun Zhang
|
Zhihan Lv
|
Arun Kumar Sangaiah
|
Tao Huang
|
Naveen K. Chilamkurti
A SDR-based verification platform for 802.11 PHY layer security authentication
Xiaoguang Li
|
Jun Liu
|
Boyan Ding
|
Zhiwei Li
|
Haoyang Wu
|
Tao Wang
An incentive mechanism with bid privacy protection on multi-bid crowdsourced spectrum sensing
Xuewen Dong
|
Guangxia Li
|
Tao Zhang
|
Di Lu
|
Yulong Shen
|
Jianfeng Ma
A PUF-based unified identity verification framework for secure IoT hardware via device authentication
Zhao Huang
|
Quan Wang
Smart computing and cyber technology for cyberization
Xiaokang Zhou
|
Flávia Coimbra Delicato
|
Kevin I-Kai Wang
|
Runhe Huang
From crowdsourcing to crowdmining: using implicit human intelligence for better understanding of crowdsourced data
Bin Guo
|
Huihui Chen
|
Yan Liu
|
Chao Chen
|
Qi Han
|
Zhiwen Yu
LW-CoEdge: a lightweight virtualization model and collaboration process for edge computing
Marcelo Pitanga Alves
|
Flávia Coimbra Delicato
|
Igor Leão dos Santos
|
Paulo F. Pires
Intelligent maintenance frameworks of large-scale grid using genetic algorithm and K-Mediods clustering methods
Weifeng Wang
|
Bing Lou
|
Xiong Li
|
Xizhong Lou
|
Ning Jin
|
Ke Yan
Fault tolerant data transmission reduction method for wireless sensor networks
Gaby Bou Tayeh
|
Abdallah Makhoul
|
Jacques Demerjian
|
Christophe Guyeux
|
Jacques M. Bahi
From affect, behavior, and cognition to personality: an integrated personal character model for individual-like intelligent artifacts
Ao Guo
|
Jianhua Ma
|
Shunxiang Tan
|
Guanqun Sun
A multiview learning method for malware threat hunting: windows, IoT and android as case studies
Hamid Darabian
|
Ali Dehghantanha
|
Sattar Hashemi
|
Mohammad Taheri
|
Amin Azmoodeh
|
Sajad Homayoun
|
Kim-Kwang Raymond Choo
|
Reza M. Parizi
Three-hop velocity attenuation propagation model for influence maximization in social networks
Weimin Li
|
Yuting Fan
|
Jun Mo
|
Wei Liu
|
Can Wang
|
Minjun Xin
|
Qun Jin
A QoS-aware virtual machine scheduling method for energy conservation in cloud-based cyber-physical systems
Lianyong Qi
|
Yi Chen
|
Yuan Yuan
|
Shucun Fu
|
Xuyun Zhang
|
Xiaolong Xu
An accurate multi-modal biometric identification system for person identification via fusion of face and finger print
Sidra Aleem
|
Po Yang
|
Saleha Masood
|
Ping Li
|
Bin Sheng
ICFR: An effective incremental collaborative filtering based recommendation architecture for personalized websites
Yayuan Tang
|
Kehua Guo
|
Ruifang Zhang
|
Tao Xu
|
Jianhua Ma
|
Tao Chi
A lightweight and cost effective edge intelligence architecture based on containerization technology
Mabrook Al-Rakhami
|
Abdu Gumaei
|
Mohammed Abdullah Alsahli
|
Mohammad Mehedi Hassan
|
Atif Alamri
|
Antonio Guerrieri
|
Giancarlo Fortino
Optimal placement of barrier coverage in heterogeneous bistatic radar sensor networks
Xianghua Xu
|
Chengwei Zhao
|
Zichen Jiang
|
Zongmao Cheng
|
Jinjun Chen
TBI2Flow: Travel behavioral inertia based long-term taxi passenger flow prediction
Xiangjie Kong
|
Feng Xia
|
Zhenhuan Fu
|
Xiaoran Yan
|
Amr Tolba
|
Zafer Al-Makhadmeh
Master data management for manufacturing big data: a method of evaluation for data network
Chun Zhao
|
Lei Ren
|
Ziqiao Zhang
|
Zihao Meng
Secure limitation analysis of public-key cryptography for smart card settings
Youliang Tian
|
Qiuxian Li
|
Jia Hu
|
Hui Lin
A survey on data provenance in IoT
Rui Hu
|
Zheng Yan
|
Wenxiu Ding
|
Laurence T. Yang