Main » WWWJ » 2020 »

2020 Volume 23 Issue 2


Anthology ID:
2020.wwwjournals_journal-ir0anthology0volumeA23A2
Year:
2020
BibTeX:
Download

doi dblp
Preface to the Special Issue on Graph Data Management in Online Social Networks
Kai Zheng | Guanfeng Liu | Mehmet A. Orgun | Junping Du

doi dblp
Misinformation-oriented expert finding in social networks
GuoHui Li | Ming Dong | Fuming Yang | Jun Zeng | Jiansen Yuan | Congyuan Jin | Nguyen Quoc Viet Hung | Phan Thanh Cong | Bolong Zheng

doi dblp
Detecting the evolving community structure in dynamic social networks
Fanzhen Liu | Jia Wu | Shan Xue | Chuan Zhou | Jian Yang | Quanzheng Sheng

doi dblp
A relationship extraction method for domain knowledge graph construction
Haoze Yu | Haisheng Li | Dianhui Mao | Qiang Cai

doi dblp
Cluster query: a new query pattern on temporal knowledge graph
Jinjing Huang | Wei Chen | An Liu | Weiqing Wang | Hongzhi Yin | Lei Zhao

doi dblp
Semi-supervised clustering with deep metric learning and graph embedding
Xiaocui Li | Hongzhi Yin | Ke Zhou | Xiaofang Zhou

doi dblp
Towards k-vertex connected component discovery from large networks
Yuan Li | Guoren Wang | Yuhai Zhao | Feida Zhu | Yubao Wu

doi dblp
Detecting topic-level influencers in large-scale scientific networks
Yang Qian | Yezheng Liu | Yuanchun Jiang | Xiao Liu

doi dblp
Matching of social events and users: a two-way selection perspective
Zikai Yin | Tong Xu | Hengshu Zhu | Chen Zhu | Enhong Chen | Hui Xiong

doi dblp
Dolha - an efficient and exact data structure for streaming graphs
Fan Zhang | Lei Zou | Li Zeng | Xiangyang Gou

doi dblp
Distributed and parallel processing for real-time and dynamic spatio-temporal graph
Junhua Fang | Jiafeng Ding | Pengpeng Zhao | Jiajie Xu | An Liu | Zhixu Li

doi dblp
Gaussian mixture embedding of multiple node roles in networks
Yujun Chen | Juhua Pu | Xingwu Liu | Xiangliang Zhang

doi dblp
Editorial: Special issue on security and privacy in network computing
Hua Wang | Yongzhi Wang | Tarek Taleb | Xiaohong Jiang

doi dblp
Privacy-preserving conjunctive keyword search on encrypted data with enhanced fine-grained access control
Qiang Cao | Yanping Li | Zhenqiang Wu | Yinbin Miao | Jianqing Liu

doi dblp
MALDC: a depth detection method for malware based on behavior chains
Hao Zhang | Wenjun Zhang | Zhihan Lv | Arun Kumar Sangaiah | Tao Huang | Naveen K. Chilamkurti

doi dblp
A SDR-based verification platform for 802.11 PHY layer security authentication
Xiaoguang Li | Jun Liu | Boyan Ding | Zhiwei Li | Haoyang Wu | Tao Wang

doi dblp
An incentive mechanism with bid privacy protection on multi-bid crowdsourced spectrum sensing
Xuewen Dong | Guangxia Li | Tao Zhang | Di Lu | Yulong Shen | Jianfeng Ma

doi dblp
A PUF-based unified identity verification framework for secure IoT hardware via device authentication
Zhao Huang | Quan Wang

doi dblp
Smart computing and cyber technology for cyberization
Xiaokang Zhou | Flávia Coimbra Delicato | Kevin I-Kai Wang | Runhe Huang

doi dblp
From crowdsourcing to crowdmining: using implicit human intelligence for better understanding of crowdsourced data
Bin Guo | Huihui Chen | Yan Liu | Chao Chen | Qi Han | Zhiwen Yu

doi dblp
LW-CoEdge: a lightweight virtualization model and collaboration process for edge computing
Marcelo Pitanga Alves | Flávia Coimbra Delicato | Igor Leão dos Santos | Paulo F. Pires

doi dblp
Intelligent maintenance frameworks of large-scale grid using genetic algorithm and K-Mediods clustering methods
Weifeng Wang | Bing Lou | Xiong Li | Xizhong Lou | Ning Jin | Ke Yan

doi dblp
Fault tolerant data transmission reduction method for wireless sensor networks
Gaby Bou Tayeh | Abdallah Makhoul | Jacques Demerjian | Christophe Guyeux | Jacques M. Bahi

doi dblp
From affect, behavior, and cognition to personality: an integrated personal character model for individual-like intelligent artifacts
Ao Guo | Jianhua Ma | Shunxiang Tan | Guanqun Sun

doi dblp
A multiview learning method for malware threat hunting: windows, IoT and android as case studies
Hamid Darabian | Ali Dehghantanha | Sattar Hashemi | Mohammad Taheri | Amin Azmoodeh | Sajad Homayoun | Kim-Kwang Raymond Choo | Reza M. Parizi

doi dblp
Three-hop velocity attenuation propagation model for influence maximization in social networks
Weimin Li | Yuting Fan | Jun Mo | Wei Liu | Can Wang | Minjun Xin | Qun Jin

doi dblp
A QoS-aware virtual machine scheduling method for energy conservation in cloud-based cyber-physical systems
Lianyong Qi | Yi Chen | Yuan Yuan | Shucun Fu | Xuyun Zhang | Xiaolong Xu

doi dblp
An accurate multi-modal biometric identification system for person identification via fusion of face and finger print
Sidra Aleem | Po Yang | Saleha Masood | Ping Li | Bin Sheng

doi dblp
ICFR: An effective incremental collaborative filtering based recommendation architecture for personalized websites
Yayuan Tang | Kehua Guo | Ruifang Zhang | Tao Xu | Jianhua Ma | Tao Chi

doi dblp
A lightweight and cost effective edge intelligence architecture based on containerization technology
Mabrook Al-Rakhami | Abdu Gumaei | Mohammed Abdullah Alsahli | Mohammad Mehedi Hassan | Atif Alamri | Antonio Guerrieri | Giancarlo Fortino

doi dblp
Optimal placement of barrier coverage in heterogeneous bistatic radar sensor networks
Xianghua Xu | Chengwei Zhao | Zichen Jiang | Zongmao Cheng | Jinjun Chen

doi dblp
TBI2Flow: Travel behavioral inertia based long-term taxi passenger flow prediction
Xiangjie Kong | Feng Xia | Zhenhuan Fu | Xiaoran Yan | Amr Tolba | Zafer Al-Makhadmeh

doi dblp
Master data management for manufacturing big data: a method of evaluation for data network
Chun Zhao | Lei Ren | Ziqiao Zhang | Zihao Meng

doi dblp
Secure limitation analysis of public-key cryptography for smart card settings
Youliang Tian | Qiuxian Li | Jia Hu | Hui Lin

doi dblp
A survey on data provenance in IoT
Rui Hu | Zheng Yan | Wenxiu Ding | Laurence T. Yang