Latest
- A survey of classification tasks and approaches for legal contracts
- A survey of classification tasks and approaches for legal contracts
- VAlign-GLAR: Graph Retrieval-Based Vulnerability Intelligence Alignment via Structured LLM-Guided Inference
- Vulnerability Aspects Extraction and Discrepancies Detection across Heterogeneous Threat Intelligence
- DARA: Enhancing Vulnerability Alignment via Adaptive Reconstruction and Dual-Level Attention
- Unifying View-Specific Learning and Ambiguity Awareness With Emotions for Multimodal Misinformation Detection
- DiHAN: A Novel Dynamic Hierarchical Graph Attention Network for Fake News Detection
- LayerPlexRank: Exploring Node Centrality and Layer Influence through Algebraic Connectivity in Multiplex Networks
- Partial label learning via identifying outlier features
- MFVIEW: Multi-modal Fake News Detection with View-Specific Information Extraction
- Exploring Uncharted Waters of Website Fingerprinting
- Influence Robustness of Nodes in Multiplex Networks Against Attacks
- Privacy-Preserving Probabilistic Data Encoding for IoT Data Analysis
- Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives
- Robust cross-network node classification via constrained graph mutual information
- Network Growth From Global and Local Influential Nodes
- R-gram: Inferring message formats of service protocols with relative positional n-grams
- A positional keyword-based approach to inferring fine-grained message formats
- Identifying and monitoring the development trends of emerging technologies using patent analysis and Twitter data mining: The case of perovskite solar cell technology
- Malicious attack propagation and source identification
- P-Gram: Positional N-Gram for the Clustering of Machine-Generated Messages
- Sustainability Analysis for Fog Nodes with Renewable Energy Supplies
- Mining accurate message formats for service APIs
- Preferential attachment and the spreading influence of users in online social networks
- Rumor Source Identification in Social Networks with Time-Varying Topology
- SmartVM: A multi-layer microservice-based platform for deploying SaaS
- Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies
- Studying the global spreading influence and local connections of users in online social networks
- The structure of communities in scale-free networks
- Towards an analysis of traffic shaping and policing in fog networks using stochastic fluid models
- Using epidemic betweenness to measure the influence of users in complex networks
- A popularity-based cache consistency mechanism for information-centric networking
- Analysis of the spreading influence variations for online social users under attacks
- K-Source: Multiple source selection for traffic offloading in mobile social networks
- The relation between local and global influence of individuals in scale-free networks
- Identifying diffusion sources in large networks: A community structure based approach
- K-Center: An Approach on the Multi-Source Identification of Information Diffusion
- On the proximal Landweber Newton method for a class of nonsmooth convex problems
- Are the popular users always important for information dissemination in online social networks?
- To shut them up or to clarify: Restraining the spread of rumors in online social networks