J. Jiang
Latest
- A positional keyword-based approach to inferring fine-grained message formats
- A positional keyword-based approach to inferring fine-grained message formats
- Identifying and monitoring the development trends of emerging technologies using patent analysis and Twitter data mining: The case of perovskite solar cell technology
- Identifying and monitoring the development trends of emerging technologies using patent analysis and Twitter data mining: The case of perovskite solar cell technology
- Malicious attack propagation and source identification
- Malicious attack propagation and source identification
- Sustainability Analysis for Fog Nodes with Renewable Energy Supplies
- Sustainability Analysis for Fog Nodes with Renewable Energy Supplies
- Mining accurate message formats for service APIs
- Mining accurate message formats for service APIs
- Preferential attachment and the spreading influence of users in online social networks
- Preferential attachment and the spreading influence of users in online social networks
- Rumor Source Identification in Social Networks with Time-Varying Topology
- Rumor Source Identification in Social Networks with Time-Varying Topology
- SmartVM: A multi-layer microservice-based platform for deploying SaaS
- SmartVM: A multi-layer microservice-based platform for deploying SaaS
- Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies
- Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies
- Studying the global spreading influence and local connections of users in online social networks
- Studying the global spreading influence and local connections of users in online social networks
- The structure of communities in scale-free networks
- The structure of communities in scale-free networks
- Towards an analysis of traffic shaping and policing in fog networks using stochastic fluid models
- Towards an analysis of traffic shaping and policing in fog networks using stochastic fluid models
- Using epidemic betweenness to measure the influence of users in complex networks
- Using epidemic betweenness to measure the influence of users in complex networks
- A popularity-based cache consistency mechanism for information-centric networking
- A popularity-based cache consistency mechanism for information-centric networking
- Analysis of the spreading influence variations for online social users under attacks
- Analysis of the spreading influence variations for online social users under attacks
- K-Source: Multiple source selection for traffic offloading in mobile social networks
- K-Source: Multiple source selection for traffic offloading in mobile social networks
- The relation between local and global influence of individuals in scale-free networks
- The relation between local and global influence of individuals in scale-free networks
- Identifying diffusion sources in large networks: A community structure based approach
- Identifying diffusion sources in large networks: A community structure based approach
- K-Center: An Approach on the Multi-Source Identification of Information Diffusion
- K-Center: An Approach on the Multi-Source Identification of Information Diffusion
- Are the popular users always important for information dissemination in online social networks?
- Are the popular users always important for information dissemination in online social networks?
- To shut them up or to clarify: Restraining the spread of rumors in online social networks
- To shut them up or to clarify: Restraining the spread of rumors in online social networks