Y. Xiang
Latest
- Malicious attack propagation and source identification
- Malicious attack propagation and source identification
- Sustainability Analysis for Fog Nodes with Renewable Energy Supplies
- Sustainability Analysis for Fog Nodes with Renewable Energy Supplies
- Rumor Source Identification in Social Networks with Time-Varying Topology
- Rumor Source Identification in Social Networks with Time-Varying Topology
- Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies
- Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies
- The structure of communities in scale-free networks
- The structure of communities in scale-free networks
- Towards an analysis of traffic shaping and policing in fog networks using stochastic fluid models
- Towards an analysis of traffic shaping and policing in fog networks using stochastic fluid models
- Using epidemic betweenness to measure the influence of users in complex networks
- Using epidemic betweenness to measure the influence of users in complex networks
- The relation between local and global influence of individuals in scale-free networks
- The relation between local and global influence of individuals in scale-free networks
- Identifying diffusion sources in large networks: A community structure based approach
- Identifying diffusion sources in large networks: A community structure based approach
- K-Center: An Approach on the Multi-Source Identification of Information Diffusion
- K-Center: An Approach on the Multi-Source Identification of Information Diffusion
- Are the popular users always important for information dissemination in online social networks?
- Are the popular users always important for information dissemination in online social networks?
- To shut them up or to clarify: Restraining the spread of rumors in online social networks
- To shut them up or to clarify: Restraining the spread of rumors in online social networks