Journal: World Wide Web

Volume 23, Issue 2

691 -- 692Kai Zheng 0001, Guanfeng Liu 0001, Mehmet A. Orgun, Junping Du. Preface to the Special Issue on Graph Data Management in Online Social Networks
693 -- 714Guohui Li, Ming Dong, Fuming Yang, Jun Zeng, Jiansen Yuan, Congyuan Jin, Nguyen Quoc Viet Hung, Phan Thanh Cong, Bolong Zheng. Misinformation-oriented expert finding in social networks
715 -- 733Fanzhen Liu, Jia Wu 0001, Shan Xue, Chuan Zhou 0001, Jian Yang 0001, Quanzheng Sheng. Detecting the evolving community structure in dynamic social networks
735 -- 753Haoze Yu, Haisheng Li, Dianhui Mao, Qiang Cai. A relationship extraction method for domain knowledge graph construction
755 -- 779Jinjing Huang, Wei Chen, An Liu 0002, Weiqing Wang 0001, Hongzhi Yin, Lei Zhao 0001. Cluster query: a new query pattern on temporal knowledge graph
781 -- 798Xiaocui Li, Hongzhi Yin, Ke Zhou 0001, Xiaofang Zhou 0001. Semi-supervised clustering with deep metric learning and graph embedding
799 -- 830Yuan Li 0008, Guoren Wang, Yuhai Zhao, Feida Zhu 0001, Yubao Wu. Towards k-vertex connected component discovery from large networks
831 -- 851Yang Qian, Yezheng Liu 0001, Yuanchun Jiang, Xiao Liu 0004. Detecting topic-level influencers in large-scale scientific networks
853 -- 871Zikai Yin, Tong Xu, Hengshu Zhu, Chen Zhu, Enhong Chen, Hui Xiong. Matching of social events and users: a two-way selection perspective
873 -- 903Fan Zhang, Lei Zou 0001, Li Zeng, Xiangyang Gou. Dolha - an efficient and exact data structure for streaming graphs
905 -- 926Junhua Fang, Jiafeng Ding, Pengpeng Zhao, Jiajie Xu, An Liu 0002, Zhixu Li. Distributed and parallel processing for real-time and dynamic spatio-temporal graph
927 -- 950Yujun Chen, Juhua Pu, Xingwu Liu, Xiangliang Zhang 0001. Gaussian mixture embedding of multiple node roles in networks
951 -- 957Hua Wang 0002, Yongzhi Wang, Tarek Taleb, Xiaohong Jiang. Editorial: Special issue on security and privacy in network computing
959 -- 989Qiang Cao, Yanping Li, Zhenqiang Wu, Yinbin Miao, Jianqing Liu. Privacy-preserving conjunctive keyword search on encrypted data with enhanced fine-grained access control
991 -- 1010Hao Zhang, Wenjun Zhang, Zhihan Lv, Arun Kumar Sangaiah, Tao Huang, Naveen Chilamkurti. MALDC: a depth detection method for malware based on behavior chains
1011 -- 1034Xiaoguang Li, Jun Liu 0063, Boyan Ding, Zhiwei Li, Haoyang Wu, Tao Wang 0004. A SDR-based verification platform for 802.11 PHY layer security authentication
1035 -- 1055Xuewen Dong, Guangxia Li, Tao Zhang 0029, Di Lu, Yulong Shen, Jianfeng Ma. An incentive mechanism with bid privacy protection on multi-bid crowdsourced spectrum sensing
1057 -- 1088Zhao Huang, Quan Wang. A PUF-based unified identity verification framework for secure IoT hardware via device authentication
1089 -- 1100Xiaokang Zhou, Flávia Coimbra Delicato, Kevin I-Kai Wang, Runhe Huang. Smart computing and cyber technology for cyberization
1101 -- 1125Bin Guo 0001, Huihui Chen, Yan Liu 0045, Chao Chen 0004, Qi Han 0001, Zhiwen Yu 0001. From crowdsourcing to crowdmining: using implicit human intelligence for better understanding of crowdsourced data
1127 -- 1175Marcelo Pitanga Alves, Flávia Coimbra Delicato, Igor Leão dos Santos, Paulo F. Pires. LW-CoEdge: a lightweight virtualization model and collaboration process for edge computing
1177 -- 1195Weifeng Wang, Bing Lou, Xiong Li, Xizhong Lou, Ning Jin, Ke Yan 0001. Intelligent maintenance frameworks of large-scale grid using genetic algorithm and K-Mediods clustering methods
1197 -- 1216Gaby Bou Tayeh, Abdallah Makhoul, Jacques Demerjian, Christophe Guyeux, Jacques M. Bahi. Fault tolerant data transmission reduction method for wireless sensor networks
1217 -- 1239Ao Guo, Jianhua Ma, Shunxiang Tan, Guanqun Sun. From affect, behavior, and cognition to personality: an integrated personal character model for individual-like intelligent artifacts
1241 -- 1260Hamid Darabian, Ali Dehghantanha, Sattar Hashemi, Mohammad Taheri, Amin Azmoodeh, Sajad Homayoun, Kim-Kwang Raymond Choo, Reza M. Parizi. A multiview learning method for malware threat hunting: windows, IoT and android as case studies
1261 -- 1273Weimin Li, Yuting Fan, Jun Mo, Wei Liu, Can Wang, Minjun Xin, Qun Jin. Three-hop velocity attenuation propagation model for influence maximization in social networks
1275 -- 1297Lianyong Qi, Yi Chen, Yuan Yuan 0003, Shucun Fu, Xuyun Zhang, Xiaolong Xu. A QoS-aware virtual machine scheduling method for energy conservation in cloud-based cyber-physical systems
1299 -- 1317Sidra Aleem, Po Yang 0001, Saleha Masood, Ping Li 0016, Bin Sheng. An accurate multi-modal biometric identification system for person identification via fusion of face and finger print
1319 -- 1340Yayuan Tang, Kehua Guo, Ruifang Zhang, Tao Xu, Jianhua Ma, Tao Chi. ICFR: An effective incremental collaborative filtering based recommendation architecture for personalized websites
1341 -- 1360Mabrook Al-Rakhami, Abdu Gumaei, Mohammed Alsahli, Mohammad Mehedi Hassan, Atif Alamri, Antonio Guerrieri, Giancarlo Fortino. A lightweight and cost effective edge intelligence architecture based on containerization technology
1361 -- 1380Xianghua Xu, Chengwei Zhao, Zichen Jiang, Zongmao Cheng, Jinjun Chen. Optimal placement of barrier coverage in heterogeneous bistatic radar sensor networks
1381 -- 1405Xiangjie Kong, Feng Xia 0001, Zhenhuan Fu, Xiaoran Yan, Amr Tolba, Zafer Al-Makhadmeh. TBI2Flow: Travel behavioral inertia based long-term taxi passenger flow prediction
1407 -- 1421Chun Zhao, Lei Ren 0001, Ziqiao Zhang, Zihao Meng. Master data management for manufacturing big data: a method of evaluation for data network
1423 -- 1440Youliang Tian, Qiuxian Li, Jia Hu, Hui Lin. Secure limitation analysis of public-key cryptography for smart card settings
1441 -- 1463Rui Hu, Zheng Yan 0002, Wenxiu Ding, Laurence T. Yang. A survey on data provenance in IoT