691 | -- | 692 | Kai Zheng 0001, Guanfeng Liu 0001, Mehmet A. Orgun, Junping Du. Preface to the Special Issue on Graph Data Management in Online Social Networks |
693 | -- | 714 | Guohui Li, Ming Dong, Fuming Yang, Jun Zeng, Jiansen Yuan, Congyuan Jin, Nguyen Quoc Viet Hung, Phan Thanh Cong, Bolong Zheng. Misinformation-oriented expert finding in social networks |
715 | -- | 733 | Fanzhen Liu, Jia Wu 0001, Shan Xue, Chuan Zhou 0001, Jian Yang 0001, Quanzheng Sheng. Detecting the evolving community structure in dynamic social networks |
735 | -- | 753 | Haoze Yu, Haisheng Li, Dianhui Mao, Qiang Cai. A relationship extraction method for domain knowledge graph construction |
755 | -- | 779 | Jinjing Huang, Wei Chen, An Liu 0002, Weiqing Wang 0001, Hongzhi Yin, Lei Zhao 0001. Cluster query: a new query pattern on temporal knowledge graph |
781 | -- | 798 | Xiaocui Li, Hongzhi Yin, Ke Zhou 0001, Xiaofang Zhou 0001. Semi-supervised clustering with deep metric learning and graph embedding |
799 | -- | 830 | Yuan Li 0008, Guoren Wang, Yuhai Zhao, Feida Zhu 0001, Yubao Wu. Towards k-vertex connected component discovery from large networks |
831 | -- | 851 | Yang Qian, Yezheng Liu 0001, Yuanchun Jiang, Xiao Liu 0004. Detecting topic-level influencers in large-scale scientific networks |
853 | -- | 871 | Zikai Yin, Tong Xu, Hengshu Zhu, Chen Zhu, Enhong Chen, Hui Xiong. Matching of social events and users: a two-way selection perspective |
873 | -- | 903 | Fan Zhang, Lei Zou 0001, Li Zeng, Xiangyang Gou. Dolha - an efficient and exact data structure for streaming graphs |
905 | -- | 926 | Junhua Fang, Jiafeng Ding, Pengpeng Zhao, Jiajie Xu, An Liu 0002, Zhixu Li. Distributed and parallel processing for real-time and dynamic spatio-temporal graph |
927 | -- | 950 | Yujun Chen, Juhua Pu, Xingwu Liu, Xiangliang Zhang 0001. Gaussian mixture embedding of multiple node roles in networks |
951 | -- | 957 | Hua Wang 0002, Yongzhi Wang, Tarek Taleb, Xiaohong Jiang. Editorial: Special issue on security and privacy in network computing |
959 | -- | 989 | Qiang Cao, Yanping Li, Zhenqiang Wu, Yinbin Miao, Jianqing Liu. Privacy-preserving conjunctive keyword search on encrypted data with enhanced fine-grained access control |
991 | -- | 1010 | Hao Zhang, Wenjun Zhang, Zhihan Lv, Arun Kumar Sangaiah, Tao Huang, Naveen Chilamkurti. MALDC: a depth detection method for malware based on behavior chains |
1011 | -- | 1034 | Xiaoguang Li, Jun Liu 0063, Boyan Ding, Zhiwei Li, Haoyang Wu, Tao Wang 0004. A SDR-based verification platform for 802.11 PHY layer security authentication |
1035 | -- | 1055 | Xuewen Dong, Guangxia Li, Tao Zhang 0029, Di Lu, Yulong Shen, Jianfeng Ma. An incentive mechanism with bid privacy protection on multi-bid crowdsourced spectrum sensing |
1057 | -- | 1088 | Zhao Huang, Quan Wang. A PUF-based unified identity verification framework for secure IoT hardware via device authentication |
1089 | -- | 1100 | Xiaokang Zhou, Flávia Coimbra Delicato, Kevin I-Kai Wang, Runhe Huang. Smart computing and cyber technology for cyberization |
1101 | -- | 1125 | Bin Guo 0001, Huihui Chen, Yan Liu 0045, Chao Chen 0004, Qi Han 0001, Zhiwen Yu 0001. From crowdsourcing to crowdmining: using implicit human intelligence for better understanding of crowdsourced data |
1127 | -- | 1175 | Marcelo Pitanga Alves, Flávia Coimbra Delicato, Igor Leão dos Santos, Paulo F. Pires. LW-CoEdge: a lightweight virtualization model and collaboration process for edge computing |
1177 | -- | 1195 | Weifeng Wang, Bing Lou, Xiong Li, Xizhong Lou, Ning Jin, Ke Yan 0001. Intelligent maintenance frameworks of large-scale grid using genetic algorithm and K-Mediods clustering methods |
1197 | -- | 1216 | Gaby Bou Tayeh, Abdallah Makhoul, Jacques Demerjian, Christophe Guyeux, Jacques M. Bahi. Fault tolerant data transmission reduction method for wireless sensor networks |
1217 | -- | 1239 | Ao Guo, Jianhua Ma, Shunxiang Tan, Guanqun Sun. From affect, behavior, and cognition to personality: an integrated personal character model for individual-like intelligent artifacts |
1241 | -- | 1260 | Hamid Darabian, Ali Dehghantanha, Sattar Hashemi, Mohammad Taheri, Amin Azmoodeh, Sajad Homayoun, Kim-Kwang Raymond Choo, Reza M. Parizi. A multiview learning method for malware threat hunting: windows, IoT and android as case studies |
1261 | -- | 1273 | Weimin Li, Yuting Fan, Jun Mo, Wei Liu, Can Wang, Minjun Xin, Qun Jin. Three-hop velocity attenuation propagation model for influence maximization in social networks |
1275 | -- | 1297 | Lianyong Qi, Yi Chen, Yuan Yuan 0003, Shucun Fu, Xuyun Zhang, Xiaolong Xu. A QoS-aware virtual machine scheduling method for energy conservation in cloud-based cyber-physical systems |
1299 | -- | 1317 | Sidra Aleem, Po Yang 0001, Saleha Masood, Ping Li 0016, Bin Sheng. An accurate multi-modal biometric identification system for person identification via fusion of face and finger print |
1319 | -- | 1340 | Yayuan Tang, Kehua Guo, Ruifang Zhang, Tao Xu, Jianhua Ma, Tao Chi. ICFR: An effective incremental collaborative filtering based recommendation architecture for personalized websites |
1341 | -- | 1360 | Mabrook Al-Rakhami, Abdu Gumaei, Mohammed Alsahli, Mohammad Mehedi Hassan, Atif Alamri, Antonio Guerrieri, Giancarlo Fortino. A lightweight and cost effective edge intelligence architecture based on containerization technology |
1361 | -- | 1380 | Xianghua Xu, Chengwei Zhao, Zichen Jiang, Zongmao Cheng, Jinjun Chen. Optimal placement of barrier coverage in heterogeneous bistatic radar sensor networks |
1381 | -- | 1405 | Xiangjie Kong, Feng Xia 0001, Zhenhuan Fu, Xiaoran Yan, Amr Tolba, Zafer Al-Makhadmeh. TBI2Flow: Travel behavioral inertia based long-term taxi passenger flow prediction |
1407 | -- | 1421 | Chun Zhao, Lei Ren 0001, Ziqiao Zhang, Zihao Meng. Master data management for manufacturing big data: a method of evaluation for data network |
1423 | -- | 1440 | Youliang Tian, Qiuxian Li, Jia Hu, Hui Lin. Secure limitation analysis of public-key cryptography for smart card settings |
1441 | -- | 1463 | Rui Hu, Zheng Yan 0002, Wenxiu Ding, Laurence T. Yang. A survey on data provenance in IoT |