Abstract is missing.
- Minimizing Influence of Rumors by Blockers on Social NetworksRuidong Yan, Deying Li, Weili Wu, Ding-Zhu Du. 1-12 [doi]
- Budgeted Competitive Influence Maximization on Online Social NetworksCanh V. Pham, Hieu V. Duong, Bao Q. Bui, My T. Thai. 13-24 [doi]
- Blockchain Queue TheoryQuan-Lin Li, Jing-Yu Ma, Yan-Xia Chang. 25-40 [doi]
- Optimal Energy Efficiency Data Dissemination Strategy Based on Optimal Stopping Theory in Mobile NetworkGaocai Wang, Ying Peng, Qifei Zhao. 41-52 [doi]
- Cease with Bass: A Framework for Real-Time Topic Detection and Popularity Prediction Based on Long-Text ContentsQuanquan Chu, Zhenhao Cao, Xiaofeng Gao, Peng He, Qianni Deng, Guihai Chen. 53-65 [doi]
- Application of SIRUS in Credit Card Fraud DetectionYuwei Zhang, GuanJun Liu, Wenjing Luan, ChunGang Yan, Changjun Jiang. 66-78 [doi]
- Graph Convolutional Networks: Algorithms, Applications and Open ChallengesSi Zhang, Hanghang Tong, JieJun Xu, Ross Maciejewski. 79-91 [doi]
- A Path Planning Approach with Maximum Traffic Flow and Minimum Breakdown Probability in Complex Road NetworkMengran Xu, Demin Li, Guanglin Zhang, Mengqi Cao, Shuya Liao. 92-102 [doi]
- Optimal Resource Allocation for Brokers in Media CloudWenlong Ni, Wei Wayne Li. 103-115 [doi]
- Towards a New Evolutionary Algorithm for the Minimum Tollbooth ProblemPavel Krömer, Jana Nowaková, Martin Hasal. 116-125 [doi]
- Methods for Optimal Resource Allocation on Cooperative Task Scheduling in Cross-Organizational Business ProcessWenAn Tan, Lu Zhao, Na Xie, Anqiong Tang, Xiaoming Hu, Shan Tang. 126-138 [doi]
- A Vehicular Collision Avoidance Routing Algorithm based on V2VAiping Zhang, Demin Li, Guanglin Zhang, Junjie Wang, Mengqi Cao. 139-151 [doi]
- Embedded Software-Define Radio for Wearable Microware DetectionYizhi Wu, Biao Luo, Hairui Zhu. 152-161 [doi]
- Group Based Immunization Strategy on Networks with Nonlinear InfectivityChandni Saxena, Mohammad Najmud Doja, Tanvir Ahmad. 162-173 [doi]
- Question Understanding in Community-Based Question Answering SystemsPhuc H. Duong, Hien T. Nguyen, Hao T. Do. 174-185 [doi]
- User Linkage Across Anonymizd Social NetworksChao Kong, Wan Tao, Sanmin Liu, Qiang Zhang. 186-197 [doi]
- K-Shell Rank Analysis Using Local InformationAkrati Saxena, S. R. S. Iyengar. 198-210 [doi]
- Leveraging Blockchain to Enhance Data Privacy in IoT-Based ApplicationsTruc D. T. Nguyen, Hoang-Anh Pham, My T. Thai. 211-221 [doi]
- A Formal Model for Temporal - Spatial Event in Internet of VehiclesNa Wang, Xuemin Chen. 222-234 [doi]
- A Decentralized Deterministic Information Propagation Model for Robust CommunicationChristopher Diaz, Alexander Nikolaev, Eduardo L. Pasiliao. 235-246 [doi]
- Gaming Bot Detection: A Systematic Literature ReviewDenis Kotkov, Gaurav Pandey, Alexander Semenov. 247-258 [doi]
- Graph-Based Comparison of IoT and Android MalwareHisham Alasmary, Afsah Anwar, Jeman Park 0001, JinChun Choi, DaeHun Nyang, Aziz Mohaisen. 259-272 [doi]
- Revisiting of 'Revisiting the Stop-and-Stare Algorithms for Influence Maximization'Hung T. Nguyen, Thang N. Dinh, My T. Thai. 273-285 [doi]
- An Issue in the Martingale Analysis of the Influence Maximization Algorithm IMMWei Chen. 286-297 [doi]
- A Stochastic Model for File Lifetime and Security in Data Center NetworksQuan-Lin Li, Fan-Qi Ma, Jing-Yu Ma. 298-309 [doi]
- The Design of Real Time Recording System for Electric Spark Source Parameters Based on the Internet of ThingsMingzhang Luo, Hao Zhang, Qiang Liu, Yang Xu 0008, Chong Luo, Zhongyuan Wang. 310-317 [doi]
- App Tamper Detection and Retrospective Program ResearchWenrong Jiang. 318-329 [doi]
- Deep Self-Taught Learning for Detecting Drug Abuse Risk Behavior in TweetsHan Hu, NhatHai Phan, James Geller, Huy Vo, Manasi Bhole, Xueqi Huang, Sophie Di Lorio, Thang Dinh, Soon Ae Chun. 330-342 [doi]
- Refined Weighted Random Forest and Its Application to Credit Card Fraud DetectionShiyang Xuan, GuanJun Liu, Zhenchuan Li. 343-355 [doi]
- A Congestion Control Protocol for Wireless Sensor NetworksChuang Ma. 356-367 [doi]
- Penalty Shutdown Mitigation in Wireless Sensor Networks Powered by Ambient EnergyTrong Nhan Le, Tran-Huu-Nguyen Nguyen, Tan Phuong Vo, The Duy Phan Dinh, Hoang-Anh Pham. 368-379 [doi]
- On Forwarding Protocols in Linear Topology Wake-up Wireless Sensor NetworksJian Wang, Xiaolin Xu, Xiaoming Hu, Wei Wayne Li. 380-391 [doi]
- Effect of Topological Structure and Coupling Strength in Weighted Multiplex NetworksRajesh Kumar, Anurag Singh, Hocine Cherifi. 392-403 [doi]
- A Single-Pair Antenna Microwave Medical Detection System Based on Unsupervised Feature LearningYizhi Wu, Bingshuai Liu, Mingda Zhu. 404-414 [doi]
- Forgetting Punished Recommendations for MOOCYanxia Pang, LiPing Li, WenAn Tan, Yuanyuan Jin, Ying Zhang. 415-426 [doi]
- Internet Rurality: Developing an Index for Network Distance from Popular Internet ServicesThomas H. Yang, Franklin Liu, Weiguo Yang, Hang Liu. 427-436 [doi]
- Ranking Academic Advisors: Analyzing Scientific Advising Impact Using MathGenealogy Social NetworkAlexander Semenov, Alexander Veremyev, Alexander Nikolaev, Eduardo L. Pasiliao, Vladimir Boginski. 437-449 [doi]
- A Rich Ranking Model Based on the Matthew Effect OptimizationJinzhong Li, GuanJun Liu. 450-459 [doi]
- A Load-Balanced and Low-Delay Data Collection for Wireless Sensor NetworksXiaoyan Kui, Junbin Liang, Huakun Du, Shaojun Zou, Zhixiong Liu. 460-476 [doi]
- Research on Telecom Flow Operation Based on User ProfileFeng Wang, Weidong Huang 0003, Yuan Xu. 477-486 [doi]
- Information Spreading in Social Network Through Explosive Percolation TheoryXiaoXia Zhu, Jiaxin Song, Jianfang Meng, Jia Liu. 487-497 [doi]
- A Novel Method for Detecting APT Attacks by Using OODA Loop and Black Swan TheoryTero Bodström, Timo Hämäläinen 0002. 498-509 [doi]
- MLSPD - Machine Learning Based Spam and Phishing DetectionSanjay Kumar, Azfar Faizan, Ari Viinikainen, Timo Hämäläinen 0002. 510-522 [doi]
- Smart Crowdsourcing Based Content Review System (SCCRS): An Approach to Improve Trustworthiness of Online ContentsKishor Datta Gupta, Dipankar Dasgupta, Sajib Sen. 523-535 [doi]