Abstract is missing.
- An Adaptive Algorithm for Maximization of Non-submodular Function with a Matroid ConstraintXin Sun, Dachuan Xu, Dongmei Zhang, Yang Zhou. 3-13 [doi]
- A Fast Class Noise Detector with Multi-factor-based LearningWanwan Zheng, Mingzhe Jin. 14-25 [doi]
- Efficient SDN-Based Traffic Monitoring in IoT Networks with Double Deep Q-NetworkTri Gia Nguyen, Trung V. Phan, Dinh Thai Hoang, Tu N. Nguyen, Chakchai So-In. 26-38 [doi]
- Large Scale Graph Analytics for Communities Using Graph Neural NetworksAsif Ali Banka, Roohie Naaz. 39-47 [doi]
- Flexible Interval Intermittent Jamming Against Eavesdropping in WAVE Based Vehicular NetworksHao Li, Xiaoshuang Xing. 48-58 [doi]
- Graph Neural Network Combined Knowledge Graph for Recommendation SystemNguyen Tien Dong, Hai Pham Van. 59-70 [doi]
- An Analysis of Users Engagement on Twitter During the COVID-19 Pandemic: Topical Trends and SentimentsSultan Alshamrani, Ahmed Abusnaina, Mohammed Abuhamad, Anho Lee, DaeHun Nyang, David A. Mohaisen. 73-86 [doi]
- A Data Conversion Approach Between GAMA and DIGIPLANT Simulating Rice Plant Growth Under Brown Planthopper InfestationHiep Xuan Huynh, Man Ba Huynh, Hoa Thi Tran, Hai Thanh Nguyen. 87-99 [doi]
- Network Based Comparison of Indian Railways and AirwaysAmit Kumar Dhar, Shivam Sharma, Rishi Ranjan Singh. 100-112 [doi]
- k-TruthScore: Fake News Mitigation in the Presence of Strong User BiasAkrati Saxena, Harsh Saxena, Ralucca Gera. 113-126 [doi]
- Hierarchies in Inter-personal and Intergroup Communication in Social Media: Case 'Smart Voting'Alexander A. Kharlamov, Maria Pilgun. 127-138 [doi]
- Design a Management System for the Influencer Marketing Campaign on Social NetworkHien D. Nguyen 0002, Kha V. Nguyen, Suong N. Hoang, Tai Huynh. 139-151 [doi]
- Group Influence Maximization in Social NetworksYuting Zhong, Longkun Guo. 152-163 [doi]
- Maximum Channel Access Probability Based on Post-Disaster Ground Terminal Distribution DensityXingxing Hu, Demin Li, Chang Guo, Wei Hu, Lei Zhang, Menglin Zhai. 164-175 [doi]
- Using Large Cliques for Hierarchical Dense Subgraph DiscoveryMd Moniruzzaman Monir, Ahmet Erdem SariyĆ¼ce. 179-192 [doi]
- SqueezeBioBERT: BioBERT Distillation for Healthcare Natural Language ProcessingHongbin George Du, Yanke Hu. 193-201 [doi]
- A New Metric to Evaluate Communities in Social Networks Using Geodesic DistanceSahar Bakhtar, Mohammad Saber Gholami, Hovhannes A. Harutyunyan. 202-216 [doi]
- Structuring Code-Switched Product Titles in Indonesian e-Commerce PlatformRicky Chandra Johanes, Rahmad Mahendra, Brahmastro Kresnaraman. 217-227 [doi]
- Privacy Attack and Defense in Network EmbeddingChao Kong, Bao-Xiang Chen, Shaoying Li, Yifan Chen, Jiahui Chen, Qi Zhou, Dongfang Wang, Liping Zhang. 231-242 [doi]
- Classifying Malware Using Function Representations in a Static Call GraphThomas Dalton, Mauritius Schmidtler, Alireza Hadj Khodabakhshi. 243-254 [doi]
- Characterizing the Cryptocurrency Market During CrisisKin-Hon Ho, Wai-Han Chiu, Chin Li. 255-266 [doi]
- Two-Stage Framework for Accurate and Differentially Private Network Information PublicationManeesh Babu Adhikari, Vorapong Suppakitpaisarn, Arinjita Paul, C. Pandu Rangan. 267-279 [doi]
- A Privacy-Preserving Blockchain-based Information Shared Scheme in Smart-CitiesYanping Wang, Xiaofen Wang, Pan Wen, Teng Hu, Xiaosong Zhang. 283-294 [doi]
- Verifiable Blockchain Redacting Method for a Trusted Consortium with Distributed Chameleon Hash AuthorityWeilong Lv, Songjie Wei, Shasha Li, Minghui Yu. 295-306 [doi]
- Anomaly Detection for Consortium Blockchains Based on Machine Learning Classification AlgorithmDongyan Huang, Bin Chen, Lang Li, Yong Ding. 307-318 [doi]
- Behavioral Analysis to Detect Social Spammer in Online Social Networks (OSNs)Somya Ranjan Sahoo, Brij B. Gupta, Chang Choi, Ching-Hsien Hsu, Kwok Tai Chui. 321-332 [doi]
- A Multi-feature Bayesian Approach for Fake News DetectionMario Casillo, Francesco Colace, Dajana Conte, Massimo De Santo, Marco Lombardi, Serena Mottola, Domenico Santaniello. 333-344 [doi]
- Propagation of Fake News on Social Media: Challenges and OpportunitiesSaqib Hakak, Wazir Zada Khan, Sweta Bhattacharya, G. Thippa Reddy, Kim-Kwang Raymond Choo. 345-353 [doi]
- Multidimensional Analysis of Fake News Spreaders on TwitterManeet Singh, Rishemjit Kaur, S. R. S. Iyengar. 354-365 [doi]
- Detection of Sybil Attacks in Social NetworksAllan Lobo, Yukta Mandekar, Sonali Pundpal, Bidisha Roy. 366-377 [doi]
- Differential Privacy Approach to Solve Gradient Leakage Attack in a Federated Machine Learning EnvironmentKrishna Yadav, Brij B. Gupta, Kwok Tai Chui, Konstantinos E. Psannis. 378-385 [doi]
- A Novel Approach for Fake News Detection in Vehicular Ad-Hoc Network (VANET)Akshat Gaurav, Brij B. Gupta, Arcangelo Castiglione, Kostas E. Psannis, Chang Choi. 386-397 [doi]
- Metadata Security Measures for Protecting Confidential Information on the CloudMamta, Brij Bhooshan Gupta, Kwok Tai Chui, Konstantinos E. Psannis. 398-410 [doi]
- XSSPro: XSS Attack Detection Proxy to Defend Social Networking PlatformsPooja Chaudhary, Brij Bhooshan Gupta, Chang Choi, Kwok Tai Chui. 411-422 [doi]
- COVID-19: What Are Arabic Tweeters Talking About?Btool Hamoui, Abdulaziz Alashaikh, Eisa Alanazi. 425-436 [doi]
- MIDMod-OSN: A Microscopic-Level Information Diffusion Model for Online Social NetworksAbiola Osho, Colin Goodman, George T. Amariucai. 437-450 [doi]
- Nonsubmodular Constrained Profit Maximization from Increment PerspectiveLiman Du, Shengminjie Chen, Suixiang Gao, Wenguo Yang. 451-463 [doi]
- BNnet: A Deep Neural Network for the Identification of Satire and Fake Bangla NewsAbdullah Al Imran, Zaman Wahid, Tanvir Ahmed. 464-475 [doi]
- Graph-Based Supervised Clustering in Vector SpaceLily Schleider, Eduardo L. Pasiliao, Qipeng P. Zheng. 476-486 [doi]
- Collective Behavior of Price Changes of ERC-20 TokensHenri T. Heinonen, Alexander Semenov, Vladimir Boginski. 487-498 [doi]
- A Cutting Plane Method for Least Cost Influence MaximizationCheng-Lung Chen, Eduardo L. Pasiliao, Vladimir Boginski. 499-511 [doi]
- Double-Threshold Models for Network Influence PropagationAlexander Semenov, Alexander Veremyev, Eduardo L. Pasiliao, Vladimir Boginski. 512-523 [doi]
- Protest Perspective Against COVID-19 Risk Mitigation Strategies on the German InternetAndrzej Jarynowski, Alexander Semenov, Vitaly Belik. 524-535 [doi]