Identifying propagation sources in networks: State-of-the-art and comparative studies J Jiang, S Wen, S Yu, Y Xiang, W Zhou IEEE Communications Surveys & Tutorials 19 (1), 465-481, 2016 | 253 | 2016 |
Identifying and monitoring the development trends of emerging technologies using patent analysis and Twitter data mining: The case of perovskite solar cell technology X Li, Q Xie, J Jiang, Y Zhou, L Huang Technological Forecasting and Social Change 146, 687-705, 2019 | 154 | 2019 |
To shut them up or to clarify: Restraining the spread of rumors in online social networks S Wen, J Jiang, Y Xiang, S Yu, W Zhou, W Jia IEEE Transactions on Parallel and Distributed Systems 25 (12), 3306-3316, 2014 | 142 | 2014 |
Cyber threat intelligence mining for proactive cybersecurity defense: a survey and new perspectives N Sun, M Ding, J Jiang, W Xu, X Mo, Y Tai, J Zhang IEEE Communications Surveys & Tutorials 25 (3), 1748-1774, 2023 | 130 | 2023 |
Rumor source identification in social networks with time-varying topology J Jiang, S Wen, S Yu, Y Xiang, W Zhou IEEE Transactions on Dependable and Secure Computing 15 (1), 166-179, 2016 | 109 | 2016 |
K-center: An approach on the multi-source identification of information diffusion J Jiang, S Wen, S Yu, Y Xiang, W Zhou IEEE Transactions on Information Forensics and Security 10 (12), 2616-2626, 2015 | 77 | 2015 |
On the linear convergence of a proximal gradient method for a class of nonsmooth convex minimization problems H Zhang, J Jiang, ZQ Luo Journal of the Operations Research Society of China 1 (2), 163-186, 2013 | 57 | 2013 |
Variational co-embedding learning for attributed network clustering S Yang, S Verma, B Cai, J Jiang, K Yu, F Chen, S Yu Knowledge-Based Systems 270, 110530, 2023 | 48 | 2023 |
Robust cross-network node classification via constrained graph mutual information S Yang, B Cai, T Cai, X Song, J Jiang, B Li, J Li Knowledge-Based Systems 257, 109852, 2022 | 41 | 2022 |
Using epidemic betweenness to measure the influence of users in complex networks S Wen, J Jiang, B Liu, Y Xiang, W Zhou Journal of Network and Computer applications 78, 288-299, 2017 | 36 | 2017 |
Analysis and insights for myths circulating on Twitter during the COVID-19 pandemic S Yang, J Jiang, A Pal, K Yu, F Chen, S Yu IEEE Open Journal of the Computer Society 1, 209-219, 2020 | 35 | 2020 |
Are the popular users always important for information dissemination in online social networks? S Wen, J Jiang, Y Xiang, S Yu, W Zhou IEEE Network 28 (5), 64-67, 2014 | 24 | 2014 |
Identifying potential breakthrough research: A machine learning method using scientific papers and Twitter data X Li, Y Wen, J Jiang, T Daim, L Huang Technological Forecasting and Social Change 184, 122042, 2022 | 22 | 2022 |
A popularity-based cache consistency mechanism for information-centric networking B Feng, H Zhou, H Zhang, J Jiang, S Yu 2016 IEEE global communications conference (GLOBECOM), 1-6, 2016 | 21 | 2016 |
The structure of communities in scalefree networks J Jiang, S Wen, S Yu, Y Xiang, W Zhou, H Hassan Concurrency and Computation: Practice and Experience 29 (14), e4040, 2017 | 20 | 2017 |
Malicious attack propagation and source identification J Jiang, S Wen, B Liu, S Yu, Y Xiang, W Zhou Springer International Publishing, 2019 | 19* | 2019 |
Mining accurate message formats for service APIs MA Hossain, S Versteeg, J Han, MA Kabir, J Jiang, JG Schneider 2018 IEEE 25th International Conference on Software Analysis, Evolution and …, 2018 | 16 | 2018 |
A positional keyword-based approach to inferring fine-grained message formats J Jiang, S Versteeg, J Han, MDA Hossain, JG Schneider Future Generation Computer Systems 102, 369-381, 2020 | 11 | 2020 |
P-gram: positional N-gram for the clustering of machine-generated messages J Jiang, S Versteeg, J Han, MA Hossain, JG Schneider, C Leckie, ... IEEE Access 7, 88504-88516, 2019 | 10 | 2019 |
Sustainability analysis for fog nodes with renewable energy supplies J Jiang, L Gao, J Jin, TH Luan, S Yu, Y Xiang, S Garg IEEE Internet of Things Journal 6 (4), 6725-6735, 2019 | 8 | 2019 |