Jiaojiao Jiang
Jiaojiao Jiang
在 unsw.edu.au 的电子邮件经过验证
标题
引用次数
引用次数
年份
Identifying propagation sources in networks: State-of-the-art and comparative studies
J Jiang, S Wen, S Yu, Y Xiang, W Zhou
IEEE Communications Surveys & Tutorials 19 (1), 465-481, 2016
1342016
To shut them up or to clarify: Restraining the spread of rumors in online social networks
S Wen, J Jiang, Y Xiang, S Yu, W Zhou, W Jia
IEEE Transactions on Parallel and Distributed Systems 25 (12), 3306-3316, 2014
802014
Rumor source identification in social networks with time-varying topology
J Jiang, S Wen, S Yu, Y Xiang, W Zhou
IEEE Transactions on Dependable and Secure Computing 15 (1), 166-179, 2016
502016
On the linear convergence of a proximal gradient method for a class of nonsmooth convex minimization problems
H Zhang, J Jiang, ZQ Luo
Journal of the Operations Research Society of China 1 (2), 163-186, 2013
452013
Identifying and monitoring the development trends of emerging technologies using patent analysis and Twitter data mining: The case of perovskite solar cell technology
X Li, Q Xie, J Jiang, Y Zhou, L Huang
Technological Forecasting and Social Change 146, 687-705, 2019
372019
K-center: An approach on the multi-source identification of information diffusion
J Jiang, S Wen, S Yu, Y Xiang, W Zhou
IEEE Transactions on Information Forensics and Security 10 (12), 2616-2626, 2015
352015
Using epidemic betweenness to measure the influence of users in complex networks
S Wen, J Jiang, B Liu, Y Xiang, W Zhou
Journal of Network and Computer applications 78, 288-299, 2017
222017
Are the popular users always important for information dissemination in online social networks?
S Wen, J Jiang, Y Xiang, S Yu, W Zhou
IEEE Network 28 (5), 64-67, 2014
212014
A popularity-based cache consistency mechanism for information-centric networking
B Feng, H Zhou, H Zhang, J Jiang, S Yu
2016 IEEE global communications conference (GLOBECOM), 1-6, 2016
152016
The structure of communities in scalefree networks
J Jiang, S Wen, S Yu, Y Xiang, W Zhou, H Hassan
Concurrency and Computation: Practice and Experience 29 (14), e4040, 2017
112017
Mining accurate message formats for service APIs
MA Hossain, S Versteeg, J Han, MA Kabir, J Jiang, JG Schneider
2018 IEEE 25th International Conference on Software Analysis, Evolution and …, 2018
92018
Malicious attack propagation and source identification
J Jiang, S Wen, B Liu, S Yu, Y Xiang, W Zhou
Springer International Publishing, 2019
6*2019
K-source: Multiple source selection for traffic offloading in mobile social networks
B Liu, W Zhou, J Jiang, K Wang
2016 8th International Conference on Wireless Communications & Signal …, 2016
62016
Multiplicative update for projective nonnegative matrix factorization with bregman divergence
J Jiang, H Zhang
2010 Third International Symposium on Information Processing, 233-237, 2010
42010
Sustainability analysis for fog nodes with renewable energy supplies
J Jiang, L Gao, J Jin, TH Luan, S Yu, Y Xiang, S Garg
IEEE Internet of Things Journal 6 (4), 6725-6735, 2019
32019
An interior point trust region method for nonnegative matrix factorization
JJ Jiang, HB Zhanga, S Yu
Neurocomputing 97, 309-316, 2012
32012
A positional keyword-based approach to inferring fine-grained message formats
J Jiang, S Versteeg, J Han, MDA Hossain, JG Schneider
Future Generation Computer Systems 102, 369-381, 2020
22020
P-gram: positional N-gram for the clustering of machine-generated messages
J Jiang, S Versteeg, J Han, MA Hossain, JG Schneider, C Leckie, ...
IEEE access 7, 88504-88516, 2019
22019
Smartvm: A multi-layer microservice-based platform for deploying saas
X Zheng, J Jiang, Y Zhang, Y Deng, M Fu, T Zheng, X Liu
2017 IEEE International Symposium on Parallel and Distributed Processing …, 2017
22017
Studying the Global Spreading Influence and Local Connections of Users in Online Social Networks
J Jiang, Y Qu, S Yu, W Zhou, W Wu
2016 IEEE International Conference on Computer and Information Technology …, 2016
22016
系统目前无法执行此操作,请稍后再试。
文章 1–20