关注
Jiaojiao Jiang
Jiaojiao Jiang
在 unsw.edu.au 的电子邮件经过验证
标题
引用次数
引用次数
年份
Identifying propagation sources in networks: State-of-the-art and comparative studies
J Jiang, S Wen, S Yu, Y Xiang, W Zhou
IEEE Communications Surveys & Tutorials 19 (1), 465-481, 2016
2532016
Identifying and monitoring the development trends of emerging technologies using patent analysis and Twitter data mining: The case of perovskite solar cell technology
X Li, Q Xie, J Jiang, Y Zhou, L Huang
Technological Forecasting and Social Change 146, 687-705, 2019
1542019
To shut them up or to clarify: Restraining the spread of rumors in online social networks
S Wen, J Jiang, Y Xiang, S Yu, W Zhou, W Jia
IEEE Transactions on Parallel and Distributed Systems 25 (12), 3306-3316, 2014
1422014
Cyber threat intelligence mining for proactive cybersecurity defense: a survey and new perspectives
N Sun, M Ding, J Jiang, W Xu, X Mo, Y Tai, J Zhang
IEEE Communications Surveys & Tutorials 25 (3), 1748-1774, 2023
1302023
Rumor source identification in social networks with time-varying topology
J Jiang, S Wen, S Yu, Y Xiang, W Zhou
IEEE Transactions on Dependable and Secure Computing 15 (1), 166-179, 2016
1092016
K-center: An approach on the multi-source identification of information diffusion
J Jiang, S Wen, S Yu, Y Xiang, W Zhou
IEEE Transactions on Information Forensics and Security 10 (12), 2616-2626, 2015
772015
On the linear convergence of a proximal gradient method for a class of nonsmooth convex minimization problems
H Zhang, J Jiang, ZQ Luo
Journal of the Operations Research Society of China 1 (2), 163-186, 2013
572013
Variational co-embedding learning for attributed network clustering
S Yang, S Verma, B Cai, J Jiang, K Yu, F Chen, S Yu
Knowledge-Based Systems 270, 110530, 2023
482023
Robust cross-network node classification via constrained graph mutual information
S Yang, B Cai, T Cai, X Song, J Jiang, B Li, J Li
Knowledge-Based Systems 257, 109852, 2022
412022
Using epidemic betweenness to measure the influence of users in complex networks
S Wen, J Jiang, B Liu, Y Xiang, W Zhou
Journal of Network and Computer applications 78, 288-299, 2017
362017
Analysis and insights for myths circulating on Twitter during the COVID-19 pandemic
S Yang, J Jiang, A Pal, K Yu, F Chen, S Yu
IEEE Open Journal of the Computer Society 1, 209-219, 2020
352020
Are the popular users always important for information dissemination in online social networks?
S Wen, J Jiang, Y Xiang, S Yu, W Zhou
IEEE Network 28 (5), 64-67, 2014
242014
Identifying potential breakthrough research: A machine learning method using scientific papers and Twitter data
X Li, Y Wen, J Jiang, T Daim, L Huang
Technological Forecasting and Social Change 184, 122042, 2022
222022
A popularity-based cache consistency mechanism for information-centric networking
B Feng, H Zhou, H Zhang, J Jiang, S Yu
2016 IEEE global communications conference (GLOBECOM), 1-6, 2016
212016
The structure of communities in scalefree networks
J Jiang, S Wen, S Yu, Y Xiang, W Zhou, H Hassan
Concurrency and Computation: Practice and Experience 29 (14), e4040, 2017
202017
Malicious attack propagation and source identification
J Jiang, S Wen, B Liu, S Yu, Y Xiang, W Zhou
Springer International Publishing, 2019
19*2019
Mining accurate message formats for service APIs
MA Hossain, S Versteeg, J Han, MA Kabir, J Jiang, JG Schneider
2018 IEEE 25th International Conference on Software Analysis, Evolution and …, 2018
162018
A positional keyword-based approach to inferring fine-grained message formats
J Jiang, S Versteeg, J Han, MDA Hossain, JG Schneider
Future Generation Computer Systems 102, 369-381, 2020
112020
P-gram: positional N-gram for the clustering of machine-generated messages
J Jiang, S Versteeg, J Han, MA Hossain, JG Schneider, C Leckie, ...
IEEE Access 7, 88504-88516, 2019
102019
Sustainability analysis for fog nodes with renewable energy supplies
J Jiang, L Gao, J Jin, TH Luan, S Yu, Y Xiang, S Garg
IEEE Internet of Things Journal 6 (4), 6725-6735, 2019
82019
系统目前无法执行此操作,请稍后再试。
文章 1–20