Name
Papers
Collaborators
MY T. THAI
180
214
Citations 
PageRank 
Referers 
1546
108.81
2760
Referees 
References 
2203
1642
Search Limit
1001000
Title
Citations
PageRank
Year
zVote: A Blockchain-based Privacy-preserving Platform for Remote E-voting00.342022
Blockchain-based Secure Client Selection in Federated Learning00.342022
SaPHyRa: A Learning Theory Approach to Ranking Nodes in Large Networks00.342022
Minimizing Latency for Data Aggregation in Wireless Sensor Networks: An Algorithm Approach00.342022
Efficient Algorithms for Monotone Non-Submodular Maximization with Partition Matroid Constraint00.342022
Auditing The Sensitivity Of Graph-Based Ranking With Visual Analytics00.342021
Continual Learning with Differential Privacy.00.342021
Evaluating Fake News Detection Models from Explainable Machine Learning Perspectives00.342021
Learning Interpretation with Explainable Knowledge Distillation.00.342021
Groups Influence with Minimum Cost in Social Networks.00.342021
Quantifying Privacy Vulnerability to Socialbot Attacks: An Adaptive Non-Submodular Model10.352020
Guest Editorial Introduction to the Special Section on Scalability and Privacy in Social Networks.00.342020
Scalable Differential Privacy with Certified Robustness in Adversarial Learning00.342020
Parking Assignment: Minimizing Parking Expenses and Balancing Parking Demand Among Multiple Parking Lots00.342020
Heterogeneous Gaussian Mechanism: Preserving Differential Privacy in Deep Learning with Provable Robustness.20.342019
Trustless Framework For Iterative Double Auction Based On Blockchain00.342019
Exploring Spatial, Temporal, and Logical Attacks on the Bitcoin Network.00.342019
Preserving Differential Privacy in Adversarial Learning with Provable Robustness.10.352019
Approximate k-Cover in Hypergraphs: Efficient Algorithms, and Applications.00.342019
Evaluating Explainers via Perturbation.00.342019
Vulnerability Assessment of Social-Smart Grids: An Algorithmic Approach00.342019
Submodular Cost Submodular Cover with an Approximate Oracle00.342019
Critical nodes in interdependent networks with deterministic and probabilistic cascading failures00.342019
TipTop: (Almost) Exact Solutions for Influence Maximization in Billion-Scale Networks10.372019
Minimum budget for misinformation blocking in online social networks.20.372019
Multiplex Influence Maximization in Online Social Networks with Heterogeneous Diffusion Models.50.442018
Network Resilience and the Length-Bounded Multicut Problem: Reaching the Dynamic Billion-Scale with Guarantees.10.362018
A hybrid ABC-TS algorithm for the unrelated parallel-batching machines scheduling problem with deteriorating jobs and maintenance activity.100.492018
AI and Blockchain: A Disruptive Integration.50.542018
Revisiting of 'Revisiting the Stop-and-Stare Algorithms for Influence Maximization'.10.352018
POSTER: Deterring DDoS Attacks on Blockchain-based Cryptocurrencies through Mempool Optimization.00.342018
Leveraging Blockchain to Enhance Data Privacy in IoT-Based Applications.00.342018
Budgeted Competitive Influence Maximization on Online Social Networks.20.362018
Construction of Signaling Pathways with RNAi Data and Multiple Reference Networks.00.342018
Maximizing misinformation restriction within time and budget constraints.00.342018
Contract-based Incentive Mechanism for LTE over Unlicensed Channels.00.342018
Online set multicover algorithms for dynamic D2D communications.00.342017
Breaking the Bonds of Submodularity: Empirical Estimation of Approximation Ratios for Monotone Non-Submodular Greedy Maximization.10.372017
Vulnerability of Clustering under Node Failure in Complex Networks.20.392017
Robustness of power-law networks: its assessment and optimization10.362016
Structural Vulnerability Assessment of Community-Based Routing in Opportunistic Networks.40.422016
Leveraging Social Communities for Optimizing Cellular Device-to-Device Communications.60.442016
Network Clustering via Maximizing Modularity: Approximation Algorithms and Theoretical Limits.30.422016
Corrections to "Least Cost Influence Maximization Across Multiple Social Networks".00.342016
Privacy Issues in Light of Reconnaissance Attacks with Incomplete Information00.342016
Preface00.342016
Rate Alteration Attacks In Smart Grid90.512015
Catastrophic cascading failures in power networks10.432015
Toward Optimal Community Detection: From Trees To General Weighted Networks90.592015
A method to detect communities with stability in social networks.30.382014
  • 1
  • 2