zVote: A Blockchain-based Privacy-preserving Platform for Remote E-voting | 0 | 0.34 | 2022 |
Blockchain-based Secure Client Selection in Federated Learning | 0 | 0.34 | 2022 |
SaPHyRa: A Learning Theory Approach to Ranking Nodes in Large Networks | 0 | 0.34 | 2022 |
Minimizing Latency for Data Aggregation in Wireless Sensor Networks: An Algorithm Approach | 0 | 0.34 | 2022 |
Efficient Algorithms for Monotone Non-Submodular Maximization with Partition Matroid Constraint | 0 | 0.34 | 2022 |
Auditing The Sensitivity Of Graph-Based Ranking With Visual Analytics | 0 | 0.34 | 2021 |
Continual Learning with Differential Privacy. | 0 | 0.34 | 2021 |
Evaluating Fake News Detection Models from Explainable Machine Learning Perspectives | 0 | 0.34 | 2021 |
Learning Interpretation with Explainable Knowledge Distillation. | 0 | 0.34 | 2021 |
Groups Influence with Minimum Cost in Social Networks. | 0 | 0.34 | 2021 |
Quantifying Privacy Vulnerability to Socialbot Attacks: An Adaptive Non-Submodular Model | 1 | 0.35 | 2020 |
Guest Editorial Introduction to the Special Section on Scalability and Privacy in Social Networks. | 0 | 0.34 | 2020 |
Scalable Differential Privacy with Certified Robustness in Adversarial Learning | 0 | 0.34 | 2020 |
Parking Assignment: Minimizing Parking Expenses and Balancing Parking Demand Among Multiple Parking Lots | 0 | 0.34 | 2020 |
Heterogeneous Gaussian Mechanism: Preserving Differential Privacy in Deep Learning with Provable Robustness. | 2 | 0.34 | 2019 |
Trustless Framework For Iterative Double Auction Based On Blockchain | 0 | 0.34 | 2019 |
Exploring Spatial, Temporal, and Logical Attacks on the Bitcoin Network. | 0 | 0.34 | 2019 |
Preserving Differential Privacy in Adversarial Learning with Provable Robustness. | 1 | 0.35 | 2019 |
Approximate k-Cover in Hypergraphs: Efficient Algorithms, and Applications. | 0 | 0.34 | 2019 |
Evaluating Explainers via Perturbation. | 0 | 0.34 | 2019 |
Vulnerability Assessment of Social-Smart Grids: An Algorithmic Approach | 0 | 0.34 | 2019 |
Submodular Cost Submodular Cover with an Approximate Oracle | 0 | 0.34 | 2019 |
Critical nodes in interdependent networks with deterministic and probabilistic cascading failures | 0 | 0.34 | 2019 |
TipTop: (Almost) Exact Solutions for Influence Maximization in Billion-Scale Networks | 1 | 0.37 | 2019 |
Minimum budget for misinformation blocking in online social networks. | 2 | 0.37 | 2019 |
Multiplex Influence Maximization in Online Social Networks with Heterogeneous Diffusion Models. | 5 | 0.44 | 2018 |
Network Resilience and the Length-Bounded Multicut Problem: Reaching the Dynamic Billion-Scale with Guarantees. | 1 | 0.36 | 2018 |
A hybrid ABC-TS algorithm for the unrelated parallel-batching machines scheduling problem with deteriorating jobs and maintenance activity. | 10 | 0.49 | 2018 |
AI and Blockchain: A Disruptive Integration. | 5 | 0.54 | 2018 |
Revisiting of 'Revisiting the Stop-and-Stare Algorithms for Influence Maximization'. | 1 | 0.35 | 2018 |
POSTER: Deterring DDoS Attacks on Blockchain-based Cryptocurrencies through Mempool Optimization. | 0 | 0.34 | 2018 |
Leveraging Blockchain to Enhance Data Privacy in IoT-Based Applications. | 0 | 0.34 | 2018 |
Budgeted Competitive Influence Maximization on Online Social Networks. | 2 | 0.36 | 2018 |
Construction of Signaling Pathways with RNAi Data and Multiple Reference Networks. | 0 | 0.34 | 2018 |
Maximizing misinformation restriction within time and budget constraints. | 0 | 0.34 | 2018 |
Contract-based Incentive Mechanism for LTE over Unlicensed Channels. | 0 | 0.34 | 2018 |
Online set multicover algorithms for dynamic D2D communications. | 0 | 0.34 | 2017 |
Breaking the Bonds of Submodularity: Empirical Estimation of Approximation Ratios for Monotone Non-Submodular Greedy Maximization. | 1 | 0.37 | 2017 |
Vulnerability of Clustering under Node Failure in Complex Networks. | 2 | 0.39 | 2017 |
Robustness of power-law networks: its assessment and optimization | 1 | 0.36 | 2016 |
Structural Vulnerability Assessment of Community-Based Routing in Opportunistic Networks. | 4 | 0.42 | 2016 |
Leveraging Social Communities for Optimizing Cellular Device-to-Device Communications. | 6 | 0.44 | 2016 |
Network Clustering via Maximizing Modularity: Approximation Algorithms and Theoretical Limits. | 3 | 0.42 | 2016 |
Corrections to "Least Cost Influence Maximization Across Multiple Social Networks". | 0 | 0.34 | 2016 |
Privacy Issues in Light of Reconnaissance Attacks with Incomplete Information | 0 | 0.34 | 2016 |
Preface | 0 | 0.34 | 2016 |
Rate Alteration Attacks In Smart Grid | 9 | 0.51 | 2015 |
Catastrophic cascading failures in power networks | 1 | 0.43 | 2015 |
Toward Optimal Community Detection: From Trees To General Weighted Networks | 9 | 0.59 | 2015 |
A method to detect communities with stability in social networks. | 3 | 0.38 | 2014 |