Local-Forest Method for Superspreaders Identification in Online Social Networks | 0 | 0.34 | 2022 |
Scattered Points Interpolation with Globally Smooth B-Spline Surface using Iterative Knot Insertion | 0 | 0.34 | 2022 |
Magnifying Side-Channel Leakage of Lattice-Based Cryptosystems With Chosen Ciphertexts: The Case Study of Kyber | 0 | 0.34 | 2022 |
A Physical Process Driven Digital Terrain Model Generating Method Based On D-Nurbs | 0 | 0.34 | 2020 |
A fast T-spline fitting method based on efficient region segmentation | 0 | 0.34 | 2020 |
Scalable Interpretable Learning for Multi-Response Error-in-Variables Regression | 0 | 0.34 | 2020 |
Identity-Based Proxy Signature Over Ntru Lattice | 0 | 0.34 | 2019 |
Core Influence Mechanism on Vertex-Cover Problem through Leaf-Removal-Core Breaking. | 0 | 0.34 | 2018 |
Infectivity Enhances Prediction Of Viral Cascades In Twitter | 0 | 0.34 | 2018 |
High symbol-rate polarization interference cancelation for satellite-to-ground remote sensing data transmission system | 0 | 0.34 | 2018 |
An Efficient Lattice-Based Proxy Signature with Message Recovery. | 0 | 0.34 | 2017 |
Bvdt: A Boosted Vector Decision Tree Algorithm For Multi-Class Classification Problems | 0 | 0.34 | 2017 |
An Efficient Chaotic Image Encryption Algorithm Based on Self-adaptive Model and Feedback Mechanism. | 1 | 0.37 | 2017 |
Research on Centralities Based on von Neumann Entropy for Nodes and Motifs. | 0 | 0.34 | 2017 |
TRIP: A Tussle-Resistant Internet Pricing Mechanism | 0 | 0.34 | 2017 |
Tumbler: Adaptable link access in the bots-infested Internet. | 2 | 0.40 | 2016 |
Collusion-resilient broadcast encryption based on dual-evolving one-way function trees. | 1 | 0.36 | 2016 |
DRDP: A DDoS-Resilient Data Pricing Mechanism. | 0 | 0.34 | 2016 |
Construction of Boolean functions with excellent cryptographic criteria using bivariate polynomial representation | 3 | 0.38 | 2016 |
A Secure Authentication and Key Agreement Protocol for Telecare Medicine Information System | 1 | 0.34 | 2015 |
Fast LMNN Algorithm through Random Sampling. | 0 | 0.34 | 2015 |
Identification of highly susceptible individuals in complex networks. | 0 | 0.34 | 2015 |
Exploring The Complex Pattern Of Information Spreading In Online Blog Communities | 6 | 0.50 | 2015 |
Research on Solution Space of Bipartite Graph Vertex-Cover by Maximum Matchings | 0 | 0.34 | 2015 |
Detecting The Influence Of Spreading In Social Networks With Excitable Sensor Networks | 2 | 0.38 | 2015 |
Contagion processes on the static and activity driven coupling networks | 1 | 0.36 | 2015 |
Searching For Superspreaders Of Information In Real-World Social Media | 59 | 1.94 | 2014 |
Statistics and algorithms on the organization and quantitative analysis of minimal vertex covers. | 0 | 0.34 | 2014 |
Discovering polynomial Lyapunov functions for continuous dynamical systems | 9 | 0.53 | 2013 |
Optimized statistical analysis of software trustworthiness attributes | 3 | 0.39 | 2012 |
Algebraic analysis on asymptotic stability of continuous dynamical systems | 6 | 0.84 | 2011 |
Threshold behaviors of a random constraint satisfaction problem with exact phase transitions | 3 | 0.38 | 2011 |
Condition number based complexity estimate for solving polynomial systems | 4 | 0.45 | 2011 |
Complexity of software trustworthiness and its dynamical statistical analysis methods. | 8 | 0.58 | 2009 |
Finite-time disturbance attenuation of nonlinear systems. | 6 | 0.62 | 2009 |
Dynamical characteristics of software trustworthiness and their evolutionary complexity. | 12 | 0.86 | 2009 |
Cross-Correlation Properties of Cyclotomic Sequences | 1 | 0.36 | 2009 |
On the Scaling Window of Model RB | 0 | 0.34 | 2008 |