A risk defense method based on microscopic state prediction with partial information observations in social networks
Tài liệu tham khảo
Bai, 2018, Big data and fans economy oriented star node mining improved algorithm in social networks based on acquaintance immunization, J. Phys.: Conf. Ser., 1069, 012009
Bhuiyan, 2017, Dependable structural health monitoring using wireless sensor networks, IEEE Trans. Dependable Secure Comput., 14, 363, 10.1109/TDSC.2015.2469655
Garg, 2014, Modeling and analyzing information diffusion behaviour of social networks, 566
Gong, 2018, Privacy-aware multidimensional mobile service quality prediction and recommendation in distributed fog environment, Wirel. Commun. Mob. Comput., 2018, 10.1155/2018/3075849
Guan, 2017, Achieving efficient and secure data acquisition for cloud-supported internet of things in smart grid, IEEE Internet Things J., 4, 1934, 10.1109/JIOT.2017.2690522
Guan, 2018, Privacy-preserving and efficient aggregation based on blockchain for power grid communications in smart communities, IEEE Commun. Mag., 56, 82, 10.1109/MCOM.2018.1700401
Huang, 2019, Deployment optimization of data centers in vehicular networks, IEEE Access, 7, 20644, 10.1109/ACCESS.2019.2897615
Huang, 2019, A queuing delay utilization scheme for on-path service aggregation in services-oriented computing networks, IEEE Access, 7, 23816, 10.1109/ACCESS.2019.2899402
Huang, 2018, A low-latency communication scheme for mobile wireless sensor control systems, IEEE Trans. Syst. Man Cybern. Syst.
Jiang, 2017, Identifying propagation sources in networks: State-of-the-art and comparative studies, IEEE Commun. Surv. Tutor., 19, 465, 10.1109/COMST.2016.2615098
Kim, 2016, Information propagation modeling in a drone network using disease epidemic models, 79
Kumar, 2018, An efficient immunization strategy using overlapping nodes and its neighborhoods, 1269
Ledzewicz, 2016, Optimal control for a SIR epidemiological model with time-varying populations, 1268
Li, 2019, Battery-friendly relay selection scheme for prolonging the lifetimes of sensor nodes in the Internet of Things, IEEE Access, 7, 33180, 10.1109/ACCESS.2019.2904079
Li, 2019, Optimizing the coverage via the UAVs with lower costs for information-centric internet of things, IEEE Access, 7, 15292, 10.1109/ACCESS.2019.2894172
Liu, 2017, Preserving privacy with probabilistic indistinguishability in weighted social networks, IEEE Trans. Parallel Distrib. Syst., 28, 1417, 10.1109/TPDS.2016.2615020
W. Luo, W.P. Tay, Finding an infection source under the SIS model, in: 2013 IEEE International Conference on Acoustics, Speech and Signal Processing, 2013, pp. 2930–2934, http://dx.doi.org/10.1109/ICASSP.2013.6638194.
Luo, 2013, Identifying infection sources and regions in large networks, IEEE Trans. Signal Process., 61, 2850, 10.1109/TSP.2013.2256902
Peng, 2019, Multidimensional privacy preservation in location-based services, Future Gener. Comput. Syst., 93, 312, 10.1016/j.future.2018.10.025
Qi, 2017, Time–Location–Frequency–aware Internet of things service selection based on historical records, Int. J. Distrib. Sensor Netw., 13, 10.1177/1550147716688696
Qi, 2018, An exception handling approach for privacy-preserving service recommendation failure in a cloud environment, Sensors, 18, 2037, 10.3390/s18072037
Qi, 2016, Time-aware IoE service recommendation on sparse data, Mob. Inf. Syst., 2016
Ren, 2019, A collaboration platform for effective task and data reporter selection in crowdsourcing network, IEEE Access, 7, 19238, 10.1109/ACCESS.2019.2897062
Tan, 2019, An adaptive collection scheme-based matrix completion for data gathering in energy-harvesting wireless sensor networks, IEEE Access, 7, 6703, 10.1109/ACCESS.2019.2890862
Tan, 2016, Ecrmodel: An elastic collision-based rumor-propagation model in online social networks, IEEE Access, 4, 6105, 10.1109/ACCESS.2016.2612298
Teng, 2019, A cost-efficient greedy code dissemination scheme through vehicle to sensing devices (V2SD) communication in smart city, IEEE Access, 7, 16675, 10.1109/ACCESS.2019.2895899
S. Vosoughi, D. Roy, A human-machine collaborative system for identifying rumors on twitter, in: 2015 IEEE International Conference on Data Mining Workshop (ICDMW), 2015, pp. 47–50, http://dx.doi.org/10.1109/ICDMW.2015.221.
Wang, 2019, Coupling resource management based on fog computing in smart city systems, J. Network Comput. Appl., 10.1016/j.jnca.2019.02.021
Wang, 2017, Data collection from WSNs to the cloud based on mobile fog elements, Future Gener. Comput. Syst.
Wang, 2018, A novel trust mechanism based on fog computing in sensor–cloud system, Future Gener. Comput. Syst.
Wang, 2018, A secure IoT service architecture with an efficient balance dynamics based on cloud and edge computing, IEEE Internet Things J.
Wang, 2018, Fog-based computing and storage offloading for data synchronization in iot, IEEE Internet Things J.
Wen, 2015, A sword with two edges: Propagation studies on both positive and negative information in online social networks, IEEE Trans. Comput., 64, 640, 10.1109/TC.2013.2295802
Wu, 2018, Using mobile nodes to control rumors in big data based on a new rumor propagation model in vehicular social networks, IEEE Access, 6, 62612, 10.1109/ACCESS.2018.2876394
Wu, 2017, Rumor restraining based on propagation prediction with limited observations in large-scale social networks, 1
Xia, 2018, Improved targeted immunization strategies based on two rounds of selection, Physica A, 496, 540, 10.1016/j.physa.2017.12.017
Xu, 2017, Privacy-preserving and scalable service recommendation based on simhash in a distributed cloud environment, Complexity, 2017, 1934, 10.1155/2017/3437854
Zhang, 2017, Anonymizing popularity in online social networks with full utility, Future Gener. Comput. Syst., 72, 227, 10.1016/j.future.2016.05.007
Zhang, 2018, Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system, Concurr. Comput.: Pract. Exper., e5109
Zhang, 2013, Network traffic classification using correlation information, IEEE Trans. Parallel Distrib. Syst., 24, 104, 10.1109/TPDS.2012.98