Skip to main content

World Wide Web

Ausgabe 2/2020

Includes Special Issues on “Graph Data Management in Online Social Networks,” “Security and Privacy in Network Computing,” and “Smart Computing and Cyber Technology for Cyberization”

Inhalt (35 Artikel)

Preface to the Special Issue on Graph Data Management in Online Social Networks

Kai Zheng, Guanfeng Liu, Mehmet A. Orgun, Junping Du

Misinformation-oriented expert finding in social networks

Guohui Li, Ming Dong, Fuming Yang, Jun Zeng, Jiansen Yuan, Congyuan Jin, Nguyen Quoc Viet Hung, Phan Thanh Cong, Bolong Zheng

Detecting the evolving community structure in dynamic social networks

Fanzhen Liu, Jia Wu, Shan Xue, Chuan Zhou, Jian Yang, Quanzheng Sheng

A relationship extraction method for domain knowledge graph construction

Haoze Yu, Haisheng Li, Dianhui Mao, Qiang Cai

Cluster query: a new query pattern on temporal knowledge graph

Jinjing Huang, Wei Chen, An Liu, Weiqing Wang, Hongzhi Yin, Lei Zhao

Semi-supervised clustering with deep metric learning and graph embedding

Xiaocui Li, Hongzhi Yin, Ke Zhou, Xiaofang Zhou

Towards k-vertex connected component discovery from large networks

Yuan Li, Guoren Wang, Yuhai Zhao, Feida Zhu, Yubao Wu

Detecting topic-level influencers in large-scale scientific networks

Yang Qian, Yezheng Liu, Yuanchun Jiang, Xiao Liu

Matching of social events and users: a two-way selection perspective

Zikai Yin, Tong Xu, Hengshu Zhu, Chen Zhu, Enhong Chen, Hui Xiong

Dolha - an efficient and exact data structure for streaming graphs

Fan Zhang, Lei Zou, Li Zeng, Xiangyang Gou

Distributed and parallel processing for real-time and dynamic spatio-temporal graph

Junhua Fang, Jiafeng Ding, Pengpeng Zhao, Jiajie Xu, An Liu, Zhixu Li

Gaussian mixture embedding of multiple node roles in networks

Yujun Chen, Juhua Pu, Xingwu Liu, Xiangliang Zhang

Editorial: Special issue on security and privacy in network computing

Hua Wang, Yongzhi Wang, Tarek Taleb, Xiaohong Jiang

MALDC: a depth detection method for malware based on behavior chains

Hao Zhang, Wenjun Zhang, Zhihan Lv, Arun Kumar Sangaiah, Tao Huang, Naveen Chilamkurti

A SDR-based verification platform for 802.11 PHY layer security authentication

Xiaoguang Li, Jun Liu, Boyan Ding, Zhiwei Li, Haoyang Wu, Tao Wang

An incentive mechanism with bid privacy protection on multi-bid crowdsourced spectrum sensing

Xuewen Dong, Guangxia Li, Tao Zhang, Di Lu, Yulong Shen, Jianfeng Ma

Smart computing and cyber technology for cyberization

Xiaokang Zhou, Flavia C. Delicato, Kevin I-Kai Wang, Runhe Huang

LW-CoEdge: a lightweight virtualization model and collaboration process for edge computing

Marcelo Pitanga Alves, Flavia C. Delicato, Igor L. Santos, Paulo F. Pires

Fault tolerant data transmission reduction method for wireless sensor networks

Gaby Bou Tayeh, Abdallah Makhoul, Jacques Demerjian, Christophe Guyeux, Jacques Bahi

A multiview learning method for malware threat hunting: windows, IoT and android as case studies

Hamid Darabian, Ali Dehghantanha, Sattar Hashemi, Mohammad Taheri, Amin Azmoodeh, Sajad Homayoun, Kim-Kwang Raymond Choo, Reza M. Parizi

Three-hop velocity attenuation propagation model for influence maximization in social networks

Weimin Li, Yuting Fan, Jun Mo, Wei Liu, Can Wang, Minjun Xin, Qun Jin

A lightweight and cost effective edge intelligence architecture based on containerization technology

Mabrook Al-Rakhami, Abdu Gumaei, Mohammed Alsahli, Mohammad Mehedi Hassan, Atif Alamri, Antonio Guerrieri, Giancarlo Fortino

Optimal placement of barrier coverage in heterogeneous bistatic radar sensor networks

Xianghua Xu, Chengwei Zhao, Zichen Jiang, Zongmao Cheng, Jinjun Chen

TBI2Flow: Travel behavioral inertia based long-term taxi passenger flow prediction

Xiangjie Kong, Feng Xia, Zhenhuan Fu, Xiaoran Yan, Amr Tolba, Zafer Almakhadmeh

Open Access

A survey on data provenance in IoT

Rui Hu, Zheng Yan, Wenxiu Ding, Laurence T. Yang

Premium Partner