Ausgabe 2/2020
Includes Special Issues on “Graph Data Management in Online Social Networks,” “Security and Privacy in Network Computing,” and “Smart Computing and Cyber Technology for Cyberization”
Inhalt (35 Artikel)
Preface to the Special Issue on Graph Data Management in Online Social Networks
Kai Zheng, Guanfeng Liu, Mehmet A. Orgun, Junping Du
Misinformation-oriented expert finding in social networks
Guohui Li, Ming Dong, Fuming Yang, Jun Zeng, Jiansen Yuan, Congyuan Jin, Nguyen Quoc Viet Hung, Phan Thanh Cong, Bolong Zheng
Detecting the evolving community structure in dynamic social networks
Fanzhen Liu, Jia Wu, Shan Xue, Chuan Zhou, Jian Yang, Quanzheng Sheng
A relationship extraction method for domain knowledge graph construction
Haoze Yu, Haisheng Li, Dianhui Mao, Qiang Cai
Cluster query: a new query pattern on temporal knowledge graph
Jinjing Huang, Wei Chen, An Liu, Weiqing Wang, Hongzhi Yin, Lei Zhao
Semi-supervised clustering with deep metric learning and graph embedding
Xiaocui Li, Hongzhi Yin, Ke Zhou, Xiaofang Zhou
Towards k-vertex connected component discovery from large networks
Yuan Li, Guoren Wang, Yuhai Zhao, Feida Zhu, Yubao Wu
Detecting topic-level influencers in large-scale scientific networks
Yang Qian, Yezheng Liu, Yuanchun Jiang, Xiao Liu
Matching of social events and users: a two-way selection perspective
Zikai Yin, Tong Xu, Hengshu Zhu, Chen Zhu, Enhong Chen, Hui Xiong
Dolha - an efficient and exact data structure for streaming graphs
Fan Zhang, Lei Zou, Li Zeng, Xiangyang Gou
Distributed and parallel processing for real-time and dynamic spatio-temporal graph
Junhua Fang, Jiafeng Ding, Pengpeng Zhao, Jiajie Xu, An Liu, Zhixu Li
Gaussian mixture embedding of multiple node roles in networks
Yujun Chen, Juhua Pu, Xingwu Liu, Xiangliang Zhang
Editorial: Special issue on security and privacy in network computing
Hua Wang, Yongzhi Wang, Tarek Taleb, Xiaohong Jiang
Privacy-preserving conjunctive keyword search on encrypted data with enhanced fine-grained access control
Qiang Cao, Yanping Li, Zhenqiang Wu, Yinbin Miao, Jianqing Liu
MALDC: a depth detection method for malware based on behavior chains
Hao Zhang, Wenjun Zhang, Zhihan Lv, Arun Kumar Sangaiah, Tao Huang, Naveen Chilamkurti
A SDR-based verification platform for 802.11 PHY layer security authentication
Xiaoguang Li, Jun Liu, Boyan Ding, Zhiwei Li, Haoyang Wu, Tao Wang
An incentive mechanism with bid privacy protection on multi-bid crowdsourced spectrum sensing
Xuewen Dong, Guangxia Li, Tao Zhang, Di Lu, Yulong Shen, Jianfeng Ma
Smart computing and cyber technology for cyberization
Xiaokang Zhou, Flavia C. Delicato, Kevin I-Kai Wang, Runhe Huang
From crowdsourcing to crowdmining: using implicit human intelligence for better understanding of crowdsourced data
Bin Guo, Huihui Chen, Yan Liu, Chao Chen, Qi Han, Zhiwen Yu
LW-CoEdge: a lightweight virtualization model and collaboration process for edge computing
Marcelo Pitanga Alves, Flavia C. Delicato, Igor L. Santos, Paulo F. Pires
Intelligent maintenance frameworks of large-scale grid using genetic algorithm and K-Mediods clustering methods
Weifeng Wang, Bing Lou, Xiong Li, Xizhong Lou, Ning Jin, Ke Yan
Fault tolerant data transmission reduction method for wireless sensor networks
Gaby Bou Tayeh, Abdallah Makhoul, Jacques Demerjian, Christophe Guyeux, Jacques Bahi
From affect, behavior, and cognition to personality: an integrated personal character model for individual-like intelligent artifacts
Ao Guo, Jianhua Ma, Shunxiang Tan, Guanqun Sun
A multiview learning method for malware threat hunting: windows, IoT and android as case studies
Hamid Darabian, Ali Dehghantanha, Sattar Hashemi, Mohammad Taheri, Amin Azmoodeh, Sajad Homayoun, Kim-Kwang Raymond Choo, Reza M. Parizi
Three-hop velocity attenuation propagation model for influence maximization in social networks
Weimin Li, Yuting Fan, Jun Mo, Wei Liu, Can Wang, Minjun Xin, Qun Jin
A QoS-aware virtual machine scheduling method for energy conservation in cloud-based cyber-physical systems
Lianyong Qi, Yi Chen, Yuan Yuan, Shucun Fu, Xuyun Zhang, Xiaolong Xu
An accurate multi-modal biometric identification system for person identification via fusion of face and finger print
Sidra Aleem, Po Yang, Saleha Masood, Ping Li, Bin Sheng
ICFR: An effective incremental collaborative filtering based recommendation architecture for personalized websites
Yayuan Tang, Kehua Guo, Ruifang Zhang, Tao Xu, Jianhua Ma, Tao Chi
A lightweight and cost effective edge intelligence architecture based on containerization technology
Mabrook Al-Rakhami, Abdu Gumaei, Mohammed Alsahli, Mohammad Mehedi Hassan, Atif Alamri, Antonio Guerrieri, Giancarlo Fortino
Optimal placement of barrier coverage in heterogeneous bistatic radar sensor networks
Xianghua Xu, Chengwei Zhao, Zichen Jiang, Zongmao Cheng, Jinjun Chen
TBI2Flow: Travel behavioral inertia based long-term taxi passenger flow prediction
Xiangjie Kong, Feng Xia, Zhenhuan Fu, Xiaoran Yan, Amr Tolba, Zafer Almakhadmeh
Master data management for manufacturing big data: a method of evaluation for data network
Chun Zhao, Lei Ren, Ziqiao Zhang, Zihao Meng
Secure limitation analysis of public-key cryptography for smart card settings
Youliang Tian, Qiuxian Li, Jia Hu, Hui Lin