Jiaojiao Jiang

Orcid: 0000-0001-7307-8114

According to our database1, Jiaojiao Jiang authored at least 37 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Exploring Uncharted Waters of Website Fingerprinting.
IEEE Trans. Inf. Forensics Secur., 2024

MFVIEW: Multi-modal Fake News Detection with View-Specific Information Extraction.
Proceedings of the Advances in Information Retrieval, 2024

2023
Variational co-embedding learning for attributed network clustering.
Knowl. Based Syst., 2023

Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives.
IEEE Commun. Surv. Tutorials, 2023

Influence Robustness of Nodes in Multiplex Networks Against Attacks.
Proceedings of the Complex Networks & Their Applications XII, 2023

2022
Extracting Formats of Service Messages with Varying Payloads.
ACM Trans. Internet Techn., 2022

Network Growth From Global and Local Influential Nodes.
IEEE Trans. Netw. Sci. Eng., 2022

Robust cross-network node classification via constrained graph mutual information.
Knowl. Based Syst., 2022

Inferring data model from service interactions for response generation in service virtualization.
Inf. Softw. Technol., 2022

Fake News Quick Detection on Dynamic Heterogeneous Information Networks.
CoRR, 2022

The Effect of Source Location on the Effectiveness of Source Detection in Finite Networks.
Proceedings of the IEEE International Conference on Communications, 2022

2021
R-gram: Inferring message formats of service protocols with relative positional n-grams.
J. Netw. Comput. Appl., 2021

Network Growth From Global and Local Influential Nodes.
CoRR, 2021

2020
Analysis and Insights for Myths Circulating on Twitter During the COVID-19 Pandemic.
IEEE Open J. Comput. Soc., 2020

A positional keyword-based approach to inferring fine-grained message formats.
Future Gener. Comput. Syst., 2020

2019
Malicious Attack Propagation and Source Identification
Advances in Information Security 73, Springer, ISBN: 978-3-030-02178-8, 2019

Sustainability Analysis for Fog Nodes With Renewable Energy Supplies.
IEEE Internet Things J., 2019

P-Gram: Positional N-Gram for the Clustering of Machine-Generated Messages.
IEEE Access, 2019

2018
Rumor Source Identification in Social Networks with Time-Varying Topology.
IEEE Trans. Dependable Secur. Comput., 2018

Mining accurate message formats for service APIs.
Proceedings of the 25th International Conference on Software Analysis, 2018

2017
Using epidemic betweenness to measure the influence of users in complex networks.
J. Netw. Comput. Appl., 2017

The structure of communities in scale-free networks.
Concurr. Comput. Pract. Exp., 2017

Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies.
IEEE Commun. Surv. Tutorials, 2017

Towards an Analysis of Traffic Shaping and Policing in Fog Networks Using Stochastic Fluid Models.
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2017

SmartVM: A Multi-Layer Microservice-Based Platform for Deploying SaaS.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Preferential attachment and the spreading influence of users in online social networks.
Proceedings of the 2017 IEEE/CIC International Conference on Communications in China, 2017

2016
K-Source: Multiple source selection for traffic offloading in mobile social networks.
Proceedings of the 8th International Conference on Wireless Communications & Signal Processing, 2016

Analysis of the Spreading Influence Variations for Online Social Users under Attacks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

A Popularity-Based Cache Consistency Mechanism for Information-Centric Networking.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Studying the Global Spreading Influence and Local Connections of Users in Online Social Networks.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

2015
K-Center: An Approach on the Multi-Source Identification of Information Diffusion.
IEEE Trans. Inf. Forensics Secur., 2015

On the proximal Landweber Newton method for a class of nonsmooth convex problems.
Comput. Optim. Appl., 2015

Identifying Diffusion Sources in Large Networks: A Community Structure Based Approach.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

The Relation Between Local and Global Influence of Individuals in Scale-Free Networks.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015

2014
To Shut Them Up or to Clarify: Restraining the Spread of Rumors in Online Social Networks.
IEEE Trans. Parallel Distributed Syst., 2014

Are the popular users always important for information dissemination in online social networks?
IEEE Netw., 2014

2012
An interior point trust region method for nonnegative matrix factorization.
Neurocomputing, 2012


  Loading...