Jiaojiao Jiang

According to our database1, Jiaojiao Jiang authored at least 25 papers between 2012 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Network Growth From Global and Local Influential Nodes.
CoRR, 2021

2020
Analysis and Insights for Myths Circulating on Twitter During the COVID-19 Pandemic.
IEEE Open J. Comput. Soc., 2020

A positional keyword-based approach to inferring fine-grained message formats.
Future Gener. Comput. Syst., 2020

2019
Malicious Attack Propagation and Source Identification
Advances in Information Security 73, Springer, ISBN: 978-3-030-02178-8, 2019

Sustainability Analysis for Fog Nodes With Renewable Energy Supplies.
IEEE Internet Things J., 2019

P-Gram: Positional N-Gram for the Clustering of Machine-Generated Messages.
IEEE Access, 2019

2018
Rumor Source Identification in Social Networks with Time-Varying Topology.
IEEE Trans. Dependable Secur. Comput., 2018

Mining accurate message formats for service APIs.
Proceedings of the 25th International Conference on Software Analysis, 2018

2017
Using epidemic betweenness to measure the influence of users in complex networks.
J. Netw. Comput. Appl., 2017

The structure of communities in scale-free networks.
Concurr. Comput. Pract. Exp., 2017

Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies.
IEEE Commun. Surv. Tutorials, 2017

Towards an Analysis of Traffic Shaping and Policing in Fog Networks Using Stochastic Fluid Models.
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2017

SmartVM: A Multi-Layer Microservice-Based Platform for Deploying SaaS.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Preferential attachment and the spreading influence of users in online social networks.
Proceedings of the 2017 IEEE/CIC International Conference on Communications in China, 2017

2016
K-Source: Multiple source selection for traffic offloading in mobile social networks.
Proceedings of the 8th International Conference on Wireless Communications & Signal Processing, 2016

Analysis of the Spreading Influence Variations for Online Social Users under Attacks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

A Popularity-Based Cache Consistency Mechanism for Information-Centric Networking.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Studying the Global Spreading Influence and Local Connections of Users in Online Social Networks.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

2015
K-Center: An Approach on the Multi-Source Identification of Information Diffusion.
IEEE Trans. Inf. Forensics Secur., 2015

On the proximal Landweber Newton method for a class of nonsmooth convex problems.
Comput. Optim. Appl., 2015

Identifying Diffusion Sources in Large Networks: A Community Structure Based Approach.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

The Relation Between Local and Global Influence of Individuals in Scale-Free Networks.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015

2014
To Shut Them Up or to Clarify: Restraining the Spread of Rumors in Online Social Networks.
IEEE Trans. Parallel Distributed Syst., 2014

Are the popular users always important for information dissemination in online social networks?
IEEE Netw., 2014

2012
An interior point trust region method for nonnegative matrix factorization.
Neurocomputing, 2012


  Loading...