My T. Thai

Orcid: 0000-0003-0503-2012

Affiliations:
  • University of Florida, Gainesville, Florida, USA


According to our database1, My T. Thai authored at least 247 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Preserving Privacy and Security in Federated Learning.
IEEE/ACM Trans. Netw., February, 2024

Analysis of Privacy Leakage in Federated Large Language Models.
CoRR, 2024

MIM-Reasoner: Learning with Theoretical Guarantees for Multiplex Influence Maximization.
CoRR, 2024

OnDev-LCT: On-Device Lightweight Convolutional Transformers towards federated learning.
CoRR, 2024

2023
When Decentralized Optimization Meets Federated Learning.
IEEE Netw., September, 2023

Denial-of-Service Vulnerability of Hash-Based Transaction Sharding: Attack and Countermeasure.
IEEE Trans. Computers, March, 2023

OASIS: Offsetting Active Reconstruction Attacks in Federated Learning.
CoRR, 2023

On the Communication Complexity of Decentralized Bilevel Optimization.
CoRR, 2023

QOMIC: Quantum optimization for motif identification.
CoRR, 2023

When Decentralized Optimization Meets Federated Learning.
CoRR, 2023

FairDP: Certified Fairness with Differential Privacy.
CoRR, 2023

Deep Graph Representation Learning and Optimization for Influence Maximization.
CoRR, 2023

LAVA: Granular Neuron-Level Explainable AI for Alzheimer's Disease Assessment from Fundus Images.
CoRR, 2023

Investigating the Dynamics of Social Norm Emergence within Online Communities.
CoRR, 2023

Detection of Fake News Through Heterogeneous Graph Interactions.
Proceedings of the Networked Systems - 11th International Conference, 2023

Linear Query Approximation Algorithms for Non-monotone Submodular Maximization under Knapsack Constraint.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

Deep Graph Representation Learning and Optimization for Influence Maximization.
Proceedings of the International Conference on Machine Learning, 2023

Limitations of Perturbation-based Explanation Methods for Temporal Graph Neural Networks.
Proceedings of the IEEE International Conference on Data Mining, 2023

ATOM: An Efficient Topology Adaptive Algorithm for Minor Embedding in Quantum Computing.
Proceedings of the IEEE International Conference on Communications, 2023

Cultural-aware Machine Learning based Analysis of COVID-19 Vaccine Hesitancy.
Proceedings of the IEEE International Conference on Communications, 2023

Continuous Length-Bounded Paths Interdiction.
Proceedings of the Computational Data and Social Networks - 12th International Conference, 2023

Privacy Analysis of Federated Learning via Dishonest Servers.
Proceedings of the 9th Intl Conference on Big Data Security on Cloud, 2023

Active Data Reconstruction Attacks in Vertical Federated Learning.
Proceedings of the IEEE International Conference on Big Data, 2023

Analyzing the Dynamics of Social Norms: Positive vs Negative Emergence.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2023

Active Membership Inference Attack under Local Differential Privacy in Federated Learning.
Proceedings of the International Conference on Artificial Intelligence and Statistics, 2023

On the Convergence of Distributed Stochastic Bilevel Optimization Algorithms over a Network.
Proceedings of the International Conference on Artificial Intelligence and Statistics, 2023

XRand: Differentially Private Defense against Explanation-Guided Attacks.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Minimizing Latency for Data Aggregation in Wireless Sensor Networks: An Algorithm Approach.
ACM Trans. Sens. Networks, 2022

Exploring Partitioning Attacks on the Bitcoin Network.
IEEE/ACM Trans. Netw., 2022

XRand: Differentially Private Defense against Explanation-Guided Attacks.
CoRR, 2022

On the Limit of Explaining Black-box Temporal Graph Neural Networks.
CoRR, 2022

EMaP: Explainable AI with Manifold-based Perturbations.
CoRR, 2022

NeuCEPT: Locally Discover Neural Networks' Mechanism via Critical Neurons Identification with Precision Guarantee.
CoRR, 2022

Lifelong DP: Consistently Bounded Differential Privacy in Lifelong Machine Learning.
CoRR, 2022

Optimizing Resource Allocation and VNF Embedding in RAN Slicing.
CoRR, 2022

Towards An Optimal Solution to Place Bistatic Radars for Belt Barrier Coverage with Minimum Cost.
CoRR, 2022

Stochastic Bilevel Distributed Optimization over a Network.
CoRR, 2022

FastHare: Fast Hamiltonian Reduction for Large-scale Quantum Annealing.
Proceedings of the IEEE International Conference on Quantum Computing and Engineering, 2022

Efficient Algorithms for Monotone Non-Submodular Maximization with Partition Matroid Constraint.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

NeuCEPT: Learn Neural Networks' Mechanism via Critical Neurons with Precision Guarantee.
Proceedings of the IEEE International Conference on Data Mining, 2022

SaPHyRa: A Learning Theory Approach to Ranking Nodes in Large Networks.
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022

zVote: A Blockchain-based Privacy-preserving Platform for Remote E-voting.
Proceedings of the IEEE International Conference on Communications, 2022

Blockchain-based Secure Client Selection in Federated Learning.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2022

An Explainer for Temporal Graph Neural Networks.
Proceedings of the IEEE Global Communications Conference, 2022

Lifelong DP: Consistently Bounded Differential Privacy in Lifelong Machine Learning.
Proceedings of the Conference on Lifelong Learning Agents, 2022

Heterogeneous Randomized Response for Differential Privacy in Graph Neural Networks.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
Auditing the Sensitivity of Graph-based Ranking with Visual Analytics.
IEEE Trans. Vis. Comput. Graph., 2021

A Blockchain-based Iterative Double Auction Protocol Using Multiparty State Channels.
ACM Trans. Internet Techn., 2021

Guest Editorial Introduction to the Special Section on Reloading Feature-Rich Information Networks.
IEEE Trans. Netw. Sci. Eng., 2021

Welcome message from the Editors-in-Chief.
IET Blockchain, 2021

Continual Learning with Differential Privacy.
Proceedings of the Neural Information Processing - 28th International Conference, 2021

Evaluating Fake News Detection Models from Explainable Machine Learning Perspectives.
Proceedings of the ICC 2021, 2021

Enforcing Resource Allocation and VNF Embedding in RAN Slicing.
Proceedings of the IEEE Global Communications Conference, 2021

Groups Influence with Minimum Cost in Social Networks.
Proceedings of the Computational Data and Social Networks - 10th International Conference, 2021

c-Eval: A Unified Metric to Evaluate Feature-based Explanations via Perturbation.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

Learning Interpretation with Explainable Knowledge Distillation.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

Minimum Robust Multi-Submodular Cover for Fairness.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Auditing on Smart-Grid With Dynamic Traffic Flows: An Algorithmic Approach.
IEEE Trans. Smart Grid, 2020

Supporting a Storm: The Impact of Community on #GamerGate's Lifespan.
IEEE Trans. Netw. Sci. Eng., 2020

Influence Diffusion in Online Social Networks With Propagation Rate Changes.
IEEE Trans. Netw. Sci. Eng., 2020

Guest Editorial Introduction to the Special Section on Scalability and Privacy in Social Networks.
IEEE Trans. Netw. Sci. Eng., 2020

Quantifying Privacy Vulnerability to Socialbot Attacks: An Adaptive Non-Submodular Model.
IEEE Trans. Emerg. Top. Comput., 2020

Parking Assignment: Minimizing Parking Expenses and Balancing Parking Demand Among Multiple Parking Lots.
IEEE Trans Autom. Sci. Eng., 2020

Length-Bounded Paths Interdiction in Continuous Domain for Network Performance Assessment.
CoRR, 2020

Denial-of-Service Vulnerability of Hash-based Transaction Sharding: Attacks and Countermeasures.
CoRR, 2020

PGM-Explainer: Probabilistic Graphical Model Explanations for Graph Neural Networks.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

Measuring Edge Sparsity on Large Social Networks.
Proceedings of the Fourteenth International AAAI Conference on Web and Social Media, 2020

Scalable Differential Privacy with Certified Robustness in Adversarial Learning.
Proceedings of the 37th International Conference on Machine Learning, 2020

Streaming k-Submodular Maximization under Noise subject to Size Constraint.
Proceedings of the 37th International Conference on Machine Learning, 2020

Multi-View Consistency for Relation Extraction via Mutual Information and Structure Prediction.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Resource Allocation in Highly Dynamic Device-to-Device Communication: An Adaptive Set Multi-Cover Approach.
IEEE Trans. Wirel. Commun., 2019

TipTop: (Almost) Exact Solutions for Influence Maximization in Billion-Scale Networks.
IEEE/ACM Trans. Netw., 2019

Spatial Motifs for Device-to-Device Network Analysis in Cellular Networks.
IEEE Trans. Commun., 2019

Contract-Based Incentive Mechanism for LTE Over Unlicensed Channels.
IEEE Trans. Commun., 2019

Network Resilience Assessment via QoS Degradation Metrics: An Algorithmic Approach.
Proc. ACM Meas. Anal. Comput. Syst., 2019

Scalable approximations to k-cycle transversal problems on dynamic networks.
Knowl. Inf. Syst., 2019

Critical nodes in interdependent networks with deterministic and probabilistic cascading failures.
J. Glob. Optim., 2019

Minimum budget for misinformation blocking in online social networks.
J. Comb. Optim., 2019

Evaluating Explainers via Perturbation.
CoRR, 2019

Preserving Differential Privacy in Adversarial Learning with Provable Robustness.
CoRR, 2019

Exploring Spatial, Temporal, and Logical Attacks on the Bitcoin Network.
CoRR, 2019

Approximate k-Cover in Hypergraphs: Efficient Algorithms, and Applications.
CoRR, 2019

Trustless Framework for Iterative Double Auction Based on Blockchain.
Proceedings of the Security and Privacy in Communication Networks, 2019

Heterogeneous Gaussian Mechanism: Preserving Differential Privacy in Deep Learning with Provable Robustness.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Submodular Cost Submodular Cover with an Approximate Oracle.
Proceedings of the 36th International Conference on Machine Learning, 2019

Efficient Bayesian Optimization for Uncertainty Reduction Over Perceived Optima Locations.
Proceedings of the 2019 IEEE International Conference on Data Mining, 2019

Partitioning Attacks on Bitcoin: Colliding Space, Time, and Logic.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Influence Maximization at Community Level: A New Challenge with Non-submodularity.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

OptChain: Optimal Transactions Placement for Scalable Blockchain Sharding.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Vulnerability Assessment of Social-Smart Grids: An Algorithmic Approach.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Importance Sample-Based Approximation Algorithm for Cost-Aware Targeted Viral Marketing.
Proceedings of the Computational Data and Social Networks - 8th International Conference, 2019

Rumor detection in social networks via deep contextual modeling.
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019

2018
Multiplex Influence Maximization in Online Social Networks With Heterogeneous Diffusion Models.
IEEE Trans. Comput. Soc. Syst., 2018

Construction of Signaling Pathways with RNAi Data and Multiple Reference Networks.
IEEE ACM Trans. Comput. Biol. Bioinform., 2018

ACM SIGMETRICS International Workshop on Critical Infrastructure Network Security.
SIGMETRICS Perform. Evaluation Rev., 2018

Network Resilience and the Length-Bounded Multicut Problem: Reaching the Dynamic Billion-Scale with Guarantees.
Proc. ACM Meas. Anal. Comput. Syst., 2018

Maximizing misinformation restriction within time and budget constraints.
J. Comb. Optim., 2018

AI and Blockchain: A Disruptive Integration.
Computer, 2018

A hybrid ABC-TS algorithm for the unrelated parallel-batching machines scheduling problem with deteriorating jobs and maintenance activity.
Appl. Soft Comput., 2018

Space-Efficient and Dynamic Caching for D2D Networks of Heterogeneous Users.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

Adaptive Crawling with Multiple Bots: A Matroid Intersection Approach.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Fast Maximization of Non-Submodular, Monotonic Functions on the Integer Lattice.
Proceedings of the 35th International Conference on Machine Learning, 2018

Vulnerability of Interdependent Networks with Heterogeneous Cascade Models and Timescales.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

Optimal Auditing on Smart-Grid Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

An Approximately Optimal Bot for Non-Submodular Social Reconnaissance.
Proceedings of the 29th on Hypertext and Social Media, 2018

Budgeted Competitive Influence Maximization on Online Social Networks.
Proceedings of the Computational Data and Social Networks - 7th International Conference, 2018

Leveraging Blockchain to Enhance Data Privacy in IoT-Based Applications.
Proceedings of the Computational Data and Social Networks - 7th International Conference, 2018

Revisiting of 'Revisiting the Stop-and-Stare Algorithms for Influence Maximization'.
Proceedings of the Computational Data and Social Networks - 7th International Conference, 2018

POSTER: Deterring DDoS Attacks on Blockchain-based Cryptocurrencies through Mempool Optimization.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Fight Under Uncertainty: Restraining Misinformation and Pushing out the Truth.
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018

2017
Leveraging Social Communities for Optimizing Cellular Device-to-Device Communications.
IEEE Trans. Wirel. Commun., 2017

Price Modification Attack and Protection Scheme in Smart Grid.
IEEE Trans. Smart Grid, 2017

A Billion-Scale Approximation Algorithm for Maximizing Benefit in Viral Marketing.
IEEE/ACM Trans. Netw., 2017

Vulnerability of clustering under node failure in complex networks.
Soc. Netw. Anal. Min., 2017

Online set multicover algorithms for dynamic D2D communications.
J. Comb. Optim., 2017

Spatial Motifs for Device-to-Device Network Analysis (DNA) in Cellular Networks.
CoRR, 2017

Breaking the Bonds of Submodularity: Empirical Estimation of Approximation Ratios for Monotone Non-Submodular Greedy Maximization.
CoRR, 2017

Popular Topics Spread Faster: New Dimension for Influence Propagation in Online Social Networks.
CoRR, 2017

Vulnerability of D2D Communications from Interconnected Social Networks.
CoRR, 2017

Threat From Being Social: Vulnerability Analysis of Social Network Coupled Smart Grid.
IEEE Access, 2017

Breakdown by Rumors: Vulnerability of D2D Communications from Online Social Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Pseudo-Separation for Assessment of Structural Vulnerability of a Network.
Proceedings of the 2017 ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, Urbana-Champaign, IL, USA, June 05, 2017

Why approximate when you can get the exact? Optimal targeted viral marketing at scale.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Scalable bicriteria algorithms for the threshold activation problem in online social networks.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Dynamic Propagation Rates: New Dimension to Viral Marketing in Online Social Networks.
Proceedings of the 2017 IEEE International Conference on Data Mining, 2017

Scalable and Adaptive Algorithms for the Triangle Interdiction Problem on Billion-Scale Networks.
Proceedings of the 2017 IEEE International Conference on Data Mining, 2017

Adaptive Reconnaissance Attacks with Near-Optimal Parallel Batching.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

2016
Modularity Maximization in Complex Networks.
Encyclopedia of Algorithms, 2016

Least Cost Influence Maximization Across Multiple Social Networks.
IEEE/ACM Trans. Netw., 2016

Corrections to "Least Cost Influence Maximization Across Multiple Social Networks".
IEEE/ACM Trans. Netw., 2016

Misinformation in Online Social Networks: Detect Them All with a Limited Budget.
ACM Trans. Inf. Syst., 2016

Structural Vulnerability Assessment of Community-Based Routing in Opportunistic Networks.
IEEE Trans. Mob. Comput., 2016

Optimal packet scan against malicious attacks in smart grids.
Theor. Comput. Sci., 2016

Robustness of power-law networks: its assessment and optimization.
J. Comb. Optim., 2016

Least Cost Influence Maximization Across Multiple Social Networks.
CoRR, 2016

Privacy Issues in Light of Reconnaissance Attacks with Incomplete Information.
Proceedings of the 2016 IEEE/WIC/ACM International Conference on Web Intelligence, 2016

Stop-and-Stare: Optimal Sampling Algorithms for Viral Marketing in Billion-scale Networks.
Proceedings of the 2016 International Conference on Management of Data, 2016

Profit maximization for multiple products in online social networks.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Cost-aware Targeted Viral Marketing in billion-scale networks.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Time-Critical Viral Marketing Strategy with the Competition on Online Social Networks.
Proceedings of the Computational Social Networks - 5th International Conference, 2016

Detecting misinformation in online social networks before it is too late.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

2015
Network Under Joint Node and Link Attacks: Vulnerability Assessment Methods and Analysis.
IEEE/ACM Trans. Netw., 2015

Catastrophic cascading failures in power networks.
Theor. Comput. Sci., 2015

A near-optimal adaptive algorithm for maximizing modularity in dynamic scale-free networks.
J. Comb. Optim., 2015

Toward Optimal Community Detection: From Trees to General Weighted Networks.
Internet Math., 2015

Rate alteration attacks in smart grid.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Assessing attack vulnerability in networks with uncertainty.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Network Clustering via Maximizing Modularity: Approximation Algorithms and Theoretical Limits.
Proceedings of the 2015 IEEE International Conference on Data Mining, 2015

Monitor placement to timely detect misinformation in Online Social Networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Limiting the Spread of Misinformation While Effectively Raising Awareness in Social Networks.
Proceedings of the Computational Social Networks - 4th International Conference, 2015

Multiple reference networks improve accuracy of signaling network construction.
Proceedings of the 6th ACM Conference on Bioinformatics, 2015

2014
On detection and tracking of variant phenomena clouds.
ACM Trans. Sens. Networks, 2014

Cost-Effective Viral Marketing for Time-Critical Campaigns in Large-Scale Social Networks.
IEEE/ACM Trans. Netw., 2014

A method to detect communities with stability in social networks.
Soc. Netw. Anal. Min., 2014

Preface.
J. Comb. Optim., 2014

Staying safe and visible via message sharing in online social networks.
J. Comb. Optim., 2014

Bound and exact methods for assessing link vulnerability in complex networks.
J. Comb. Optim., 2014

On the approximability of positive influence dominating set in social networks.
J. Comb. Optim., 2014

A cutting-plane algorithm for solving a weighted influence interdiction problem.
Comput. Optim. Appl., 2014

Structural Vulnerability Analysis of Overlapping Communities in Complex Networks.
Proceedings of the 2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT), Warsaw, Poland, August 11-14, 2014, 2014

Online Algorithms for Optimal Resource Management in Dynamic D2D Communications.
Proceedings of the 10th International Conference on Mobile Ad-hoc and Sensor Networks, 2014

Optimal Inspection Points for Malicious Attack Detection in Smart Grids.
Proceedings of the Computing and Combinatorics - 20th International Conference, 2014

Approximation Algorithms for Optimization Problems in Random Power-Law Graphs.
Proceedings of the Combinatorial Optimization and Applications, 2014

Cascading Critical Nodes Detection with Load Redistribution in Complex Systems.
Proceedings of the Combinatorial Optimization and Applications, 2014

Are communities as strong as we think?
Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2014

2013
Detecting Critical Nodes in Interdependent Power Networks for Vulnerability Assessment.
IEEE Trans. Smart Grid, 2013

On the Discovery of Critical Links and Nodes for Assessing Network Vulnerability.
IEEE/ACM Trans. Netw., 2013

On Centralized and Localized Approximation Algorithms for Interference-Aware Broadcast Scheduling.
IEEE Trans. Mob. Comput., 2013

Efficient Multi-Link Failure Localization Schemes in All-Optical Networks.
IEEE Trans. Commun., 2013

Community Detection in Scale-Free Networks: Approximation Algorithms for Maximizing Modularity.
IEEE J. Sel. Areas Commun., 2013

Analysis of misinformation containment in online social networks.
Comput. Networks, 2013

Adaptive approximation algorithms for hole healing in hybrid wireless sensor networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

An adaptive approximation algorithm for community detection in dynamic scale-free networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Least Cost Influence in Multiplex Social Networks: Model Representation and Analysis.
Proceedings of the 2013 IEEE 13th International Conference on Data Mining, 2013

Maximizing the Spread of Positive Influence in Online Social Networks.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013

Network vulnerability assessment under cascading failures.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Influence maximization in multiple online social networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Assessing network vulnerability in a community structure point of view.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
On New Approaches of Assessing Network Vulnerability: Hardness and Approximation.
IEEE/ACM Trans. Netw., 2012

A Trigger Identification Service for Defending Reactive Jammers in WSN.
IEEE Trans. Mob. Comput., 2012

New techniques for approximating optimal substructure problems in power-law graphs.
Theor. Comput. Sci., 2012

Optimal and distributed algorithms for coverage hole healing in hybrid sensor networks.
Int. J. Sens. Networks, 2012

Guest Editorial: Computing and Combinatorics.
Algorithmica, 2012

Containment of misinformation spread in online social networks.
Proceedings of the Web Science 2012, 2012

Adaptive algorithms for detecting critical links and nodes in dynamic networks.
Proceedings of the 31st IEEE Military Communications Conference, 2012

Finding overlapped communities in online social networks with Nonnegative Matrix Factorization.
Proceedings of the 31st IEEE Military Communications Conference, 2012

Sources of misinformation in Online Social Networks: Who to suspect?
Proceedings of the 31st IEEE Military Communications Conference, 2012

An efficient spectral bound for link vulnerability assessment in large-scale networks.
Proceedings of the 31st IEEE Military Communications Conference, 2012

Maximizing circle of trust in online social networks.
Proceedings of the 23rd ACM Conference on Hypertext and Social Media, 2012

Cheap, easy, and massively effective viral marketing in social networks: truth or fiction?
Proceedings of the 23rd ACM Conference on Hypertext and Social Media, 2012

Interest-matching information propagation in multiple online social networks.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

The walls have ears: optimize sharing for visibility and privacy in online social networks.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

2011
Finding Community Structure with Performance Guarantees in Complex Networks
CoRR, 2011

A Novel Approach Against Reactive Jamming Attacks.
Ad Hoc Sens. Wirel. Networks, 2011

Overlapping Community Structures and Their Detection on Social Networks.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Finding Community Structure with Performance Guarantees in Scale-Free Networks.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Optimizing push/pull envelopes for energy-efficient cloud-sensor systems.
Proceedings of the 14th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2011

Overlapping communities in dynamic networks: their detection and mobile applications.
Proceedings of the 17th Annual International Conference on Mobile Computing and Networking, 2011

On local approximation of minimum-latency broadcast scheduling in 3D MANETs.
Proceedings of the MILCOM 2011, 2011

Precise structural vulnerability assessment via mathematical programming.
Proceedings of the MILCOM 2011, 2011

An optimal algorithm for coverage hole healing in hybrid sensor networks.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

Adaptive algorithms for detecting community structure in dynamic social networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Exploiting the Robustness on Power-Law Networks.
Proceedings of the Computing and Combinatorics - 17th Annual International Conference, 2011

2010
Detecting Application Denial-of-Service Attacks: A Group-Testing-Based Approach.
IEEE Trans. Parallel Distributed Syst., 2010

On approximation of dominating tree in wireless sensor networks.
Optim. Lett., 2010

Construction of Virtual Backbone with Multiple Factors Constraints in Wireless Ad-hoc Network.
Ad Hoc Sens. Wirel. Networks, 2010

On Approximation of New Optimization Methods for Assessing Network Vulnerability.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

A Graph-Theoretic QoS-Aware Vulnerability Assessment for Network Topologies.
Proceedings of the Global Communications Conference, 2010

Localized Energy Efficient Detection and Tracking of Dynamic Phenomena.
Proceedings of the Global Communications Conference, 2010

On the Hardness and Inapproximability of Optimization Problems on Power Law Graphs.
Proceedings of the Combinatorial Optimization and Applications, 2010

Finding Dynamic Modules of Biological Regulatory Networks.
Proceedings of the 10th IEEE International Conference on Bioinformatics and Bioengineering, 2010

2009
On the construction of 2-connected virtual backbone in wireless networks.
IEEE Trans. Wirel. Commun., 2009

Optimization scheme for sensor coverage scheduling with bandwidth constraints.
Optim. Lett., 2009

On the complexity and approximation of non-unique probe selection using <i>d</i> -disjunct matrix.
J. Comb. Optim., 2009

On Approximation Algorithms for Interference-Aware Broadcast Scheduling in 2D and 3D Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, 2009

Reactive jamming attacks in multi-radio wireless sensor networks: an efficient mitigating measure by identifying trigger nodes.
Proceedings of the 2nd ACM international workshop on Foundations of wireless ad hoc and sensor networking and computing, 2009

On trigger detection against reactive Jamming Attacks: A clique-independent set based approach.
Proceedings of the 28th International Performance Computing and Communications Conference, 2009

Towards social-aware routing in dynamic communication networks.
Proceedings of the 28th International Performance Computing and Communications Conference, 2009

2008
Fault-Tolerant Topology Control for All-to-One and One-to-All Communication in Wireles Networks.
IEEE Trans. Mob. Comput., 2008

On Construction of Virtual Backbone in Wireless Ad Hoc Networks with Unidirectional Links.
IEEE Trans. Mob. Comput., 2008

Coverage problems in wireless sensor networks: designs and analysis.
Int. J. Sens. Networks, 2008

New Approximation for Minimum-Weight Routing Backbone in Wireless Sensor Network.
Proceedings of the Wireless Algorithms, 2008

Trade-off scheme for fault tolerant connected dominating sets on size and diameter.
Proceedings of the 1st ACM International Workshop on Foundations of Wireless Ad Hoc and Sensor Networking and Computing, 2008

An approximation algorithm for conflict-aware broadcast scheduling in wireless ad hoc networks.
Proceedings of the 9th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2008

On Detection of Malicious Users Using Group Testing Techniques.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

2007
Connected Dominating Sets in Wireless Networks with Different Transmission Ranges.
IEEE Trans. Mob. Comput., 2007

On approximation algorithms of k-connected m-dominating sets in disk graphs.
Theor. Comput. Sci., 2007

Genetic networks: processing data, regulatory network modelling and their analysis.
Optim. Methods Softw., 2007

Fault tolerant topology control for one-to-all communications in symmetric wireless networks.
Int. J. Sens. Networks, 2007

Decoding algorithms in pooling designs with inhibitors and error-tolerance.
Int. J. Bioinform. Res. Appl., 2007

A dominating and absorbent set in a wireless ad-hoc network with different transmission ranges.
Proceedings of the 8th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2007

O(log n)-Localized Algorithms on the Coverage Problem in Heterogeneous Sensor Networks.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007

Minimum Coverage Breach and Maximum Network Lifetime in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2007

A Non-Unique Probes Selection Algorithm Using d-Disjunct Matrix.
Proceedings of the International Conference on Bioinformatics & Computational Biology, 2007

2006
On the Construction of a Strongly Connected Broadcast Arborescence with Bounded Transmission Delay.
IEEE Trans. Mob. Comput., 2006

Construction of <i>d(H)</i>-disjunct matrix for group testing in hypergraphs.
J. Comb. Optim., 2006

Connected dominating sets in disk graphs with bidirectional links.
IEEE Commun. Lett., 2006

2-Connected Dominating Set inWireless Networks (Invited Talk Abstract).
Proceedings of the Seventh International Conference on Software Engineering, 2006

Strongly Connected Dominating Sets in Wireless Sensor Networks with Unidirectional Links.
Proceedings of the Frontiers of WWW Research and Development, 2006

2005
On greedy construction of connected dominating sets in wireless networks.
Wirel. Commun. Mob. Comput., 2005

An Approximation for Minimum Multicast Route in Optical Networks with Nonsplitting Nodes.
J. Comb. Optim., 2005

A Note on Optical Network with Nonsplitting Nodes.
J. Comb. Optim., 2005

Data caching and query processing in MANETs.
Int. J. Pervasive Comput. Commun., 2005

Protein-protein interaction and group testing in bipartite graphs.
Int. J. Bioinform. Res. Appl., 2005

A combination of wireless multicast advantage and hitch-hiking.
IEEE Commun. Lett., 2005

On the construction of energy-efficient broadcast tree with Hitch-hiking in wireless networks.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005

Energy-efficient target coverage in wireless sensor networks.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005


  Loading...