Select Publications

Books

Jiang J; Wen S; Liu B; Yu S; Xiang Y; Zhou W, 2019, Preface

Book Chapters

Jiang J; Wen S; Yu S; Liu B; Xiang Y; Zhou W, 2019, 'Comparative study and numerical analysis', in Advances in Information Security, pp. 95 - 114, http://dx.doi.org/10.1007/978-3-030-02179-5_9

Jiang J; Wen S; Yu S; Liu B; Xiang Y; Zhou W, 2019, 'Future directions and conclusion', in Advances in Information Security, pp. 179 - 181, http://dx.doi.org/10.1007/978-3-030-02179-5_13

Jiang J; Wen S; Yu S; Liu B; Xiang Y; Zhou W, 2019, 'Identifying multiple propagation sources', in Advances in Information Security, pp. 139 - 157, http://dx.doi.org/10.1007/978-3-030-02179-5_11

Jiang J; Wen S; Yu S; Liu B; Xiang Y; Zhou W, 2019, 'Identifying propagation source in large-scale networks', in Advances in Information Security, pp. 159 - 178, http://dx.doi.org/10.1007/978-3-030-02179-5_12

Jiang J; Wen S; Yu S; Liu B; Xiang Y; Zhou W, 2019, 'Identifying propagation source in time-varying networks', in Advances in Information Security, pp. 117 - 137, http://dx.doi.org/10.1007/978-3-030-02179-5_10

Jiang J; Wen S; Liu B; Yu S; Xiang Y; Zhou W, 2019, 'Malicious attack propagation and source identification', in Advances in Information Security, pp. 1 - 192, http://dx.doi.org/10.1007/978-3-030-02179-5_1

Jiang J; Wen S; Yu S; Liu B; Xiang Y; Zhou W, 2019, 'Preliminary of identifying propagation sources', in Advances in Information Security, pp. 65 - 67, http://dx.doi.org/10.1007/978-3-030-02179-5_5

Jiang J; Wen S; Yu S; Liu B; Xiang Y; Zhou W, 2019, 'Preliminary of modeling malicious attack propagation', in Advances in Information Security, pp. 11 - 19, http://dx.doi.org/10.1007/978-3-030-02179-5_2

Jiang J; Wen S; Yu S; Liu B; Xiang Y; Zhou W, 2019, 'Restrain malicious attack propagation', in Advances in Information Security, pp. 41 - 62, http://dx.doi.org/10.1007/978-3-030-02179-5_4

Jiang J; Wen S; Yu S; Liu B; Xiang Y; Zhou W, 2019, 'Source identification under complete observations: A maximum likelihood (ML) source estimator', in Advances in Information Security, pp. 69 - 77, http://dx.doi.org/10.1007/978-3-030-02179-5_6

Jiang J; Wen S; Yu S; Liu B; Xiang Y; Zhou W, 2019, 'Source identification under sensor observations: A Gaussian source estimator', in Advances in Information Security, pp. 89 - 93, http://dx.doi.org/10.1007/978-3-030-02179-5_8

Jiang J; Wen S; Yu S; Liu B; Xiang Y; Zhou W, 2019, 'Source identification under snapshots: A sample path based source estimator', in Advances in Information Security, pp. 79 - 87, http://dx.doi.org/10.1007/978-3-030-02179-5_7

Jiang J; Wen S; Yu S; Liu B; Xiang Y; Zhou W, 2019, 'User influence in the propagation of malicious attacks', in Advances in Information Security, pp. 21 - 39, http://dx.doi.org/10.1007/978-3-030-02179-5_3

Jiang J; Wen S; Yu S; Liu B; Xiang Y; Zhou W, 2018, 'Introduction', in Malicious Attack Propagation and Source Identification, pp. 1 - 8, http://dx.doi.org/10.1007/978-3-030-02179-5_1

Bowden BM, 2009, 'Introduction', in Bowden B (ed.), Civilization; Critical Concepts in Political Science, edn. First, Routledge, London and New York, pp. 1 - 18

Journal articles

Jiang J, 2021, 'Network Growth From Global and Local Influential Nodes', arXiv

Jiang J; Schneider J-G; Versteeg S; Han J; Hossain MDA; Liu C, 2021, 'R-gram: Inferring message formats of service protocols with relative positional N-grams', Journal of Network and Computer Applications, pp. 103247 - 103247, http://dx.doi.org/10.1016/j.jnca.2021.103247

Jiang J; Versteeg S; Han J; Hossain MDA; Schneider JG, 2020, 'A positional keyword-based approach to inferring fine-grained message formats', Future Generation Computer Systems, vol. 102, pp. 369 - 381, http://dx.doi.org/10.1016/j.future.2019.08.011

Yang S; Jiang J; Pal A; Yu K; Chen F; Yu S, 2020, 'Analysis and Insights for Myths Circulating on Twitter During the COVID-19 Pandemic', IEEE Open Journal of the Computer Society, vol. 1, pp. 209 - 219, http://dx.doi.org/10.1109/ojcs.2020.3028573

Li X; Xie Q; Jiang J; Zhou Y; Huang L, 2019, 'Identifying and monitoring the development trends of emerging technologies using patent analysis and Twitter data mining: The case of perovskite solar cell technology', Technological Forecasting and Social Change, vol. 146, pp. 687 - 705, http://dx.doi.org/10.1016/j.techfore.2018.06.004

Jiang J; Gao L; Jin J; Luan TH; Yu S; Xiang Y; Garg S, 2019, 'Sustainability Analysis for Fog Nodes with Renewable Energy Supplies', IEEE Internet of Things Journal, vol. 6, pp. 6725 - 6735, http://dx.doi.org/10.1109/JIOT.2019.2910875

Jiang J; Versteeg S; Han J; Hossain MA; Schneider JG; Leckie C; Farahmandpour Z, 2019, 'P-Gram: Positional N-Gram for the Clustering of Machine-Generated Messages', IEEE Access, vol. 7, pp. 88504 - 88516, http://dx.doi.org/10.1109/ACCESS.2019.2924928

Jiang J; Wen S; Yu S; Xiang Y; Zhou W, 2018, 'Rumor Source Identification in Social Networks with Time-Varying Topology', IEEE Transactions on Dependable and Secure Computing, vol. 15, pp. 166 - 179, http://dx.doi.org/10.1109/TDSC.2016.2522436

Jiang J; Wen S; Yu S; Xiang Y; Zhou W; Hassan H, 2017, 'The structure of communities in scale-free networks', Concurrency and Computation: Practice and Experience, vol. 29, http://dx.doi.org/10.1002/cpe.4040

Wen S; Jiang J; Liu B; Xiang Y; Zhou W, 2017, 'Using epidemic betweenness to measure the influence of users in complex networks', Journal of Network and Computer Applications, vol. 78, pp. 288 - 299, http://dx.doi.org/10.1016/j.jnca.2016.10.018

Jiang J; Wen S; Yu S; Xiang Y; Zhou W, 2017, 'Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies', IEEE Communications Surveys and Tutorials, vol. 19, pp. 465 - 481, http://dx.doi.org/10.1109/COMST.2016.2615098

Jiang J; Wen S; Yu S; Xiang Y; Zhou W, 2015, 'K-Center: An Approach on the Multi-Source Identification of Information Diffusion', IEEE Transactions on Information Forensics and Security, vol. 10, pp. 2616 - 2626, http://dx.doi.org/10.1109/TIFS.2015.2469256

Zhang HB; Jiang JJ; Zhao YB, 2015, 'On the proximal Landweber Newton method for a class of nonsmooth convex problems', Computational Optimization and Applications, vol. 61, pp. 79 - 99, http://dx.doi.org/10.1007/s10589-014-9703-7

Wen S; Jiang J; Xiang Y; Yu S; Zhou W; Jia W, 2014, 'To shut them up or to clarify: Restraining the spread of rumors in online social networks', IEEE Transactions on Parallel and Distributed Systems, vol. 25, pp. 3306 - 3316, http://dx.doi.org/10.1109/TPDS.2013.2297115

Wen S; Jiang J; Xiang Y; Yu S; Zhou W, 2014, 'Are the popular users always important for information dissemination in online social networks?', IEEE Network, vol. 28, pp. 64 - 67, http://dx.doi.org/10.1109/MNET.2014.6915441

Zhang H; Jiang J; Luo Z-Q, 2013, 'On the Linear Convergence of a Proximal Gradient Method for a Class of Nonsmooth Convex Minimization Problems', JOURNAL OF THE OPERATIONS RESEARCH SOCIETY OF CHINA, vol. 1, pp. 163 - 186, http://dx.doi.org/10.1007/s40305-013-0015-x

Jiang JJ; Zhanga HB; Yu S, 2012, 'An interior point trust region method for nonnegative matrix factorization', NEUROCOMPUTING, vol. 97, pp. 309 - 316, http://dx.doi.org/10.1016/j.neucom.2012.05.008

Conference Papers

Zheng X; Jiang J; Zhang Y; Deng Y; Fu M; Zheng T; Liu X, 2018, 'SmartVM: A multi-layer microservice-based platform for deploying SaaS', in Proceedings - 15th IEEE International Symposium on Parallel and Distributed Processing with Applications and 16th IEEE International Conference on Ubiquitous Computing and Communications, ISPA/IUCC 2017, pp. 470 - 474, http://dx.doi.org/10.1109/ISPA/IUCC.2017.00077

Hossain MA; Versteeg S; Han J; Kabir MA; Jiang J; Schneider JG, 2018, 'Mining accurate message formats for service APIs', in 25th IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2018 - Proceedings, pp. 266 - 276, http://dx.doi.org/10.1109/SANER.2018.8330215

Jiang J; Gao L; Yu S; Jin J; Yuan D, 2018, 'Preferential attachment and the spreading influence of users in online social networks', in 2017 IEEE/CIC International Conference on Communications in China, ICCC 2017, pp. 1 - 6, http://dx.doi.org/10.1109/ICCChina.2017.8330470

Jiang J; Gao L; Jin J; Luan TH; Yu S; Yuan D; Xiang Y; Yuan D, 2017, 'Towards an analysis of traffic shaping and policing in fog networks using stochastic fluid models', in ACM International Conference Proceeding Series, pp. 196 - 204, http://dx.doi.org/10.1145/3144457.3144496

Jiang J; Qu Y; Yu S; Zhou W; Wu W, 2017, 'Studying the global spreading influence and local connections of users in online social networks', in Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016, pp. 431 - 435, http://dx.doi.org/10.1109/CIT.2016.15

Liu B; Zhou W; Jiang J; Wang K, 2016, 'K-Source: Multiple source selection for traffic offloading in mobile social networks', in 2016 8th International Conference on Wireless Communications and Signal Processing, WCSP 2016, http://dx.doi.org/10.1109/WCSP.2016.7752474

Wen S; Jiang J; Yazdi KM; Xiang Y; Zhou W, 2016, 'The relation between local and global influence of individuals in scale-free networks', in Proceedings - 2015 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2015, pp. 80 - 84, http://dx.doi.org/10.1109/SocialSec2015.20

Feng B; Zhou H; Zhang H; Jiang J; Yu S, 2016, 'A popularity-based cache consistency mechanism for information-centric networking', in 2016 IEEE Global Communications Conference, GLOBECOM 2016 - Proceedings, http://dx.doi.org/10.1109/GLOCOM.2016.7841535

Jiang J; Wen S; Yu S; Zhou W; Qian Y, 2016, 'Analysis of the spreading influence variations for online social users under attacks', in 2016 IEEE Global Communications Conference, GLOBECOM 2016 - Proceedings, http://dx.doi.org/10.1109/GLOCOM.2016.7841605

Jiang J; Zhou A; Yazdi KM; Wen S; Yu S; Xiang Y, 2015, 'Identifying diffusion sources in large networks: A community structure based approach', in Proceedings - 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015, pp. 302 - 309, http://dx.doi.org/10.1109/Trustcom.2015.388

Jiang J; Zhou A; Yazdi KM; Wen S; Yu S; Xiang Y, 2015, 'Identifying Diffusion Sources in Large Networks: A Community Structure Based Approach', in 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, IEEE, Aalto Univ, Helsinki, FINLAND, pp. 302 - 309, presented at Joint 14th IEEE Int Conf on Trust, Secur and Privacy in Comp and Commun / 13th IEEE Int Symposium on Parallel and Distributed Proc with Applications / 9th IEEE Int Conf on Big Data Science and Engineering (IEEE TrustCom-ISPA-BigDataSE), Aalto Univ, Helsinki, FINLAND, 20 August 2015 - 22 August 2015, http://dx.doi.org/10.1109/Trustcom-2015.388

Jiang J; Zhang H; Xue Y, 2012, 'Fast Local Learning Regularized Nonnegative Matrix Factorization', in Lee G (ed.), ADVANCES IN COMPUTATIONAL ENVIRONMENT SCIENCE, SPRINGER-VERLAG BERLIN, Melbourne, AUSTRALIA, pp. 67 - 75, presented at International Conference on Environment Science (ICES 2012), Melbourne, AUSTRALIA, 15 January 2012 - 16 January 2012, http://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000310241100009&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1

Jiang J; Zhang H; Yu S, 2011, 'A Novel Monotonic Fixed-Point Algorithm for l(1)-Regularized Least Square Vector and Matrix Problem', in Wu YW (ed.), HIGH PERFORMANCE NETWORKING, COMPUTING, AND COMMUNICATION SYSTEMS, SPRINGER-VERLAG BERLIN, Singapore, SINGAPORE, pp. 476 - +, presented at 2nd International Conference on Theoretical and Mathematical Foundations of Computer Science (ICHCC 2011), Singapore, SINGAPORE, 05 May 2011 - 06 May 2011, http://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000310948200067&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1


Back to profile page