Select Publications

Book Chapters

Ma B; Ren H; Jiang J, 2024, 'Influence Robustness of Nodes in Multiplex Networks Against Attacks', in , pp. 62 - 74, http://dx.doi.org/10.1007/978-3-031-53472-0_6

Jiang J; Wen S; Yu S; Liu B; Xiang Y; Zhou W, 2019, 'Comparative study and numerical analysis', in Advances in Information Security, pp. 95 - 114, http://dx.doi.org/10.1007/978-3-030-02179-5_9

Jiang J; Wen S; Yu S; Liu B; Xiang Y; Zhou W, 2019, 'Future directions and conclusion', in Advances in Information Security, pp. 179 - 181, http://dx.doi.org/10.1007/978-3-030-02179-5_13

Jiang J; Wen S; Yu S; Liu B; Xiang Y; Zhou W, 2019, 'Identifying multiple propagation sources', in Advances in Information Security, pp. 139 - 157, http://dx.doi.org/10.1007/978-3-030-02179-5_11

Jiang J; Wen S; Yu S; Liu B; Xiang Y; Zhou W, 2019, 'Identifying propagation source in large-scale networks', in Advances in Information Security, pp. 159 - 178, http://dx.doi.org/10.1007/978-3-030-02179-5_12

Jiang J; Wen S; Yu S; Liu B; Xiang Y; Zhou W, 2019, 'Identifying propagation source in time-varying networks', in Advances in Information Security, pp. 117 - 137, http://dx.doi.org/10.1007/978-3-030-02179-5_10

Jiang J; Wen S; Liu B; Yu S; Xiang Y; Zhou W, 2019, 'Malicious attack propagation and source identification', in Advances in Information Security, pp. 1 - 192, http://dx.doi.org/10.1007/978-3-030-02179-5_1

Jiang J; Wen S; Yu S; Liu B; Xiang Y; Zhou W, 2019, 'Preliminary of identifying propagation sources', in Advances in Information Security, pp. 65 - 67, http://dx.doi.org/10.1007/978-3-030-02179-5_5

Jiang J; Wen S; Yu S; Liu B; Xiang Y; Zhou W, 2019, 'Preliminary of modeling malicious attack propagation', in Advances in Information Security, pp. 11 - 19, http://dx.doi.org/10.1007/978-3-030-02179-5_2

Jiang J; Wen S; Yu S; Liu B; Xiang Y; Zhou W, 2019, 'Restrain malicious attack propagation', in Advances in Information Security, pp. 41 - 62, http://dx.doi.org/10.1007/978-3-030-02179-5_4

Jiang J; Wen S; Yu S; Liu B; Xiang Y; Zhou W, 2019, 'Source identification under complete observations: A maximum likelihood (ML) source estimator', in Advances in Information Security, pp. 69 - 77, http://dx.doi.org/10.1007/978-3-030-02179-5_6

Jiang J; Wen S; Yu S; Liu B; Xiang Y; Zhou W, 2019, 'Source identification under sensor observations: A Gaussian source estimator', in Advances in Information Security, pp. 89 - 93, http://dx.doi.org/10.1007/978-3-030-02179-5_8

Jiang J; Wen S; Yu S; Liu B; Xiang Y; Zhou W, 2019, 'Source identification under snapshots: A sample path based source estimator', in Advances in Information Security, pp. 79 - 87, http://dx.doi.org/10.1007/978-3-030-02179-5_7

Jiang J; Wen S; Yu S; Liu B; Xiang Y; Zhou W, 2019, 'User influence in the propagation of malicious attacks', in Advances in Information Security, pp. 21 - 39, http://dx.doi.org/10.1007/978-3-030-02179-5_3

Jiang J; Wen S; Yu S; Liu B; Xiang Y; Zhou W, 2019, 'Introduction', in Malicious Attack Propagation and Source Identification, Springer Nature, pp. 1 - 8, http://dx.doi.org/10.1007/978-3-030-02179-5_1

Bowden BM, 2009, 'Introduction', in Bowden B (ed.), Civilization; Critical Concepts in Political Science, Routledge, London and New York, pp. 1 - 18


Back to profile page