Select Publications
Conference Papers
2024, 'DiHAN: A Novel Dynamic Hierarchical Graph Attention Network for Fake News Detection', in International Conference on Information and Knowledge Management, Proceedings, pp. 197 - 206, http://dx.doi.org/10.1145/3627673.3679675
,2024, 'LayerPlexRank: Exploring Node Centrality and Layer Influence through Algebraic Connectivity in Multiplex Networks', in International Conference on Information and Knowledge Management, Proceedings, pp. 4010 - 4014, http://dx.doi.org/10.1145/3627673.3679950
,2024, 'MFVIEW: Multi-modal Fake News Detection with View-Specific Information Extraction', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 345 - 353, http://dx.doi.org/10.1007/978-3-031-56063-7_26
,2022, 'The Effect of Source Location on the Effectiveness of Source Detection in Finite Networks', in IEEE International Conference on Communications, pp. 4104 - 4113, http://dx.doi.org/10.1109/ICC45855.2022.9838272
,2018, 'SmartVM: A multi-layer microservice-based platform for deploying SaaS', in Proceedings - 15th IEEE International Symposium on Parallel and Distributed Processing with Applications and 16th IEEE International Conference on Ubiquitous Computing and Communications, ISPA/IUCC 2017, pp. 470 - 474, http://dx.doi.org/10.1109/ISPA/IUCC.2017.00077
,2018, 'Mining accurate message formats for service APIs', in 25th IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2018 - Proceedings, pp. 266 - 276, http://dx.doi.org/10.1109/SANER.2018.8330215
,2017, 'Towards an analysis of traffic shaping and policing in fog networks using stochastic fluid models', in ACM International Conference Proceeding Series, pp. 196 - 204, http://dx.doi.org/10.1145/3144457.3144496
,2017, 'Preferential attachment and the spreading influence of users in online social networks', in 2017 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), IEEE, PEOPLES R CHINA, Qingdao, pp. 690 - 695, presented at IEEE/CIC International Conference on Communications in China (ICCC), PEOPLES R CHINA, Qingdao, 22 October 2017 - 24 October 2017, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000709551200125&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,2017, 'Preferential attachment and the spreading influence of users in online social networks', in 2017 IEEE/CIC International Conference on Communications in China, ICCC 2017, pp. 1 - 6, http://dx.doi.org/10.1109/ICCChina.2017.8330470
,2017, 'Studying the global spreading influence and local connections of users in online social networks', in Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016, pp. 431 - 435, http://dx.doi.org/10.1109/CIT.2016.15
,2016, 'K-Source: Multiple source selection for traffic offloading in mobile social networks', in 2016 8th International Conference on Wireless Communications and Signal Processing, WCSP 2016, http://dx.doi.org/10.1109/WCSP.2016.7752474
,2016, 'The relation between local and global influence of individuals in scale-free networks', in Proceedings - 2015 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2015, pp. 80 - 84, http://dx.doi.org/10.1109/SocialSec2015.20
,2016, 'A popularity-based cache consistency mechanism for information-centric networking', in Proceedings - IEEE Global Communications Conference, GLOBECOM, http://dx.doi.org/10.1109/GLOCOM.2016.7841535
,2016, 'Analysis of the spreading influence variations for online social users under attacks', in Proceedings - IEEE Global Communications Conference, GLOBECOM, http://dx.doi.org/10.1109/GLOCOM.2016.7841605
,2015, 'Identifying diffusion sources in large networks: A community structure based approach', in Proceedings - 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015, pp. 302 - 309, http://dx.doi.org/10.1109/Trustcom.2015.388
,2015, 'Identifying Diffusion Sources in Large Networks: A Community Structure Based Approach', in 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, IEEE, FINLAND, Aalto Univ, Helsinki, pp. 302 - 309, presented at Joint 14th IEEE Int Conf on Trust, Secur and Privacy in Comp and Commun / 13th IEEE Int Symposium on Parallel and Distributed Proc with Applications / 9th IEEE Int Conf on Big Data Science and Engineering (IEEE TrustCom-ISPA-BigDataSE), FINLAND, Aalto Univ, Helsinki, 20 August 2015 - 22 August 2015, http://dx.doi.org/10.1109/Trustcom-2015.388
,2012, 'Fast local learning regularized nonnegative matrix factorization', in Advances in Intelligent and Soft Computing, pp. 67 - 75, http://dx.doi.org/10.1007/978-3-642-27957-7_9
,2011, 'A novel monotonic fixed-point algorithm for l
2010, 'Multiplicative update for projective nonnegative matrix factorization with Bregman divergence', in Proceedings - 3rd International Symposium on Information Processing, ISIP 2010, pp. 233 - 237, http://dx.doi.org/10.1109/ISIP.2010.73
,2010, 'The inexact Newton method with semi automatic differentiation', in Proceedings - 3rd International Symposium on Information Processing, ISIP 2010, pp. 286 - 290, http://dx.doi.org/10.1109/ISIP.2010.71
,