Select Publications
Journal articles
2024, 'Partial label learning via identifying outlier features', Knowledge-Based Systems, 301, http://dx.doi.org/10.1016/j.knosys.2024.112278
,2024, 'Exploring Uncharted Waters of Website Fingerprinting', IEEE Transactions on Information Forensics and Security, 19, pp. 1840 - 1854, http://dx.doi.org/10.1109/TIFS.2023.3342607
,2024, 'Privacy-Preserving Probabilistic Data Encoding for IoT Data Analysis', IEEE Transactions on Information Forensics and Security, 19, pp. 9173 - 9187, http://dx.doi.org/10.1109/TIFS.2024.3468150
,2023, 'An Improved Robust Sparse Convex Clustering', Tsinghua Science and Technology, 28, pp. 989 - 998, http://dx.doi.org/10.26599/TST.2022.9010046
,2023, 'A tight bound of modified iterative hard thresholding algorithm for compressed sensing', Applications of Mathematics, 68, pp. 623 - 642, http://dx.doi.org/10.21136/AM.2023.0221-22
,2023, 'Variational co-embedding learning for attributed network clustering', Knowledge-Based Systems, 270, http://dx.doi.org/10.1016/j.knosys.2023.110530
,2023, 'Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives', IEEE Communications Surveys and Tutorials, 25, pp. 1748 - 1774, http://dx.doi.org/10.1109/COMST.2023.3273282
,2022, 'Robust cross-network node classification via constrained graph mutual information', Knowledge-Based Systems, 257, http://dx.doi.org/10.1016/j.knosys.2022.109852
,2022, 'Identifying potential breakthrough research: A machine learning method using scientific papers and Twitter data', Technological Forecasting and Social Change, 184, http://dx.doi.org/10.1016/j.techfore.2022.122042
,2022, 'Inferring data model from service interactions for response generation in service virtualization', Information and Software Technology, 145, http://dx.doi.org/10.1016/j.infsof.2021.106803
,2022, 'Extracting Formats of Service Messages with Varying Payloads', ACM Transactions on Internet Technology, 22, http://dx.doi.org/10.1145/3503159
,2022, 'Network Growth From Global and Local Influential Nodes', IEEE Transactions on Network Science and Engineering, http://dx.doi.org/10.1109/TNSE.2022.3165528
,2021, 'R-gram: Inferring message formats of service protocols with relative positional n-grams', Journal of Network and Computer Applications, 196, http://dx.doi.org/10.1016/j.jnca.2021.103247
,2020, 'A positional keyword-based approach to inferring fine-grained message formats', Future Generation Computer Systems, 102, pp. 369 - 381, http://dx.doi.org/10.1016/j.future.2019.08.011
,2020, 'Analysis and Insights for Myths Circulating on Twitter during the COVID-19 Pandemic', IEEE Open Journal of the Computer Society, 1, pp. 209 - 219, http://dx.doi.org/10.1109/OJCS.2020.3028573
,2019, 'Identifying and monitoring the development trends of emerging technologies using patent analysis and Twitter data mining: The case of perovskite solar cell technology', Technological Forecasting and Social Change, 146, pp. 687 - 705, http://dx.doi.org/10.1016/j.techfore.2018.06.004
,2019, 'Sustainability Analysis for Fog Nodes with Renewable Energy Supplies', IEEE Internet of Things Journal, 6, pp. 6725 - 6735, http://dx.doi.org/10.1109/JIOT.2019.2910875
,2019, 'P-Gram: Positional N-Gram for the Clustering of Machine-Generated Messages', IEEE Access, 7, pp. 88504 - 88516, http://dx.doi.org/10.1109/ACCESS.2019.2924928
,2018, 'Rumor Source Identification in Social Networks with Time-Varying Topology', IEEE Transactions on Dependable and Secure Computing, 15, pp. 166 - 179, http://dx.doi.org/10.1109/TDSC.2016.2522436
,2017, 'The structure of communities in scale-free networks', Concurrency and Computation: Practice and Experience, 29, http://dx.doi.org/10.1002/cpe.4040
,2017, 'Using epidemic betweenness to measure the influence of users in complex networks', Journal of Network and Computer Applications, 78, pp. 288 - 299, http://dx.doi.org/10.1016/j.jnca.2016.10.018
,2017, 'Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies', IEEE Communications Surveys and Tutorials, 19, pp. 465 - 481, http://dx.doi.org/10.1109/COMST.2016.2615098
,2015, 'K-Center: An Approach on the Multi-Source Identification of Information Diffusion', IEEE Transactions on Information Forensics and Security, 10, pp. 2616 - 2626, http://dx.doi.org/10.1109/TIFS.2015.2469256
,2015, 'On the proximal Landweber Newton method for a class of nonsmooth convex problems', Computational Optimization and Applications, 61, pp. 79 - 99, http://dx.doi.org/10.1007/s10589-014-9703-7
,2014, 'To shut them up or to clarify: Restraining the spread of rumors in online social networks', IEEE Transactions on Parallel and Distributed Systems, 25, pp. 3306 - 3316, http://dx.doi.org/10.1109/TPDS.2013.2297115
,2014, 'Are the popular users always important for information dissemination in online social networks?', IEEE Network, 28, pp. 64 - 67, http://dx.doi.org/10.1109/MNET.2014.6915441
,2013, 'On the Linear Convergence of a Proximal Gradient Method for a Class of Nonsmooth Convex Minimization Problems', Journal of the Operations Research Society of China, 1, pp. 163 - 186, http://dx.doi.org/10.1007/s40305-013-0015-x
,2012, 'An interior point trust region method for nonnegative matrix factorization', Neurocomputing, 97, pp. 309 - 316, http://dx.doi.org/10.1016/j.neucom.2012.05.008
,