Identifying propagation sources in networks: State-of-the-art and comparative studies J Jiang, S Wen, S Yu, Y Xiang, W Zhou IEEE Communications Surveys & Tutorials 19 (1), 465-481, 2016 | 131 | 2016 |
To shut them up or to clarify: Restraining the spread of rumors in online social networks S Wen, J Jiang, Y Xiang, S Yu, W Zhou, W Jia IEEE Transactions on Parallel and Distributed Systems 25 (12), 3306-3316, 2014 | 79 | 2014 |
Rumor source identification in social networks with time-varying topology J Jiang, S Wen, S Yu, Y Xiang, W Zhou IEEE Transactions on Dependable and Secure Computing 15 (1), 166-179, 2016 | 49 | 2016 |
On the linear convergence of a proximal gradient method for a class of nonsmooth convex minimization problems H Zhang, J Jiang, ZQ Luo Journal of the Operations Research Society of China 1 (2), 163-186, 2013 | 45 | 2013 |
K-center: An approach on the multi-source identification of information diffusion J Jiang, S Wen, S Yu, Y Xiang, W Zhou IEEE Transactions on Information Forensics and Security 10 (12), 2616-2626, 2015 | 34 | 2015 |
Identifying and monitoring the development trends of emerging technologies using patent analysis and Twitter data mining: The case of perovskite solar cell technology X Li, Q Xie, J Jiang, Y Zhou, L Huang Technological Forecasting and Social Change 146, 687-705, 2019 | 33 | 2019 |
Using epidemic betweenness to measure the influence of users in complex networks S Wen, J Jiang, B Liu, Y Xiang, W Zhou Journal of Network and Computer applications 78, 288-299, 2017 | 21 | 2017 |
Are the popular users always important for information dissemination in online social networks? S Wen, J Jiang, Y Xiang, S Yu, W Zhou IEEE Network 28 (5), 64-67, 2014 | 21 | 2014 |
A popularity-based cache consistency mechanism for information-centric networking B Feng, H Zhou, H Zhang, J Jiang, S Yu 2016 IEEE global communications conference (GLOBECOM), 1-6, 2016 | 15 | 2016 |
The structure of communities in scale‐free networks J Jiang, S Wen, S Yu, Y Xiang, W Zhou, H Hassan Concurrency and Computation: Practice and Experience 29 (14), e4040, 2017 | 11 | 2017 |
Mining accurate message formats for service APIs MA Hossain, S Versteeg, J Han, MA Kabir, J Jiang, JG Schneider 2018 IEEE 25th International Conference on Software Analysis, Evolution and …, 2018 | 9 | 2018 |
Malicious attack propagation and source identification J Jiang, S Wen, B Liu, S Yu, Y Xiang, W Zhou Springer International Publishing, 2019 | 6* | 2019 |
K-source: Multiple source selection for traffic offloading in mobile social networks B Liu, W Zhou, J Jiang, K Wang 2016 8th International Conference on Wireless Communications & Signal …, 2016 | 6 | 2016 |
Multiplicative update for projective nonnegative matrix factorization with bregman divergence J Jiang, H Zhang 2010 Third International Symposium on Information Processing, 233-237, 2010 | 4 | 2010 |
Sustainability analysis for fog nodes with renewable energy supplies J Jiang, L Gao, J Jin, TH Luan, S Yu, Y Xiang, S Garg IEEE Internet of Things Journal 6 (4), 6725-6735, 2019 | 3 | 2019 |
An interior point trust region method for nonnegative matrix factorization JJ Jiang, HB Zhanga, S Yu Neurocomputing 97, 309-316, 2012 | 3 | 2012 |
A positional keyword-based approach to inferring fine-grained message formats J Jiang, S Versteeg, J Han, MDA Hossain, JG Schneider Future Generation Computer Systems 102, 369-381, 2020 | 2 | 2020 |
P-gram: positional N-gram for the clustering of machine-generated messages J Jiang, S Versteeg, J Han, MA Hossain, JG Schneider, C Leckie, ... IEEE access 7, 88504-88516, 2019 | 2 | 2019 |
Smartvm: A multi-layer microservice-based platform for deploying saas X Zheng, J Jiang, Y Zhang, Y Deng, M Fu, T Zheng, X Liu 2017 IEEE International Symposium on Parallel and Distributed Processing …, 2017 | 2 | 2017 |
Studying the Global Spreading Influence and Local Connections of Users in Online Social Networks J Jiang, Y Qu, S Yu, W Zhou, W Wu 2016 IEEE International Conference on Computer and Information Technology …, 2016 | 2 | 2016 |