Author of the publication

Modeling and Analyzing the Interaction between Network Rumors and Authoritative Information.

, , , and . Entropy, 17 (1): 471-482 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Susceptible-Infected Model of Malware Propagation in the Internet., , , and . ICYCS, page 2771-2775. IEEE Computer Society, (2008)Two-Layer Carrier Index Modulation Scheme Based on Differential Chaos Shift Keying., , , and . IEEE Access, (2018)Reliability Analysis of Large-Scale Adaptive Weighted Networks., , , , , , and . IEEE Trans. Information Forensics and Security, (2020)Active fault-tolerant control approach design for rigid spacecraft with multiple actuator faults., , , , and . J. Systems & Control Engineering, (2018)Bas-relief Generation from Point Clouds Based on Normal Space Compression with Real-time Adjustment on CPU., , , , , , and . CoRR, (2019)Cooperative FPT-based spectrum sensing algorithm with decision fusion., , , , and . WCSP, page 1-5. IEEE, (2014)Asymptotic Solutions and Circuit Implementations of a Rayleigh Oscillator Including Cubic Fractional Damping Terms., , and . CSSP, 35 (6): 2041-2053 (2016)Robust spectrum sensing algorithm based on free probability theory., , , and . Wireless Communications and Mobile Computing, 16 (13): 1668-1679 (2016)Improving Both Quantity and Quality: Incentive Mechanism for Social Mobile Crowdsensing Architecture., , , , and . IEEE Access, (2018)Modeling and Experiment of Three-cavity Soft Manipulator., , , and . CCIS, page 1018-1022. IEEE, (2018)