Author of the publication

Limiting the Influence to Vulnerable Users in Social Networks: A Ratio Perspective.

, , , and . AINA, volume 926 of Advances in Intelligent Systems and Computing, page 1106-1122. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

String Sanitization: A Combinatorial Approach., , , , , , , and . CoRR, (2019)Limiting the Influence to Vulnerable Users in Social Networks: A Ratio Perspective., , , and . AINA, volume 926 of Advances in Intelligent Systems and Computing, page 1106-1122. Springer, (2019)The Analysis of County Science and Technology Worker Internet Usage and Its Influence Factors., , , and . CCTA (2), volume 420 of IFIP Advances in Information and Communication Technology, page 434-443. Springer, (2013)An Integrated Approach for Mining Meta-rules., , , , , and . MLDM, volume 3587 of Lecture Notes in Computer Science, page 549-557. Springer, (2005)Differentially Private String Sanitization for Frequency-Based Mining Tasks., , , , , and . ICDM, page 41-50. IEEE, (2021)Multi-objective cost-sensitive attribute reduction., , , and . IFSA/NAFIPS, page 1377-1381. IEEE, (2013)