Author of the publication

Influence maximization in social networks with user attitude modification.

, , , , , and . ICC, page 3913-3918. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Role-Based Access Control for Distributed Cooperation Environment., and . CIS (2), page 455-459. IEEE Computer Society, (2009)978-0-7695-3931-7.Formal Specification and Verification of Modular Security Policy Based on Colored Petri Nets., and . IEEE Trans. Dependable Sec. Comput., 8 (6): 852-865 (2011)Vision-Based Hand Gesture Recognition Using Combinational Features., , , , and . IIH-MSP, page 543-546. IEEE Computer Society, (2010)A Tree Regression-Based Approach for VM Power Metering., , , , and . IEEE Access, (2015)Channel assignment using block design in wireless mesh networks., , , and . Computer Communications, 32 (7-10): 1148-1153 (2009)Petri net modeling and deadlock analysis of parallel manufacturing processes with shared-resources., , and . Journal of Systems and Software, 83 (4): 675-688 (2010)Path Planning for Sensor Data Collection by Using UAVs., , and . MSN, page 199-205. IEEE, (2018)A Novel Image Encryption Scheme Using Josephus Permutation and Image Filtering., , and . CSS, volume 10581 of Lecture Notes in Computer Science, page 307-319. Springer, (2017)Dynamic Resource Provision for Cloud Broker with Multiple Reserved Instance Terms., , , , and . ICA3PP (1), volume 9528 of Lecture Notes in Computer Science, page 339-356. Springer, (2015)A technique for generating the reduced reachability graph of petri net models., , , and . SMC, page 3636-3641. IEEE, (2008)