You are here

Publications

Export 15 results:
[ Author(Asc)] Keyword Title Type Year
Filters: First Letter Of Last Name is H  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
H
Huang, H., B. Zhao, H. Zhao, Z. Zhuang, Z. Wang, X. Yao, X. Wang, H. Jin, and X. Fu, "A Cross-Platform Consumer Behavior Analysis of Large-Scale Mobile Shopping Data", Proceedings of the 2018 World Wide Web Conference on World Wide Web, {WWW} 2018, Lyon, France, April 23-27, 2018: {ACM}, pp. 1785–1794, 2018.
Huang, H., Y. Dong, J. Tang, H. Yang, N. V. Chawla, and X. Fu, "Will Triadic Closure Strengthen Ties in Social Networks?", ACM Transactions on Knowledge Discovery from Data (TKDD), vol. 12, issue 3, no. 3, pp. 30:1–30:25, 04/2018.
Huang, H., J. Tang, S. Wu, L. Liu, and X. Fu, "Mining triadic closure patterns in social networks", 23rd International World Wide Web Conference, {WWW} '14, Seoul, Republic of Korea, April 7-11, 2014, Companion Volume: {ACM}, pp. 499–504, 2014.
Huang, H., R. Shi, W. Zhou, X. Wang, H. Jin, and X. Fu, "Temporal Heterogeneous Information Network Embedding", The 30th International Joint Conference on Artificial Intelligence (IJCAI 2021), 08/2021.
Huang, H., J. Tang, L. Liu, J. Luo, and X. Fu, "Triadic Closure Pattern Analysis and Prediction in Social Networks", {IEEE} Trans. Knowl. Data Eng., vol. 27, no. 12, pp. 3374–3389, 2015.
Hou, B., S. Yang, F. A. Kuipers, L. Jiao, and X. Fu, "EAVS: Edge-assisted Adaptive Video Streaming with Fine-grained Serverless Pipelines", IEEE INFOCOM 2023, New York, USA, IEEE, 05/2023.
He, X., Q. Gong, Y. Chen, Y. Zhang, X. Wang, and X. Fu, "DatingSec: Detecting Malicious Accounts in Dating Apps Using a Content-Based Attention Network", IEEE Transactions on Dependable and Secure Computing, vol. 18, issue 5, pp. 2193-2208, 09/2021.
He, N., S. Yang, F. Li, S. Trajanovski, L. Zhu, Y. Wang, and X. Fu, "Leveraging Deep Reinforcement Learning with Attention Mechanism for Virtual Network Function Placement and Routing", IEEE Transactions on Parallel and Distributed Systems, vol. 34, issue 4, pp. 1186-1201, 04/2023.
He, J., X. Fu, Z. Tang, and H-H. Chen, "End-to-end versus hop-by-hop state refresh in soft state signaling protocols", {IEEE} Communications Letters, vol. 13, no. 4, pp. 268–270, 2009.
He, N., S. Yang, F. Li, S. Trajanovski, F. A. Kuipers, and X. Fu, "A-DDPG: Attention Mechanism-based Deep Reinforcement Learning for NFV", The 29th IEEE/ACM International Symposium on Quality of Service (IWQoS 2021), 06/2021.
Han, Z., H. Tan, S. Jiang, X. Fu, W. Cao, and F. C. M. Lau, "Scheduling Placement-Sensitive BSP Jobs with Inaccurate Execution Time Estimation", IEEE INFOCOM 2020, Beijing, China, IEEE, 07/2020.
Hameed, S., T. Kloht, and X. Fu, "iSATS: Leveraging Identity based Sender Authentication for Spam Mitigation", {SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications: SciTePress, pp. 408–411, 2012.
Hameed, S., A. Wolf, K. Zhu, and X. Fu, "Evaluation of Human Altruism Using a DTN-based Mobile Social Network Application", Informatik 2012, 42. Jahrestagung der Gesellschaft für Informatik e.V. (GI), 16.-21.09.2012, Braunschweig, Deutschland, vol. 208: {GI}, pp. 81–95, 2012.
Hameed, S., T. Kloht, and X. Fu, "Identity based email sender authentication for spam mitigation", Eighth International Conference on Digital Information Management {(ICDIM} 2013), Islamabad, Pakistan, September 10-12, 2013: {IEEE}, pp. 14–19, 2013.
Hameed, S., X. Fu, P. Hui, and N. R. Sastry, "LENS: Leveraging social networking and trust to prevent spam transmission", Proceedings of the 19th annual {IEEE} International Conference on Network Protocols, {ICNP} 2011, Vancouver, BC, Canada, October 17-20, 2011: {IEEE} Computer Society, pp. 13–18, 2011.