You are here
Publications
Export 15 results:
[ Author] Keyword Title Type Year Filters: First Letter Of Last Name is H [Clear All Filters]
"A Cross-Platform Consumer Behavior Analysis of Large-Scale Mobile Shopping Data",
Proceedings of the 2018 World Wide Web Conference on World Wide Web, {WWW} 2018, Lyon, France, April 23-27, 2018: {ACM}, pp. 1785–1794, 2018.
"Will Triadic Closure Strengthen Ties in Social Networks?",
ACM Transactions on Knowledge Discovery from Data (TKDD), vol. 12, issue 3, no. 3, pp. 30:1–30:25, 04/2018.
"Mining triadic closure patterns in social networks",
23rd International World Wide Web Conference, {WWW} '14, Seoul, Republic of Korea, April 7-11, 2014, Companion Volume: {ACM}, pp. 499–504, 2014.
"Temporal Heterogeneous Information Network Embedding",
The 30th International Joint Conference on Artificial Intelligence (IJCAI 2021), 08/2021.
"Triadic Closure Pattern Analysis and Prediction in Social Networks",
{IEEE} Trans. Knowl. Data Eng., vol. 27, no. 12, pp. 3374–3389, 2015.
"EAVS: Edge-assisted Adaptive Video Streaming with Fine-grained Serverless Pipelines",
IEEE INFOCOM 2023, New York, USA, IEEE, 05/2023.
"DatingSec: Detecting Malicious Accounts in Dating Apps Using a Content-Based Attention Network",
IEEE Transactions on Dependable and Secure Computing, vol. 18, issue 5, pp. 2193-2208, 09/2021.
"Leveraging Deep Reinforcement Learning with Attention Mechanism for Virtual Network Function Placement and Routing",
IEEE Transactions on Parallel and Distributed Systems, vol. 34, issue 4, pp. 1186-1201, 04/2023.
"End-to-end versus hop-by-hop state refresh in soft state signaling protocols",
{IEEE} Communications Letters, vol. 13, no. 4, pp. 268–270, 2009.
"A-DDPG: Attention Mechanism-based Deep Reinforcement Learning for NFV",
The 29th IEEE/ACM International Symposium on Quality of Service (IWQoS 2021), 06/2021.
"Scheduling Placement-Sensitive BSP Jobs with Inaccurate Execution Time Estimation",
IEEE INFOCOM 2020, Beijing, China, IEEE, 07/2020.
"iSATS: Leveraging Identity based Sender Authentication for Spam Mitigation",
{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications: SciTePress, pp. 408–411, 2012.
"Evaluation of Human Altruism Using a DTN-based Mobile Social Network Application",
Informatik 2012, 42. Jahrestagung der Gesellschaft für Informatik e.V. (GI), 16.-21.09.2012, Braunschweig, Deutschland, vol. 208: {GI}, pp. 81–95, 2012.
"Identity based email sender authentication for spam mitigation",
Eighth International Conference on Digital Information Management {(ICDIM} 2013), Islamabad, Pakistan, September 10-12, 2013: {IEEE}, pp. 14–19, 2013.
"LENS: Leveraging social networking and trust to prevent spam transmission",
Proceedings of the 19th annual {IEEE} International Conference on Network Protocols, {ICNP} 2011, Vancouver, BC, Canada, October 17-20, 2011: {IEEE} Computer Society, pp. 13–18, 2011.