default search action
Jiaojiao Jiang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Jinyao Ma, Jiaojiao Jiang, Wei Bao, Haibin Zhang:
Partial label learning via identifying outlier features. Knowl. Based Syst. 301: 112278 (2024) - [j22]Ishan Karunanayake, Jiaojiao Jiang, Nadeem Ahmed, Sanjay K. Jha:
Exploring Uncharted Waters of Website Fingerprinting. IEEE Trans. Inf. Forensics Secur. 19: 1840-1854 (2024) - [j21]Zakia Zaman, Wanli Xue, Praveen Gauravaram, Wen Hu, Jiaojiao Jiang, Sanjay K. Jha:
Privacy-Preserving Probabilistic Data Encoding for IoT Data Analysis. IEEE Trans. Inf. Forensics Secur. 19: 9173-9187 (2024) - [c15]Ya-Ting Chang, Zhibo Hu, Xiaoyu Li, Shuiqiao Yang, Jiaojiao Jiang, Nan Sun:
DiHAN: A Novel Dynamic Hierarchical Graph Attention Network for Fake News Detection. CIKM 2024: 197-206 - [c14]Hao Ren, Jiaojiao Jiang:
LayerPlexRank: Exploring Node Centrality and Layer Influence through Algebraic Connectivity in Multiplex Networks. CIKM 2024: 4010-4014 - [c13]Marium Malik, Jiaojiao Jiang, Yang Song, Sanjay Jha:
MFVIEW: Multi-modal Fake News Detection with View-Specific Information Extraction. ECIR (3) 2024: 345-353 - [i5]Hao Ren, Jiaojiao Jiang:
LayerPlexRank: Exploring Node Centrality and Layer Influence through Algebraic Connectivity in Multiplex Networks. CoRR abs/2405.05576 (2024) - 2023
- [j20]Nan Sun, Ming Ding, Jiaojiao Jiang, Weikang Xu, Xiaoxing Mo, Yonghang Tai, Jun Zhang:
Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives. IEEE Commun. Surv. Tutorials 25(3): 1748-1774 (2023) - [j19]Shuiqiao Yang, Sunny Verma, Borui Cai, Jiaojiao Jiang, Kun Yu, Fang Chen, Shui Yu:
Variational co-embedding learning for attributed network clustering. Knowl. Based Syst. 270: 110530 (2023) - [c12]Boqian Ma, Hao Ren, Jiaojiao Jiang:
Influence Robustness of Nodes in Multiplex Networks Against Attacks. COMPLEX NETWORKS (3) 2023: 62-74 - [i4]Boqian Ma, Hao Ren, Jiaojiao Jiang:
Influence Robustness of Nodes in Multiplex Networks against Attacks. CoRR abs/2309.07617 (2023) - 2022
- [j18]Md. Arafat Hossain, Jiaojiao Jiang, Jun Han, Muhammad Ashad Kabir, Jean-Guy Schneider, Chengfei Liu:
Inferring data model from service interactions for response generation in service virtualization. Inf. Softw. Technol. 145: 106803 (2022) - [j17]Shuiqiao Yang, Borui Cai, Taotao Cai, Xiangyu Song, Jiaojiao Jiang, Bing Li, Jianxin Li:
Robust cross-network node classification via constrained graph mutual information. Knowl. Based Syst. 257: 109852 (2022) - [j16]Jiaojiao Jiang, Shuiqiao Yang, Sanjay Jha:
Network Growth From Global and Local Influential Nodes. IEEE Trans. Netw. Sci. Eng. 9(4): 2549-2561 (2022) - [j15]Md. Arafat Hossain, Jun Han, Jean-Guy Schneider, Jiaojiao Jiang, Muhammad Ashad Kabir, Steve Versteeg:
Extracting Formats of Service Messages with Varying Payloads. ACM Trans. Internet Techn. 22(3): 71:1-71:31 (2022) - [c11]Danni Qu, Qi Chen, Jiahui Wang, Jiaojiao Jiang, Zhen Wang:
The Effect of Source Location on the Effectiveness of Source Detection in Finite Networks. ICC 2022: 4104-4113 - [i3]Jin Ho Go, Alina Sari, Jiaojiao Jiang, Shuiqiao Yang, Sanjay K. Jha:
Fake News Quick Detection on Dynamic Heterogeneous Information Networks. CoRR abs/2205.07039 (2022) - 2021
- [j14]Jiaojiao Jiang, Jean-Guy Schneider, Steve Versteeg, Jun Han, Md. Arafat Hossain, Chengfei Liu:
R-gram: Inferring message formats of service protocols with relative positional n-grams. J. Netw. Comput. Appl. 196: 103247 (2021) - [i2]Jiaojiao Jiang, Sanjay Jha:
Network Growth From Global and Local Influential Nodes. CoRR abs/2103.00487 (2021) - [i1]Shuiqiao Yang, Sunny Verma, Borui Cai, Jiaojiao Jiang, Kun Yu, Fang Chen, Shui Yu:
Variational Co-embedding Learning for Attributed Network Clustering. CoRR abs/2104.07295 (2021) - 2020
- [j13]Jiaojiao Jiang, Steve Versteeg, Jun Han, Md. Arafat Hossain, Jean-Guy Schneider:
A positional keyword-based approach to inferring fine-grained message formats. Future Gener. Comput. Syst. 102: 369-381 (2020) - [j12]Shuiqiao Yang, Jiaojiao Jiang, Arindam Pal, Kun Yu, Fang Chen, Shui Yu:
Analysis and Insights for Myths Circulating on Twitter During the COVID-19 Pandemic. IEEE Open J. Comput. Soc. 1: 209-219 (2020)
2010 – 2019
- 2019
- [b1]Jiaojiao Jiang, Sheng Wen, Shui Yu, Bo Liu, Yang Xiang, Wanlei Zhou:
Malicious Attack Propagation and Source Identification. Advances in Information Security 73, Springer 2019, ISBN 978-3-030-02178-8, pp. 1-181 - [j11]Jiaojiao Jiang, Steve Versteeg, Jun Han, Md. Arafat Hossain, Jean-Guy Schneider, Christopher Leckie, Zeinab Farahmandpour:
P-Gram: Positional N-Gram for the Clustering of Machine-Generated Messages. IEEE Access 7: 88504-88516 (2019) - [j10]Jiaojiao Jiang, Longxiang Gao, Jiong Jin, Tom H. Luan, Shui Yu, Yong Xiang, Saurabh Kumar Garg:
Sustainability Analysis for Fog Nodes With Renewable Energy Supplies. IEEE Internet Things J. 6(4): 6725-6735 (2019) - 2018
- [j9]Jiao Jiao Jiang, Sheng Wen, Shui Yu, Yang Xiang, Wanlei Zhou:
Rumor Source Identification in Social Networks with Time-Varying Topology. IEEE Trans. Dependable Secur. Comput. 15(1): 166-179 (2018) - [c10]Md. Arafat Hossain, Steve Versteeg, Jun Han, Muhammad Ashad Kabir, Jiaojiao Jiang, Jean-Guy Schneider:
Mining accurate message formats for service APIs. SANER 2018: 266-276 - 2017
- [j8]Jiaojiao Jiang, Sheng Wen, Shui Yu, Yang Xiang, Wanlei Zhou:
Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies. IEEE Commun. Surv. Tutorials 19(1): 465-481 (2017) - [j7]Jiao Jiao Jiang, Sheng Wen, Shui Yu, Yang Xiang, Wanlei Zhou, Houcine Hassan:
The structure of communities in scale-free networks. Concurr. Comput. Pract. Exp. 29(14) (2017) - [j6]Sheng Wen, Jiao Jiao Jiang, Bo Liu, Yang Xiang, Wanlei Zhou:
Using epidemic betweenness to measure the influence of users in complex networks. J. Netw. Comput. Appl. 78: 288-299 (2017) - [c9]Jiao Jiao Jiang, Longxiang Gao, Shui Yu, Jiong Jin, Dongfeng Yuan:
Preferential attachment and the spreading influence of users in online social networks. ICCC 2017: 1-6 - [c8]Xi Zheng, Jiaojiao Jiang, Yuqun Zhang, Yao Deng, Min Fu, Tianlei Zheng, Xiao Liu:
SmartVM: A Multi-Layer Microservice-Based Platform for Deploying SaaS. ISPA/IUCC 2017: 470-474 - [c7]Jiaojiao Jiang, Longxiang Gao, Jiong Jin, Tom H. Luan, Shui Yu, Dong Yuan, Yong Xiang, Dongfeng Yuan:
Towards an Analysis of Traffic Shaping and Policing in Fog Networks Using Stochastic Fluid Models. MobiQuitous 2017: 196-204 - 2016
- [c6]Jiao Jiao Jiang, Youyang Qu, Shui Yu, Wanlei Zhou, Wei Wu:
Studying the Global Spreading Influence and Local Connections of Users in Online Social Networks. CIT 2016: 431-435 - [c5]Bohao Feng, Huachun Zhou, Hongke Zhang, Jiao Jiao Jiang, Shui Yu:
A Popularity-Based Cache Consistency Mechanism for Information-Centric Networking. GLOBECOM 2016: 1-6 - [c4]Jiao Jiao Jiang, Sheng Wen, Shui Yu, Wanlei Zhou, Yi Qian:
Analysis of the Spreading Influence Variations for Online Social Users under Attacks. GLOBECOM 2016: 1-6 - [c3]Bo Liu, Wanlei Zhou, Jiao Jiao Jiang, Kun Wang:
K-Source: Multiple source selection for traffic offloading in mobile social networks. WCSP 2016: 1-5 - 2015
- [j5]Hai-Bin Zhang, Jiao-Jiao Jiang, Yun-Bin Zhao:
On the proximal Landweber Newton method for a class of nonsmooth convex problems. Comput. Optim. Appl. 61(1): 79-99 (2015) - [j4]Jiao Jiao Jiang, Sheng Wen, Shui Yu, Yang Xiang, Wanlei Zhou:
K-Center: An Approach on the Multi-Source Identification of Information Diffusion. IEEE Trans. Inf. Forensics Secur. 10(12): 2616-2626 (2015) - [c2]Sheng Wen, Jiaojiao Jiang, Kasra Majbouri Yazdi, Yang Xiang, Wanlei Zhou:
The Relation Between Local and Global Influence of Individuals in Scale-Free Networks. SocialSec 2015: 80-84 - [c1]Jiao Jiao Jiang, Andi Zhou, Kasra Majbouri Yazdi, Sheng Wen, Shui Yu, Yang Xiang:
Identifying Diffusion Sources in Large Networks: A Community Structure Based Approach. TrustCom/BigDataSE/ISPA (1) 2015: 302-309 - 2014
- [j3]Sheng Wen, Jiao Jiao Jiang, Yang Xiang, Shui Yu, Wanlei Zhou:
Are the popular users always important for information dissemination in online social networks? IEEE Netw. 28(5): 64-67 (2014) - [j2]Sheng Wen, Jiao Jiao Jiang, Yang Xiang, Shui Yu, Wanlei Zhou, Weijia Jia:
To Shut Them Up or to Clarify: Restraining the Spread of Rumors in Online Social Networks. IEEE Trans. Parallel Distributed Syst. 25(12): 3306-3316 (2014) - 2012
- [j1]Jiao Jiao Jiang, Haibin Zhang, Shui Yu:
An interior point trust region method for nonnegative matrix factorization. Neurocomputing 97: 309-316 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 20:39 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint