Jiaojiao Jiang
Cited by
Cited by
Identifying propagation sources in networks: State-of-the-art and comparative studies
J Jiang, S Wen, S Yu, Y Xiang, W Zhou
IEEE Communications Surveys & Tutorials 19 (1), 465-481, 2016
To shut them up or to clarify: Restraining the spread of rumors in online social networks
S Wen, J Jiang, Y Xiang, S Yu, W Zhou, W Jia
IEEE Transactions on Parallel and Distributed Systems 25 (12), 3306-3316, 2014
Rumor source identification in social networks with time-varying topology
J Jiang, S Wen, S Yu, Y Xiang, W Zhou
IEEE Transactions on Dependable and Secure Computing 15 (1), 166-179, 2016
Identifying and monitoring the development trends of emerging technologies using patent analysis and Twitter data mining: The case of perovskite solar cell technology
X Li, Q Xie, J Jiang, Y Zhou, L Huang
Technological Forecasting and Social Change 146, 687-705, 2019
On the linear convergence of a proximal gradient method for a class of nonsmooth convex minimization problems
H Zhang, J Jiang, ZQ Luo
Journal of the Operations Research Society of China 1 (2), 163-186, 2013
K-center: An approach on the multi-source identification of information diffusion
J Jiang, S Wen, S Yu, Y Xiang, W Zhou
IEEE Transactions on Information Forensics and Security 10 (12), 2616-2626, 2015
Using epidemic betweenness to measure the influence of users in complex networks
S Wen, J Jiang, B Liu, Y Xiang, W Zhou
Journal of Network and Computer Applications 78, 288-299, 2017
Are the popular users always important for information dissemination in online social networks?
S Wen, J Jiang, Y Xiang, S Yu, W Zhou
IEEE Network 28 (5), 64-67, 2014
A popularity-based cache consistency mechanism for information-centric networking
B Feng, H Zhou, H Zhang, J Jiang, S Yu
2016 IEEE global communications conference (GLOBECOM), 1-6, 2016
The structure of communities in scale‐free networks
J Jiang, S Wen, S Yu, Y Xiang, W Zhou, H Hassan
Concurrency and Computation: Practice and Experience 29 (14), e4040, 2017
Mining accurate message formats for service APIs
MA Hossain, S Versteeg, J Han, MA Kabir, J Jiang, JG Schneider
2018 IEEE 25th International Conference on Software Analysis, Evolution and …, 2018
Analysis and insights for myths circulating on Twitter during the COVID-19 pandemic
S Yang, J Jiang, A Pal, K Yu, F Chen, S Yu
IEEE Open Journal of the Computer Society 1, 209-219, 2020
Malicious attack propagation and source identification
J Jiang, S Wen, B Liu, S Yu, Y Xiang, W Zhou
Springer International Publishing, 2019
P-gram: positional N-gram for the clustering of machine-generated messages
J Jiang, S Versteeg, J Han, MA Hossain, JG Schneider, C Leckie, ...
IEEE access 7, 88504-88516, 2019
Sustainability analysis for fog nodes with renewable energy supplies
J Jiang, L Gao, J Jin, TH Luan, S Yu, Y Xiang, S Garg
IEEE Internet of Things Journal 6 (4), 6725-6735, 2019
K-source: Multiple source selection for traffic offloading in mobile social networks
B Liu, W Zhou, J Jiang, K Wang
2016 8th International Conference on Wireless Communications & Signal …, 2016
A positional keyword-based approach to inferring fine-grained message formats
J Jiang, S Versteeg, J Han, MDA Hossain, JG Schneider
Future Generation Computer Systems 102, 369-381, 2020
Multiplicative update for projective nonnegative matrix factorization with bregman divergence
J Jiang, H Zhang
2010 Third International Symposium on Information Processing, 233-237, 2010
An interior point trust region method for nonnegative matrix factorization
JJ Jiang, HB Zhanga, S Yu
Neurocomputing 97, 309-316, 2012
Smartvm: A multi-layer microservice-based platform for deploying saas
X Zheng, J Jiang, Y Zhang, Y Deng, M Fu, T Zheng, X Liu
2017 IEEE International Symposium on Parallel and Distributed Processing …, 2017
The system can't perform the operation now. Try again later.
Articles 1–20