A survey on security and privacy issues of blockchain technology AP Joshi, M Han*, Y Wang Mathematical Foundations of Computing 1 (2), 121-147, 2018 | 121 | 2018 |
Influence maximization by probing partial communities in dynamic online social networks M Han, M Yan, Z Cai, Y Li, X Cai, J Yu Transactions on Emerging Telecommunications Technologies 28 (4), e3054, 2017 | 65 | 2017 |
An exploration of broader influence maximization in timeliness networks with opportunistic selection M Han, M Yan, Z Cai, Y Li Journal of Network and Computer Applications 63, 39-49, 2016 | 65 | 2016 |
Truthful incentive mechanisms for geographical position conflicting mobile crowdsensing systems J Li, Z Cai, J Wang, M Han, Y Li IEEE Transactions on Computational Social Systems 5 (2), 324-334, 2018 | 59 | 2018 |
Truthful incentive mechanisms for social cost minimization in mobile crowdsourcing systems Z Duan, M Yan, Z Cai, X Wang, M Han, Y Li Sensors 16 (4), 481, 2016 | 59 | 2016 |
Privacy reserved influence maximization in gps-enabled cyber-physical and online social networks M Han, J Li, Z Cai, Q Han 2016 IEEE International Conferences on Social Computing and Networking …, 2016 | 40 | 2016 |
Deep learning approach for cyberattack detection Y Zhou, M Han*, L Liu, JS He, Y Wang IEEE INFOCOM 2018-IEEE Conference on Computer Communications Workshops …, 2018 | 33 | 2018 |
Cognitive approach for location privacy protection M Han, L Li, Y Xie, J Wang, Z Duan, J Li, M Yan IEEE Access 6, 13466-13477, 2018 | 31 | 2018 |
Neighborhood-based uncertainty generation in social networks M Han, M Yan, J Li, S Ji, Y Li Journal of Combinatorial Optimization 28 (3), 561-576, 2014 | 31 | 2014 |
A novel blockchain-based education records verification solution M Han, Z Li, J He, D Wu, Y Xie, A Baba Proceedings of the 19th Annual SIG Conference on Information Technology …, 2018 | 29 | 2018 |
RAKING: An efficient K-maximal frequent pattern mining algorithm on uncertain graph database M Han, W Zhang, JZ Li Chinese Journal of Computers 33 (8), 1387-1395, 2010 | 27* | 2010 |
The roles of social network mavens H Albinali, M Han, J Wang, H Gao, Y Li 2016 12th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN …, 2016 | 24 | 2016 |
Privacy issues for transportation cyber physical systems M Han, Z Duan, Y Li Secure and Trustworthy Transportation Cyber-Physical Systems, 67-86, 2017 | 22 | 2017 |
LSTM Recurrent Neural Networks for Influenza Trends Prediction L Liu, M Han*, Y Zhou, Y Wang International Symposium on Bioinformatics Research and Applications, 259-264, 2018 | 21 | 2018 |
Maximising influence in sensed heterogeneous social network with privacy preservation M Han, Q Han, L Li, J Li, Y Li International Journal of Sensor Networks 28 (2), 69-79, 2018 | 20 | 2018 |
Time constraint influence maximization algorithm in the age of big data M Han, Z Duan, C Ai, FW Lybarger, Y Li, AG Bourgeois International Journal of Computational Science and Engineering 15 (3-4), 165-175, 2017 | 17 | 2017 |
Adversarial examples versus cloud-based detectors: A black-box empirical study X Li, S Ji, M Han, J Ji, Z Ren, Y Liu, C Wu IEEE Transactions on Dependable and Secure Computing, 2019 | 16 | 2019 |
Spreading social influence with both positive and negative opinions in online networks JS He, M Han, S Ji, T Du, Z Li Big Data Mining and Analytics 2 (2), 100-117, 2019 | 16 | 2019 |
Improving iot services in smart-home using blockchain smart contract Y Zhou, M Han, L Liu, Y Wang, Y Liang, L Tian 2018 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2018 | 16 | 2018 |
Data Aggregation Scheduling in Probabilistic Wireless Networks with Cognitive Radio Capability M Yan, M Han, C Ai, Z Cai, Y Li IEEE GLOBECOM 2016, 2016 | 15 | 2016 |