Meng Han
Meng Han
Data-driven Intelligence Research (DIR) Lab
Geverifieerd e-mailadres voor - Homepage
Geciteerd door
Geciteerd door
A survey on security and privacy issues of blockchain technology
AP Joshi, M Han*, Y Wang
Mathematical Foundations of Computing 1 (2), 121-147, 2018
Influence maximization by probing partial communities in dynamic online social networks
M Han, M Yan, Z Cai, Y Li, X Cai, J Yu
Transactions on Emerging Telecommunications Technologies 28 (4), e3054, 2017
An exploration of broader influence maximization in timeliness networks with opportunistic selection
M Han, M Yan, Z Cai, Y Li
Journal of Network and Computer Applications 63, 39-49, 2016
Truthful incentive mechanisms for geographical position conflicting mobile crowdsensing systems
J Li, Z Cai, J Wang, M Han, Y Li
IEEE Transactions on Computational Social Systems 5 (2), 324-334, 2018
Truthful incentive mechanisms for social cost minimization in mobile crowdsourcing systems
Z Duan, M Yan, Z Cai, X Wang, M Han, Y Li
Sensors 16 (4), 481, 2016
Privacy reserved influence maximization in gps-enabled cyber-physical and online social networks
M Han, J Li, Z Cai, Q Han
2016 IEEE International Conferences on Social Computing and Networking …, 2016
Deep learning approach for cyberattack detection
Y Zhou, M Han*, L Liu, JS He, Y Wang
IEEE INFOCOM 2018-IEEE Conference on Computer Communications Workshops …, 2018
Cognitive approach for location privacy protection
M Han, L Li, Y Xie, J Wang, Z Duan, J Li, M Yan
IEEE Access 6, 13466-13477, 2018
Neighborhood-based uncertainty generation in social networks
M Han, M Yan, J Li, S Ji, Y Li
Journal of Combinatorial Optimization 28 (3), 561-576, 2014
A novel blockchain-based education records verification solution
M Han, Z Li, J He, D Wu, Y Xie, A Baba
Proceedings of the 19th Annual SIG Conference on Information Technology …, 2018
RAKING: An efficient K-maximal frequent pattern mining algorithm on uncertain graph database
M Han, W Zhang, JZ Li
Chinese Journal of Computers 33 (8), 1387-1395, 2010
The roles of social network mavens
H Albinali, M Han, J Wang, H Gao, Y Li
2016 12th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN …, 2016
Privacy issues for transportation cyber physical systems
M Han, Z Duan, Y Li
Secure and Trustworthy Transportation Cyber-Physical Systems, 67-86, 2017
LSTM Recurrent Neural Networks for Influenza Trends Prediction
L Liu, M Han*, Y Zhou, Y Wang
International Symposium on Bioinformatics Research and Applications, 259-264, 2018
Maximising influence in sensed heterogeneous social network with privacy preservation
M Han, Q Han, L Li, J Li, Y Li
International Journal of Sensor Networks 28 (2), 69-79, 2018
Time constraint influence maximization algorithm in the age of big data
M Han, Z Duan, C Ai, FW Lybarger, Y Li, AG Bourgeois
International Journal of Computational Science and Engineering 15 (3-4), 165-175, 2017
Adversarial examples versus cloud-based detectors: A black-box empirical study
X Li, S Ji, M Han, J Ji, Z Ren, Y Liu, C Wu
IEEE Transactions on Dependable and Secure Computing, 2019
Spreading social influence with both positive and negative opinions in online networks
JS He, M Han, S Ji, T Du, Z Li
Big Data Mining and Analytics 2 (2), 100-117, 2019
Improving iot services in smart-home using blockchain smart contract
Y Zhou, M Han, L Liu, Y Wang, Y Liang, L Tian
2018 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2018
Data Aggregation Scheduling in Probabilistic Wireless Networks with Cognitive Radio Capability
M Yan, M Han, C Ai, Z Cai, Y Li
IEEE GLOBECOM 2016, 2016
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20