Year |
Citation |
Score |
2020 |
Xu K, Wang F, Wang H, Wang Y, Zhang Y. Mitigating the Impact of Data Sampling on Social Media Analysis and Mining Ieee Transactions On Computational Social Systems. 7: 546-555. DOI: 10.1109/Tcss.2020.2970602 |
0.353 |
|
2020 |
Lei K, Fang J, Zhang Q, Lou J, Du M, Huang J, Wang J, Xu K. Blockchain-Based Cache Poisoning Security Protection and Privacy-Aware Access Control in NDN Vehicular Edge Computing Networks Journal of Grid Computing. 1-21. DOI: 10.1007/S10723-020-09531-1 |
0.404 |
|
2020 |
Wang H, Wang F, Xu K. Modeling Information Diffusion in Online Social Networks with Partial Differential Equations Arxiv: Social and Information Networks. DOI: 10.1007/978-3-030-38852-2 |
0.351 |
|
2019 |
Xu K, Wan Y, Xue G. Powering Smart Homes with Information-Centric Networking Ieee Communications Magazine. 57: 40-46. DOI: 10.1109/Mcom.2019.1800732 |
0.373 |
|
2019 |
Lei K, Zhang Q, Lou J, Bai B, Xu K. Securing ICN-Based UAV Ad Hoc Networks with Blockchain Ieee Communications Magazine. 57: 26-32. DOI: 10.1109/Mcom.2019.1800722 |
0.421 |
|
2018 |
Lei K, Zhong S, Zhu F, Xu K, Zhang H. An NDN IoT Content Distribution Model With Network Coding Enhanced Forwarding Strategy for 5G Ieee Transactions On Industrial Informatics. 14: 2725-2735. DOI: 10.1109/Tii.2017.2781372 |
0.356 |
|
2018 |
Wang F, Orton K, Wagenseller P, Xu K. Towards Understanding Community Interests With Topic Modeling Ieee Access. 6: 24660-24668. DOI: 10.1109/Access.2018.2815904 |
0.3 |
|
2018 |
Lei K, Liu Y, Zhong S, Liu Y, Xu K, Shen Y, Yang M. Understanding User Behavior in Sina Weibo Online Social Network: A Community Approach Ieee Access. 6: 13302-13316. DOI: 10.1109/Access.2018.2808158 |
0.337 |
|
2016 |
Wang F, Wang H, Xu K, Raymond R, Chon J, Fuller S, Debruyn A. Regional Level Influenza Study with Geo-Tagged Twitter Data. Journal of Medical Systems. 40: 189. PMID 27372953 DOI: 10.1007/S10916-016-0545-Y |
0.307 |
|
2016 |
Zhu H, Xu K, Lu X. Guest editorial: Special issue on algorithms, systems and applications in mobile social networks Peer-to-Peer Networking and Applications. 1-3. DOI: 10.1007/S12083-016-0459-Y |
0.374 |
|
2016 |
Cheng X, Kutylowski M, Xu K, Zhu H. Cyber security, crime, and forensics of wireless networks and applications Security and Communication Networks. 9: 3763-3764. DOI: 10.1002/Sec.1646 |
0.359 |
|
2016 |
Xu K, Wang F, Jia X. Secure the Internet, one home at a time Security and Communication Networks. 9: 3821-3832. DOI: 10.1002/Sec.1569 |
0.388 |
|
2015 |
Zhong L, Chen XF, Zhang ZL, Wang Z, Shi XZ, Xu K, Zhang YW, Xu H, Bu G. DAP12 Stabilizes the C-terminal Fragment of the Triggering Receptor Expressed on Myeloid Cells-2 (TREM2) and Protects against LPS-induced Pro-inflammatory Response. The Journal of Biological Chemistry. 290: 15866-77. PMID 25957402 DOI: 10.1074/Jbc.M115.645986 |
0.356 |
|
2015 |
Dai G, Ma R, Wang H, Wang F, Xu K. Partial differential equations with Robin boundary condition in online social networks Discrete and Continuous Dynamical Systems - Series B. 20: 1609-1624. DOI: 10.3934/Dcdsb.2015.20.1609 |
0.34 |
|
2015 |
Cheng X, Kutyłowski M, Xu K, Zhu H. Special issue on cyber security, crime, and forensics of wireless networks and applications Security and Communication Networks. 8: 3300-3300. DOI: 10.1002/Sec.1370 |
0.358 |
|
2014 |
Xu K, Wang F, Gu L. Behavior analysis of internet traffic via bipartite graphs and one-mode projections Ieee Acm Transactions On Networking. 22: 931-942. DOI: 10.1109/Tnet.2013.2264634 |
0.357 |
|
2012 |
Zhang W, Wu W, Wang F, Xu K. Positive influence dominating sets in power-law graphs Social Network Analysis and Mining. 2: 31-37. DOI: 10.1007/S13278-011-0033-9 |
0.328 |
|
2012 |
Xu K, Wang F, Wang H. Lightweight and informative traffic metrics for data center monitoring Journal of Network and Systems Management. 20: 226-243. DOI: 10.1007/S10922-011-9200-6 |
0.41 |
|
2011 |
Jing ZC, Yu ZX, Shen JY, Wu BX, Xu KF, Zhu XY, Pan L, Zhang ZL, Liu XQ, Zhang YS, Jiang X, Galiè N. Vardenafil in pulmonary arterial hypertension: a randomized, double-blind, placebo-controlled study. American Journal of Respiratory and Critical Care Medicine. 183: 1723-9. PMID 21471085 DOI: 10.1164/rccm.201101-0093OC |
0.359 |
|
2011 |
Wang F, Du H, Camacho E, Xu K, Lee W, Shi Y, Shan S. On positive influence dominating sets in social networks Theoretical Computer Science. 412: 265-269. DOI: 10.1016/J.Tcs.2009.10.001 |
0.344 |
|
2010 |
Xu K, Wang F, Bhattacharyya S, Zhang Z. Real-time behaviour profiling for network monitoring International Journal of Internet Protocol Technology. 5: 65-80. DOI: 10.1504/Ijipt.2010.032616 |
0.54 |
|
2010 |
Xu K, Chandrashekar J, Zhang Z. Principal component analysis of BGP update streams Journal of Communications and Networks. 12: 191-197. DOI: 10.1109/Jcn.2010.6391376 |
0.525 |
|
2008 |
Xu K, Zhang Z, Bhattacharyya S. Internet traffic behavior profiling for network security monitoring Ieee Acm Transactions On Networking. 16: 1241-1252. DOI: 10.1109/Tnet.2007.911438 |
0.547 |
|
2007 |
Wang F, Xu K, Thai MT, Du DZ. Fault tolerant topology control for one-to-all communications in symmetric wireless networks International Journal of Sensor Networks. 2: 163-168. DOI: 10.1504/Ijsnet.2007.013196 |
0.358 |
|
2007 |
Duan Z, Chandrashekar J, Krasky J, Xu K, Zhang Z. Damping BGP route flaps Journal of Communications and Networks. 9: 490-498. DOI: 10.1109/Jcn.2007.6182885 |
0.639 |
|
2004 |
Xu K, Duan Z, Zhang Z, Chandrashekar J. On Properties of Internet Exchange Points and Their Impact on AS Topology and Relationship Lecture Notes in Computer Science. 284-295. DOI: 10.1007/978-3-540-24693-0_24 |
0.625 |
|
2003 |
Jin GW, Yang CH, Xu KX, Xu ZR, Li SC, Chen J, Zhang JX, Zhang ZL. [Acoustic analysis of the voice restored by using a tracheoesophageal slit-like fistula]. Zhonghua Er Bi Yan Hou Ke Za Zhi. 38: 225-8. PMID 14515786 |
0.381 |
|
Show low-probability matches. |