2021
DOI: 10.1109/tsmc.2019.2930908
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Control of Fraud Information Spreading in Mobile Social Networks

Abstract: He was the Founding Director of the Texas A&M Center for Information Security and Assurance. As an elected IEEE fellow, he has made significant contributions in distributed computing, realtime systems, computer networks, cyber security, and cyberphysical systems.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
28
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 60 publications
(29 citation statements)
references
References 44 publications
0
28
0
1
Order By: Relevance
“…indicates the weight of a tree is 1 in the DP model owing to only covering one keyword node [27]. Formula (2) indicates that T Pmin (v, K ′ ) is obtained by using the following two operations: tree growth operation (i.e., formulas (3) and 4) and tree merging operation (i.e., formulas (5) and 6). In Figure 6(a), tree growth operation generates new T Pmin (v, K ′ ) by adding new node u (i.e., one of v's neighbors) to T Pmin (v, K ′ ).…”
Section: Pr Keyword+pop Approachmentioning
confidence: 99%
See 1 more Smart Citation
“…indicates the weight of a tree is 1 in the DP model owing to only covering one keyword node [27]. Formula (2) indicates that T Pmin (v, K ′ ) is obtained by using the following two operations: tree growth operation (i.e., formulas (3) and 4) and tree merging operation (i.e., formulas (5) and 6). In Figure 6(a), tree growth operation generates new T Pmin (v, K ′ ) by adding new node u (i.e., one of v's neighbors) to T Pmin (v, K ′ ).…”
Section: Pr Keyword+pop Approachmentioning
confidence: 99%
“…e second phase is paper discovery [3]; the recommender system automatically identifies diverse sets of candidate papers. e third phase is paper selection [4,5]; the recommender system recommends candidate papers containing query keywords to users. Frankly, the returned papers may fail to satisfy users' requirements on deep and continuous research on a certain content or topic as these papers may belong to the variety of research domains.…”
Section: Introductionmentioning
confidence: 99%
“…It selects neighboring mobile devices dynamically as neighbor nodes to construct a communication path based on the "storage-save-forward" mechanism [12]. The widespread use of opportunistic networks and the rapid increase in information requires us to pay attention to the control of Fraud Information [13,14] and the spread of negative news [15].…”
Section: Introductionmentioning
confidence: 99%
“…The non-forwarding method means that the node does not directly accept any node message. Resource issues, security issues, and fraud of malicious nodes [18] in the network are the main causes of selfish behavior [19].…”
Section: Introductionmentioning
confidence: 99%