Mobile QR Code QR CODE

REFERENCES

1 
W. Yan, Q. Liu, R. Chen, and M. Zhang, ``Favoritism or equality: Difference analysis of users’ utilization of academic social networks for top research corporations,'' Online Information Review, Vol. 45, no. 1, pp. 240-260, 2020.DOI
2 
G. Anand, S. Srivastava, and A. Shandilya, ``Recurrent neural networks in predicting the popularity of online social networks content: A review,'' ECS Transactions, Vol. 107, no. 1, pp. 19991-20003, 2022.DOI
3 
C. Wang, H. Zhu, and B. Yang, ``Composite behavioral modeling for identity theft detection in online social networks,'' IEEE Transactions on Computational Social Systems, Vol. 9, no. 2, pp. 428-439, 2022.DOI
4 
Y. Liu, J. Wang, H. He, G. Huang, and W. Shi, ``Identifying important nodes affecting network security in complex networks,'' International Journal of Distributed Sensor Networks, Vol. 17, no. 2, pp. 1560-1571, 2021.DOI
5 
Halevy, C. Canton-Ferrer, H. Ma, U. Ozertem, P. Pantel, and M. Saeidi, ``Preserving integrity in online social networks,'' Communications of the ACM, Vol. 65, no. 2, pp. 92-98, 2022.DOI
6 
Tian, and W.-K.-V. Chan, ``Spatial-temporal attention wavenet: A deep learning framework for traffic prediction considering spatial-temporal dependencies,'' IET Intelligent Transport Systems, Vol. 15, no. 4, pp. 549-561, 2021.DOI
7 
Z. Yu, ``Evaluation of node importance and invulnerability simulation analysis in complex load- network,'' Neurocomputing, Vol. 416, no. 11, pp. 158-164, 2020.DOI
8 
C. Yang, Z. Kaibo, and J. Liu, ``SuperGraph: Spatial-temporal graph-based feature extraction for rotating machinery diagnosis,'' IEEE Transactions on Industrial Electronics, Vol. 69, no. 4, pp. 4167-4176, 2021.DOI
9 
Q. An, and Y. Shen, ``On the information coupling and propagation of visual 3D perception in vehicular networks with position uncertainty,'' IEEE Transactions on Vehicular Technology, Vol. 70, no. 12, pp. 13325-13339, 2021.DOI
10 
S. Kumar, M. Saini, M. Goel, and B.-S. Panda, ``Modeling information diffusion in online social networks using a modified forest-fire model,'' Journal of Intelligent Information Systems, Vol. 56, no. 2, pp. 355-377, 2020.DOI
11 
S.-S. Singh, K. Singh, A. Kumar, and B. Biswas, ``ACO-IM: Maximizing influence in social networks using ant colony optimization,'' Soft Computing: Fundamentals and Applications, Vol. 24, no. 13, pp. 10181-10203, 2020.DOI
12 
F. Wang, J.-H. She, O. Yasuhiro, W.-J. Jiang, G.-Y. Min, G.-J. Wang, and M. Wu, ``Maximizing positive influence in competitive social networks: A trust-based solution,'' Information Sciences, Vol. 546, no. 1, pp. 559-572, 2021.DOI
13 
M.-A. Uddin, J.-B. Joolee, and Y.-K. Lee, ``Depression level prediction using deep spatiotemporal features and multilayer Bi-LTSM,'' IEEE Transactions on Affective Computing, Vol. 13, no. 2, pp. 864-870, 2020.DOI
14 
R. Casarin, M. Iacopini, G. Molina, E.-T. Horst, and R. Rigobon, ``Multilayer network analysis of oil linkages,'' Econometrics Journal, Vol. 23, no. 2, pp. 269-296, 2020.DOI
15 
Z. Fang, X. Zhang, T. Cao, Y. Zheng, and M. Sun, ``Spatial-temporal slowfast graph convolutional network for skeleton-based action recognition,'' IET Computer Vision, Vol. 16, no. 3, pp. 205-217, 2021.DOI
16 
Ghasemi, and A. Ahmadi, ``Cache management in content delivery networks using the metadata of online social networks,'' Computer Communications, Vol. 189, no. 5, pp. 11-17, 2022.DOI
17 
S. Thabit, Y. Lianshan, Y. Tao, and A.-B. Abdullah, ``Trust management and data protection for online social networks,'' IET Communications, Vol. 16, no. 12, pp. 1355-1368, 2022.DOI
18 
F. Yi, M. Huo, J. Li, and J. Yu, ``Time‐series transcriptomics reveals a drought‐responsive temporal network and crosstalk between drought stress and the circadian clock in foxtail millet,'' The Plant Journal, Vol. 110, no. 4, pp. 1213-1228, 2022.DOI
19 
C. Tong, L. Zhang, H. Li, and Y. Ding, ``Temporal inception convolutional network based on multi-head attention for ultra-short-term load forecasting,'' IET Generation, Transmission & Distribution, Vol. 16, no. 8, pp. 1680-1696, 2022.DOI
20 
X. Wang, M. Cheng, J. Eaton, C.-J. Hsieh, and F. Wu, ``Fake node attacks on graph convolutional networks,'' Journal of Computational and Cognitive Engineering, Vol. 1, no. 4, pp. 165-173, 2022.DOI