Select Publications
Books
, 2019, Preface
Book Chapters
, 2025, 'DARA: Enhancing Vulnerability Alignment via Adaptive Reconstruction and Dual-Level Attention', in Lecture Notes in Computer Science, Springer Nature Singapore, pp. 265 - 284, http://dx.doi.org/10.1007/978-981-96-9101-2_14
, 2024, 'Influence Robustness of Nodes in Multiplex Networks Against Attacks', in , pp. 62 - 74, http://dx.doi.org/10.1007/978-3-031-53472-0_6
, 2019, 'Comparative study and numerical analysis', in Advances in Information Security, pp. 95 - 114, http://dx.doi.org/10.1007/978-3-030-02179-5_9
, 2019, 'Future directions and conclusion', in Advances in Information Security, pp. 179 - 181, http://dx.doi.org/10.1007/978-3-030-02179-5_13
, 2019, 'Identifying multiple propagation sources', in Advances in Information Security, pp. 139 - 157, http://dx.doi.org/10.1007/978-3-030-02179-5_11
, 2019, 'Identifying propagation source in large-scale networks', in Advances in Information Security, pp. 159 - 178, http://dx.doi.org/10.1007/978-3-030-02179-5_12
, 2019, 'Identifying propagation source in time-varying networks', in Advances in Information Security, pp. 117 - 137, http://dx.doi.org/10.1007/978-3-030-02179-5_10
, 2019, 'Malicious attack propagation and source identification', in Advances in Information Security, pp. 1 - 192, http://dx.doi.org/10.1007/978-3-030-02179-5_1
, 2019, 'Preliminary of identifying propagation sources', in Advances in Information Security, pp. 65 - 67, http://dx.doi.org/10.1007/978-3-030-02179-5_5
, 2019, 'Preliminary of modeling malicious attack propagation', in Advances in Information Security, pp. 11 - 19, http://dx.doi.org/10.1007/978-3-030-02179-5_2
, 2019, 'Restrain malicious attack propagation', in Advances in Information Security, pp. 41 - 62, http://dx.doi.org/10.1007/978-3-030-02179-5_4
, 2019, 'Source identification under complete observations: A maximum likelihood (ML) source estimator', in Advances in Information Security, pp. 69 - 77, http://dx.doi.org/10.1007/978-3-030-02179-5_6
, 2019, 'Source identification under sensor observations: A Gaussian source estimator', in Advances in Information Security, pp. 89 - 93, http://dx.doi.org/10.1007/978-3-030-02179-5_8
, 2019, 'Source identification under snapshots: A sample path based source estimator', in Advances in Information Security, pp. 79 - 87, http://dx.doi.org/10.1007/978-3-030-02179-5_7
, 2019, 'User influence in the propagation of malicious attacks', in Advances in Information Security, pp. 21 - 39, http://dx.doi.org/10.1007/978-3-030-02179-5_3
, 2019, 'Introduction', in Malicious Attack Propagation and Source Identification, Springer Nature, pp. 1 - 8, http://dx.doi.org/10.1007/978-3-030-02179-5_1
, 2009, 'Introduction', in Bowden B (ed.), Civilization; Critical Concepts in Political Science, Routledge, London and New York, pp. 1 - 18
Journal articles
, 2025, 'Can LLM-Generated Misinformation Be Detected: A Study On Cyber Threat Intelligence', Future generations computer systems, 173, pp. 107877 - 107877, http://dx.doi.org/10.1016/j.future.2025.107877
, 2025, 'LRNet: Link Residual Neural Network for Blood Vessel Segmentation in OCTA Images', JOURNAL OF IMAGING INFORMATICS IN MEDICINE, http://dx.doi.org/10.1007/s10278-024-01375-5
, 2024, 'Partial label learning via identifying outlier features', Knowledge Based Systems, 301, http://dx.doi.org/10.1016/j.knosys.2024.112278
, 2024, 'Dietary patterns and hepatocellular carcinoma risk: a systematic review and meta-analysis of cohort and case-control studies', NUTRITION & METABOLISM, 21, http://dx.doi.org/10.1186/s12986-024-00822-y
, 2024, 'Exploring Uncharted Waters of Website Fingerprinting', IEEE Transactions on Information Forensics and Security, 19, pp. 1840 - 1854, http://dx.doi.org/10.1109/TIFS.2023.3342607
, 2024, 'Privacy-Preserving Probabilistic Data Encoding for IoT Data Analysis', IEEE Transactions on Information Forensics and Security, 19, pp. 9173 - 9187, http://dx.doi.org/10.1109/TIFS.2024.3468150
, 2024, 'Investigating the potential of mineral precipitation in co-pyrolysis biochar: Development of a novel Cd (II) adsorption material utilizing dual solid waste', BIORESOURCE TECHNOLOGY, 402, http://dx.doi.org/10.1016/j.biortech.2024.130762
, 2024, 'Research advances on TIL therapy for colorectal cancer', CLINICAL & TRANSLATIONAL ONCOLOGY, 26, pp. 2917 - 2923, http://dx.doi.org/10.1007/s12094-024-03530-4
, 2023, 'An Improved Robust Sparse Convex Clustering', Tsinghua Science and Technology, 28, pp. 989 - 998, http://dx.doi.org/10.26599/TST.2022.9010046
, 2023, 'A tight bound of modified iterative hard thresholding algorithm for compressed sensing', Applications of Mathematics, 68, pp. 623 - 642, http://dx.doi.org/10.21136/AM.2023.0221-22
, 2023, 'Variational co-embedding learning for attributed network clustering', Knowledge Based Systems, 270, http://dx.doi.org/10.1016/j.knosys.2023.110530
, 2023, 'Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives', IEEE Communications Surveys and Tutorials, 25, pp. 1748 - 1774, http://dx.doi.org/10.1109/COMST.2023.3273282
, 2022, 'Robust cross-network node classification via constrained graph mutual information', Knowledge Based Systems, 257, http://dx.doi.org/10.1016/j.knosys.2022.109852
, 2022, 'Identifying potential breakthrough research: A machine learning method using scientific papers and Twitter data', Technological Forecasting and Social Change, 184, http://dx.doi.org/10.1016/j.techfore.2022.122042
, 2022, 'Pyrolysis of oil-based drill cuttings from shale gas field: Kinetic, thermodynamic, and product properties', FUEL, 323, http://dx.doi.org/10.1016/j.fuel.2022.124332
, 2022, 'Inferring data model from service interactions for response generation in service virtualization', Information and Software Technology, 145, http://dx.doi.org/10.1016/j.infsof.2021.106803
, 2022, 'Extracting Formats of Service Messages with Varying Payloads', ACM Transactions on Internet Technology, 22, http://dx.doi.org/10.1145/3503159
, 2022, 'Network Growth From Global and Local Influential Nodes', IEEE Transactions on Network Science and Engineering, http://dx.doi.org/10.1109/TNSE.2022.3165528
, 2022, 'Catalytic pyrolysis of oil-based drill cuttings over metal oxides: The product properties and environmental risk assessment of heavy metals in char', PROCESS SAFETY AND ENVIRONMENTAL PROTECTION, 159, pp. 354 - 361, http://dx.doi.org/10.1016/j.psep.2021.12.063
, 2021, 'R-gram: Inferring message formats of service protocols with relative positional n-grams', Journal of Network and Computer Applications, 196, http://dx.doi.org/10.1016/j.jnca.2021.103247
, 2021, 'Effects of different functional strains on key metabolic pathways of methanogenesis in the domestic waste fermentation reactor', BIOMASS & BIOENERGY, 146, http://dx.doi.org/10.1016/j.biombioe.2021.105995
, 2021, 'The improvement of pore characteristics, remediation efficiency, and biotoxicity of petroleum-contaminated soil with the addition of bulking agent on field-scale biopile treatment', JOURNAL OF SOILS AND SEDIMENTS, 21, pp. 2855 - 2864, http://dx.doi.org/10.1007/s11368-021-02992-1
, 2021, 'The Method of Classifying Fog Level of Outdoor Video Images Based on Convolutional Neural Networks', JOURNAL OF THE INDIAN SOCIETY OF REMOTE SENSING, 49, pp. 2261 - 2271, http://dx.doi.org/10.1007/s12524-021-01387-6
, 2020, 'A positional keyword-based approach to inferring fine-grained message formats', Future Generation Computer Systems, 102, pp. 369 - 381, http://dx.doi.org/10.1016/j.future.2019.08.011
, 2020, 'Analysis and Insights for Myths Circulating on Twitter during the COVID-19 Pandemic', IEEE Open Journal of the Computer Society, 1, pp. 209 - 219, http://dx.doi.org/10.1109/OJCS.2020.3028573
, 2019, 'Identifying and monitoring the development trends of emerging technologies using patent analysis and Twitter data mining: The case of perovskite solar cell technology', Technological Forecasting and Social Change, 146, pp. 687 - 705, http://dx.doi.org/10.1016/j.techfore.2018.06.004
, 2019, 'Sustainability Analysis for Fog Nodes with Renewable Energy Supplies', IEEE Internet of Things Journal, 6, pp. 6725 - 6735, http://dx.doi.org/10.1109/JIOT.2019.2910875
, 2019, 'P-Gram: Positional N-Gram for the Clustering of Machine-Generated Messages', IEEE Access, 7, pp. 88504 - 88516, http://dx.doi.org/10.1109/ACCESS.2019.2924928
, 2018, 'Rumor Source Identification in Social Networks with Time-Varying Topology', IEEE Transactions on Dependable and Secure Computing, 15, pp. 166 - 179, http://dx.doi.org/10.1109/TDSC.2016.2522436
, 2017, 'The structure of communities in scale-free networks', Concurrency and Computation Practice and Experience, 29, http://dx.doi.org/10.1002/cpe.4040
, 2017, 'Using epidemic betweenness to measure the influence of users in complex networks', Journal of Network and Computer Applications, 78, pp. 288 - 299, http://dx.doi.org/10.1016/j.jnca.2016.10.018
, 2017, 'Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies', IEEE Communications Surveys and Tutorials, 19, pp. 465 - 481, http://dx.doi.org/10.1109/COMST.2016.2615098