Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3)
  • Open Access

    ARTICLE

    Maximizing Influence in Temporal Social Networks: A Node Feature-Aware Voting Algorithm

    Wenlong Zhu1,2,*, Yu Miao1, Shuangshuang Yang3, Zuozheng Lian1,2, Lianhe Cui1

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3095-3117, 2023, DOI:10.32604/cmc.2023.045646

    Abstract Influence Maximization (IM) aims to select a seed set of size k in a social network so that information can be spread most widely under a specific information propagation model through this set of nodes. However, most existing studies on the IM problem focus on static social network features, while neglecting the features of temporal social networks. To bridge this gap, we focus on node features reflected by their historical interaction behavior in temporal social networks, i.e., interaction attributes and self-similarity, and incorporate them into the influence maximization algorithm and information propagation model. Firstly, we propose a node feature-aware voting… More >

  • Open Access

    ARTICLE

    Research on Detection Method of Interest Flooding Attack in Named Data Networking

    Yabin Xu1,2,*, Peiyuan Gu2, Xiaowei Xu3

    Intelligent Automation & Soft Computing, Vol.30, No.1, pp. 113-127, 2021, DOI:10.32604/iasc.2021.018895

    Abstract In order to effectively detect interest flooding attack (IFA) in Named Data Networking (NDN), this paper proposes a detection method of interest flooding attack based on chi-square test and similarity test. Firstly, it determines the detection window size based on the distribution of information name prefixes (that is information entropy) in the current network traffic. The attackers may append arbitrary random suffix to a certain prefix in the network traffic, and then send a large number of interest packets that cannot get the response. Targeted at this problem, the sensitivity of chi-square test is used to detect the change of… More >

  • Open Access

    ARTICLE

    An Enhanced Nonlocal Self-Similarity Technique for Fabric Defect Detection

    Boheng Wang1, Li Ma1, Jielin Jiang1,2,*

    Journal of Information Hiding and Privacy Protection, Vol.1, No.3, pp. 135-142, 2019, DOI:10.32604/jihpp.2019.07432

    Abstract Fabric defect detection has been an indispensable and important link in fabric production, many studies on the development of vision based automated inspection techniques have been reported. The main drawback of existing methods is that they can only inspect a particular type of fabric pattern in controlled environment. Recently, nonlocal self-similarity (NSS) based method is used for fabric defect detection. This method achieves good defect detection performance for small defects with uneven illumination, the disadvantage of NNS based method is poor for detecting linear defects. Based on this reason, we improve NSS based defect detection method by introducing a gray… More >

Displaying 1-10 on page 1 of 3. Per Page