A survey of IoT applications in blockchain systems: Architecture, consensus, and traffic modeling

L Lao, Z Li, S Hou, B **ao, S Guo, Y Yang - ACM Computing Surveys …, 2020 - dl.acm.org
Blockchain technology can be extensively applied in diverse services, including online
micro-payments, supply chain tracking, digital forensics, health-care record sharing, and …

Source detection of rumor in social network–a review

S Shelke, V Attar - Online Social Networks and Media, 2019 - Elsevier
The ubiquity of handheld devices provides straightforward access to the Internet and Social
networking. The quick and easy updates from social networks help users in many situations …

Software vulnerability detection using deep neural networks: a survey

G Lin, S Wen, QL Han, J Zhang… - Proceedings of the …, 2020 - ieeexplore.ieee.org
The constantly increasing number of disclosed security vulnerabilities have become an
important concern in the software industry and in the field of cybersecurity, suggesting that …

A rapid source localization method in the early stage of large-scale network propagation

Z Wang, D Hou, C Gao, J Huang, Q Xuan - Proceedings of the ACM web …, 2022 - dl.acm.org
Recently, the rapid diffusion of malicious information in online social networks causes great
harm to our society. Therefore, it is of great significance to localize diffusion sources as early …

A computational approach for examining the roots and spreading patterns of fake news: Evolution tree analysis

SM Jang, T Geng, JYQ Li, R **a, CT Huang… - Computers in Human …, 2018 - Elsevier
To improve the flow of quality information and combat fake news on social media, it is
essential to identify the origins and evolution patterns of false information. However …

A survey on security issues in services communication of Microservices‐enabled fog applications

D Yu, Y **, Y Zhang, X Zheng - Concurrency and Computation …, 2019 - Wiley Online Library
Fog computing is used as a popular extension of cloud computing for a variety of emerging
applications. To incorporate various design choices and customized policies in fog …

Multiple rumor source detection with graph convolutional networks

M Dong, B Zheng, N Quoc Viet Hung, H Su… - Proceedings of the 28th …, 2019 - dl.acm.org
Detecting rumor source in social networks is one of the key issues for defeating rumors
automatically. Although many efforts have been devoted to defeating online rumors, most of …

Locating multi-sources in social networks with a low infection rate

P Zhu, L Cheng, C Gao, Z Wang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
With the development of modern technology, numerous economic losses are incurred by
various spreading phenomena. Thus, it is of great significance to identify the initial sources …

Source localization of graph diffusion via variational autoencoders for graph inverse problems

C Ling, J Jiang, J Wang, Z Liang - Proceedings of the 28th ACM SIGKDD …, 2022 - dl.acm.org
Graph diffusion problems such as the propagation of rumors, computer viruses, or smart grid
failures are ubiquitous and societal. Hence it is usually crucial to identify diffusion sources …

Countering misinformation: A multidisciplinary approach

KT Gradoń, JA Hołyst, WR Moy… - Big Data & …, 2021 - journals.sagepub.com
The article explores the concept of infodemics during the COVID-19 pandemic, focusing on
the propagation of false or inaccurate information proliferating worldwide throughout the …