暂无分享,去创建一个
[1] F. Chung,et al. Complex Graphs and Networks , 2006 .
[2] Éva Tardos,et al. Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..
[3] Hans J. Herrmann,et al. Mitigation of malicious attacks on networks , 2011, Proceedings of the National Academy of Sciences.
[4] H. Chernoff. A Note on an Inequality Involving the Normal Distribution , 1981 .
[5] Duncan J Watts,et al. A simple model of global cascades on random networks , 2002, Proceedings of the National Academy of Sciences of the United States of America.
[6] David A. Huffman,et al. A method for the construction of minimum-redundancy codes , 1952, Proceedings of the IRE.
[7] C. Causer. The Art of War , 2011, IEEE Potentials.
[8] Luca Trevisan,et al. Multi-way spectral partitioning and higher-order cheeger inequalities , 2011, STOC '12.
[9] Angsheng Li,et al. Structural Information and Dynamical Complexity of Networks , 2016, IEEE Transactions on Information Theory.
[10] Paulo Shakarian,et al. Finding Near-Optimal Groups of Epidemic Spreaders in a Complex Network , 2014, PloS one.
[11] Adilson E Motter. Cascade control and defense in complex networks. , 2004, Physical review letters.
[12] Alessandro Vespignani,et al. Epidemic spreading in scale-free networks. , 2000, Physical review letters.
[13] P. Kaye. Infectious diseases of humans: Dynamics and control , 1993 .
[14] Abhijit Sarkar,et al. Two-peak and three-peak optimal complex networks. , 2004, Physical review letters.
[15] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[16] Albert-László Barabási,et al. Scale-Free Networks: A Decade and Beyond , 2009, Science.
[17] Wei Zhang,et al. Strategies for network security , 2014, Science China Information Sciences.
[18] Claude E. Shannon,et al. The lattice theory of information , 1953, Trans. IRE Prof. Group Inf. Theory.
[19] S. Havlin,et al. Optimization of network robustness to waves of targeted and random attacks. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.
[20] P. Erdos,et al. On the evolution of random graphs , 1984 .
[21] Angsheng Li,et al. Resistance and Security Index of Networks: Structural Information Perspective of Network Security , 2016, Scientific Reports.
[22] Angsheng Li,et al. Discovering natural communities in networks , 2015 .
[23] Frederick P. Brooks,et al. Three great challenges for half-century-old computer science , 2003, JACM.
[24] Albert,et al. Emergence of scaling in random networks , 1999, Science.
[25] Angsheng Li,et al. Resistance maximization principle for defending networks against virus attack , 2017 .
[26] Massimo Marchiori,et al. Error and attacktolerance of complex network s , 2004 .
[27] David D. Jensen,et al. Navigating networks by using homophily and degree , 2008, Proceedings of the National Academy of Sciences.
[28] Éva Tardos,et al. Influential Nodes in a Diffusion Model for Social Networks , 2005, ICALP.
[29] Angsheng Li,et al. A Theory of Network Security: Principles of Natural Selection and Combinatorics , 2016, Internet Math..
[30] Reuven Cohen,et al. Efficient immunization strategies for computer networks and populations. , 2002, Physical review letters.