An advertisement dissemination strategy with maximal influence for Internet-of-Vehicles
暂无分享,去创建一个
Yanfei Lu | Zihan Zhao | Bowu Zhang | Qinghe Gao | Bowu Zhang | Yanfei Lu | Qinghe Gao | Zihan Zhao
[1] John B. Kenney,et al. Dedicated Short-Range Communications (DSRC) Standards in the United States , 2011, Proceedings of the IEEE.
[2] Thang N. Dinh,et al. Cost-aware Targeted Viral Marketing in billion-scale networks , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.
[3] Xiaokui Xiao,et al. Influence maximization: near-optimal time complexity meets practical efficiency , 2014, SIGMOD Conference.
[4] Shangguang Wang,et al. An overview of Internet of Vehicles , 2014, China Communications.
[5] Shahid Mumtaz,et al. Social Big-Data-Based Content Dissemination in Internet of Vehicles , 2018, IEEE Transactions on Industrial Informatics.
[6] Lei Yang,et al. Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC , 2018, Wirel. Commun. Mob. Comput..
[7] P. Saxena,et al. Man-in-the-browser-cache: Persisting HTTPS attacks via browser cache poisoning , 2015, Comput. Secur..
[8] Éva Tardos,et al. Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..
[9] Xiang Li,et al. Why approximate when you can get the exact? Optimal targeted viral marketing at scale , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.
[10] Xiuzhen Cheng,et al. Jamming Strategies for Physical Layer Security , 2018, IEEE Wireless Communications.
[11] Mianxiong Dong,et al. Fog-Computing-Enabled Cognitive Network Function Virtualization for an Information-Centric Future Internet , 2019, IEEE Communications Magazine.
[12] Kate Ching-Ju Lin,et al. Cellular traffic offloading through community-based opportunistic dissemination , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).
[13] M. L. Fisher,et al. An analysis of approximations for maximizing submodular set functions—I , 1978, Math. Program..
[14] Wei Dong,et al. Coalition Game-Based Secure and Effective Clustering Communication in Vehicular Cyber-Physical System (VCPS) , 2017, Sensors.
[15] Yanfei Lu,et al. Re-ADP: Real-Time Data Aggregation with Adaptive ω-Event Differential Privacy for Fog Computing , 2018, Wirel. Commun. Mob. Comput..
[16] Shangguang Wang,et al. An overview of Internet of Vehicles , 2014 .
[17] Kai Wang,et al. Enabling Collaborative Edge Computing for Software Defined Vehicular Networks , 2018, IEEE Network.
[18] Zhao Zhang,et al. Viral marketing with positive influence , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.
[19] Ilsun You,et al. A Novel Utility Based Resource Management Scheme in Vehicular Social Edge Computing , 2018, IEEE Access.
[20] Xiaodong Lin,et al. SPRING: A Social-based Privacy-preserving Packet Forwarding Protocol for Vehicular Delay Tolerant Networks , 2009, 2010 Proceedings IEEE INFOCOM.
[21] Ke Zhang,et al. Mobile-Edge Computing for Vehicular Networks: A Promising Network Paradigm with Predictive Off-Loading , 2017, IEEE Veh. Technol. Mag..
[22] Jun Wu,et al. Making Knowledge Tradable in Edge-AI Enabled IoT: A Consortium Blockchain-Based Efficient and Incentive Approach , 2019, IEEE Transactions on Industrial Informatics.
[23] Michele Nogueira Lima,et al. Offloading cellular networks through V2V communications — How to select the seed-vehicles? , 2016, 2016 IEEE International Conference on Communications (ICC).
[24] Kim-Kwang Raymond Choo,et al. Fair Resource Allocation in an Intrusion-Detection System for Edge Computing: Ensuring the Security of Internet of Things Devices , 2018, IEEE Consumer Electronics Magazine.
[25] Wei Chen,et al. Scalable influence maximization for prevalent viral marketing in large-scale social networks , 2010, KDD.
[26] Wei Chen,et al. Efficient influence maximization in social networks , 2009, KDD.
[27] Zhen Li,et al. An optimal multiple stopping rule–based cooperative downloading scheme in vehicular cyber-physical systems , 2017, Int. J. Distributed Sens. Networks.
[28] Nan Cheng,et al. Cooperative vehicular content distribution in edge computing assisted 5G-VANET , 2018, China Communications.
[29] Donghyun Kim,et al. A New Comprehensive RSU Installation Strategy for Cost-Efficient VANET Deployment , 2017, IEEE Transactions on Vehicular Technology.
[30] Zhenkai Liang,et al. Detecting Malicious Behaviors in JavaScript Applications , 2018, IEEE Access.
[31] Chunqiang Hu,et al. LoDPD: A Location Difference-Based Proximity Detection Protocol for Fog Computing , 2017, IEEE Internet of Things Journal.
[32] Xin Fan,et al. A novel secure relay selection strategy for energy-harvesting-enabled Internet of things , 2018, EURASIP J. Wirel. Commun. Netw..
[33] Wei Zhou,et al. A coalition formation game based relay selection scheme for cooperative cognitive radio networks , 2017, Wirel. Networks.
[34] Christian Borgs,et al. Maximizing Social Influence in Nearly Optimal Time , 2012, SODA.
[35] Shengli Xie,et al. Blockchain for Secure and Efficient Data Sharing in Vehicular Edge Computing and Networks , 2019, IEEE Internet of Things Journal.
[36] Zhihong Zhou,et al. Understanding structure-based social network de-anonymization techniques via empirical analysis , 2018, EURASIP J. Wirel. Commun. Netw..
[37] Ondrej Rysavý,et al. Identification of Threats and Security Risk Assessments for Recursive Internet Architecture , 2018, IEEE Systems Journal.
[38] Laks V. S. Lakshmanan,et al. CELF++: optimizing the greedy algorithm for influence maximization in social networks , 2011, WWW.