2019
|
Hou, Qixuan; Han, Meng Incorporating Content Beyond Text: A High Reliable Twitter-Based Disaster Information System Conference International Conference on Computational Data and Social Networks, 2019. Tags: Information System, NLP @conference{hou2019incorporating,
title = {Incorporating Content Beyond Text: A High Reliable Twitter-Based Disaster Information System},
author = {Qixuan Hou and Meng Han},
year = {2019},
date = {2019-11-18},
booktitle = {International Conference on Computational Data and Social Networks},
pages = {282-292},
keywords = {Information System, NLP},
pubstate = {published},
tppubtype = {conference}
}
|
Desai, Shreya; Han, Meng; Li, Lei; Li, Zhigang; He, Jing Selena; Xu, Xiaohua Untampered Electronic Voting in Entertainment Industry: A Blockchain-based Implementation Conference Proceedings of the 20th Annual SIG Conference on Information Technology Education, 2019. Tags: Blockchain @conference{desai2019untampered,
title = {Untampered Electronic Voting in Entertainment Industry: A Blockchain-based Implementation},
author = {Shreya Desai and Meng Han and Lei Li and Zhigang Li and Jing Selena He and Xiaohua Xu},
year = {2019},
date = {2019-09-26},
booktitle = {Proceedings of the 20th Annual SIG Conference on Information Technology Education},
pages = {166-166},
keywords = {Blockchain},
pubstate = {published},
tppubtype = {conference}
}
|
Li, Zhigang; Tian, Xin; Li, Lei; Yang, Ming; Han, Meng Practice What You Preach-Building a Capstone Management System as Undergraduate IT Capstone Projects Conference Proceedings of the 20th Annual SIG Conference on Information Technology Education, 2019. Tags: Capstone @conference{li2019practice,
title = {Practice What You Preach-Building a Capstone Management System as Undergraduate IT Capstone Projects},
author = {Zhigang Li and Xin Tian and Lei Li and Ming Yang and Meng Han},
year = {2019},
date = {2019-09-26},
booktitle = {Proceedings of the 20th Annual SIG Conference on Information Technology Education},
pages = {126-131},
keywords = {Capstone},
pubstate = {published},
tppubtype = {conference}
}
|
Li, Xurong; Ji, Shouling; Han, Meng; Ji, Juntao; Ren, Zhenyu; Liu, Yushan; Wu, Chunming Adversarial Examples versus Cloud-based Detectors: A Black-box Empirical Study Journal Article arXiv preprint arXiv:1901.01223, 2019. Tags: Security @article{li2019adversarial,
title = {Adversarial Examples versus Cloud-based Detectors: A Black-box Empirical Study},
author = {Xurong Li and Shouling Ji and Meng Han and Juntao Ji and Zhenyu Ren and Yushan Liu and Chunming Wu},
year = {2019},
date = {2019-01-01},
journal = {arXiv preprint arXiv:1901.01223},
keywords = {Security},
pubstate = {published},
tppubtype = {article}
}
|
He, Jing S; Han, Meng; Ji, Shouling; Du, Tianyu; Li, Zhao Spreading social influence with both positive and negative opinions in online networks Journal Article Big Data Mining and Analytics, 2 (2), pp. 100–117, 2019. Tags: Deep learning, NLP @article{he2019spreading,
title = {Spreading social influence with both positive and negative opinions in online networks},
author = {Jing S He and Meng Han and Shouling Ji and Tianyu Du and Zhao Li},
year = {2019},
date = {2019-01-01},
journal = {Big Data Mining and Analytics},
volume = {2},
number = {2},
pages = {100--117},
publisher = {TUP},
keywords = {Deep learning, NLP},
pubstate = {published},
tppubtype = {article}
}
|
Vyas, Jhanvi Devangbhai; Han, Meng Understanding the Mobile Game App Activity Conference Proceedings of the 2019 ACM Southeast Conference, ACM 2019. Tags: App, Game @conference{vyas2019understanding,
title = {Understanding the Mobile Game App Activity},
author = {Jhanvi Devangbhai Vyas and Meng Han},
year = {2019},
date = {2019-01-01},
booktitle = {Proceedings of the 2019 ACM Southeast Conference},
pages = {206--209},
organization = {ACM},
keywords = {App, Game},
pubstate = {published},
tppubtype = {conference}
}
|
Cho, Erin; Han, Meng AI Powered Book Recommendation System Conference Proceedings of the 2019 ACM Southeast Conference, ACM 2019. Tags: Deep learning, Machine learning @conference{cho2019ai,
title = {AI Powered Book Recommendation System},
author = {Erin Cho and Meng Han},
year = {2019},
date = {2019-01-01},
booktitle = {Proceedings of the 2019 ACM Southeast Conference},
pages = {230--232},
organization = {ACM},
keywords = {Deep learning, Machine learning},
pubstate = {published},
tppubtype = {conference}
}
|
Desai, Shreya; Han, Meng Social Media Content Analytics beyond the Text: A Case Study of University Branding in Instagram Conference Proceedings of the 2019 ACM Southeast Conference, ACM 2019. Tags: NLP @conference{desai2019social,
title = {Social Media Content Analytics beyond the Text: A Case Study of University Branding in Instagram},
author = {Shreya Desai and Meng Han},
year = {2019},
date = {2019-01-01},
booktitle = {Proceedings of the 2019 ACM Southeast Conference},
pages = {94--101},
organization = {ACM},
keywords = {NLP},
pubstate = {published},
tppubtype = {conference}
}
|
Liu, Liyuan; Han, Meng; Zhou, Yiyun; Parizi, Reza M E2C-Chain: A Two-stage Incentive Education Employment and Skill Certification Blockchain Conference The 2nd IEEE International Conference on Blockchain (Blockchain-2019), 2019. Tags: Blockchain @conference{liu2019e2c,
title = {E2C-Chain: A Two-stage Incentive Education Employment and Skill Certification Blockchain},
author = {Liyuan Liu and Meng Han and Yiyun Zhou and Reza M Parizi},
year = {2019},
date = {2019-01-01},
booktitle = {The 2nd IEEE International Conference on Blockchain (Blockchain-2019)},
keywords = {Blockchain},
pubstate = {published},
tppubtype = {conference}
}
|
Han, Meng; Li, Zhigang; He, Jing Selena; Tian, Xin Shirley Understand the Emerging Demands of Computing Education for Non-CS Major Students Conference Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019. Tags: Education @conference{han2019understand,
title = {Understand the Emerging Demands of Computing Education for Non-CS Major Students},
author = {Meng Han and Zhigang Li and Jing Selena He and Xin Shirley Tian},
year = {2019},
date = {2019-01-01},
booktitle = {Proceedings of the 50th ACM Technical Symposium on Computer Science Education},
pages = {1266--1266},
keywords = {Education},
pubstate = {published},
tppubtype = {conference}
}
|
2018
|
Han, Meng; Wang, Jinbao; Yan, Mingyuan; Ai, Chuyu; Duan, Zhuojun; Hong, Zhen Near-complete privacy protection: cognitive optimal strategy in location-based services Journal Article Procedia Computer Science, 129 , pp. 298–304, 2018. Tags: Security @article{han2018near,
title = {Near-complete privacy protection: cognitive optimal strategy in location-based services},
author = {Meng Han and Jinbao Wang and Mingyuan Yan and Chuyu Ai and Zhuojun Duan and Zhen Hong},
year = {2018},
date = {2018-01-01},
journal = {Procedia Computer Science},
volume = {129},
pages = {298--304},
publisher = {Elsevier},
keywords = {Security},
pubstate = {published},
tppubtype = {article}
}
|
Zhou, Yiyun; Han, Meng; Liu, Liyuan; Wang, Yan; Liang, Yi; Tian, Ling Improving IoT Services in Smart-Home Using Blockchain Smart Contract Conference 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), IEEE 2018. Tags: Blockchain, IoT @conference{zhou2018improving,
title = {Improving IoT Services in Smart-Home Using Blockchain Smart Contract},
author = {Yiyun Zhou and Meng Han and Liyuan Liu and Yan Wang and Yi Liang and Ling Tian},
year = {2018},
date = {2018-01-01},
booktitle = {2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)},
pages = {81--87},
organization = {IEEE},
keywords = {Blockchain, IoT},
pubstate = {published},
tppubtype = {conference}
}
|
Joshi, Archana Prashanth; Han*, Meng; Wang, Yan A survey on security and privacy issues of blockchain technology Journal Article Mathematical Foundations of Computing, 1 (2), pp. 121–147, 2018. Tags: Blockchain, Security @article{joshi2018survey,
title = {A survey on security and privacy issues of blockchain technology},
author = {Archana Prashanth Joshi and Meng Han* and Yan Wang},
year = {2018},
date = {2018-01-01},
journal = {Mathematical Foundations of Computing},
volume = {1},
number = {2},
pages = {121--147},
keywords = {Blockchain, Security},
pubstate = {published},
tppubtype = {article}
}
|
Liu, Liyuan; Han, Meng; Wang, Yan; Zhou, Yiyun Understanding Data Breach: A Visualization Aspect Conference International Conference on Wireless Algorithms, Systems, and Applications, Springer, Cham 2018. Tags: Data Breach, Security @conference{liu2018understanding,
title = {Understanding Data Breach: A Visualization Aspect},
author = {Liyuan Liu and Meng Han and Yan Wang and Yiyun Zhou},
year = {2018},
date = {2018-01-01},
booktitle = {International Conference on Wireless Algorithms, Systems, and Applications},
pages = {883--892},
organization = {Springer, Cham},
keywords = {Data Breach, Security},
pubstate = {published},
tppubtype = {conference}
}
|
Liu, Liyuan; Han*, Meng; Zhou, Yiyun; Wang, Yan LSTM Recurrent Neural Networks for Influenza Trends Prediction Conference International Symposium on Bioinformatics Research and Applications, Springer, Cham 2018. Tags: Deep learning @conference{liu2018lstm,
title = {LSTM Recurrent Neural Networks for Influenza Trends Prediction},
author = {Liyuan Liu and Meng Han* and Yiyun Zhou and Yan Wang},
year = {2018},
date = {2018-01-01},
booktitle = {International Symposium on Bioinformatics Research and Applications},
pages = {259--264},
organization = {Springer, Cham},
keywords = {Deep learning},
pubstate = {published},
tppubtype = {conference}
}
|
Zhou, Yiyun; Han*, Meng; Liu, Liyuan; He, Jing Selena; Wang, Yan Deep learning approach for cyberattack detection Conference IEEE INFOCOM 2018-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), IEEE 2018. Tags: Deep learning, Security @conference{zhou2018deep,
title = {Deep learning approach for cyberattack detection},
author = {Yiyun Zhou and Meng Han* and Liyuan Liu and Jing Selena He and Yan Wang},
year = {2018},
date = {2018-01-01},
booktitle = {IEEE INFOCOM 2018-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)},
organization = {IEEE},
keywords = {Deep learning, Security},
pubstate = {published},
tppubtype = {conference}
}
|
Han, Meng; Li, Yingshu Influence analysis: A survey of the state-of-the-art Journal Article Mathematical Foundations of Computing, 1 (3), pp. 201–253, 2018. Tags: Influence analysis @article{han2018influence,
title = {Influence analysis: A survey of the state-of-the-art},
author = {Meng Han and Yingshu Li},
year = {2018},
date = {2018-01-01},
journal = {Mathematical Foundations of Computing},
volume = {1},
number = {3},
pages = {201--253},
keywords = {Influence analysis},
pubstate = {published},
tppubtype = {article}
}
|
Li, Lei; Guo, Rong; Han, Meng On-Demand Virtual Lectures: Promoting Active Learning in Distance Learning Conference Proceedings of the 2nd International Conference on E-Education, E-Business and E-Technology, ACM 2018. Tags: Education, Interactive Learning @conference{li2018demand,
title = {On-Demand Virtual Lectures: Promoting Active Learning in Distance Learning},
author = {Lei Li and Rong Guo and Meng Han},
year = {2018},
date = {2018-01-01},
booktitle = {Proceedings of the 2nd International Conference on E-Education, E-Business and E-Technology},
pages = {1--5},
organization = {ACM},
keywords = {Education, Interactive Learning},
pubstate = {published},
tppubtype = {conference}
}
|
He, Jing Selena; Han, Meng; Bobbie, Patrick O An Energy-efficient Secure Adaptive Cloud-of-Things (CoT) Framework to Facilitate Undergraduate STEM Education Conference Proceedings of the 19th Annual SIG Conference on Information Technology Education, International World Wide Web Conferences Steering Committee 2018. Tags: Cloud-of-Things @conference{he2018energy,
title = {An Energy-efficient Secure Adaptive Cloud-of-Things (CoT) Framework to Facilitate Undergraduate STEM Education},
author = {Jing Selena He and Meng Han and Patrick O Bobbie},
year = {2018},
date = {2018-01-01},
booktitle = {Proceedings of the 19th Annual SIG Conference on Information Technology Education},
pages = {123--128},
organization = {International World Wide Web Conferences Steering Committee},
keywords = {Cloud-of-Things},
pubstate = {published},
tppubtype = {conference}
}
|
Han, Meng; Li, Zhigang; He, Jing Selena; Wu, Dalei; Xie, Ying; Baba, Asif A Novel Blockchain-based Education Records Verification Solution Conference Proceedings of the 19th Annual SIG Conference on Information Technology Education, International World Wide Web Conferences Steering Committee 2018. Tags: Blockchain @conference{han2018novel,
title = {A Novel Blockchain-based Education Records Verification Solution},
author = {Meng Han and Zhigang Li and Jing Selena He and Dalei Wu and Ying Xie and Asif Baba},
year = {2018},
date = {2018-01-01},
booktitle = {Proceedings of the 19th Annual SIG Conference on Information Technology Education},
pages = {178--183},
organization = {International World Wide Web Conferences Steering Committee},
keywords = {Blockchain},
pubstate = {published},
tppubtype = {conference}
}
|
Lu, Yunmei; Yan, Mingyuan; Han, Meng; Yang, Qingliang; Zhang, Yanqing Privacy Preserving Multiclass Classification for Horizontally Distributed Data Conference Proceedings of the 19th Annual SIG Conference on Information Technology Education, International World Wide Web Conferences Steering Committee 2018. Tags: Machine learning @conference{lu2018privacy,
title = {Privacy Preserving Multiclass Classification for Horizontally Distributed Data},
author = {Yunmei Lu and Mingyuan Yan and Meng Han and Qingliang Yang and Yanqing Zhang},
year = {2018},
date = {2018-01-01},
booktitle = {Proceedings of the 19th Annual SIG Conference on Information Technology Education},
pages = {165--165},
organization = {International World Wide Web Conferences Steering Committee},
keywords = {Machine learning},
pubstate = {published},
tppubtype = {conference}
}
|
Han, Meng; Miao, Dongjing; Wang, Jinbao; Liu, Liyuan Defend the Clique-based Attack for Data Privacy Conference International Conference on Combinatorial Optimization and Applications, Springer, Cham 2018. Tags: Security @conference{han2018defend,
title = {Defend the Clique-based Attack for Data Privacy},
author = {Meng Han and Dongjing Miao and Jinbao Wang and Liyuan Liu},
year = {2018},
date = {2018-01-01},
booktitle = {International Conference on Combinatorial Optimization and Applications},
pages = {262--280},
organization = {Springer, Cham},
keywords = {Security},
pubstate = {published},
tppubtype = {conference}
}
|
Lu, Yunmei; Yan, Mingyuan; Han, Meng; Yang, Qingliang; Zhang, Yanqing Privacy preserving feature selection and Multiclass Classification for horizontally distributed data Journal Article Mathematical Foundations of Computing, 1 (4), pp. 331–348, 2018. Tags: Machine learning @article{lu2018privacyb,
title = {Privacy preserving feature selection and Multiclass Classification for horizontally distributed data},
author = {Yunmei Lu and Mingyuan Yan and Meng Han and Qingliang Yang and Yanqing Zhang},
year = {2018},
date = {2018-01-01},
journal = {Mathematical Foundations of Computing},
volume = {1},
number = {4},
pages = {331--348},
keywords = {Machine learning},
pubstate = {published},
tppubtype = {article}
}
|
Han, Meng; Li, Lei; Xie, Ying; Wang, Jinbao; Duan, Zhuojun; Li, Ji; Yan, Mingyuan Cognitive approach for location privacy protection Journal Article IEEE Access, 6 , pp. 13466–13477, 2018. Tags: Security @article{han2018cognitive,
title = {Cognitive approach for location privacy protection},
author = {Meng Han and Lei Li and Ying Xie and Jinbao Wang and Zhuojun Duan and Ji Li and Mingyuan Yan},
year = {2018},
date = {2018-01-01},
journal = {IEEE Access},
volume = {6},
pages = {13466--13477},
publisher = {IEEE},
keywords = {Security},
pubstate = {published},
tppubtype = {article}
}
|
Linda, Vu; Xie, Ying; Han, Meng Designing Visually Interactive Learning Modules to Promote Students’ Critical Thinking in Mathematics Conference 2018 IEEE Frontiers in Education Conference (FIE), IEEE 2018. Tags: Interactive Learning @conference{linda2018designing,
title = {Designing Visually Interactive Learning Modules to Promote Students’ Critical Thinking in Mathematics},
author = {Vu Linda and Ying Xie and Meng Han},
year = {2018},
date = {2018-01-01},
booktitle = {2018 IEEE Frontiers in Education Conference (FIE)},
pages = {1--5},
organization = {IEEE},
keywords = {Interactive Learning},
pubstate = {published},
tppubtype = {conference}
}
|
Li, Ji; Cai, Zhipeng; Wang, Jinbao; Han, Meng; Li, Yingshu Truthful incentive mechanisms for geographical position conflicting mobile crowdsensing systems Journal Article IEEE Transactions on Computational Social Systems, 5 (2), pp. 324–334, 2018. Tags: Crowdsensing Systems @article{li2018truthful,
title = {Truthful incentive mechanisms for geographical position conflicting mobile crowdsensing systems},
author = {Ji Li and Zhipeng Cai and Jinbao Wang and Meng Han and Yingshu Li},
year = {2018},
date = {2018-01-01},
journal = {IEEE Transactions on Computational Social Systems},
volume = {5},
number = {2},
pages = {324--334},
publisher = {IEEE},
keywords = {Crowdsensing Systems},
pubstate = {published},
tppubtype = {article}
}
|
Han, Meng; Han, Qilong; Li, Lijie; Li, Ji; Li, Yingshu Maximising influence in sensed heterogeneous social network with privacy preservation Journal Article International Journal of Sensor Networks, 28 (2), pp. 69–79, 2018. Tags: Security @article{han2018maximising,
title = {Maximising influence in sensed heterogeneous social network with privacy preservation},
author = {Meng Han and Qilong Han and Lijie Li and Ji Li and Yingshu Li},
year = {2018},
date = {2018-01-01},
journal = {International Journal of Sensor Networks},
volume = {28},
number = {2},
pages = {69--79},
publisher = {Inderscience Publishers (IEL)},
keywords = {Security},
pubstate = {published},
tppubtype = {article}
}
|
2017
|
Ling, Xiang; Wu, Chunming; Ji, Shouling; Han, Meng HTTP/2 DoS: An Application-Layer DoS Attack Towards HTTP/2 Protocol Conference International Conference on Security and Privacy in Communication Systems, Springer, Cham 2017. Tags: DoS, Security @conference{ling2017http,
title = {HTTP/2 DoS: An Application-Layer DoS Attack Towards HTTP/2 Protocol},
author = {Xiang Ling and Chunming Wu and Shouling Ji and Meng Han},
year = {2017},
date = {2017-01-01},
booktitle = {International Conference on Security and Privacy in Communication Systems},
pages = {550--570},
organization = {Springer, Cham},
keywords = {DoS, Security},
pubstate = {published},
tppubtype = {conference}
}
|
Gao, Xiaofeng; Du, Hongwei; Han, Meng Combinatorial Optimization and Applications: 11th International Conference, COCOA 2017, Shanghai, China, December 16-18, 2017, Proceedings Miscellaneous 2017. Tags: @misc{gao2017combinatorial,
title = {Combinatorial Optimization and Applications: 11th International Conference, COCOA 2017, Shanghai, China, December 16-18, 2017, Proceedings},
author = {Xiaofeng Gao and Hongwei Du and Meng Han},
year = {2017},
date = {2017-01-01},
publisher = {Springer},
keywords = {},
pubstate = {published},
tppubtype = {misc}
}
|
Han, Meng; Li, Lei; Peng, Xiaoqing; Hong, Zhen; Li, Mohan Information Privacy of Cyber Transportation System: Opportunities and Challenges Conference Proceedings of the 6th Annual Conference on Research in Information Technology, (https://dl.acm.org/citation.cfm?id=31256), ACM 2017. Tags: Security @conference{han2017information,
title = {Information Privacy of Cyber Transportation System: Opportunities and Challenges},
author = {Meng Han and Lei Li and Xiaoqing Peng and Zhen Hong and Mohan Li},
year = {2017},
date = {2017-01-01},
booktitle = {Proceedings of the 6th Annual Conference on Research in Information Technology},
number = {https://dl.acm.org/citation.cfm?id=31256},
pages = {23--28},
organization = {ACM},
keywords = {Security},
pubstate = {published},
tppubtype = {conference}
}
|
Han, Meng; Duan, Zhuojun; Ai, Chunyu; Lybarger, Forrest Wong; Li, Yingshu; Bourgeois, Anu G Time constraint influence maximization algorithm in the age of big data Journal Article International Journal of Computational Science and Engineering, 15 (3-4), pp. 165–175, 2017. Tags: Big Data @article{han2017time,
title = {Time constraint influence maximization algorithm in the age of big data},
author = {Meng Han and Zhuojun Duan and Chunyu Ai and Forrest Wong Lybarger and Yingshu Li and Anu G Bourgeois},
year = {2017},
date = {2017-01-01},
journal = {International Journal of Computational Science and Engineering},
volume = {15},
number = {3-4},
pages = {165--175},
publisher = {Inderscience Publishers (IEL)},
keywords = {Big Data},
pubstate = {published},
tppubtype = {article}
}
|
Han, Meng; Duan, Zhuojun; Li, Yingshu Privacy issues for transportation cyber physical systems Incollection Secure and Trustworthy Transportation Cyber-Physical Systems, pp. 67–86, Springer, Singapore, 2017. Tags: Security @incollection{han2017privacy,
title = {Privacy issues for transportation cyber physical systems},
author = {Meng Han and Zhuojun Duan and Yingshu Li},
year = {2017},
date = {2017-01-01},
booktitle = {Secure and Trustworthy Transportation Cyber-Physical Systems},
pages = {67--86},
publisher = {Springer, Singapore},
keywords = {Security},
pubstate = {published},
tppubtype = {incollection}
}
|
Han, Meng INFLUENCE ANALYSIS TOWARDS BIG SOCIAL DATA Journal Article 2017. Tags: Big Data, Influence analysis @article{han2017influenceb,
title = {INFLUENCE ANALYSIS TOWARDS BIG SOCIAL DATA},
author = {Meng Han},
year = {2017},
date = {2017-01-01},
keywords = {Big Data, Influence analysis},
pubstate = {published},
tppubtype = {article}
}
|
Han, Meng; Yan, Mingyuan; Cai, Zhipeng; Li, Yingshu; Cai, Xingquan; Yu, Jiguo Influence maximization by probing partial communities in dynamic online social networks Journal Article Transactions on Emerging Telecommunications Technologies, 28 (4), pp. e3054, 2017. Tags: Influence analysis @article{han2017influence,
title = {Influence maximization by probing partial communities in dynamic online social networks},
author = {Meng Han and Mingyuan Yan and Zhipeng Cai and Yingshu Li and Xingquan Cai and Jiguo Yu},
year = {2017},
date = {2017-01-01},
journal = {Transactions on Emerging Telecommunications Technologies},
volume = {28},
number = {4},
pages = {e3054},
keywords = {Influence analysis},
pubstate = {published},
tppubtype = {article}
}
|
2016
|
Han, Meng; Li, Ji; Cai, Zhipeng; Han, Qilong Privacy reserved influence maximization in gps-enabled cyber-physical and online social networks Conference 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), Social Computing and Networking (SocialCom), Sustainable Computing and Communications (SustainCom)(BDCloud-SocialCom-SustainCom), IEEE 2016. Tags: Security @conference{han2016privacy,
title = {Privacy reserved influence maximization in gps-enabled cyber-physical and online social networks},
author = {Meng Han and Ji Li and Zhipeng Cai and Qilong Han},
year = {2016},
date = {2016-01-01},
booktitle = {2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), Social Computing and Networking (SocialCom), Sustainable Computing and Communications (SustainCom)(BDCloud-SocialCom-SustainCom)},
pages = {284--292},
organization = {IEEE},
keywords = {Security},
pubstate = {published},
tppubtype = {conference}
}
|
Han, Meng; Yan, Mingyuan; Cai, Zhipeng; Li, Yingshu An exploration of broader influence maximization in timeliness networks with opportunistic selection Journal Article Journal of Network and Computer Applications, 63 , pp. 39–49, 2016. Tags: Influence analysis @article{han2016exploration,
title = {An exploration of broader influence maximization in timeliness networks with opportunistic selection},
author = {Meng Han and Mingyuan Yan and Zhipeng Cai and Yingshu Li},
year = {2016},
date = {2016-01-01},
journal = {Journal of Network and Computer Applications},
volume = {63},
pages = {39--49},
publisher = {Academic Press},
keywords = {Influence analysis},
pubstate = {published},
tppubtype = {article}
}
|
Duan, Zhuojun; Yan, Mingyuan; Cai, Zhipeng; Wang, Xiaoming; Han, Meng; Li, Yingshu Truthful incentive mechanisms for social cost minimization in mobile crowdsourcing systems Journal Article Sensors, 16 (4), pp. 481, 2016. Tags: Mobile crowdsourcing systems @article{duan2016truthful,
title = {Truthful incentive mechanisms for social cost minimization in mobile crowdsourcing systems},
author = {Zhuojun Duan and Mingyuan Yan and Zhipeng Cai and Xiaoming Wang and Meng Han and Yingshu Li},
year = {2016},
date = {2016-01-01},
journal = {Sensors},
volume = {16},
number = {4},
pages = {481},
publisher = {Multidisciplinary Digital Publishing Institute},
keywords = {Mobile crowdsourcing systems},
pubstate = {published},
tppubtype = {article}
}
|
Yan, Mingyuan; Han, Meng; Ai, Chunyu; Cai, Zhipeng; Li, Yingshu Data Aggregation Scheduling in Probabilistic Wireless Networks with Cognitive Radio Capability Conference IEEE GLOBECOM 2016, 2016. Tags: Probabilistic Wireless Networks @conference{yan2016data,
title = {Data Aggregation Scheduling in Probabilistic Wireless Networks with Cognitive Radio Capability},
author = {Mingyuan Yan and Meng Han and Chunyu Ai and Zhipeng Cai and Yingshu Li},
year = {2016},
date = {2016-01-01},
booktitle = {IEEE GLOBECOM 2016},
keywords = {Probabilistic Wireless Networks},
pubstate = {published},
tppubtype = {conference}
}
|
Han, Meng; Liang, Yi; Duan, Zhuojun; Wang, Yingjie Mining public business knowledge: A case study in sec's edgar Conference 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), Social Computing and Networking (SocialCom), Sustainable Computing and Communications (SustainCom)(BDCloud-SocialCom-SustainCom), IEEE 2016. Tags: Text mining @conference{han2016mining,
title = {Mining public business knowledge: A case study in sec's edgar},
author = {Meng Han and Yi Liang and Zhuojun Duan and Yingjie Wang},
year = {2016},
date = {2016-01-01},
booktitle = {2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), Social Computing and Networking (SocialCom), Sustainable Computing and Communications (SustainCom)(BDCloud-SocialCom-SustainCom)},
pages = {393--400},
organization = {IEEE},
keywords = {Text mining},
pubstate = {published},
tppubtype = {conference}
}
|
Ai, Chunyu; Han, Meng; Wang, Jinbao; Yan, Mingyuan An efficient social event invitation framework based on historical data of smart devices Conference 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), Social Computing and Networking (SocialCom), Sustainable Computing and Communications (SustainCom)(BDCloud-SocialCom-SustainCom), IEEE 2016. Tags: Big Data @conference{ai2016efficient,
title = {An efficient social event invitation framework based on historical data of smart devices},
author = {Chunyu Ai and Meng Han and Jinbao Wang and Mingyuan Yan},
year = {2016},
date = {2016-01-01},
booktitle = {2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), Social Computing and Networking (SocialCom), Sustainable Computing and Communications (SustainCom)(BDCloud-SocialCom-SustainCom)},
pages = {229--236},
organization = {IEEE},
keywords = {Big Data},
pubstate = {published},
tppubtype = {conference}
}
|
Lu, Yanfei; Ren, Jianmin; Qian, Jin; Han, Meng; Huo, Yan; Jing, Tao Predictive contention window-based broadcast collision mitigation strategy for vanet Conference 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), Social Computing and Networking (SocialCom), Sustainable Computing and Communications (SustainCom)(BDCloud-SocialCom-SustainCom), IEEE 2016. Tags: @conference{lu2016predictive,
title = {Predictive contention window-based broadcast collision mitigation strategy for vanet},
author = {Yanfei Lu and Jianmin Ren and Jin Qian and Meng Han and Yan Huo and Tao Jing},
year = {2016},
date = {2016-01-01},
booktitle = {2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), Social Computing and Networking (SocialCom), Sustainable Computing and Communications (SustainCom)(BDCloud-SocialCom-SustainCom)},
pages = {209--215},
organization = {IEEE},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
|
Albinali, Hussah; Han, Meng; Wang, Jinbao; Gao, Hong; Li, Yingshu The roles of social network mavens Conference 2016 12th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN), IEEE 2016. Tags: @conference{albinali2016roles,
title = {The roles of social network mavens},
author = {Hussah Albinali and Meng Han and Jinbao Wang and Hong Gao and Yingshu Li},
year = {2016},
date = {2016-01-01},
booktitle = {2016 12th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN)},
pages = {1--8},
organization = {IEEE},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
|
2015
|
Ji, Shouling; Cai, Zhipeng; Han, Meng; Beyah, Raheem Whitespace measurement and virtual backbone construction for cognitive radio networks: From the social perspective Conference 2015 12th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), IEEE 2015. Tags: Cognitive radio networks @conference{ji2015whitespace,
title = {Whitespace measurement and virtual backbone construction for cognitive radio networks: From the social perspective},
author = {Shouling Ji and Zhipeng Cai and Meng Han and Raheem Beyah},
year = {2015},
date = {2015-01-01},
booktitle = {2015 12th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)},
pages = {435--443},
organization = {IEEE},
keywords = {Cognitive radio networks},
pubstate = {published},
tppubtype = {conference}
}
|
Li, Jinbao; Guo, Xiaohang; Guo, Longjiang; Ji, Shouling; Han, Meng; Cai, Zhipeng Optimal routing with scheduling and channel assignment in multi-power multi-radio wireless sensor networks Journal Article Ad Hoc Networks, 31 , pp. 45–62, 2015. Tags: Wireless sensor networks @article{li2015optimal,
title = {Optimal routing with scheduling and channel assignment in multi-power multi-radio wireless sensor networks},
author = {Jinbao Li and Xiaohang Guo and Longjiang Guo and Shouling Ji and Meng Han and Zhipeng Cai},
year = {2015},
date = {2015-01-01},
journal = {Ad Hoc Networks},
volume = {31},
pages = {45--62},
publisher = {Elsevier},
keywords = {Wireless sensor networks},
pubstate = {published},
tppubtype = {article}
}
|
2014
|
Lu, Yunmei; Zhu, Yun; Han, Meng; He, Jing Selena; Zhang, Yanqing A survey of GPU accelerated SVM Conference Proceedings of the 2014 ACM Southeast Regional Conference, ACM 2014. Tags: Machine learning @conference{lu2014survey,
title = {A survey of GPU accelerated SVM},
author = {Yunmei Lu and Yun Zhu and Meng Han and Jing Selena He and Yanqing Zhang},
year = {2014},
date = {2014-01-01},
booktitle = {Proceedings of the 2014 ACM Southeast Regional Conference},
pages = {15},
organization = {ACM},
keywords = {Machine learning},
pubstate = {published},
tppubtype = {conference}
}
|
Yan, Mingyuan; Ji, Shouling; Han, Meng; Li, Yingshu; Cai, Zhipeng Data aggregation scheduling in wireless networks with cognitive radio capability Conference 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), IEEE 2014. Tags: Wireless Networks @conference{yan2014data,
title = {Data aggregation scheduling in wireless networks with cognitive radio capability},
author = {Mingyuan Yan and Shouling Ji and Meng Han and Yingshu Li and Zhipeng Cai},
year = {2014},
date = {2014-01-01},
booktitle = {2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)},
pages = {513--521},
organization = {IEEE},
keywords = {Wireless Networks},
pubstate = {published},
tppubtype = {conference}
}
|
Han, Meng; Yan, Mingyuan; Li, Jinbao; Ji, Shouling; Li, Yingshu Neighborhood-based uncertainty generation in social networks Journal Article Journal of Combinatorial Optimization, 28 (3), pp. 561–576, 2014. Tags: Uncertainty generation @article{han2014neighborhood,
title = {Neighborhood-based uncertainty generation in social networks},
author = {Meng Han and Mingyuan Yan and Jinbao Li and Shouling Ji and Yingshu Li},
year = {2014},
date = {2014-01-01},
journal = {Journal of Combinatorial Optimization},
volume = {28},
number = {3},
pages = {561--576},
publisher = {Springer US},
keywords = {Uncertainty generation},
pubstate = {published},
tppubtype = {article}
}
|
2013
|
Han, Meng; Yan, Mingyuan; Li, Jinbao; Ji, Shouling; Li, Yingshu Generating uncertain networks based on historical network snapshots Conference International Computing and Combinatorics Conference, Springer, Berlin, Heidelberg 2013. Tags: Uncertainty generation @conference{han2013generating,
title = {Generating uncertain networks based on historical network snapshots},
author = {Meng Han and Mingyuan Yan and Jinbao Li and Shouling Ji and Yingshu Li},
year = {2013},
date = {2013-01-01},
booktitle = {International Computing and Combinatorics Conference},
pages = {747--758},
organization = {Springer, Berlin, Heidelberg},
keywords = {Uncertainty generation},
pubstate = {published},
tppubtype = {conference}
}
|
2011
|
Han, Meng; Li, Jianzhong; Zou, Zhaonian K-CLOSE: Algorithm for Finding the Close Regions in Wireless Sensor Networks Based Uncertain Graph Mining Technology Journal Article Journal of Software, 22 (1), pp. 131–141, 2011. Tags: Wireless sensor networks @article{han2011k,
title = {K-CLOSE: Algorithm for Finding the Close Regions in Wireless Sensor Networks Based Uncertain Graph Mining Technology},
author = {Meng Han and Jianzhong Li and Zhaonian Zou},
year = {2011},
date = {2011-01-01},
journal = {Journal of Software},
volume = {22},
number = {1},
pages = {131--141},
keywords = {Wireless sensor networks},
pubstate = {published},
tppubtype = {article}
}
|
Han, Meng; Li, Jianzhong; Zou, Zhaonian Finding k close subgraphs in an uncertain graph Journal Article Journal of Frontiers of Computer Science and Technology, 5 (9), pp. 791–803, 2011. Tags: Uncertain graph @article{han2011finding,
title = {Finding k close subgraphs in an uncertain graph},
author = {Meng Han and Jianzhong Li and Zhaonian Zou},
year = {2011},
date = {2011-01-01},
journal = {Journal of Frontiers of Computer Science and Technology},
volume = {5},
number = {9},
pages = {791--803},
publisher = {North China Computing Technology Institute,| a No. 26, P. O. Box 619| c~…},
keywords = {Uncertain graph},
pubstate = {published},
tppubtype = {article}
}
|