Abstract: Influence maximization (IM) aims to select a seed set of users that maximizes the expected influence spread and is a fundamental problem in social network analysis. The dynamic and complex ...
Abstract: With valuable data constantly under attack, reactive security measures are no longer sufficient. Predicting cyber threats before they emerge is crucial. Cyberattacks do not occur randomly; ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results