共 37 条
[1]
Kong C(2019)Disseminating authorized content via data analysis in opportunistic social networks Big Data Mining and Analytics 2 12-24
[2]
Luo G(2019)Big data analytics for healthcare industry: impact, applications, and tools Big Data Mining and Analytics 2 48-C57
[3]
Tian L(2018)A two-stage locality-sensitive hashing based approach for privacy-preserving mobile service recommendation in cross-platform edge environment Futur. Gener. Comput. Syst. 88 636-643
[4]
Cao X(2020)Android HIV: a study of repackaging malware for evading machine-learning detection IEEE Transactions on Information Forensics and Security 15 987-1001
[5]
Kumar S(2016)An overview of fog computing and its security issues[J] Concurrency and Computation: Practice and Experience 28 2991-3005
[6]
Singh M(2017)Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies IEEE Communications Surveys and Tutorials 19 465-481
[7]
Qi L(2003)Kernel methods for relation extraction J. Mach. Learn. Res. 3 1083-1106
[8]
Zhang X(2018)Twitter spam detection: Survey of new approaches and comparative study[J] Computers & Security 76 265-284
[9]
Dou W(2015)Human-level concept learning through probabilistic program induction Science 350 1332-1338
[10]
Hu C(undefined)undefined undefined undefined undefined-undefined