×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
山东大学 [10]
上海电子信息职业技术... [8]
北京大学 [6]
西安交通大学 [3]
北京航空航天大学 [2]
湖南大学 [2]
更多...
内容类型
期刊论文 [24]
会议论文 [19]
其他 [1]
发表日期
2020 [1]
2019 [3]
2018 [6]
2017 [5]
2016 [4]
2015 [5]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共44条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Understanding the power of opinion leaders' influence on the diffusion process of popular mobile games: Travel Frog on Sina Weibo
期刊论文
COMPUTERS IN HUMAN BEHAVIOR, 2020, 卷号: 109, 页码: 11
作者:
Wang, Zongshui
;
Liu, Haiyan
;
Liu, Wei
;
Wang, Shouyang
收藏
  |  
浏览/下载:149/0
  |  
提交时间:2020/06/30
Popular mobile game
Diffusion analysis
Social network
Opinion leader
User-generated content
Psychological Gender Express via Mobile Social Network Activities: An Experimental Study on a Gay Network Data
期刊论文
IEEE ACCESS, 2019, 卷号: 7, 页码: 12696-12704
作者:
Guo, Ziyu
;
Liu, Shijun
;
Pan, Li
;
Guo, Shanqing
;
Niu, Tingting
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/11
Classifier
ego network
mobile social network
gender identity
triad
A novel trust recommendation model for mobile social network based on user motivation
期刊论文
Electronic Commerce Research, 2019
作者:
Yang, G.
;
Yang, Q.*
;
Jin, H.
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/24
Filtering algorithm
Mobile social network
Recommendation attack
Recommendation management
Trust relationship
An Immunization Framework for Social Networks Through Big Data Based Influence Modeling
期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 卷号: 16, 页码: 984-995
作者:
Peng, Sancheng
;
Wang, Guojun
;
Zhou, Yongmei
;
Wan, Cong
;
Wang, Cong
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/30
Malware
Social network services
Big Data
Mobile communication
Smart phones
Algorithm design and analysis
Computational modeling
Malware propagation
social influence
big data
propagation model
containment scheme
immunization algorithm
Research on Children's Network Privacy Protection in Mobile Social Media
会议论文
20th IEEE International Conference on High Performance Computing and Communications (HPCC) / 16th IEEE International Conference on Smart City (SmartCity) / 4th IEEE International Conference on Data Science and Systems (DSS), Exeter, ENGLAND, JUN 28-30, 2018
作者:
Hu, Mengjia*
;
Wu, Xumin
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/12/04
mobile social media
Children's Network Privacy
Privacy Management
privacy protection
Forensic analysis of digital images over smart devices and online social networks
会议论文
IEEE 20TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS / IEEE 16TH INTERNATIONAL CONFERENCE ON SMART CITY / IEEE 4TH INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS), 2018-01-01
作者:
Li, Shancang
;
Sun, Qindong
;
Xu, Xiaolong
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/20
Mobile phone
camera fingerprints
digital and multimedia forensics
forensics images
social network forensics
Inter-Community Detection Scheme for Social Internet of Things: A Compressive Sensing Over Graphs Approach
期刊论文
IEEE Internet of Things Journal, 2018, 页码: 1
作者:
WenboDing
;
TengjiaoWang
;
JianSong
;
ZhuHan
;
FangYang
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/24
Image
edge
detection
Internet
of
Things
Social
network
services
Complexity
theory
Compressed
sensing
Electronic
mail
Additives
Internet
of
Things
smart
cities
mobile
social
networks
compressive
sensing
over
graphs
edge
clustering
coefficient
prior
information.
Determinants of Users’ Intention to Purchase Probability-Based Items in Mobile Social Network Games: A Case of South Korea
期刊论文
IEEE Access, 2018, 卷号: Vol.6, 页码: 12425-12437
作者:
Park,Hooyoung
;
Lee,Jaeyoung
;
Suh,Euiho
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/24
Games
Land
mobile
radio
Social
network
services
Information
systems
Mathematical
model
Electronic
mail
Analytical
models
Mobile
social
network
games
technology
acceptance
model
motivation
theory
network
externality
probability-based
items
structural
equation
modeling
confirmatory
factor
analysis
gambling
motivation
gender
difference
in
response
A Privacy Preserving Algorithm Based on R-constrained Dummy Trajectory in Mobile Social Network
会议论文
6th International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI), OCT 19-21, 2017
作者:
Ni, Lina
;
Yuan, Yanfeng
;
Wang, Xiao
;
Yu, Jiguo
;
Zhang, Jinquan
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/31
Privacy preserving
mobile social network
trajectory privacy
location-based service
R-constrained dummy trajectory
A Location Privacy Preserving Scheme Based on Repartitioning Anonymous Region in Mobile Social Network
会议论文
6th International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI), OCT 19-21, 2017
作者:
Ni, Lina
;
Yuan, Yanfeng
;
Wang, Xiao
;
Zhang, Mengmeng
;
Zhang, Jinquan
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/31
Privacy preserving
mobile social network
location-based service
location privacy
anonymous region repartition
©版权所有 ©2017 CSpace - Powered by
CSpace