Follow
Feng Wang
Title
Cited by
Cited by
Year
On greedy construction of connected dominating sets in wireless networks
Y Li, MT Thai, F Wang, CW Yi, PJ Wan, DZ Du
Wireless Communications and Mobile Computing 5 (8), 927-932, 2005
2562005
Connected dominating sets in wireless networks with different transmission ranges
MT Thai, F Wang, D Liu, S Zhu, DZ Du
IEEE transactions on mobile computing 6 (7), 721-730, 2007
2212007
On the construction of 2-connected virtual backbone in wireless networks
F Wang, MT Thai, DZ Du
IEEE Transactions on wireless communications 8 (3), 1230-1237, 2009
1872009
Diffusive logistic model towards predicting information diffusion in online social networks
F Wang, H Wang, K Xu
2012 32nd international conference on distributed computing systems …, 2012
1762012
Coverage problems in wireless sensor networks: designs and analysis
MT Thai, F Wang, DH Du, X Jia
International Journal of Sensor Networks 3 (3), 191-200, 2008
1702008
On positive influence dominating sets in social networks
F Wang, H Du, E Camacho, K Xu, W Lee, Y Shi, S Shan
Theoretical Computer Science 412 (3), 265-269, 2011
1262011
Characterizing information diffusion in online social networks with linear diffusive model
F Wang, H Wang, K Xu, J Wu, X Jia
2013 IEEE 33rd international conference on Distributed Computing Systems …, 2013
1072013
Constructing k-connected m-dominating sets in wireless sensor networks
Y Wu, F Wang, MT Thai, Y Li
MILCOM 2007-IEEE Military Communications Conference, 1-7, 2007
1052007
Positive influence dominating set in online social networks
F Wang, E Camacho, K Xu
Combinatorial Optimization and Applications, 313-321, 2009
1032009
Detecting fake news over online social media via domain reputations and content understanding
K Xu, F Wang, H Wang, B Yang
Tsinghua Science and Technology 25 (1), 20-27, 2019
962019
Behavior analysis of internet traffic via bipartite graphs and one-mode projections
K Xu, F Wang, L Gu
IEEE/ACM Transactions on Networking 22 (3), 931-942, 2013
802013
Iotargos: A multi-layer security monitoring system for internet-of-things in smart homes
Y Wan, K Xu, G Xue, F Wang
IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 874-883, 2020
782020
Network-aware behavior clustering of Internet end hosts
K Xu, F Wang, L Gu
2011 proceedings ieee infocom, 2078-2086, 2011
782011
A reliable virtual backbone scheme in mobile ad-hoc networks
M Min, F Wang, DZ Du, PM Pardalos
2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE …, 2004
762004
Prediction of influenza-like illness based on the improved artificial tree algorithm and artificial neural network
H Hu, H Wang, F Wang, D Langley, A Avram, M Liu
Scientific reports 8 (1), 4895, 2018
702018
Modeling Information Diffusion in Online Social Networks with Partial Differential Equations
H Wang, F Wang, K Xu
Springer ISBN 978-3-030-38850-8, 2020
68*2020
Fault-tolerant topology control for all-to-one and one-to-all communication in wireless networks
F Wang, MT Thai, Y Li, X Cheng, DZ Du
IEEE Transactions on Mobile Computing 7 (3), 322-331, 2008
542008
Size matters: A comparative analysis of community detection algorithms
P Wagenseller, F Wang, W Wu
IEEE Transactions on Computational Social Systems 5 (4), 951-960, 2018
532018
Minimum coverage breach and maximum network lifetime in wireless sensor networks
C Wang, MT Thai, Y Li, F Wang, W Wu
IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, 1118-1123, 2007
532007
On the construction of a strongly connected broadcast arborescence with bounded transmission delay
Y Li, MT Thai, F Wang, DZ Du
IEEE Transactions on mobile computing 5 (10), 1460-1470, 2006
522006
The system can't perform the operation now. Try again later.
Articles 1–20