Modelling of information diffusion on social networks with applications to WeChat L Liu, B Qu, B Chen, A Hanjalic, H Wang Physica A: Statistical Mechanics and its Applications 496, 318-329, 2018 | 67 | 2018 |
SIS epidemic spreading with heterogeneous infection rates B Qu, H Wang IEEE Transactions on Network Science and Engineering 4 (3), 177-186, 2017 | 65 | 2017 |
SIS epidemic spreading with correlated heterogeneous infection rates B Qu, H Wang Physica A: Statistical Mechanics and its Applications 472, 13-24, 2017 | 29 | 2017 |
Nonconsensus opinion model on directed networks B Qu, Q Li, S Havlin, HE Stanley, H Wang Physical Review E 90 (5), 052811, 2014 | 26 | 2014 |
Epidemic mitigation via awareness propagation in communication networks: the role of time scales H Wang, C Chen, B Qu, D Li, S Havlin New Journal of Physics 19 (7), 073039, 2017 | 24 | 2017 |
Ranking of nodal infection probability in susceptible-infected-susceptible epidemic B Qu, C Li, P Van Mieghem, H Wang Scientific reports 7 (1), 9233, 2017 | 14 | 2017 |
Differential power analysis of stream ciphers with LFSRs B Qu, D Gu, Z Guo, J Liu Computers & Mathematics with Applications 65 (9), 1291-1299, 2013 | 12 | 2013 |
Data driven modeling of continuous time information diffusion in social networks L Liu, B Chen, B Qu, L He, X Qiu 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC …, 2017 | 9 | 2017 |
Deep attributed network representation learning via attribute enhanced neighborhood C Li, M Shi, B Qu, X Li Neurocomputing 508, 170-181, 2022 | 6 | 2022 |
The accuracy of mean-field approximation for susceptible-infected-susceptible epidemic spreading with heterogeneous infection rates B Qu, H Wang Complex Networks & Their Applications V: Proceedings of the 5th …, 2017 | 6 | 2017 |
Legitimate-reader-only attack on MIFARE Classic Y Liu, D Gu, B Li, B Qu Mathematical and Computer Modelling 58 (1-2), 219-226, 2013 | 6 | 2013 |
Heterogeneous recovery rates against sis epidemics in directed networks B Qu, A Hanjalic, H Wang 2014 7th International Conference on NETwork Games, COntrol and OPtimization …, 2014 | 5 | 2014 |
An effective differential fault analysis on the Serpent cryptosystem in the Internet of Things L Wei, T Zhi, G Dawu, S Li, Q Bo, L Zhiqiang, L Ya China Communications 11 (6), 129-139, 2014 | 5 | 2014 |
A highly compatible verification framework with minimal upgrades to secure an existing edge network Z Li, Y Ding, H Gao, B Qu, Y Wang, J Li ACM Transactions on Internet Technology 23 (3), 1-23, 2023 | 4 | 2023 |
The accuracy of mean-field approximation for susceptible-infected-susceptible epidemic spreading B Qu, H Wang arXiv preprint arXiv:1609.01105, 2016 | 4 | 2016 |
ATVITSC: A novel encrypted traffic classification method based on deep learning Y Liu, X Wang, B Qu, F Zhao IEEE Transactions on Information Forensics and Security, 2024 | 3 | 2024 |
提升 MIFARE Classic 应用系统的安全性 曲博, 谷大武, 刘亚, 李柏岚 信息安全与通信保密, 137-140, 2009 | 1 | 2009 |
An Encrypted Traffic Classification Framework Based on Higher-Interaction-Graph Neural Network Z Hu, B Qu, X Li, C Li Australasian Conference on Information Security and Privacy, 383-403, 2024 | | 2024 |
Predicting Higher-order Dynamics without Network Topology by Ridge Regression Z Zhou, C Li, B Qu, X Li 2024 IEEE International Symposium on Circuits and Systems (ISCAS), 1-5, 2024 | | 2024 |
Vaccination strategies in the disease–behavior evolution model L Zhou, J Dai, B Qu, C Li Frontiers in Physics 12, 1387267, 2024 | | 2024 |