Year |
Citation |
Score |
2018 |
Wang G, Wang B, Wang T, Nika A, Zheng H, Zhao BY. Ghost Riders: Sybil Attacks on Crowdsourced Mobile Mapping Services Ieee/Acm Transactions On Networking. 26: 1123-1136. DOI: 10.1109/Tnet.2018.2818073 |
0.461 |
|
2018 |
Metzger MJ, Wilson C, Zhao BY. Benefits of Browsing? The Prevalence, Nature, and Effects of Profile Consumption Behavior in Social Network Sites Journal of Computer-Mediated Communication. 23: 72-89. DOI: 10.1093/Jcmc/Zmx004 |
0.547 |
|
2017 |
Wang G, Zhang X, Tang S, Wilson C, Zheng H, Zhao BY. Clickstream User Behavior Models Acm Transactions On the Web. 11: 21. DOI: 10.1145/3068332 |
0.604 |
|
2017 |
Wang T, Wang G, Wang B, Sambasivan D, Zhang Z, Li X, Zheng H, Zhao BY. Value and Misinformation in Collaborative Investing Platforms Acm Transactions On the Web. 11: 8. DOI: 10.1145/3027487 |
0.343 |
|
2017 |
Nika A, Zhang Z, Zhao BY, Zheng H. Toward Practical Spectrum Permits Ieee Transactions On Cognitive Communications and Networking. 3: 112-122. DOI: 10.1109/Tccn.2017.2656127 |
0.48 |
|
2016 |
Liu Q, Zhao X, Willinger W, Wang X, Zhao BY, Zheng H. Self-Similarity in Social Network Dynamics Acm Transactions On Modeling and Performance Evaluation of Computing. 2: 5. DOI: 10.1145/2994142 |
0.611 |
|
2016 |
Wang T, Chen Y, Wang Y, Wang B, Wang G, Li X, Zheng H, Zhao BY. The power of comments: fostering social interactions in microblog networks Frontiers of Computer Science. 10: 889-907. DOI: 10.1007/S11704-016-5198-Y |
0.467 |
|
2016 |
Nika A, Ismail A, Zhao BY, Gaito S, Rossi GP, Zheng H. Understanding and Predicting Data Hotspots in Cellular Networks Mobile Networks and Applications. 21: 402-413. DOI: 10.1007/S11036-015-0648-6 |
0.484 |
|
2015 |
Zhou X, Zhang Z, Wang G, Yu X, Zhao BY, Zheng H. Practical conflict graphs in the wild Ieee Acm Transactions On Networking. 23: 824-835. DOI: 10.1109/Tnet.2014.2306416 |
0.317 |
|
2014 |
Yang Z, Wilson C, Wang X, Gao T, Zhao BY, Dai Y. Uncovering social network Sybils in the wild Acm Transactions On Knowledge Discovery From Data. 8: 2. DOI: 10.1145/2556609 |
0.584 |
|
2014 |
Puttaswamy KPN, Wang S, Steinbauer T, Agrawal D, El Abbadi A, Kruegel C, Zhao BY. Preserving location privacy in geosocial applications Ieee Transactions On Mobile Computing. 13: 159-173. DOI: 10.1109/Tmc.2012.247 |
0.464 |
|
2013 |
Jiang J, Wilson C, Wang X, Sha W, Huang P, Dai Y, Zhao BY. Understanding latent interactions in online social networks Acm Transactions On the Web. 7. DOI: 10.1145/2517040 |
0.603 |
|
2013 |
Kone V, Zheng H, Rowstron A, O'Shea G, Zhao BY. Measurement-based design of roadside content delivery systems Ieee Transactions On Mobile Computing. 12: 1160-1173. DOI: 10.1109/Tmc.2012.90 |
0.712 |
|
2012 |
Wilson C, Sala A, Puttaswamy KPN, Zhao BY. Beyond Social Graphs: User Interactions in Online Social Networks and their Implications Acm Transactions On the Web. 6: 17. DOI: 10.1145/2382616.2382620 |
0.587 |
|
2012 |
Kone V, Yang L, Yang X, Zhao BY, Zheng H. The effectiveness of opportunistic spectrum access: a measurement study Ieee Acm Transactions On Networking. 20: 2005-2016. DOI: 10.1109/Tnet.2012.2191571 |
0.713 |
|
2011 |
Yang Z, Tian J, Zhao BY, Chen W, Dai Y. Protector: A Probabilistic Failure Detector for Cost-Effective Peer-to-Peer Storage Ieee Transactions On Parallel and Distributed Systems. 22: 1514-1527. DOI: 10.1109/Tpds.2010.205 |
0.37 |
|
2011 |
Kone V, Zheng H, Rowstron A, Zhao BY. The impact of infostation density on vehicular data dissemination Mobile Networks and Applications. 16: 807-819. DOI: 10.1007/S11036-010-0277-Z |
0.717 |
|
2010 |
Swamynathan G, Almeroth KC, Zhao BY. The design of a reliable reputation system Electronic Commerce Research. 10: 239-270. DOI: 10.1007/S10660-010-9064-Y |
0.427 |
|
2009 |
Puttaswamy KPN, Zheng H, Zhao BY. Securing Structured Overlays against Identity Attacks Ieee Transactions On Parallel and Distributed Systems. 20: 1487-1498. DOI: 10.1109/Tpds.2008.241 |
0.382 |
|
2009 |
Qiu T, Chan E, Ye M, Chen G, Zhao BY. Peer-exchange schemes to handle mismatch in peer-to-peer systems The Journal of Supercomputing. 48: 15-42. DOI: 10.1007/S11227-008-0203-3 |
0.43 |
|
2008 |
Swamynathan G, Zhao BY, Almeroth KC. Exploring the feasibility of proactive reputations Concurrency Computation Practice and Experience. 20: 155-166. DOI: 10.1002/Cpe.1186 |
0.396 |
|
2007 |
Kone V, Das S, Zhao BY, Zheng H. QUORUM-Quality of service in wireless mesh networks Mobile Networks and Applications. 12: 358-369. DOI: 10.1007/S11036-008-0050-8 |
0.719 |
|
2006 |
Konrad A, Zhao BY, Joseph AD. Determining model accuracy of network traces Journal of Computer and System Sciences. 72: 1156-1171. DOI: 10.1016/J.Jcss.2005.12.009 |
0.443 |
|
2006 |
Peng C, Zheng H, Zhao BY. Utilization and fairness in spectrum assignment for opportunistic spectrum access Mobile Networks and Applications. 11: 555-576. DOI: 10.1007/S11036-006-7322-Y |
0.375 |
|
2004 |
Zhao BY, Huang L, Stribling J, Rhea SC, Joseph AD, Kubiatowicz JD. Tapestry: A resilient global-scale overlay for service deployment Ieee Journal On Selected Areas in Communications. 22: 41-53. DOI: 10.1109/Jsac.2003.818784 |
0.401 |
|
2004 |
Hildrum K, Kubiatowicz JD, Rao S, Zhao BY. Distributed object location in a dynamic network Theory of Computing Systems. 37: 405-440. DOI: 10.1007/S00224-004-1146-6 |
0.452 |
|
2003 |
Konrad A, Zhao BY, Joseph AD, Ludwig R. A Markov-based channel model algorithm for wireless networks Wireless Networks. 9: 189-199. DOI: 10.1023/A:1022869025953 |
0.399 |
|
2002 |
Hodes TD, Czerwinski SE, Zhao BY, Joseph AD, Katz RH. An architecture for secure wide-area service discovery Wireless Networks. 8: 213-230. DOI: 10.1023/A:1013772027164 |
0.405 |
|
2001 |
Rhea S, Wells G, Eaton P, Geels D, Zhao B, Weatherspoon H, Kubiatowicz J. Maintenance-free global data storage Ieee Internet Computing. 5: 40-49. DOI: 10.1109/4236.957894 |
0.45 |
|
2001 |
Gribble SD, Welsh M, Von Behren R, Brewer EA, Culler D, Borisov N, Czerwinski S, Gummadi R, Hill J, Joseph A, Katz RH, Mao ZM, Ross S, Zhao B. Ninja architecture for robust Internet-scale systems and services Computer Networks. 35: 473-497. DOI: 10.1016/S1389-1286(00)00179-1 |
0.342 |
|
Show low-probability matches. |