My T. Thai
#87,492
Most Influential Person Now
American computer science engineer
My T. Thai's AcademicInfluence.com Rankings
My T. Thaicomputer-science Degrees
Computer Science
#7004
World Rank
#7377
Historical Rank
Database
#7426
World Rank
#7698
Historical Rank
Download Badge
Computer Science
My T. Thai's Degrees
- PhD Computer Science Stanford University
- Masters Computer Science Stanford University
- Bachelors Computer Science Stanford University
Similar Degrees You Can Earn
Why Is My T. Thai Influential?
(Suggest an Edit or Addition)According to Wikipedia, My Tra Thai is an American computer science engineer, professor in the Computer and Information Science and Engineering department at the University of Florida, and Fellow of the IEEE. Early life and education Thai completed two bachelor's degrees in computer science and mathematics from Iowa State University in 1999 before enrolling at the University of Minnesota for her PhD.
My T. Thai's Published Works
Published Works
- Energy-efficient target coverage in wireless sensor networks (2005) (1118)
- Stop-and-Stare: Optimal Sampling Algorithms for Viral Marketing in Billion-scale Networks (2016) (316)
- Wireless Sensor Networks and Applications (2008) (230)
- Adaptive algorithms for detecting community structure in dynamic social networks (2011) (230)
- Overlapping communities in dynamic networks: their detection and mobile applications (2011) (223)
- Containment of misinformation spread in online social networks (2012) (213)
- Detecting Critical Nodes in Interdependent Power Networks for Vulnerability Assessment (2013) (207)
- On greedy construction of connected dominating sets in wireless networks (2005) (197)
- Connected Dominating Sets in Wireless Networks with Different Transmission Ranges (2007) (173)
- AI and Blockchain: A Disruptive Integration (2018) (157)
- On the construction of 2-connected virtual backbone in wireless networks (2009) (139)
- On New Approaches of Assessing Network Vulnerability: Hardness and Approximation (2012) (138)
- PGM-Explainer: Probabilistic Graphical Model Explanations for Graph Neural Networks (2020) (135)
- Maximizing the Spread of Positive Influence in Online Social Networks (2013) (119)
- Coverage problems in wireless sensor networks: designs and analysis (2008) (118)
- On the Discovery of Critical Links and Nodes for Assessing Network Vulnerability (2013) (111)
- On approximation algorithms of k-connected m-dominating sets in disk graphs (2007) (103)
- Dynamic Social Community Detection and Its Applications (2014) (95)
- Cost-aware Targeted Viral Marketing in billion-scale networks (2016) (94)
- Constructing k-Connected m-Dominating Sets in Wireless Sensor Networks (2007) (92)
- On Approximation of New Optimization Methods for Assessing Network Vulnerability (2010) (90)
- Least Cost Influence Maximization Across Multiple Social Networks (2016) (81)
- An approximation algorithm for conflict-aware broadcast scheduling in wireless ad hoc networks (2008) (77)
- Localized Construction of Connected Dominating Set in Wireless Networks (2004) (75)
- On the approximability of positive influence dominating set in social networks (2014) (73)
- Cost-Effective Viral Marketing for Time-Critical Campaigns in Large-Scale Social Networks (2014) (73)
- Detecting Application Denial-of-Service Attacks: A Group-Testing-Based Approach (2010) (72)
- Analysis of misinformation containment in online social networks (2013) (68)
- Towards social-aware routing in dynamic communication networks (2009) (66)
- A Trigger Identification Service for Defending Reactive Jammers in WSN (2012) (64)
- A hybrid ABC-TS algorithm for the unrelated parallel-batching machines scheduling problem with deteriorating jobs and maintenance activity (2018) (63)
- Sources of misinformation in Online Social Networks: Who to suspect? (2012) (61)
- A Billion-Scale Approximation Algorithm for Maximizing Benefit in Viral Marketing (2017) (60)
- Big Data in Complex and Social Networks (2016) (57)
- Misinformation in Online Social Networks: Detect Them All with a Limited Budget (2016) (56)
- Fault-Tolerant Topology Control for All-to-One and One-to-All Communication in Wireles Networks (2008) (55)
- On Construction of Virtual Backbone in Wireless Ad Hoc Networks with Unidirectional Links (2008) (55)
- Recent Advances in Information Diffusion and Influence Maximization of Complex Social Networks (2014) (55)
- Cheap, easy, and massively effective viral marketing in social networks: truth or fiction? (2012) (55)
- Minimum Coverage Breach and Maximum Network Lifetime in Wireless Sensor Networks (2007) (50)
- Network Under Joint Node and Link Attacks: Vulnerability Assessment Methods and Analysis (2015) (49)
- Limiting the Spread of Misinformation While Effectively Raising Awareness in Social Networks (2015) (49)
- Strongly Connected Dominating Sets in Wireless Sensor Networks with Unidirectional Links (2006) (48)
- OptChain: Optimal Transactions Placement for Scalable Blockchain Sharding (2019) (45)
- A dominating and absorbent set in a wireless ad-hoc network with different transmission ranges (2007) (44)
- Overlapping Community Structures and Their Detection on Social Networks (2011) (44)
- Handbook of Optimization in Complex Networks (2012) (44)
- Profit maximization for multiple products in online social networks (2016) (43)
- On the Construction of a Strongly Connected Broadcast Arborescence with Bounded Transmission Delay (2006) (42)
- Least Cost Influence in Multiplex Social Networks: Model Representation and Analysis (2013) (41)
- Interest-matching information propagation in multiple online social networks (2012) (40)
- POSTER: Deterring DDoS Attacks on Blockchain-based Cryptocurrencies through Mempool Optimization (2018) (40)
- Connected dominating sets in disk graphs with bidirectional links (2006) (40)
- Optimizing push/pull envelopes for energy-efficient cloud-sensor systems (2011) (40)
- Precise structural vulnerability assessment via mathematical programming (2011) (39)
- A novel method for worm containment on dynamic social networks (2010) (39)
- Community Detection in Scale-Free Networks: Approximation Algorithms for Maximizing Modularity (2013) (38)
- Reactive jamming attacks in multi-radio wireless sensor networks: an efficient mitigating measure by identifying trigger nodes (2009) (38)
- Multiplex Influence Maximization in Online Social Networks With Heterogeneous Diffusion Models (2018) (37)
- Fast Maximization of Non-Submodular, Monotonic Functions on the Integer Lattice (2018) (37)
- Optimization scheme for sensor coverage scheduling with bandwidth constraints (2009) (35)
- Partitioning Attacks on Bitcoin: Colliding Space, Time, and Logic (2019) (33)
- Network Clustering via Maximizing Modularity: Approximation Algorithms and Theoretical Limits (2015) (32)
- Heterogeneous Gaussian Mechanism: Preserving Differential Privacy in Deep Learning with Provable Robustness (2019) (31)
- Scalable Differential Privacy with Certified Robustness in Adversarial Learning (2019) (31)
- Handbook of Optimization in Complex Networks: Theory and Applications (2014) (30)
- Catastrophic cascading failures in power networks (2015) (29)
- Trade-off scheme for fault tolerant connected dominating sets on size and diameter (2008) (29)
- Why approximate when you can get the exact? Optimal targeted viral marketing at scale (2017) (28)
- On approximation of dominating tree in wireless sensor networks (2010) (28)
- O(log n)-Localized Algorithms on the Coverage Problem in Heterogeneous Sensor Networks (2007) (28)
- TipTop: (Almost) Exact Solutions for Influence Maximization in Billion-Scale Networks (2017) (28)
- Construction of d(H)-disjunct matrix for group testing in hypergraphs (2006) (27)
- Rumor Detection in Social Networks via Deep Contextual Modeling (2019) (24)
- Rate alteration attacks in smart grid (2015) (23)
- Adaptive algorithms for detecting critical links and nodes in dynamic networks (2012) (23)
- Toward Optimal Community Detection: From Trees to General Weighted Networks (2015) (22)
- Minimum budget for misinformation blocking in online social networks (2019) (22)
- Influence maximization in multiple online social networks (2013) (22)
- Wireless Sensor Networks and Applications (Signals and Communication Technology) (2007) (21)
- An optimal algorithm for coverage hole healing in hybrid sensor networks (2011) (21)
- Price Modification Attack and Protection Scheme in Smart Grid (2017) (21)
- Parking Assignment: Minimizing Parking Expenses and Balancing Parking Demand Among Multiple Parking Lots (2020) (20)
- An adaptive approximation algorithm for community detection in dynamic scale-free networks (2013) (20)
- On Detection of Malicious Users Using Group Testing Techniques (2008) (20)
- Assessing attack vulnerability in networks with uncertainty (2015) (20)
- On Centralized and Localized Approximation Algorithms for Interference-Aware Broadcast Scheduling (2013) (20)
- Handbook of Optimization in Complex Networks: Communication and Social Networks (2014) (20)
- Maximizing misinformation restriction within time and budget constraints (2018) (19)
- Scalable bicriteria algorithms for the threshold activation problem in online social networks (2017) (19)
- A cutting-plane algorithm for solving a weighted influence interdiction problem (2014) (19)
- Adaptive approximation algorithms for hole healing in hybrid wireless sensor networks (2013) (19)
- Detecting misinformation in online social networks before it is too late (2016) (19)
- Leveraging Social Communities for Optimizing Cellular Device-to-Device Communications (2016) (19)
- Optimal and distributed algorithms for coverage hole healing in hybrid sensor networks (2012) (18)
- Protein-protein interaction and group testing in bipartite graphs (2005) (18)
- Evaluating Explainers via Perturbation (2019) (18)
- Monitor placement to timely detect misinformation in Online Social Networks (2015) (18)
- Structural Vulnerability Assessment of Community-Based Routing in Opportunistic Networks (2016) (18)
- On greedy construction of connected dominating sets in wireless networks: Research Articles (2005) (17)
- Bound and exact methods for assessing link vulnerability in complex networks (2014) (17)
- New techniques for approximating optimal substructure problems in power-law graphs (2012) (15)
- Detection of local community structures in complex dynamic networks with random walks. (2009) (15)
- Vulnerability of clustering under node failure in complex networks (2017) (15)
- Assessing network vulnerability in a community structure point of view (2013) (15)
- On trigger detection against reactive Jamming Attacks: A clique-independent set based approach (2009) (14)
- Leveraging Blockchain to Enhance Data Privacy in IoT-Based Applications (2018) (14)
- Threat From Being Social: Vulnerability Analysis of Social Network Coupled Smart Grid (2017) (14)
- Group Testing Theory in Network Security: An Advanced Solution (2011) (13)
- Preserving Differential Privacy in Adversarial Learning with Provable Robustness (2019) (13)
- On Approximation Algorithms for Interference-Aware Broadcast Scheduling in 2D and 3D Wireless Sensor Networks (2009) (12)
- Structural Vulnerability Analysis of Overlapping Communities in Complex Networks (2014) (12)
- Fault tolerant topology control for one-to-all communications in symmetric wireless networks (2007) (12)
- Revisiting of 'Revisiting the Stop-and-Stare Algorithms for Influence Maximization' (2018) (12)
- Efficient non-unique probes selection algorithms for DNA microarray (2008) (12)
- Decoding algorithms in pooling designs with inhibitors and error-tolerance (2007) (11)
- Efficient Multi-Link Failure Localization Schemes in All-Optical Networks (2013) (11)
- A method to detect communities with stability in social networks (2014) (11)
- Streaming k-Submodular Maximization under Noise subject to Size Constraint (2020) (11)
- Competitive Influence Maximization within Time and Budget Constraints in Online Social Networks: An Algorithmic Approach (2019) (11)
- Submodular Cost Submodular Cover with an Approximate Oracle (2019) (11)
- Privacy Issues in Light of Reconnaissance Attacks with Incomplete Information (2016) (11)
- Dynamics of Information Systems: Mathematical Foundations (2014) (10)
- A Novel Approach Against Reactive Jamming Attacks (2011) (10)
- A General Approach for Modules Identification in Evolving Networks (2010) (10)
- Finding Community Structure with Performance Guarantees in Scale-Free Networks (2011) (10)
- Approximation algorithms of non‐unique probes selection for biological target identification (2007) (10)
- Influence Maximization at Community Level: A New Challenge with Non-submodularity (2019) (9)
- Time-Critical Viral Marketing Strategy with the Competition on Online Social Networks (2016) (9)
- k-Strongly Connected m-Dominating and Absorbing Set in Wireless Ad Hoc Networks with Unidirectional Links (2007) (9)
- The walls have ears: optimize sharing for visibility and privacy in online social networks (2012) (9)
- Online Algorithms for Optimal Resource Management in Dynamic D2D Communications (2014) (9)
- On Enhancing Fault Tolerance of Virtual Backbone in a Wireless Sensor Network with Unidirectional Links (2012) (9)
- New Approximation for Minimum-Weight Routing Backbone in Wireless Sensor Network (2008) (9)
- A near-optimal adaptive algorithm for maximizing modularity in dynamic scale-free networks (2015) (8)
- Vulnerability of Interdependent Networks with Heterogeneous Cascade Models and Timescales (2018) (8)
- Multi-View Consistency for Relation Extraction via Mutual Information and Structure Prediction (2020) (8)
- Learning Interpretation with Explainable Knowledge Distillation (2021) (8)
- Fight Under Uncertainty: Restraining Misinformation and Pushing out the Truth (2018) (8)
- Data caching and query processing in MANETs (2005) (8)
- Group Testing Theory in Network Security (2012) (8)
- On detection and tracking of variant phenomena clouds (2014) (8)
- Multi-Task Learning for Metaphor Detection with Graph Convolutional Neural Networks and Word Sense Disambiguation (2020) (8)
- Adaptive Reconnaissance Attacks with Near-Optimal Parallel Batching (2017) (8)
- A Unified Approach for Domination Problems on Different Network Topologies (2013) (7)
- Finding Community Structure with Performance Guarantees in Complex Networks (2011) (7)
- A Graph-Theoretic QoS-Aware Vulnerability Assessment for Network Topologies (2010) (7)
- A Note on Optical Network with Nonsplitting Nodes (2005) (7)
- On the Hardness and Inapproximability of Optimization Problems on Power Law Graphs (2010) (7)
- Maximizing circle of trust in online social networks (2012) (7)
- Network Resilience and the Length-Bounded Multicut Problem: Reaching the Dynamic Billion-Scale with Guarantees (2018) (6)
- Auditing the Sensitivity of Graph-based Ranking with Visual Analytics (2020) (6)
- Finding Dynamic Modules of Biological Regulatory Networks (2010) (6)
- Pseudo-Separation for Assessment of Structural Vulnerability of a Network (2017) (6)
- Contract-Based Incentive Mechanism for LTE Over Unlicensed Channels (2018) (6)
- Preserving Privacy and Security in Federated Learning (2022) (6)
- Finding overlapped communities in online social networks with Nonnegative Matrix Factorization (2012) (6)
- Graphs and their Applications (2009) (6)
- Budgeted Competitive Influence Maximization on Online Social Networks (2018) (6)
- Trustless Framework for Iterative Double Auction Based on Blockchain (2019) (6)
- A combination of wireless multicast advantage and hitch-hiking (2005) (6)
- Critical nodes in interdependent networks with deterministic and probabilistic cascading failures (2018) (6)
- c-Eval: A Unified Metric to Evaluate Feature-based Explanations via Perturbation (2021) (5)
- Popular Topics Spread Faster: New Dimension for Influence Propagation in Online Social Networks (2017) (5)
- Approximation Algorithms : LP Relaxation , Rounding , and Randomized Rounding Techniques (2008) (5)
- Optimal packet scan against malicious attacks in smart grids (2016) (5)
- A Blockchain-based Iterative Double Auction Protocol using Multiparty State Channels (2020) (5)
- Resource Allocation in Highly Dynamic Device-to-Device Communication: An Adaptive Set Multi-Cover Approach (2019) (5)
- Genetic networks: processing data, regulatory network modelling and their analysis (2007) (5)
- An Approximation for Minimum Multicast Route in Optical Networks with Nonsplitting Nodes (2005) (5)
- Network Resilience and the Length-Bounded Multicut Problem (2018) (5)
- Stochastic Bilevel Distributed Optimization over a Network (2022) (5)
- Construction of Virtual Backbone with Multiple Factors Constraints in Wireless Ad-hoc Network (2010) (5)
- Efficient Bayesian Optimization for Uncertainty Reduction Over Perceived Optima Locations (2019) (5)
- On the construction of energy-efficient broadcast tree with Hitch-hiking in wireless networks (2005) (5)
- Exploiting the Robustness on Power-Law Networks (2011) (4)
- Network vulnerability assessment under cascading failures (2013) (4)
- Quantifying Privacy Vulnerability to Socialbot Attacks: An Adaptive Non-Submodular Model (2020) (4)
- Cascading Critical Nodes Detection with Load Redistribution in Complex Systems (2014) (4)
- On the complexity and approximation of non-unique probe selection using d-disjunct matrix (2009) (4)
- Minimizing Latency for Data Aggregation in Wireless Sensor Networks: An Algorithm Approach (2022) (4)
- Approximate k-Cover in Hypergraphs: Efficient Algorithms, and Applications (2019) (4)
- Importance Sample-based Approximation Algorithm for Cost-aware Targeted Viral Marketing (2019) (4)
- Dynamic Propagation Rates: New Dimension to Viral Marketing in Online Social Networks (2017) (4)
- Adaptive Crawling with Multiple Bots: A Matroid Intersection Approach (2018) (3)
- Continual Learning with Differential Privacy (2021) (3)
- Evaluating Fake News Detection Models from Explainable Machine Learning Perspectives (2021) (3)
- Privacy Preserving Distributed Energy Trading (2020) (3)
- An Approximately Optimal Bot for Non-Submodular Social Reconnaissance (2018) (3)
- Robustness of power-law networks: its assessment and optimization (2016) (3)
- Auditing on Smart-Grid With Dynamic Traffic Flows: An Algorithmic Approach (2020) (3)
- Containment of viral spread in online social networks with aid of celebrities (2011) (3)
- Influence Diffusion in Online Social Networks With Propagation Rate Changes (2020) (3)
- Network Resilience Assessment via QoS Degradation Metrics: An Algorithmic Approach (2019) (3)
- POSTER (2018) (3)
- Are communities as strong as we think? (2014) (2)
- A Graph-theoretic Framework for Identifying Trigger Nodes against Probabilistic Reactive Jamming Attacks (2010) (2)
- The evolution of overlapping communities in dynamic mobile networks (2012) (2)
- Space-Efficient and Dynamic Caching for D2D Networks of Heterogeneous Users (2018) (2)
- Spatial Motifs for Device-to-Device Network Analysis in Cellular Networks (2017) (2)
- Online set multicover algorithms for dynamic D2D communications (2017) (2)
- Blockchain-based Secure Client Selection in Federated Learning (2022) (2)
- Vulnerability Assessment of Social-Smart Grids: An Algorithmic Approach (2019) (2)
- Optimal Inspection Points for Malicious Attack Detection in Smart Grids (2014) (2)
- An efficient spectral bound for link vulnerability assessment in large-scale networks (2012) (2)
- When Decentralized Optimization Meets Federated Learning (2023) (2)
- Breaking the Bonds of Submodularity: Empirical Estimation of Approximation Ratios for Monotone Non-Submodular Greedy Maximization (2017) (2)
- On Detection of Community Structure in Dynamic Social Networks (2012) (2)
- Computational Social Networks : 4th International Conference, CSoNet 2015, Beijing, China, August 4-6, 2015, Proceedings (2015) (2)
- Denial-of-Service Vulnerability of Hash-Based Transaction Sharding: Attack and Countermeasure (2020) (2)
- Network Resilience Assessment via QoS Degradation Metrics (2019) (2)
- Network Resilience and the Length-Bounded Multicut Problem: Reaching the Dynamic Billion-Scale with Guarantees (2019) (2)
- On local approximation of minimum-latency broadcast scheduling in 3D MANETs (2011) (2)
- A Non-Unique Probes Selection Algorithm Using d-Disjunct Matrix (2007) (1)
- Guest Editorial Introduction to the Special Section on Reloading Feature-Rich Information Networks (2021) (1)
- FastHare: Fast Hamiltonian Reduction for Large-scale Quantum Annealing (2022) (1)
- Group Testing Theory (2012) (1)
- A Novel Key Management and Data Encryption Method for Metering Infrastructure of Smart Grid (2017) (1)
- NeuCEPT: Learn Neural Networks’ Mechanism via Critical Neurons with Precision Guarantee (2022) (1)
- Optimizing Resource Allocation and VNF Embedding in RAN Slicing (2022) (1)
- Computational Data and Social Networks (2018) (1)
- Optimal Auditing on Smart-Grid Networks (2018) (1)
- ACM SIGMETRICS International Workshop on Critical Infrastructure Network Security (2019) (1)
- Computing and combinatorics : 16th annual international conference, COCOON 2010, Nha Trang, Vietnam, July 19-21, 2010 : proceedings (2010) (1)
- Measuring Edge Sparsity on Large Social Networks (2020) (1)
- Scalable approximations to k-cycle transversal problems on dynamic networks (2019) (1)
- Guest editorial: Special issue on wireless computing and networking (2012) (1)
- NeuCEPT: Locally Discover Neural Networks' Mechanism via Critical Neurons Identification with Precision Guarantee (2022) (1)
- zVote: A Blockchain-based Privacy-preserving Platform for Remote E-voting (2022) (1)
- Minimum Robust Multi-Submodular Cover for Fairness (2020) (1)
- Hardness Complexity of Optimal Substructure Problems on Power-Law Graphs (2012) (1)
- Modularity Maximization in Complex Networks (2016) (1)
- Enforcing Resource Allocation and VNF Embedding in RAN Slicing (2021) (1)
- Network Resilience Assessment via QoS Degradation Metrics (2019) (1)
- Localized Energy Efficient Detection and Tracking of Dynamic Phenomena (2010) (1)
- EMaP: Explainable AI with Manifold-based Perturbations (2022) (1)
- Multiple reference networks improve accuracy of signaling network construction (2015) (1)
- Approximation Algorithms : The Primal-Dual Method (2008) (1)
- Scalable and Adaptive Algorithms for the Triangle Interdiction Problem on Billion-Scale Networks (2017) (1)
- An Explainer for Temporal Graph Neural Networks (2022) (1)
- Supporting a Storm: The Impact of Community on #GamerGate's Lifespan (2020) (1)
- Deterministic & Adaptive Non-Submodular Maximization via the Primal Curvature (2017) (1)
- Guest Editorial: Computing and Combinatorics (2012) (0)
- Exploring Spatial, Temporal, and Logical Attacks on the Bitcoin Network (2019) (0)
- Construction of Signaling Pathways with RNAi Data and Multiple Reference Networks (2018) (0)
- Cultural-aware Machine Learning based Analysis of COVID-19 Vaccine Hesitancy (2023) (0)
- Group testing theory in network security / My T. Thai (2012) (0)
- Preface (2014) (0)
- Size Constraint Group Testing and DoS Attacks (2012) (0)
- LAVA: Granular Neuron-Level Explainable AI for Alzheimer's Disease Assessment from Fundus Images (2023) (0)
- On Multi-Link Failure Localization in All-Optical Networks (2010) (0)
- A near-optimal adaptive algorithm for maximizing modularity in dynamic scale-free networks (2013) (0)
- On the approximability of positive influence dominating set in social networks (2012) (0)
- Exploring Partitioning Attacks on the Bitcoin Network (2022) (0)
- Online set multicover algorithms for dynamic D2D communications (2017) (0)
- Investigating the Dynamics of Social Norm Emergence within Online Communities (2023) (0)
- Staying safe and visible via message sharing in online social networks (2013) (0)
- Proceedings of the 16th annual international conference on Computing and combinatorics (2010) (0)
- Approximation Algorithms for Optimization Problems in Random Power-Law Graphs (2014) (0)
- Vulnerability of D2D Communications from Interconnected Social Networks (2017) (0)
- XRand: Differentially Private Defense against Explanation-Guided Attacks (2022) (0)
- Maximizing misinformation restriction within time and budget constraints (2018) (0)
- 2-Connected Dominating Set inWireless Networks (Invited Talk Abstract) (2006) (0)
- Staying safe and visible via message sharing in online social networks (2014) (0)
- On the Convergence of Distributed Stochastic Bilevel Optimization Algorithms over a Network (2022) (0)
- Multicut and Sparesest-Cut problem (2009) (0)
- O ( log n )-Localized Algorithms on the Coverage Problem in Wireless Sensor Networks (2005) (0)
- Mathematical Approaches to WMD Defense and Vulnerability Assessments of Dynamic Networks (2016) (0)
- On the Limit of Explaining Black-box Temporal Graph Neural Networks (2022) (0)
- Length-Bounded Paths Interdiction in Continuous Domain for Network Performance Assessment (2020) (0)
- A Note on Network Vulnerability (2011) (0)
- Deep Graph Representation Learning and Optimization for Influence Maximization (2023) (0)
- Cost-aware Targeted Viral Marketing: Approximation with Less Samples. (2019) (0)
- Combating Weapons of Mass Destruction: Models, Complexity, and Algorithms in Complex Dynamic and Evolving Networks (2015) (0)
- Efficient Algorithms for Monotone Non-Submodular Maximization with Partition Matroid Constraint (2022) (0)
- Randomized Fault Tolerant Group Testing and Advanced Security (2012) (0)
- Interference Free Group Testing and Reactive Jamming Attacks (2012) (0)
- A cutting-plane algorithm for solving a weighted influence interdiction problem (2013) (0)
- Guest Editorial: Computing and Combinatorics (2012) (0)
- Computing and Combinatorics (1995) (0)
- SaPHyRa: A Learning Theory Approach to Ranking Nodes in Large Networks (2022) (0)
- Bound and exact methods for assessing link vulnerability in complex networks (2014) (0)
- Session details: Special Issue on the Workshop on Critical Infrastructure Network Security (CINS) 2017 (2017) (0)
- Active Membership Inference Attack under Local Differential Privacy in Federated Learning (2023) (0)
- Towards An Optimal Solution to Place Bistatic Radars for Belt Barrier Coverage with Minimum Cost (2022) (0)
- Robustness of power-law networks: its assessment and optimization (2015) (0)
- Guest Editorial Introduction to the Special Section on Scalability and Privacy in Social Networks (2020) (0)
- Welcome message from the Editors-in-Chief (2021) (0)
- Message from the SAWN 2006 Workshop Co-chairs (2006) (0)
- Energy efficiency in wireless sensor networks (2005) (0)
- Heterogeneous Randomized Response for Differential Privacy in Graph Neural Networks (2022) (0)
- Discrete optimization for network security and reliability (2011) (0)
- Vulnerability of clustering under node failure in complex networks (2017) (0)
- Black-Box and Data-Driven Computation (2021) (0)
- Breakdown by Rumors: Vulnerability of D2D Communications from Online Social Networks (2017) (0)
- Critical nodes in interdependent networks with deterministic and probabilistic cascading failures (2018) (0)
- Hardness and Approximation of Network Vulnerability (2013) (0)
- Lifelong DP: Consistently Bounded Differential Privacy in Lifelong Machine Learning (2022) (0)
- A method to detect communities with stability in social networks (2014) (0)
- Lecture MAX k-FUNCTION SAT (2009) (0)
- Groups Influence with Minimum Cost in Social Networks (2021) (0)
- Corrections to “Least Cost Influence Maximization Across Multiple Social Networks” [Apr 16 929-939] (2016) (0)
- Fault TolerantTopologyControl for All-to-One and One-to-All Communicationin WirelessNetworks (2005) (0)
- Scalable approximations to k-cycle transversal problems on dynamic networks (2018) (0)
- QuTIE: Quantum optimization for Target Identification by Enzymes (2023) (0)
- Minimum Matching Dominating Sets and Its Applications in Wireless Networks (2016) (0)
This paper list is powered by the following services:
Other Resources About My T. Thai
What Schools Are Affiliated With My T. Thai?
My T. Thai is affiliated with the following schools: