


default search action
IEEE Transactions on Computational Social Systems, Volume 2
Volume 2, Number 1, March 2015
- Md. Imrul Kayes, Jacob Chakareski:
Retention in Online Blogging: A Case Study of the Blogster Community. 1-14
Volume 2, Number 2, June 2015
- Noseong Park, Edoardo Serra
, Tom Snitch, V. S. Subrahmanian:
APE: A Data-Driven, Behavioral Model-Based Anti-Poaching Engine. 15-37
Volume 2, Number 3, September 2015
- Mianxiong Dong, Rajiv Ranjan
, Albert Y. Zomaya
, Man Lin:
Guest Editorial on Advances in Tools and Techniques for Enabling Cyber-Physical-Social Systems - Part I. 38-40 - Kuan Zhang
, Xiaohui Liang, Rongxing Lu, Xuemin Shen
:
PIF: A Personalized Fine-Grained Spam Filtering Scheme With Privacy Preservation in Mobile Social Networks. 41-52 - Li Lu, Yongshuai Liu:
Safeguard: User Reauthentication on Smartphones via Behavioral Biometrics. 53-64 - Chao Chen, Jun Zhang, Yi Xie, Yang Xiang, Wanlei Zhou
, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi, Majed A. AlRubaian:
A Performance Evaluation of Machine Learning-Based Streaming Spam Tweets Detection. 65-76 - Hongyang Zhao, Huan Zhou, Chengjue Yuan, Yinghua Huang, Jiming Chen:
Social Discovery: Exploring the Correlation Among Three-Dimensional Social Relationships. 77-87 - Zheng Yan
, Wei Feng
, Pu Wang:
Anonymous Authentication for Trustworthy Pervasive Social Networking. 88-98 - Gang Liang, Wenbo He
, Chun Xu, Liangyin Chen, Jinquan Zeng:
Rumor Identification in Microblogging Systems Based on Users' Behavior. 99-108 - Prem Prakash Jayaraman
, João Bártolo Gomes, Hai-Long Nguyen, Zahraa Said Abdallah
, Shonali Krishnaswamy, Arkady B. Zaslavsky:
Scalable Energy-Efficient Distributed Data Analytics for Crowdsensing Applications in Mobile Environments. 109-123
Volume 2, Number 4, December 2015
- Mianxiong Dong, Rajiv Ranjan
, Albert Y. Zomaya
, Man Lin:
Guest Editorial on Advances in Tools and Techniques for Enabling Cyber-Physical-Social Systems - Part II. 124-126 - Katsuya Suto, Keisuke Miyanabe, Hiroki Nishiyama
, Nei Kato
, Hirotaka Ujikawa, Ken-Ichi Suzuki:
QoE-Guaranteed and Power-Efficient Network Operation for Cloud Radio Access Network With Power Over Fiber. 127-136 - Mi Wen, Kaoru Ota
, He Li
, Jingsheng Lei, Chunhua Gu, Zhou Su:
Secure Data Deduplication With Reliable Key Management for Dynamic Updates in CPSS. 137-147 - Yang Liu, Shiyan Hu:
Cyberthreat Analysis and Detection for Energy Theft in Social Networking of Smart Homes. 148-158 - Yuan Zhang
, Chunxiang Xu, Shui Yu
, Hongwei Li, Xiaojun Zhang:
SCLPV: Secure Certificateless Public Verification for Cloud-Based Cyber-Physical-Social Systems Against Malicious Auditors. 159-170 - Charith Perera, Dumidu S. Talagala, Chi Harold Liu, Júlio Cezar Estrella:
Energy-Efficient Location and Activity-Aware On-Demand Mobile Distributed Sensing Platform for Sensing as a Service in IoT Clouds. 171-181 - Nikos Tziritas, Thanasis Loukopoulos, Samee U. Khan
, Cheng-Zhong Xu
:
Distributed Algorithms for the Operator Placement Problem. 182-196

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.