[1] |
LIU Shengjiu, LI Tianrui, LIU Jia, XIE Peng.
Research and Application of Hypernetwork Energy
[J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(4): 682-689.
|
[2] |
ZHANG Mingjun, YANG Sihua, YAO Bing.
Exploring Relationship Between Traditional Lattices and Graph Lattices of Topological Coding
[J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(11): 2171-2183.
|
[3] |
MU Junfang, LIANG Jiye, ZHENG Wenping, LIU Shaoqian, WANG Jie.
Node Similarity Measure for Complex Networks
[J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(5): 749-759.
|
[4] |
CHEN Kejia, CHEN Liming, WU Tong.
Survey on Community Detection in Multi-layer Networks
[J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(11): 1801-1812.
|
[5] |
ZHOU Hanxun, YANG Yang, FENG Runze, XIONG Junkun, WAN Ming, GUO Wei.
Stochastic Propagation Model of Worms in Internet of Vehicles
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(9): 1524-1533.
|
[6] |
JIANG Cheng, ZHANG Jun, LU Shan.
Research on Models and Algorithms for Critical Nodes Group Identification Problem in Complex Networks
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(8): 1319-1330.
|
[7] |
JIANG Miaomiao, SUN Gengxin, BIN Sheng.
Community Detection Algorithm in Multiple Relationships Online Social Network
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(7): 1134-1144.
|
[8] |
QIAN Fulan, YANG Qiang, MA Chuang, ZHANG Yanping.
Link Prediction Algorithm of Weighted Friend Recommendation Model
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(3): 383-393.
|
[9] |
FENG Lizhou, QIN Yue, YANG Guijun.
Community Detection Algorithm with Difference of Node-Local Fiedler Vector Centrality
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(12): 2029-2042.
|
[10] |
SONG Jiaxiu, YANG Xiaocui, ZHANG Xihuang.
Top-k Influential Nodes Identification Algorithm in Complex Networks
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(6): 928-939.
|
[11] |
ZHANG Sheng, ZHAO Jue, CHEN Rongyuan.
Research Advances on Network Security Logs Visualization
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(5): 681-696.
|
[12] |
LI Kai, ZHANG Xizhe, SHEN Yupei, CHEN Enhong.
Analysis of Human Interactive Behavior Based on Phone Communication Networks
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(5): 777-784.
|
[13] |
ZHAO Chao, WANG Huiqiang, LIN Junyu, LV Hongwu, HAN Jizhong.
Attack Graph Analysis Method for Large Scale Network Security Hardening
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(2): 263-273.
|
[14] |
GAO Ni, HE Yiyue, SHEN Yuan, GAO Ling.
Hierarchical Vulnerability Remediation Model Based on Vulnerability Type Clustering
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(2): 274-281.
|
[15] |
YANG Xiaocui, SONG Jiaxiu, ZHANG Xihuang.
Link Prediction Algorithm Based on Collective Influence and Edge Clustering Information
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(12): 1914-1925.
|