A survey of IoT applications in blockchain systems: Architecture, consensus, and traffic modeling

L Lao, Z Li, S Hou, B Xiao, S Guo, Y Yang - ACM Computing Surveys …, 2020 - dl.acm.org
Blockchain technology can be extensively applied in diverse services, including online
micro-payments, supply chain tracking, digital forensics, health-care record sharing, and …

Detecting and preventing cyber insider threats: A survey

L Liu, O De Vel, QL Han, J Zhang… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Information communications technology systems are facing an increasing number of cyber
security threats, the majority of which are originated by insiders. As insiders reside behind …

Software vulnerability detection using deep neural networks: a survey

G Lin, S Wen, QL Han, J Zhang… - Proceedings of the …, 2020 - ieeexplore.ieee.org
The constantly increasing number of disclosed security vulnerabilities have become an
important concern in the software industry and in the field of cybersecurity, suggesting that …

Influence maximization on social graphs: A survey

Y Li, J Fan, Y Wang, KL Tan - IEEE Transactions on Knowledge …, 2018 - ieeexplore.ieee.org
Influence Maximization (IM), which selects a set of k users (called seed set) from a social
network to maximize the expected number of influenced users (called influence spread), is a …

Defensive modeling of fake news through online social networks

G Shrivastava, P Kumar, RP Ojha… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Online social networks (OSNs) have become an integral mode of communication among
people and even nonhuman scenarios can also be integrated into OSNs. The evergrowing …

Cost-efficient strategies for restraining rumor spreading in mobile social networks

Z He, Z Cai, J Yu, X Wang, Y Sun… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
With the popularity of mobile devices, mobile social networks (MSNs) have become an
important platform for information dissemination. However, the spread of rumors in MSNs …

[HTML][HTML] Detection of fake news using deep learning CNN–RNN based methods

IK Sastrawan, IPA Bayupati, DMS Arsa - ICT express, 2022 - Elsevier
Fake news is inaccurate information that is intentionally disseminated for a specific purpose.
If allowed to spread, fake news can harm the political and social spheres, so several studies …

Building trust/distrust relationships on signed social service network through privacy-aware link prediction process

H Kou, H Liu, Y Duan, W Gong, Y Xu, X Xu, L Qi - Applied Soft Computing, 2021 - Elsevier
With the ever-increasing popularity of social software, we can easily establish a signed
social n etwork (SSN) by capturing users' attitudes (ie, trust/distrust, friend/enemies …

A survey on security issues in services communication of Microservices‐enabled fog applications

D Yu, Y Jin, Y Zhang, X Zheng - Concurrency and Computation …, 2019 - Wiley Online Library
Fog computing is used as a popular extension of cloud computing for a variety of emerging
applications. To incorporate various design choices and customized policies in fog …

Controlling of fake information dissemination in online social networks: an epidemiological approach

RP Ojha, PK Srivastava, S Awasthi, V Srivastava… - IEEE …, 2023 - ieeexplore.ieee.org
Due to the fast advancement of Internet technology, the popularity of Online Social Networks
(OSN) over the Internet is increasing day by day. In the modern world, people are using OSN …