构造基于推荐的 Peer-to-Peer 环境下的 Trust 模型 窦文, 王怀民, 贾焰, 邹鹏 软件学报 15 (4), 2004 | 317 | 2004 |
构造基于推荐的 Peer-to-Peer 环境下的 Trust 模型 窦文, 王怀民, 贾焰, 邹鹏 | 317* | |
A recommendation-based peer-to-peer trust model W Dou, HM Wang, Y Jia, P Zou Journal of software 15 (4), 571-583, 2004 | 281* | 2004 |
Continuous privacy preserving publishing of data streams B Zhou, Y Han, J Pei, B Jiang, Y Tao, Y Jia Proceedings of the 12th International Conference on Extending Database …, 2009 | 131 | 2009 |
Community detection in incomplete information networks W Lin, X Kong, PS Yu, Q Wu, Y Jia, C Li Proceedings of the 21st international conference on World Wide Web, 341-350, 2012 | 120 | 2012 |
分布式数据库技术 贾焰, 王志英, 韩伟红, 李霖 第一版. 国防工业出版社, 2000 | 119 | 2000 |
Identifying users across social networks based on dynamic core interests Y Nie, Y Jia, S Li, X Zhu, A Li, B Zhou Neurocomputing 210, 107-115, 2016 | 115 | 2016 |
Understanding importance of collaborations in co-authorship networks: A supportiveness analysis approach Y Han, B Zhou, J Pei, Y Jia Proceedings of the 2009 SIAM International Conference on Data Mining, 1112-1123, 2009 | 75 | 2009 |
Mining topical influencers based on the multi-relational network in micro-blogging sites D Zhaoyun, J Yan, Z Bin, H Yi China Communications 10 (1), 93-104, 2013 | 66 | 2013 |
Research and development of provable data integrity in cloud storage S Tan, Y Jia, WH Han Chinese Journal of Computers 38 (1), 164-177, 2015 | 55 | 2015 |
微博数据挖掘研究综述 丁兆云, 贾 焰, 周 斌 计算机研究与发展 51 (4), 691-706, 2014 | 53 | 2014 |
Mining user interest in microblogs with a user-topic model D Li, H., Yan, J., Weihong, H., Zhaoyun China Communications 11 (8), 131-144, 2014 | 52 | 2014 |
基于非合作动态博弈的网络安全主动防御技术研究 林旺群, 王慧, 刘家红, 邓镭, 李爱平, 吴泉源, 贾焰 计算机研究与发展 48 (2), 306-316, 2011 | 47 | 2011 |
Instant message clustering based on extended vector space model L Wang, Y Jia, W Han International Symposium on Intelligence Computation and Applications, 435-443, 2007 | 47 | 2007 |
A method for achieving provable data integrity in cloud computing A Li, S Tan, Y Jia The Journal of Supercomputing, 1-17, 2016 | 44 | 2016 |
Measuring the spreadability of users in microblogs Z Ding, Y Jia, B Zhou, Y Han, L He, J Zhang Journal of Zhejiang University SCIENCE C 14 (9), 701-710, 2013 | 42 | 2013 |
云存储中的数据完整性证明研究及进展 谭霜, 贾焰, 韩伟红 计算机学报 38 (1), 164-177, 2015 | 40 | 2015 |
隐私计算研究范畴及发展趋势 李凤华, 李晖, 贾焰, 俞能海, 翁健 通信学报 37 (4), 1-11, 2016 | 37 | 2016 |
A P2P approach for global computing W Dou, Y Jia, HM Wang, WQ Song, P Zou Parallel and Distributed Processing Symposium, 2003. Proceedings …, 2003 | 34 | 2003 |
An efficient method for checking the integrity of data in the Cloud T Shuang, T Lin, L Xiaoling, J Yan China Communications 11 (9), 68-81, 2014 | 33 | 2014 |