- Complex Network Analysis Techniques
- Opinion Dynamics and Social Influence
- Network Security and Intrusion Detection
- Spam and Phishing Detection
- Caching and Content Delivery
- Advanced Graph Neural Networks
- Quantum Computing Algorithms and Architecture
- Quantum Information and Cryptography
- Peer-to-Peer Network Technologies
- Non-Invasive Vital Sign Monitoring
- Opportunistic and Delay-Tolerant Networks
- Mobile Ad Hoc Networks
- Internet Traffic Analysis and Secure E-voting
- Software-Defined Networks and 5G
- Bioinformatics and Genomic Networks
- Complexity and Algorithms in Graphs
- Privacy-Preserving Technologies in Data
- Advanced Graph Theory Research
- Graph theory and applications
- Infrastructure Resilience and Vulnerability Analysis
- Optimization and Search Problems
- Healthcare Technology and Patient Monitoring
- Data Visualization and Analytics
- Stochastic Gradient Optimization Techniques
- Gaze Tracking and Assistive Technology
Virginia Commonwealth University
2015-2024
Vinh University
2024
U.S. Army Engineer Research and Development Center
2016
University of Florida
2009-2014
Chemnitz University of Technology
2012
Influence Maximization (IM), that seeks a small set of key users who spread the influence widely into network, is core problem in multiple domains. It finds applications viral marketing, epidemic control, and assessing cascading failures within complex systems. Despite huge amount effort, IM billion-scale networks such as Facebook, Twitter, World Wide Web has not been satisfactorily solved. Even state-of-the-art methods TIM+ IMM may take days on those networks. In this paper, we propose SSA...
AI and blockchain are among the most disruptive technologies will fundamentally reshape how we live, work, interact. The authors summarize existing efforts discuss promising future of their integration, seeking to answer question: What can smart, decentralized, secure systems do for our society?
Social networks exhibit a very special property: community structure. Understanding the network structure is of great advantages. It not only provides helpful information in developing more social-aware strategies for social problems but also promises wide range applications enabled by mobile networking, such as routings Mobile Ad Hoc Networks (MANETs) and worm containments cellular networks. Unfortunately, understanding this challenging, especially dynamic where activities interactions are...
Many practical problems on Mobile networking, such as routing strategies in MANETs, sensor reprogramming WSNs and worm containment online social networks (OSNs) share an ubiquitous, yet interesting feature their organizations: community structure. Knowledge of this structure provides us not only crucial information about the network principles, but also key insights into designing more effective algorithms for enabled by networking. However, understanding is extremely challenging dynamic...
Society relies heavily on its networked physical infrastructure and information systems. Accurately assessing the vulnerability of these systems against disruptive events is vital for planning risk management. Existing approaches to assessments large-scale mainly focus investigating inhomogeneous properties underlying graph elements. These measures associated heuristic solutions are limited in evaluating network topologies. Furthermore, often fail provide performance guarantees proposed...
Online social networks (OSNs) provide a new platform for product promotion and advertisement. Influence maximization problem arisen in viral marketing has received lot of attentions recently. Most the existing diffusion models rely on one fundamental assumption that an influenced user necessarily adopts encourages his/her friends to further adopt it. However, may be just aware product. Due personal preference, neutral or negative opinion can generated so adoption is uncertain. Maximizing...
Online social networks have been one of the most effective platforms for marketing and advertising. Through "world-of-mouth" exchanges, so-called viral marketing, influence product adoption can spread from few key influencers to billions users in network. To identify those influencers, a great amount work has devoted Influence Maximization (IM) problem that seeks set k seed maximize expected influence. Unfortunately, IM encloses two impractical assumptions: 1) any user be acquired with same...
Community structure is one of the most commonly observed features Online Social Networks (OSNs) in reality. The knowledge this feature great advantage: it not only provides helpful insights into developing more efficient social-aware solutions but also promises a wide range applications enabled by social and mobile networking, such as routing strategies Mobile Ad Hoc (MANETs) worm containment OSNs. Unfortunately, understanding very challenging, especially dynamic networks where interactions...
A major challenge in blockchain sharding protocols is that more than 95% transactions are cross-shard. Not only those cross-shard degrade the system throughput but also double confirmation time, and exhaust an already scarce network bandwidth. Are imminent for schemes? In this paper, we propose a new paradigm, called OptChain, which minimized, resulting almost twice faster time throughput. By treating as stream of nodes online graph, OptChain utilizes lightweight on-the-fly transaction...
We present CapBand, a battery-free hand gesture recognition wearable in the form of wristband. The key challenges creating such system are (1) to sense useful gestures at ultra-low power so that device can be powered by limited energy harvestable from surrounding environment and (2) make work reliably without requiring training every time user puts on successive capacitance sensing, an sensing technique, capture small skin deformations due muscle tendon movements user's wrist, which...
Online social networks (OSNs) have become one of the most effective channels for marketing and advertising. Since users are often influenced by their friends, "word-of-mouth" exchanges, so-called viral marketing, in can be used to increase product adoption or widely spread content over network. The common perception about being cheap, easy, massively makes it an ideal replacement traditional However, recent studies revealed that propagation fades quickly within only few hops from sources,...
Online social networks have been one of the most effective platforms for marketing and advertising. Through “world-of-mouth” exchanges, so-called viral marketing, influence product adoption can spread from few key influencers to billions users in network. To identify those influencers, a great amount work has devoted maximization (IM) problem that seeks set k seed maximize expected influence. Unfortunately, IM encloses two impractical assumptions: 1) any user be acquired with same cost 2)...
Frequent blood pressure (BP) assessment is key to the diagnosis and treatment of many severe diseases, such as heart failure, kidney hypertension, hemodialysis. Current "gold-standard'' BP measurement techniques require complete blockage flow, which causes discomfort disruption normal activity when done repetitively frequently. Unfortunately, patients with hypertension or hemodialysis often have get their measured every 15 minutes for a duration 4-5 hours more. The wearing cumbersome limited...
Assessing network vulnerability before potential disruptive events such as natural disasters or malicious attacks is vital for planning and risk management. It enables us to seek safeguard against most destructive scenarios in which the overall connectivity falls dramatically. Existing assessments mainly focus on investigating inhomogeneous properties of graph elements, node degree example, however, these measures corresponding heuristic solutions can provide neither an accurate evaluation...
Critical infrastructures such as communication networks, electrical grids, and transportation systems are highly vulnerable to natural disasters malicious attacks. Even failures of few nodes or links may have a profound impact on large parts the system. Traditionally, network vulnerability assessment methods separate studies node link vulnerability, thus ignore joint attack schemes that cause grave damage network. To this end, we introduce new method, called β-disruptor, unifies both...
Many communication networks such as Mobile Ad Hoc Networks (MANETs) involve in human interactions and exhibit properties of social networks. Hence, it is interesting to see how knowledge from can be used enhance the processes. We focus on use identifying modular structure improve efficiency routing strategies. Since nodes mobility a network often alters its requires recomputing modules scratch, updating main bottleneck current social-aware strategies where have limited processing speed....
Many networks, indifferent of their function and scope, converge to a scale-free architecture in which the degree distribution approximately follows power law. Meanwhile, many those networks are found be naturally divided into communities densely connected nodes, known as community structure. Finding this structure is fundamental but challenging topic network science. Since Newman's suggestion using modularity measure qualify strength structure, efficient methods that find based on...
This paper explores a new wearable system, called TYTH, that enables novel form of human computer interaction based on the relative location and between user's tongue teeth. TYTH allows its user to interact with computing system by tapping their is analogous using finger type keypad except substitutes for teeth keyboard. We study neurological anatomical structures design so obtrusiveness social awkwardness caused minimized while maximizing accuracy sensing sensitivity. From behind ears,...
Microsleep, caused by sleep deprivation, apnea, and narcolepsy, costs the U.S.'s economy more than $411 billion/year because of work performance reduction, injuries, traffic accidents. Mitigating microsleep's consequences require an unobtrusive, reliable, socially acceptable microsleep detection solution throughout day, every day. Unfortunately, existing solutions do not meet these requirements.
In this paper, we study the cost-aware target viral marketing (CTVM) problem, a generalization of influence maximization. CTVM asks for most cost-effective users to relevant users. contrast vast literature, attempt offer exact solutions. As problem is NP-hard, thus, solutions are intractable, propose TipTop, <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="LaTeX">$(1-\epsilon)$ </tex-math></inline-formula> -optimal...
Online social networks (OSNs) have become one of the most effective channels for marketing and advertising. Since users are often influenced by their friends, "word-of-mouth" exchanges so-called viral in can be used to increases product adoption or widely spread content over network. The common perception about being cheap, easy, massively makes it an ideal replacement traditional However, recent studies revealed that propagation fades quickly within only few hops from sources, counteracting...
Network vulnerability assessment is an indispensable component of attack risk reduction and proactive response. However, traditional methods simply assume the attacks only target at nodes with high degree or betweenness centrality, thus fail to capture worst-case scenarios under simultaneous failures. In our previous work, we formulated assessing network as optimization problems, so-called β-edge disruptor β-vertex disruptor, identify minimum cost critical infrastructures that removal expose...
Influence Maximization (IM), that seeks a small set of key users who spread the influence widely into network, is core problem in multiple domains. It finds applications viral marketing, epidemic control, and assessing cascading failures within complex systems. Despite huge amount effort, IM billion-scale networks such as Facebook, Twitter, World Wide Web has not been satisfactorily solved. Even state-of-the-art methods TIM+ IMM may take days on those networks. In this paper, we propose SSA...