These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

113 related articles for article (PubMed ID: 32872799)

  • 1. The impact of malicious nodes on the spreading of false information.
    Ruan Z; Yu B; Shu X; Zhang Q; Xuan Q
    Chaos; 2020 Aug; 30(8):083101. PubMed ID: 32872799
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Information filtering by smart nodes in random networks.
    Ruan Z; Wang J; Xuan Q; Fu C; Chen G
    Phys Rev E; 2018 Aug; 98(2-1):022308. PubMed ID: 30253588
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Evidence of complex contagion of information in social media: An experiment using Twitter bots.
    Mønsted B; Sapieżyński P; Ferrara E; Lehmann S
    PLoS One; 2017; 12(9):e0184148. PubMed ID: 28937984
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Robust and Cooperative Localization for Underwater Sensor Networks in the Existence of Malicious Anchors.
    Cai W; Yang J; Zhang M; Peng S; Yang J
    Sensors (Basel); 2019 Oct; 19(20):. PubMed ID: 31627437
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Man-In-The-Middle Attacks in Vehicular Ad-Hoc Networks: Evaluating the Impact of Attackers' Strategies.
    Ahmad F; Adnane A; Franqueira VNL; Kurugollu F; Liu L
    Sensors (Basel); 2018 Nov; 18(11):. PubMed ID: 30463282
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Disrupting drive-by download networks on Twitter.
    Javed A; Ikwu R; Burnap P; Giommoni L; Williams ML
    Soc Netw Anal Min; 2022; 12(1):117. PubMed ID: 36035378
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Evolutionary game model based on cumulative prospect theory for information management mechanism in SIoT.
    Liu S; Ma Y; Chen X
    Heliyon; 2023 Jun; 9(6):e16590. PubMed ID: 37292283
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Guiding propagation to localized target nodes in complex networks.
    Zhang A; Zeng A; Fan Y; Di Z
    Chaos; 2021 Jul; 31(7):073104. PubMed ID: 34340325
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Developing an agent-based model to minimize spreading of malicious information in dynamic social networks.
    Alassad M; Hussain MN; Agarwal N
    Comput Math Organ Theory; 2023 Apr; ():1-16. PubMed ID: 37360911
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Attack and flee: game-theory-based analysis on interactions among nodes in MANETs.
    Li F; Yang Y; Wu J
    IEEE Trans Syst Man Cybern B Cybern; 2010 Jun; 40(3):612-22. PubMed ID: 20031501
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Malicious traffic detection combined deep neural network with hierarchical attention mechanism.
    Liu X; Liu J
    Sci Rep; 2021 Jun; 11(1):12363. PubMed ID: 34117338
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Kinetics of Social Contagion.
    Ruan Z; Iñiguez G; Karsai M; Kertész J
    Phys Rev Lett; 2015 Nov; 115(21):218702. PubMed ID: 26636878
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Outbreak detection for temporal contact data.
    Sterchi M; Sarasua C; Grütter R; Bernstein A
    Appl Netw Sci; 2021; 6(1):17. PubMed ID: 33681456
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Spreading to localized targets in complex networks.
    Sun Y; Ma L; Zeng A; Wang WX
    Sci Rep; 2016 Dec; 6():38865. PubMed ID: 27966613
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Synergistic interactions promote behavior spreading and alter phase transitions on multiplex networks.
    Liu QH; Wang W; Cai SM; Tang M; Lai YC
    Phys Rev E; 2018 Feb; 97(2-1):022311. PubMed ID: 29548211
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Benchmarking seeding strategies for spreading processes in social networks: an interplay between influencers, topologies and sizes.
    Montes F; Jaramillo AM; Meisel JD; Diaz-Guilera A; Valdivia JA; Sarmiento OL; Zarama R
    Sci Rep; 2020 Feb; 10(1):3666. PubMed ID: 32111953
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Combating QR-Code-Based Compromised Accounts in Mobile Social Networks.
    Guo D; Cao J; Wang X; Fu Q; Li Q
    Sensors (Basel); 2016 Sep; 16(9):. PubMed ID: 27657071
    [TBL] [Abstract][Full Text] [Related]  

  • 18. A metric of influential spreading during contagion dynamics through the air transportation network.
    Nicolaides C; Cueto-Felgueroso L; González MC; Juanes R
    PLoS One; 2012; 7(7):e40961. PubMed ID: 22829902
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Mechanistic modelling of viral spreading on empirical social network and popularity prediction.
    Ma S; Feng L; Lai CH
    Sci Rep; 2018 Sep; 8(1):13126. PubMed ID: 30177853
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Hipsters on networks: How a minority group of individuals can lead to an antiestablishment majority.
    Juul JS; Porter MA
    Phys Rev E; 2019 Feb; 99(2-1):022313. PubMed ID: 30934370
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.