Cited By
View all- Kasana SSharma MGupta S(2025)A Systematic Security Analysis of Existing Sybil Attack-Resilient Defensive Methodologies in Blockchain NetworkConvergence of Cybersecurity and Cloud Computing10.4018/979-8-3693-6859-6.ch009(191-224)Online publication date: 10-Jan-2025
- Liao MZhou JLi RDai QChen HWang G(2024)Efficient and Provable Effective Resistance Computation on Large Graphs: An Index-based ApproachProceedings of the ACM on Management of Data10.1145/36549362:3(1-27)Online publication date: 30-May-2024
- Peng JLei RWei ZSerra ESpezzano F(2024)Beyond Over-smoothing: Uncovering the Trainability Challenges in Deep Graph Neural NetworksProceedings of the 33rd ACM International Conference on Information and Knowledge Management10.1145/3627673.3679776(1878-1887)Online publication date: 21-Oct-2024
- Show More Cited By