| On greedy construction of connected dominating sets in wireless networks Y Li, MT Thai, F Wang, CW Yi, PJ Wan, DZ Du Wireless Communications and Mobile Computing 5 (8), 927-932, 2005 | 264 | 2005 |
| Connected dominating sets in wireless networks with different transmission ranges MT Thai, F Wang, D Liu, S Zhu, DZ Du IEEE transactions on mobile computing 6 (7), 721-730, 2007 | 227 | 2007 |
| On the construction of 2-connected virtual backbone in wireless networks F Wang, MT Thai, DZ Du IEEE Transactions on wireless communications 8 (3), 1230-1237, 2009 | 193 | 2009 |
| Diffusive logistic model towards predicting information diffusion in online social networks F Wang, H Wang, K Xu 2012 32nd international conference on distributed computing systems …, 2012 | 184 | 2012 |
| Coverage problems in wireless sensor networks: designs and analysis MT Thai, F Wang, DH Du, X Jia International Journal of Sensor Networks 3 (3), 191-200, 2008 | 175 | 2008 |
| On positive influence dominating sets in social networks F Wang, H Du, E Camacho, K Xu, W Lee, Y Shi, S Shan Theoretical Computer Science 412 (3), 265-269, 2011 | 138 | 2011 |
| Detecting fake news over online social media via domain reputations and content understanding K Xu, F Wang, H Wang, B Yang Tsinghua Science and Technology 25 (1), 20-27, 2019 | 118 | 2019 |
| Positive influence dominating set in online social networks F Wang, E Camacho, K Xu Combinatorial Optimization and Applications, 313-321, 2009 | 114 | 2009 |
| Characterizing information diffusion in online social networks with linear diffusive model F Wang, H Wang, K Xu, J Wu, X Jia 2013 IEEE 33rd international conference on distributed computing systems …, 2013 | 108 | 2013 |
| Constructing k-connected m-dominating sets in wireless sensor networks Y Wu, F Wang, MT Thai, Y Li MILCOM 2007-IEEE Military Communications Conference, 1-7, 2007 | 107 | 2007 |
| Iotargos: A multi-layer security monitoring system for internet-of-things in smart homes Y Wan, K Xu, G Xue, F Wang IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 874-883, 2020 | 91 | 2020 |
| Modeling Information Diffusion in Online Social Networks with Partial Differential Equations H Wang, F Wang, K Xu Springer ISBN 978-3-030-38850-8, 2020 | 87 | 2020 |
| Behavior analysis of internet traffic via bipartite graphs and one-mode projections K Xu, F Wang, L Gu IEEE/ACM Transactions on Networking 22 (3), 931-942, 2013 | 86 | 2013 |
| A reliable virtual backbone scheme in mobile ad-hoc networks M Min, F Wang, DZ Du, PM Pardalos 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE …, 2004 | 78 | 2004 |
| Network-aware behavior clustering of Internet end hosts K Xu, F Wang, L Gu 2011 proceedings ieee infocom, 2078-2086, 2011 | 77 | 2011 |
| Prediction of influenza-like illness based on the improved artificial tree algorithm and artificial neural network H Hu, H Wang, F Wang, D Langley, A Avram, M Liu Scientific reports 8 (1), 4895, 2018 | 76 | 2018 |
| Size matters: A comparative analysis of community detection algorithms P Wagenseller, F Wang, W Wu IEEE Transactions on Computational Social Systems 5 (4), 951-960, 2018 | 64 | 2018 |
| Regional influenza prediction with sampling twitter data and PDE model Y Wang, K Xu, Y Kang, H Wang, F Wang, A Avram International journal of environmental research and public health 17 (3), 678, 2020 | 56 | 2020 |
| Fault-tolerant topology control for all-to-one and one-to-all communication in wireless networks F Wang, MT Thai, Y Li, X Cheng, DZ Du IEEE Transactions on Mobile Computing 7 (3), 322-331, 2008 | 54 | 2008 |
| Minimum coverage breach and maximum network lifetime in wireless sensor networks C Wang, MT Thai, Y Li, F Wang, W Wu IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, 1118-1123, 2007 | 53 | 2007 |