Computer Science ›› 2020, Vol. 47 ›› Issue (6A): 17-23.doi: 10.11896/JsJkx.190900086
• Artificial Intelligence • Previous Articles Next Articles
CHEN Jin-yin, ZHANG Dun-Jie, LIN Xiang, XU Xiao-dong and ZHU Zi-ling
CLC Number:
[1] VOSOUGHI S,ROY D,ARAL S.The spread of true and false news online.Science,2018,359(6380):1146-1151. [2] ZHANG W,YE Y Q,TAN H L,et al.Information diffusion model based on social network//Proceedings of the 2012 International Conference of Modern Computer Science and Applications.Berlin Heidelberg:Springer-Verlag,2013:145-150. [3] LI C,MA J,GUO X,et al.Deepcas:An end-to-end predictor of information cascades//Proceedings of the 26th international conference on World Wide Web.International World Wide Web Conferences Steering Committee,Perth,2017:577-586. [4] KIM S B,HAN K S,RIM H C,et al.Some effective techniques for naive bayes text classification.IEEE Transactions on Knowledge and Data Engineering,2006,18(11):1457-1466. [5] GENKIN A,LEWIS D D,MADIGAN D.Large-scale Bayesian logistic regression for text categorization.Technometrics,2007,49(3):291-304. [6] COLAS F,BRAZDIL P.Comparison of SVM and some older classification algorithms in text classification tasks//IFIP International Conference on Artificial Intelligence in Theory and Practice.Boston:Springer,2006:169-178. [7] KIM Y.Convolutional neural networks for sentence classification.arXiv:1408.5882,2014. [8] LIU P,QIU X,HUANG X.Recurrent neural network for text classification with multi-task learning.arXiv:1605.05101,2016. [9] BAHDANAU D,CHO K,BENGIO Y.Neural machine translation by Jointly learning to align and translate.arXiv:1409.0473,2014. [10] POTTHAST M,KIESEL J,REINARTZ K,et al.A stylometric inquiry into hyperpartisan and fake news.arXiv:1702.05638,2017. [11] ZHENG M H,LV L Y,ZHAO M.Spreading in online social networks:the role ofsocial reinforcement.Physical Review E:Statistical Nonlinear and Soft Matter Physics,2013,88(1). [12] ZAN Y L,WU J L,LI P,et al.SICR rumor spreading model in complex networks:counterattack and self-resistance.Physica A:Statistical Mechanics and Its Applications,2014,405(1):159-170. [13] WANG X L,ZHAO L J.Rumor spreading model with skepticism mechanism in social networks.Journal of University of Shanghai for Science and Technology,2012,34(5):424-428. [14] ZHANG Y M,TANG C S,Li W G.Research on interest attenuation and social reinforcement mechanism for rumor spreading in online social networks.Journal of the China Society for Scientific and Technical Information,2015,34(8):833-844. [15] KAN J Q,XIE J R,ZHANG H F.Impacts of Social Reinforcement and Edge Weight on the Spreading of Information in Networks.Journal of University of Electronic Science and Technology of China,2014,43(1):21-25. [16] JENDERS M,KASNECI G,NAUMANN F.Analyzing and predicting viral tweets//Proc.of WWW.2013:173-182 [17] CHENG J,ADAMIC L,DOW P A,et al.Can cascades be predicted//Proc.of WWW.2014:42-34. [18] LERMAN K,GHOSH R.Information contagion:n empirical study of the spread of news on digg and twitter social networks//ICWSM.2010:54-32. [19] YANG Y,TANG J,LEUNG C W K,et al.Rain:social role-aware information diffusion//Proc.of AAAI.2015:34-35. [20] CHENG J,ADAMIC L,DOW P A,et al.Can cascades be predicted//Proc.of WWW.2014:43-55. [21] MUKHERJEE A,VENKATARAMAN V,LIU B,et al.What yelp fake review filter might be doing?//Seventh International AAAI Conference on Weblogs and Social Media.Bellevue,2013. [22] JING Y P.Reacher of deceptive opinions spam recognition based on deep learning.Shanghai:East China Normal University,2014. [23] LI J,OTT M,CARDIE C,et al.Towards a general rule for identifying deceptive opinion spam//Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics.2014:1566-1576. [24] LAU R Y K,LIAO S Y,KWOK R C W,et al.Text mining and probabilistic language modeling for online review spam detecting.ACM Transactions on Management Information Systems,2011,2(4):1-30. [25] OTT M,CHOI Y,CARDIE C,et al. Finding deceptive opinion spam by any stretch of the imagination//Proceedings of the 49th annual meeting of the association for computational linguistics:Human language technologies.Association for Computational Linguistics,Oregon,2011:309-319. [26] JINDAL N,LIU B,LIM E P.Finding unusual review patterns using unexpected rules//Proceedings of the 19th ACM International Conference on Information and Knowledge Management.ACM,Toronto,2010:1549-1552. [27] JOULIN A,GRAVE E,BOJANOWSKI P,et al.Bag of Tricks for Efficient Text Classification.arXiv:1607.01759,2016. [28] SUTSKEVERI,VINYALS O,LE Q V.Sequence to Sequence Learning with Neural Networks//Advances in Neural Information Processing Systems.2014. [29] BAHDANAU D,CHO K,BENGIO Y.Neural Machine Translation by Jointly Learning to Align and Translate.arXiv:1409.0473. [30] BLONDEL V D,GUILLAUME J L,LAMBIOTTE R,et al.Fast unfolding of communities in large networks.arXiv:0803.0476,2008. |
[1] | RAO Zhi-shuang, JIA Zhen, ZHANG Fan, LI Tian-rui. Key-Value Relational Memory Networks for Question Answering over Knowledge Graph [J]. Computer Science, 2022, 49(9): 202-207. |
[2] | TANG Ling-tao, WANG Di, ZHANG Lu-fei, LIU Sheng-yun. Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy [J]. Computer Science, 2022, 49(9): 297-305. |
[3] | XU Yong-xin, ZHAO Jun-feng, WANG Ya-sha, XIE Bing, YANG Kai. Temporal Knowledge Graph Representation Learning [J]. Computer Science, 2022, 49(9): 162-171. |
[4] | WANG Jian, PENG Yu-qi, ZHAO Yu-fei, YANG Jian. Survey of Social Network Public Opinion Information Extraction Based on Deep Learning [J]. Computer Science, 2022, 49(8): 279-293. |
[5] | HAO Zhi-rong, CHEN Long, HUANG Jia-cheng. Class Discriminative Universal Adversarial Attack for Text Classification [J]. Computer Science, 2022, 49(8): 323-329. |
[6] | JIANG Meng-han, LI Shao-mei, ZHENG Hong-hao, ZHANG Jian-peng. Rumor Detection Model Based on Improved Position Embedding [J]. Computer Science, 2022, 49(8): 330-335. |
[7] | SUN Qi, JI Gen-lin, ZHANG Jie. Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection [J]. Computer Science, 2022, 49(8): 172-177. |
[8] | HOU Yu-tao, ABULIZI Abudukelimu, ABUDUKELIMU Halidanmu. Advances in Chinese Pre-training Models [J]. Computer Science, 2022, 49(7): 148-163. |
[9] | ZHOU Hui, SHI Hao-chen, TU Yao-feng, HUANG Sheng-jun. Robust Deep Neural Network Learning Based on Active Sampling [J]. Computer Science, 2022, 49(7): 164-169. |
[10] | SU Dan-ning, CAO Gui-tao, WANG Yan-nan, WANG Hong, REN He. Survey of Deep Learning for Radar Emitter Identification Based on Small Sample [J]. Computer Science, 2022, 49(7): 226-235. |
[11] | HU Yan-yu, ZHAO Long, DONG Xiang-jun. Two-stage Deep Feature Selection Extraction Algorithm for Cancer Classification [J]. Computer Science, 2022, 49(7): 73-78. |
[12] | CHENG Cheng, JIANG Ai-lian. Real-time Semantic Segmentation Method Based on Multi-path Feature Extraction [J]. Computer Science, 2022, 49(7): 120-126. |
[13] | WANG Jun-feng, LIU Fan, YANG Sai, LYU Tan-yue, CHEN Zhi-yu, XU Feng. Dam Crack Detection Based on Multi-source Transfer Learning [J]. Computer Science, 2022, 49(6A): 319-324. |
[14] | CHU Yu-chun, GONG Hang, Wang Xue-fang, LIU Pei-shun. Study on Knowledge Distillation of Target Detection Algorithm Based on YOLOv4 [J]. Computer Science, 2022, 49(6A): 337-344. |
[15] | LIU Wei-ye, LU Hui-min, LI Yu-peng, MA Ning. Survey on Finger Vein Recognition Research [J]. Computer Science, 2022, 49(6A): 1-11. |
|