Computer Science ›› 2019, Vol. 46 ›› Issue (5): 129-134.doi: 10.11896/j.issn.1002-137X.2019.05.020
Previous Articles Next Articles
YUAN De-yu1,2, GAO Jian1,2, YE Meng-xi1, WANG Xiao-juan3,
CLC Number:
[1]THOMSON R,ITO N,SUDA H,et al.Trusting tweets:The Fukushima disaster and information source credibility on Twitter[C]∥Proceedings of the 9th International ISCRAM Confe-rence.2012:1-10. [2]GHOSH S,SHARMA N,BENEVENUTO F,et al.Cognos:crowdsourcing search for topic experts in microblogs[C]∥Proceedings of the 35th International ACM SIGIR Conference on Research and Development in Information Retrieval.ACM,2012:575-590. [3]YANG F,LIU Y,YU X,et al.Automatic detection of rumor on sinaweibo[C]∥Proceedings of the ACM SIGKDD Workshop on Mining Data Semantics.ACM,2012. [4]DIAKOPOULOS N,DE CHOUDHURY M,NAAMAN M. Finding and assessing social media information sources in the context of journalism[C]∥Proceedings of the SIGCHIConfe-rence on Human Factors in Computing Systems.ACM,2012:2451-2460. [5]SUN S,LIU H,HE J,et al.Detecting Event Rumors on Sina Weibo Automatically [M]∥Web Technologies and Applications.Berlin:Springer,2013:120-131. [6]CANINI K R,SUH B,PIROLLI P L.Finding Credible Information Sources In Social Networks Based On Content And Social Structure[C]∥2011 IEEE Third International Conference on and 2011 Privacy,Security,Risk and Trust (PASSAT).2011:1-8. [7]GUAN W,GAO H,YANG M,et al.Analyzing user behavior of the micro-blogging website Sina Weibo during hot social events[J].Physica A Statistical Mechanics & Its Applications,2014,395(4):340-351. [8]LIU Y,XU S,TOURASSI G.Detecting Rumors Through Mo-deling Information Propagation Networks in a Social Media Environment[M]∥Social Computing,Behavioral-Cultural Mode-ling,and Prediction.Springer International Publishing,2015:121-130. [9]GONZALEZ-BAILON S,BORGE-HOLTHOEFER J,MORENOY.Broadcasters and Hidden Influentials in Online Protest Diffusion[J].American Behavioral Scientist,2012,57(7):943-965. [10]CHEN W,LU W,ZHANG N.Time-Critical Influence Maximization in Social Networks with Time-Delayed Diffusion Process[C]∥Twenty-Sixth AAAI Conference on Artificial Intelligence.2012. [11]ZHOU T,LIU J G,BAI W J,et al.Behaviors of susceptible-infected epidemics on scale-free networks with identical infectivity[J].Physical Review E,2006,74(5):056109. [12]LEE H K,SHIM P S,NOH J D.Epidemic threshold of the susceptible-infected-susceptible model on complex networks.[J].Physical Review E,2013,87(6):88-90. [13]YUAN-YUAN M A,ZHUANG X T.Susceptible-infected-re-moved (SIR) model of crisis spreading in the correlated network of listed companies and their main stock-holders[J].Journal of Management Sciences in China,2013,7(16):80-94. [14]BIANCHI P,DEBBAH M,MAIDA M,et al.1Performance of Statistical Tests for Single Source Detection using Random Matrix Theory[J].IEEE Transactions on Information Theory,2010,57(4):2400-2419. [15]WANG Z,DONG W,ZHANG W,et al.Rooting out RumorSources in Online Social Networks:The Value of Diversity from Multiple Observations[J].IEEE Journal of Selected Topics in Signal Processing,2015,9(4):663-677. [16]ZANG W,ZHANG P,ZHOU C,et al.Discovering Multiple Diffusion Source Nodes in Social Networks[J].Procedia Computer Science,2014,29:443-452. [17]ANTULOV-FANTULIN N,LANCIC A,STEFANCIC H,et al.Statistical inference framework for source detection of contagion processes on arbitrary network structures[C]∥Procee-dings of 2014 IEEE Eighth International Conference on Self-Adaptive and Self-Organizing Systems Workshops.2013:78-83. [18]DONG W X,ZHANG W,TAN C W.Rooting out the Rumor Culprit from Suspects[C]∥2013 IEEE International Sympo-sium on Information Theory Proceedings (ISIT).IEEE,2015,18(3):731-747. [19]ZHANG E,WANG G,GAO K,et al.Finding critical blocks of information diffusion in social networks[J].World Wide Web-internet & Web Information Systems,2013:521-532. [20]ANTULOV-FANTULIN N,LANCIC A,SMUC T,et al.De-tectability limits of epidemic sources in networks[J].Physical Review Letter,2014,114(10):589-596. [21]LUO W,TAY W P,LENG M.Identifying Infection Sources and Regions in Large Networks[J].IEEE Transactions on Signal Processing ,2013,61(11):2850-2865. [22]RICHARDSON M,DOMINGOS P.Mining Knowledge-Sharing Sites for Viral Marketing[C]∥Eighth Intl.Conf.on Knowledge Discovery and Data Mining.2002:61-70. [23]KEMPE D.Maximizing the Spread of Influence Through a Social Network[J].Kdd Proceedings of the Ninth AcmSigkdd International Conference on Knowledge Discovery & Data,2003:137-146. [24]CHEN W,WANG Y,YANG S.Efficient influence maximization in social networks[C]∥Proc. of Acm Kdd.2009:199-208. [25]GOYAL A,BONCHI F,LAKSHMANAN L V S.A Data-Based Approach to Social Influence Maximization[J].Proceedings of the VLDB Endowment,2011,1(5):73-84. [26]ZHUANG H,SUN Y,TANG J,et al.Influence Maximization in Dynamic Social Networks[C]∥2013 IEEE 13th International Conference on Data Mining (ICDM).IEEE,2013:1313-1318. [27]PINTO P C,THIRAN P,VETTERLI M.Locating the Source of Diffusion in Large-Scale Networks[J].Physical Review Letters,2012,109(6):1-5. [28]BORGE-HOLTHOEFER J,RIVERO A,MORENO Y.Locating privileged information spreaders during political protests on an Online Social Network[J].Holthoefer,2011,85(6):4454-4463. [29]LUO W,MEMBER S,TAY W P,et al.How to Identify an Infection Source with Limited Observations[J].IEEE Journal of Selected Topics in Signal Processing,2013,8(4):586-597. [30]SHAH D,ZAMAN T.Rumor centrality:a universal source detector[C]∥ACM SIGMETRICS Performance Evaluation Review.ACM,2012,40(1):199-210. [31]ZHU K,YING L.Information source detection in the SIR mo-del:A sample path based approach[C]∥Information Theory and Applications Workshop (ITA).2013:1-9. [32]SHAH D,ZAMAN T.Detecting sources of computer viruses in networks:theory and experiment[J].Acm Sigmetrics perfor-mance Evaluation Review,2010,38(1):203-214. [33]ZHU K,YING L.A robust information source estimator with sparse observations[C]∥INFOCOM.IEEE,2014:2211-2219. [34]LUO W,TAY W P,LENG M.On the Universality of Jordan Centers for Estimating Infection Sources in Tree Networks[J].IEEE Transactions on Information Theory,2014,PP(99):1-1. [35]ADAMIC L,GLANCE N.The political blogosphere and the2004 US election[C]∥International Workshop on Link Disco-very.ACM Press,2005:36-43. |
[1] | YUAN De-yu, CHEN Shi-cong, GAO Jian, WANG Xiao-juan. Intervention Algorithm for Distorted Information in Online Social Networks Based on Stackelberg Game [J]. Computer Science, 2021, 48(3): 313-319. |
[2] | WU Hai-tao and YING Shi. Classifying Interests of Social Media Users Based on Information Content and Social Graph [J]. Computer Science, 2015, 42(4): 185-189. |
[3] | ZHENG Qian-bing,ZHU Pei-dong,WANG Yong-wen,XU Ming. Research on Network Protocol Enhancing Mechanisms Based on Online Social Networks [J]. Computer Science, 2011, 38(6): 81-83. |
|