Computer Science ›› 2020, Vol. 47 ›› Issue (6): 230-235.doi: 10.11896/jsjkx.190400164
• Artificial Intelligence • Previous Articles Next Articles
BAO Jun-bo, YAN Guang-hui, LI Jun-cheng
CLC Number:
[1]马知恩.传染病动力学的数学建模与研究[M].北京:科学出版社,2004:3-15. [2]KERMACK W O,MCKENDRICK A G.Contributions to the mathematical theory of epidemics.II.The problem of endemicity[J].Bulletin of Mathematical Biology,1991,53(1/2):57-87. [3]AMARAL M A,ARENZON J J.Rumor propagation meets skepticism:A parallel with zombies[J].EPL (Europhysics Letters),2018,124(1):1-6. [4]PASTOR-SATORRAS R,VESPIGNANI A.Epidemic dynamics and endemic states in complex networks[J].Physical Review E,2001,63(6):1-9. [5]DALEY D J,KENDALL D G.Stochastic Rumours[J].Ima Journal of Applied Mathematics,1965,1(1):42-55. [6]GRASSLY N C,FRASER C.Mathematical models of infectious disease transmission[J].Nature Reviews Microbiology,2008,6(6):477-487. [7]ZHANG Y C,LIU Y,ZHANG H F,et al.The research of information dissemination model on online social network[J].Acta Physica Sinica,2011,60(5):050501. [8]ZHANG W,YANQING Y,HANLIN T.Improved SI Model for Information Dissemination-Information Diffusion Model Based on Social Network[C]//Proceedings of the 2012 International Conference of MCSA.2013:145-150. [9]LV L Y,CHEN D B,ZHOU T.The small world yields the most effective information spreading[J].New Journal of Physics,2011,13(12):123005. [10]PÉREZ-RECHE F J,LUDLAM J J,TARASKIN S N.Synergy in spreading processes:From exploitative to explorative foraging strategies[J].Physical Review Letters,2011,106(21):1-16. [11]NEWMAN M E J.Threshold Effects for Two Pathogens Spreading on a Network[J].Physical Review Letters,2005,95(10):108701. [12]NIAN F,DANG Z.Message propagation in the network based on node credibility[J].International Journal of Modern Physics B,2018,32(9):1850106. [13]ULLAH F,LEE S.Community clustering based on trust modeling weighted by user interests in online social networks[J].Chaos Solitons & Fractals,2017,103:194-204. [14]LI S W,JIN C,GUO Y G.Propagation Model of Mobile Phone Bluetooth Virus Based on Mean-filed Theory[J].Computer Engineering,2012,38(7):93-95. [15]谢识予.经济博弈论[M].上海:复旦大学出版社,2002:3-4. [16]王元卓.社交网络演化计算:模型、方法与案例[M].北京:清华大学出版社,2018:73-93. [17]THEODOROS S,GEORGE O,THEO T,et al.Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention[C]//28th Security and Privacy Protection in Information Processing Systems (SEC).Auckland,New Zealand,2013:28-41. [18]GUO D W,WU Y N,ZOU Y,et al.Simulation and Modeling of Non-rational Game based Public Opinion Spread[J].Act Auto Matica Sinica,2014,40(8):1721-1732. [19]张维迎.博弈论与信息经济学[M].上海:上海人民出版社,2016:26-31. [20]ZACHARY W W.An Information Flow Model for Conflict and Fission in Small Groups[J].Journal of Anthropological Research,1977,33(4):452-473. [21]KUMAR S,SPEZZANO F,SUBRAHMANIAN V S,et al.Edge Weight Prediction in Weighted Signed Networks.[C]//IEEE International Conference on Data Mining (ICDM).2016:221-230. |
[1] | JIANG Yang-yang, SONG Li-hua, XING Chang-you, ZHANG Guo-min, ZENG Qing-wei. Belief Driven Attack and Defense Policy Optimization Mechanism in Honeypot Game [J]. Computer Science, 2022, 49(9): 333-339. |
[2] | YUAN Wei-lin, LUO Jun-ren, LU Li-na, CHEN Jia-xing, ZHANG Wan-peng, CHEN Jing. Methods in Adversarial Intelligent Game:A Holistic Comparative Analysis from Perspective of Game Theory and Reinforcement Learning [J]. Computer Science, 2022, 49(8): 191-204. |
[3] | FANG Tao, YANG Yang, CHEN Jia-xin. Optimization of Offloading Decisions in D2D-assisted MEC Networks [J]. Computer Science, 2022, 49(6A): 601-605. |
[4] | XU Hao, CAO Gui-jun, YAN Lu, LI Ke, WANG Zhen-hong. Wireless Resource Allocation Algorithm with High Reliability and Low Delay for Railway Container [J]. Computer Science, 2022, 49(6): 39-43. |
[5] | CHANG Ya-wen, YANG Bo, GAO Yue-lin, HUANG Jing-yun. Modeling and Analysis of WeChat Official Account Information Dissemination Based on SEIR [J]. Computer Science, 2022, 49(4): 56-66. |
[6] | LI Shao-hui, ZHANG Guo-min, SONG Li-hua, WANG Xiu-lei. Incomplete Information Game Theoretic Analysis to Defend Fingerprinting [J]. Computer Science, 2021, 48(8): 291-299. |
[7] | SANG Chun-yan, XU Wen, JIA Chao-long, WEN Jun-hao. Prediction of Evolution Trend of Online Public Opinion Events Based on Attention Mechanism in Social Networks [J]. Computer Science, 2021, 48(7): 118-123. |
[8] | YUAN De-yu, CHEN Shi-cong, GAO Jian, WANG Xiao-juan. Intervention Algorithm for Distorted Information in Online Social Networks Based on Stackelberg Game [J]. Computer Science, 2021, 48(3): 313-319. |
[9] | WEI Li-qi, ZHAO Zhi-hong, BAI Guang-wei, SHEN Hang. Location Privacy Game Mechanism Based on Generative Adversarial Networks [J]. Computer Science, 2021, 48(10): 266-271. |
[10] | MAO Ying-chi, ZHOU Tong, LIU Peng-fei. Multi-user Task Offloading Based on Delayed Acceptance [J]. Computer Science, 2021, 48(1): 49-57. |
[11] | CHEN Meng-rong,LIN Ying,LAN Wei,SHAN Jin-zhao. Improvement of DPoS Consensus Mechanism Based on Positive Incentive [J]. Computer Science, 2020, 47(2): 269-275. |
[12] | WANG Shuai-hui, HU Gu-yu, PAN Yu, ZHANG Zhi-yue, ZHANG Hai-feng, PAN Zhi-song. Community Detection in Signed Networks with Game Theory [J]. Computer Science, 2020, 47(11A): 449-453. |
[13] | ZHAI Yong, LIU Jin, LIU Lei, CHEN Jie. Analysis of Private Cloud Resource Allocation Management Based on Game Theory in Spatial Data Center [J]. Computer Science, 2020, 47(11A): 373-379. |
[14] | CAI Wei, BAI Guang-wei, SHEN Hang, CHENG Zhao-wei, ZHANG Hui-li. Reinforcement Learning Based Win-Win Game for Mobile Crowdsensing [J]. Computer Science, 2020, 47(10): 41-47. |
[15] | LIU Hai-bo,WU Tian-bo,SHEN Jing,SHI Chang-ting. Advanced Persistent Threat Detection Based on Generative Adversarial Networks and Long Short-term Memory [J]. Computer Science, 2020, 47(1): 281-286. |
|