Computer Science ›› 2021, Vol. 48 ›› Issue (3): 313-319.doi: 10.11896/jsjkx.200400079
• Information Security • Previous Articles Next Articles
YUAN De-yu1,2, CHEN Shi-cong1, GAO Jian1,2, WANG Xiao-juan3
CLC Number:
[1]WANG J K,YU H,WANG X H,et al.Dissemination and control model of public opinion in online social networks based on users’ relative weight[J].Systems Engineering-Theory & Practice,2019,39(6):1565-1579. [2]ZUO L M,XIA P P,HU K X,et al.Propagation model of public opinion about ICO in social network environment[J].Computer Engineering and Design,2019,40(11):3247-3253. [3]PENG S,WANG G,ZHOU Y,et al.An Immunization Framework for Social Networks Through Big Data Based Influence Modeling[J].IEEE Transactions on Dependable and Secure Computing,2019,16(6):984-995. [4]SHANG R H,ZHANG W T,JIAO L C,et al.Dynamic Immunization Node Model for Complex Networks Based on Community Structure and Threshold[J].IEEE Transactions on Cyberne-tics,2020(5):1-14. [5]XIN Y,GAO C,WANG Z,et al.Discerning influential spreaders in complex networks by accounting the spreading heterogeneity of the nodes[J].IEEE Access,2019,7:92070-92078. [6]LIU Y,WANG X,KURTHS J.Framework of Evolutionary Algorithm for Investigation of Influential Nodes in Complex Networks[J].IEEE Transactions on Evolutionary Computation,2019,23(6):1049-1063. [7]YANG Y,WU C X,HE M,et al.Negative Influence Minimization Algorithm for Social Networks[J/OL].Journal of System Simulation.http://kns.cnki.net/kcms/detail/11.3092.V.20120120.1422.002.html.2019. [8]ZHUKOV D,ZALTCMAN A G,KHVATOVA T Y.Forecasting Changes in States in Social Networks and Sentiment Security Using the Principles of Percolation Theory and Stochastic Dynamics[C]//2019 International Conference on Quality Management,Transport and Information Security,Information Technologies(IT&QM&IS).2019:149-153. [9]ZHENG J,PAN L.Least Cost Rumor Community Blocking optimization in Social Networks[C]//Third International Confe-rence on Security of Smart Cities,Industrial Control System and Communications (SSIC).2018. [10]JOHNSON N F,LEAHY R,RESTREPO N J,et al.Hidden resilience and adaptive dynamics of the global online hate ecology[J].Nature,2019,573:261-265. [11]XIAO Y P,YANG Q F,SANG C Y,et al.Rumor DiffusionModel Based on Representation Learning and Anti-Rumor[J].IEEE Transactions on Network and Service Management,2020(5):1-14. [12]TONG G M,WU W L,GUO L,et al.An Efficient Randomized Algorithm for Rumor Blocking in Online Social Networks[J].arXiv:1701.02368. [13]SRIVASTAVA A,KANNAN R,CHELMIS C,et al.RecANt:Network-based Recruitment for Active Fake News Correction[C]//2019 IEEE International Conference on Big Data (Big Data).2019:940-949. [14]YU Y X,WANG L.An advertising game theory decision-ma-king mechanism for overlapping seeds in geo-social network[J].Journal of Computer Research and Development,2019,56(6):1302-1311. [15]SHAN F F,LI H,ZHU H.Game theory based forwarding control method for social network[J].Journal on Communications,2018,39(3):172-180. [16]YAO C,ZHANG Y,ZHANG X,et al.Competitive InfluenceBlocking in Online Social Networks:A Case Study on WeChat [C]//2018 24th Asia-Pacific Conference on Communications (APCC).2018:251-256. [17]LU P E,PENG Y H,CHANG C S,et al.Percolation Threshold for Competitive Influence in Random Networks[J/OL].IEEE Transactions on Computational Social Systems.https://arxiv.org/pdf/ 1904.05754.pdf,2020. [18]LIU Y Z,PAN X Z,FU W.Social Network Rumor Spreading Model Based on Bandwagon Game Between Nodes[J].Compu-ter Engineering,2018,44(10):309-314. [19]LI Q,WANG Z,WU B,et al.Competition and Cooperation:Dynamical Interplay Diffusion Between Social Topic Multiple Messages in Multiplex Networks[J].IEEE Transactions on Computational Social Systems,2019,6(3):467-478. [20]KALIGOTLA C,YÜCESAN E,CHICK S E.An agent based model of spread of competing rumors through online interactions on social media[C]//Proceedings of the 2015 Winter Simulation Conference.2015:3985-3996. [21]HE Z,CAI Z,YU J,et al.Cost-efficient strategies for restraining rumor spreading in mobile social networks[J].IEEE Trans.Veh.Technol.,2017,66(3):2789-2800. [22]MYERSON R B.Game theory:analysis of conflict[M].Harvard University Press,1997. [23]WAN P,WANG X,WANG X,et al.Intervening coupling diffusion of competitive information in online social networks[J].IEEE Transactions on Knowledge and Data Engineering.DOI:10.1109/TKDE.2019.2954901. |
[1] | CHANG Ya-wen, YANG Bo, GAO Yue-lin, HUANG Jing-yun. Modeling and Analysis of WeChat Official Account Information Dissemination Based on SEIR [J]. Computer Science, 2022, 49(4): 56-66. |
[2] | ZHANG Jie, YUE Shao-hua, WANG Gang, LIU Jia-yi, YAO Xiao-qiang. Multi-agent System Based on Stackelberg and Edge Laplace Matrix [J]. Computer Science, 2021, 48(8): 253-262. |
[3] | SANG Chun-yan, XU Wen, JIA Chao-long, WEN Jun-hao. Prediction of Evolution Trend of Online Public Opinion Events Based on Attention Mechanism in Social Networks [J]. Computer Science, 2021, 48(7): 118-123. |
[4] | BAO Jun-bo, YAN Guang-hui, LI Jun-cheng. SIR Propagation Model Combing Incomplete Information Game [J]. Computer Science, 2020, 47(6): 230-235. |
[5] | YUAN De-yu, GAO Jian, YE Meng-xi, WANG Xiao-juan,. Malicious Information Source Locating Algorithm Based on Topological Extension in Online Social Network [J]. Computer Science, 2019, 46(5): 129-134. |
[6] | LI Fang-wei, ZHOU Jia-wei, ZHANG Hai-bo. Anti-eavesdropping Physical Layer Transmission Scheme Based on Time-reversal in D2D Communication Link [J]. Computer Science, 2019, 46(5): 100-104. |
[7] | FENG Lei, JI Jun-zhong, WU Chen-sheng. New Method for Ranking Scientific Publications with Creditworthiness Mechanism [J]. Computer Science, 2018, 45(11A): 132-137. |
[8] | ZHANG Lin-zi, JIA Chuan-liang. Study of Propagation Mechanism in Networks Based on Topological Path [J]. Computer Science, 2018, 45(11A): 308-314. |
[9] | GONG Xu-fu, WEI Cheng-jian, QIAN Zhen, CHE Bao-zhen and SHEN Hang. Maritime Security Research Based on Stackelberg Game [J]. Computer Science, 2017, 44(5): 153-159. |
[10] | WU Hai-tao and YING Shi. Classifying Interests of Social Media Users Based on Information Content and Social Graph [J]. Computer Science, 2015, 42(4): 185-189. |
[11] | ZHANG Chi, ZENG Bi-qing, YANG Jin-song and XIE Xiao-hong. Power Control-oriented Spectrum Pricing and Allocation in OFDMA Cognitive Radio Networks [J]. Computer Science, 2015, 42(3): 85-90. |
[12] | LI Li-yao, SUN Lu-jing and YANG Jia-hai. Research on Online Social Network [J]. Computer Science, 2015, 42(11): 8-21. |
[13] | ZHANG Yue-yang and LIU Wei. Link Prediction in Uncertain Protein-Protein Interaction Network [J]. Computer Science, 2014, 41(Z11): 399-402. |
[14] | DU Jun-zhao , LIU Hui , LI Xiao-jun , ZHANG Ying-jun , ZHANG Yun-yang. Performance Evaluation of Information Dissemination Protocol in WSNs Based on RS Erasure Codes [J]. Computer Science, 2011, 38(Z10): 315-318. |
[15] | ZHENG Qian-bing,ZHU Pei-dong,WANG Yong-wen,XU Ming. Research on Network Protocol Enhancing Mechanisms Based on Online Social Networks [J]. Computer Science, 2011, 38(6): 81-83. |
|