Computer Science ›› 2025, Vol. 52 ›› Issue (4): 280-290.doi: 10.11896/jsjkx.240300127
• Artificial Intelligence • Previous Articles Next Articles
CHEN Zhangyuan, CHEN Ling, LIU Wei, LI Bin
CLC Number:
[1]KHULLER S,RAGHAVACHARI B,ROSFIELD A.Land-marks in grapghs[J].Discrete Applied Mathematics,1996,70(3):217-229. [2]DEVARAPALLI R K,BISWAS A.Rumor Detection and Tra-cing its source to Prevent Cyber-Crimes on social Media[C]//Intelligent Data Analytics for Terror Threat Prediction:Architectures,Methodologies,Techniques and Applications.2021:1-30. [3]REN J,LIU M,LIU Y,et al.Optimal resource allocation with spatiotemporal transmission discovery for effective disease control[J].Infectious diseases of poverty,2022,11(1):34. [4]LIU P,LI L,FANG S,et al.Identifying influential nodes in social networks:A voting approach[J].Chaos,Solitons & Fractals,2021,152:111309. [5]SHAH D,ZAMAN T.Rumors in a Network:Who’s the Culprit?[J].IEEE Transactions on Information Theory,2011,57(8):5163-5181. [6]PINTO P C,THIRAN P,VETTERLI M.Locating the source of diffusion in large scale networks[J].Physical Review Letters,2012,109(6):68702. [7]LI X,WANG X,HAO C,et a1.Locating the Epidemic Source in complex Networks with sparse Observers [J].Applied Sciences,2019,9(18):3644. [8]SPINELLI B,CELIS L E,THIRAN P.A General Frameworkfor Sensor Placement in Source Localization[J].IEEE Transactions on Network Science and Engineering,2019,6(2):86-102. [9]CELIS L E,PAVETIC' F,SPINELLI B,et al.Budgeted sensor placement for source localization on trees[J].Electronic Notes in Discrete Mathematics,2015,50:65-70. [10]LOKHOV A,MÉZARD M,OHTA H,et al.Inferring the origin of an epidemic with a dynamic message-passing algorithm[J].Physical Review E,2014,90(1):012801. [11]WANG Z X,SUN C,RUI X,et al.Localization of multiple diffusion sources based on overlapping community detection[J].Knowledge-Based Systems,2021,226:106613. [12]LIU Y,LI W,YANG C,et al.Multi-source detection based on neighborhood entropy in social networks[J].Scientific Reports,2022,12(1):1-12. [13]ZHANG Z,YUE K,SUN Z,et al.Locating Sources in Onlinesocial Networks via Random walk[C]//2017 IEEE Interna-tional Congress on Big Data(Big Data Congress).IEEE,2017:337-343. [14]BAO Z Q,CHEN W D.Rumor Source Detection in Social Networks via Maximum-a-Posteriori Estimation[J].Computer Science,2021,48(4):243-248. [15]YUAN D Y,GAO J,YE M X,et al.Malicious InformationSource Locating Algorithm Based on Topological Extension in Online Social NEtwork[J].Computer Science,2019,46(5):129-134. [16]LI W,GUO C,LIU Y,et al.Rumor source localization in social networks based on infection potential energy[J].Information Science,2023,634,172-188. [17]ZHANG X Z,ZHANG Y B,LV T Y,et al.Identification of efficient observers for locating spreading source in complex networks[J].Physic A,2015,442:100-109. [18]PALUCH R,LU X,SUCHECKI K,et a1.Fast andaccurate detection of spread source in large complex networks[J].Scientific Reports,2018,8(1):2508. [19]PALUCH R,GAJEWSKI L,HOLYST G,et al.Optimizing sensors placement in complex networks for localization of hidden signal source:A review[J].Future Generation Compute Systems,2020,112:1070-1092. [20]SPINELLI B,CELIS L E,THIRAN P.Observer placement for source localization:The effect of budgets and transmission variance[C]//54th Annual Allerton Conference on Communication,Control,and Computing,Allerton 2016.IEEE,2016:743-751. [21]ZEJNILOVIC S,GOMES J,SINOPOLI B.Sequential observer selection for source localization[C]//2015 IEEE Global Confe-rence on Signal and Information Processing(GlobalSIP).IEEE,2015:1220-1224. [22]ZEJNILOVIC S,XAVIER J,GOMES J,et al.Selecting observers for source localization via error exponents[C]//2015 IEEE International Symposium on Information Theory(ISIT),IEEE,2015:2914-2918. [23]ZEJNILOVIC,GOMES J,SINOPOLI B.Network observability and localization of the source of diffusion based on a subset of nodes[C]//51st Annual Allerton Conference on Communication,Control,and Computing(Allerton).IEEE,2013:847-852. [24]GAJEWSKI L,PALUCH R,SUCHECKI K,et al.Comparison of observer based methods for source localization in complex networks[J].Scientific Reports,2022,12:5079-5079. [25]CHEN X,HU X,WAN C.Approximation for the minimum cost doubly resolving set problem[J].Theoretical Computer Science,2016,609:526-543. [26]WANG H J,ZHANG F F,SUN K J.An algorithm for locating propagation source in complex networks[J].Physics Letters A,2021,393:127184. [27]ZHAO J,HAO K,CHEONG H.Early identification of diffusion source in complex networks with evidence theory[J].Information Science,2023,642:119061. [28]BERRY J,HART,W,PHILLIPS C,et al.Sensor placement in municipal water networks with temporal integer programming models[J].Journal of Water Resources Planning and Manage- ment,2006,132(4):218. |
[1] | LIU Wei, WU Fei, GUO Zhen, CHEN Ling. Two Stage Rumor Blocking Method Based on EHEM in Social Networks [J]. Computer Science, 2024, 51(7): 156-166. |
[2] | DENG Ziwei, CHEN Ling, LIU Wei. Continuous Influence Maximization Under Independent Cascade Propagation Model [J]. Computer Science, 2024, 51(6): 161-171. |
[3] | ZHU Yangfu, LI Meiling, TAN Jiachen, WU Bin. Study on Text-based Personality Detection-A Review [J]. Computer Science, 2024, 51(12): 209-222. |
[4] | CAO Jinxin, XU Weizhong, JIN Di, DING Weiping. Survey of Community Discovery in Complex Networks [J]. Computer Science, 2023, 50(11A): 230100130-11. |
[5] | WEI Peng, MA Yu-liang, YUAN Ye, WU An-biao. Study on Temporal Influence Maximization Driven by User Behavior [J]. Computer Science, 2022, 49(6): 119-126. |
[6] | GUO Lei, MA Ting-huai. Friend Closeness Based User Matching [J]. Computer Science, 2022, 49(3): 113-120. |
[7] | SHAO Yu, CHEN Ling, LIU Wei. Maximum Likelihood-based Method for Locating Source of Negative Influence Spreading Under Independent Cascade Model [J]. Computer Science, 2022, 49(2): 204-215. |
[8] | ZHANG Shao-jie, LU Xu-dong, GUO Wei, WANG Shi-peng, HE Wei. Prevention of Dishonest Behavior in Supply-Demand Matching [J]. Computer Science, 2021, 48(4): 303-308. |
[9] | YUAN De-yu, CHEN Shi-cong, GAO Jian, WANG Xiao-juan. Intervention Algorithm for Distorted Information in Online Social Networks Based on Stackelberg Game [J]. Computer Science, 2021, 48(3): 313-319. |
[10] | MA Li-bo, QIN Xiao-lin. Topic-Location-Category Aware Point-of-interest Recommendation [J]. Computer Science, 2020, 47(9): 81-87. |
[11] | LIANG Jun-bin, ZHANG Min, JIANG Chan. Research Progress of Social Sensor Cloud Security [J]. Computer Science, 2020, 47(6): 276-283. |
[12] | WU Lei,YUE Feng,WANG Han-ru,WANG Gang. Academic Paper Recommendation Method Combined with Researcher Tag [J]. Computer Science, 2020, 47(2): 51-57. |
[13] | GU Qiu-yang, JU Chun-hua, WU Gong-xing. Social Network Information Recommendation Model Combining Deep Autoencoder and Network Representation Learning [J]. Computer Science, 2020, 47(11): 101-112. |
[14] | ZHANG Zheng, WANG Hong-zhi, DING Xiao-ou, LI Jian-zhong, GAO Hong. Identification of Same User in Social Networks [J]. Computer Science, 2019, 46(9): 93-98. |
[15] | LV Zhi-quan, LI Hao, ZHANG Zong-fu, ZHANG Min. Topic-based Re-identification for Anonymous Users in Social Network [J]. Computer Science, 2019, 46(6): 143-147. |
|