Computer Science ›› 2022, Vol. 49 ›› Issue (6A): 280-284.doi: 10.11896/jsjkx.210500043
• Big Data & Data Science • Previous Articles Next Articles
DU Hong-yi, YANG Hua, LIU Yan-hong, YANG Hong-peng
CLC Number:
[1] ARNABOLDI V,CONTI M,PASSARELLA A,et al.On line social networks and information diffusion:the role of ego networks[J].Online Social Networks & Media,2017,1(6):44-55. [2] JIN L,CHEN Y,WANG T,et al.Understanding user behavior in online social networks:A survey[J].IEEE Communications Magazine,2013,51(9):144-150. [3] LI Y M,SHIU Y L.A diffusion mechanism for social advertising over microblogs[J].Decision Support Systems,2012,54:9-22. [4] ZHOU D H,HAN W B.DiffRank:A Novel Algorithm for Information Diffusion Detection in Social Networks[J].Chinese Journal of Computers,2014,37(4):884-893. [5] LIU X Y,HE D B.Research on of Competitive Nonlinear Dynamic Information Diffusion Modeling in Online Social Network[J].Chinese Journal of Computers,2019,42(9):1-20. [6] SANG C Y,LI T,TIAN S.SFTRD:A novel ingormation propagation model in heterogeneous networks:Modeling and restraining strategy[J].Physica A,2019,524:475-490. [7] CHIASSERINI C F,GARETTO M,LEONARDI E.Social network de-anonymization under scale-free user relations[J].IEEE/ACM Transactions on Networking,2016,24(6):3756-3769. [8] KO H,LEE J,PACK S.An opportunistic push scheme for online social networking services in heterogeneous wireless networks[J].IEEE Transactions on Network & Service Management,2017,14(2):416-428. [9] MA Z E,ZHOU Y C.Mathematical modelling and study on infectious disease dynamics [M].Beijing:Science Press,2004:3-10. [10] LIU D,YIN Y W,SONG M.Microblog Information Diffusion:Simulation Based on SIR Model[J].Journal of Beijing Univer-sity of Posts and Telecommunications(Social Sciences Edition),2014,16(3):28-33. [11] WAN Y H,WANG X C.Rumor spreading model with conformity effect[J].Journal of Computer Applications,2016,36(9):2381-2385. [12] HU X,LI W G,HU Q,et al.SIRS Model and Stability Based on Open Cyber Ecosystem[C]//2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Disco-very.2018. [13] PIQUEIRA J R C,ARAUJO V O A.Modified epidemiological model for computer viruses[J].Applied Mathematics and Computation,2009,213:355-360. [14] ZHENG Z R,GUO F,WANG Z F,et al.Study on Microblog Propagation Model Based on Aanlysis of User Behavior[J].Computer Science,2016,43(12):41-46. [15] CHEN K Y.Empirical analysis of novel coronavirus outbreak based on SEIR model[J].Statistics and Management,2020,35(6):31-38. [16] YUAN H,CHEN G Q.Network virus-epidemic model with the point-to-group information propagation[J].Applied Mathema-tics and Computation,2008,206:357-367. [17] SONG L P,ZHANG R P.Dynamical analysis for a malwarepropagation model in wireless sensor network[J].Journal of Measurement of Science and Instrumentation,2016,7(2):136-144. [18] ZHU G H,JIANG G P,XIA L L.Rumor spreading model considering conformity phenomena in complex social networks[J].Computer Science,2016,43(2):135-139. [19] CUI Z L,QIAN X D.Research on optimization of blockchain social Network Information Transmission Model[J].Computer Engineering and Applications,2021,57(7):59-69. |
[1] | LIU Jie-ling, LING Xiao-bo, ZHANG Lei, WANG Bo, WANG Zhi-liang, LI Zi-mu, ZHANG Hui, YANG Jia-hai, WU Cheng-nan. Network Security Risk Assessment Framework Based on Tactical Correlation [J]. Computer Science, 2022, 49(9): 306-311. |
[2] | ZHAO Dong-mei, WU Ya-xing, ZHANG Hong-bin. Network Security Situation Prediction Based on IPSO-BiLSTM [J]. Computer Science, 2022, 49(7): 357-362. |
[3] | DENG Kai, YANG Pin, LI Yi-zhou, YANG Xing, ZENG Fan-rui, ZHANG Zhen-yu. Fast and Transmissible Domain Knowledge Graph Construction Method [J]. Computer Science, 2022, 49(6A): 100-108. |
[4] | LYU Peng-peng, WANG Shao-ying, ZHOU Wen-fang, LIAN Yang-yang, GAO Li-fang. Quantitative Method of Power Information Network Security Situation Based on Evolutionary Neural Network [J]. Computer Science, 2022, 49(6A): 588-593. |
[5] | ZHANG Shi-peng, LI Yong-zhong. Intrusion Detection Method Based on Denoising Autoencoder and Three-way Decisions [J]. Computer Science, 2021, 48(9): 345-351. |
[6] | CHEN Hai-biao, HUANG Sheng-yong, CAI Jie-rui. Trust Evaluation Protocol for Cross-layer Routing Based on Smart Grid [J]. Computer Science, 2021, 48(6A): 491-497. |
[7] | WANG Jin-heng, SHAN Zhi-long, TAN Han-song, WANG Yu-lin. Network Security Situation Assessment Based on Genetic Optimized PNN Neural Network [J]. Computer Science, 2021, 48(6): 338-342. |
[8] | ZHANG Kai, LIU Jing-ju. Attack Path Analysis Method Based on Absorbing Markov Chain [J]. Computer Science, 2021, 48(5): 294-300. |
[9] | LIU Quan-ming, LI Yin-nan, GUO Ting, LI Yan-wei. Intrusion Detection Method Based on Borderline-SMOTE and Double Attention [J]. Computer Science, 2021, 48(3): 327-332. |
[10] | WANG Yu-chen, QI Wen-hui, XU Li-zhen. Security Cooperation of UAV Swarm Based on Blockchain [J]. Computer Science, 2021, 48(11A): 528-532. |
[11] | MA Lin, WANG Yun-xiao, ZHAO Li-na, HAN Xing-wang, NI Jin-chao, ZHANG Jie. Network Intrusion Detection System Based on Multi-model Ensemble [J]. Computer Science, 2021, 48(11A): 592-596. |
[12] | JIANG Jian-feng, SUN Jin-xia, YOU Lan-tao. Security Clustering Strategy Based on Particle Swarm Optimization Algorithm in Wireless Sensor Network [J]. Computer Science, 2021, 48(11A): 452-455. |
[13] | BAI Xue, Nurbol and WANG Ya-dong. Map Analysis for Research Status and Development Trend on Network Security Situational Awareness [J]. Computer Science, 2020, 47(6A): 340-343. |
[14] | BAI Wei, PAN Zhi-song, XIA Shi-ming, CHENG Ang-xuan. Network Security Configuration Generation Framework Based on Genetic Algorithm Optimization [J]. Computer Science, 2020, 47(5): 306-312. |
[15] | LIU Hai-bo,WU Tian-bo,SHEN Jing,SHI Chang-ting. Advanced Persistent Threat Detection Based on Generative Adversarial Networks and Long Short-term Memory [J]. Computer Science, 2020, 47(1): 281-286. |
|