4.7 Article

Social influence source locating based on network sparsification and stratification

Related references

Note: Only part of the references are listed.
Article Computer Science, Theory & Methods

Rumor detection based on a Source-Replies conversation Tree Convolutional Neural Net

Na Bai et al.

Summary: This research proposes a Source-Replies conversation Tree Convolutional Neural Net (TCN) for rumor detection, which can extract content features and structural features simultaneously from rumor conversations. Experimental results demonstrate that the proposed TCN is effective compared to other commonly used rumor analysis models for the task of rumor detection.

COMPUTING (2022)

Article Computer Science, Artificial Intelligence

Veracity assessment by single and multi-source identification algorithms during the crisis

P. Suthanthiradevi et al.

Summary: Social networks, particularly Twitter, have become popular platforms for information sharing. However, during pandemics, Twitter also becomes a major source for the dissemination of unverified information. To address this issue, the authors have developed a hybrid rumor centrality algorithm to detect the sources of rumors in social networks efficiently.

JOURNAL OF INTELLIGENT & FUZZY SYSTEMS (2022)

Article Computer Science, Hardware & Architecture

PRIA: a Multi-source Recognition Method Based on Partial Observation in SIR Model

Yong Ding et al.

Summary: This paper proposes a novel PRIA algorithm to locate multiple propagation sources in a multi-source propagation environment, using effective distance partitioning and single source algorithm based on SIR model. The simulation results demonstrate that the method can accurately identify the true source and estimate the propagation time.

MOBILE NETWORKS & APPLICATIONS (2021)

Article Computer Science, Information Systems

Attribute based diversification of seeds for targeted influence maximization

Antonio Calio et al.

Summary: This work introduces the integration of diversity into targeted influence maximization, proposing a class of monotone submodular functions for determining seed diversity and developing an efficient approximate method called ADITUM. The method ensures a (1 - 1/e - epsilon)-approximate solution under a general triggering diffusion model, demonstrating the meaningfulness and uniqueness of the proposed set diversity functions and ADITUM algorithm compared to other methods.

INFORMATION SCIENCES (2021)

Article Computer Science, Information Systems

Robust rumor blocking problem with uncertain rumor sources in social networks

Jianming Zhu et al.

Summary: The spread of rumors in social networks can lead to panic or unrest, and it is important to use protector nodes to spread positive information and block rumors. The Robust Rumor Blocking (RRB) problem aims to minimize the number of eventually influenced users by selecting protector nodes, and a randomized greedy algorithm with approximation ratio is proposed for solving this problem effectively.

WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS (2021)

Article Computer Science, Hardware & Architecture

A two-step rumor detection model based on the supernetwork theory about Weibo

Xuefan Dong et al.

Summary: This study introduced a two-step rumor detection model, which first classified users based on user features and then used various features to detect rumors posted by different types of users. The classifier was trained using four machine learning methods, and the effectiveness of the model was verified through real cases and assessment metrics.

JOURNAL OF SUPERCOMPUTING (2021)

Article Computer Science, Artificial Intelligence

Locating the propagation source in complex networks with a direction-induced search based Gaussian estimator

Fan Yang et al.

KNOWLEDGE-BASED SYSTEMS (2020)

Article Computer Science, Information Systems

Targeted influence maximization under a multifactor-based information propagation model

Lingfei Li et al.

INFORMATION SCIENCES (2020)

Article Physics, Multidisciplinary

The effect of adaptive behavior on risk propagation in industrial symbiosis networks

Junliang Yang et al.

PHYSICS LETTERS A (2020)

Article Computer Science, Hardware & Architecture

Even Central Users Do Not Always Drive Information Diffusion

Chao Gao et al.

COMMUNICATIONS OF THE ACM (2019)

Article Computer Science, Artificial Intelligence

Grassroots VS elites: Which ones are better candidates for influence maximization in social networks?

Dong Li et al.

NEUROCOMPUTING (2019)

Article Computer Science, Hardware & Architecture

Stochastic approximation algorithms for rumor source inference on graphs

Anand Kalvit et al.

PERFORMANCE EVALUATION (2019)

Article Management

Influence maximization with deactivation in social networks

Kubra Taninmis et al.

EUROPEAN JOURNAL OF OPERATIONAL RESEARCH (2019)

Article Chemistry, Multidisciplinary

Locating Multiple Sources of Contagion in Complex Networks under the SIR Model

Xiang Li et al.

APPLIED SCIENCES-BASEL (2019)

Proceedings Paper Computer Science, Information Systems

Adaptive Influence Blocking: Minimizing the Negative Spread by Observation-based Policies

Qihao Shi et al.

2019 IEEE 35TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2019) (2019)

Article Computer Science, Information Systems

Location-Based Seeds Selection for Influence Blocking Maximization in Social Networks

Wenlong Zhu et al.

IEEE ACCESS (2019)

Article Computer Science, Artificial Intelligence

Using swarm intelligence algorithms to detect influential individuals for influence maximization in social networks

Aybike Simsek et al.

EXPERT SYSTEMS WITH APPLICATIONS (2018)

Article Computer Science, Artificial Intelligence

Influence Maximization on Social Graphs: A Survey

Yuchen Li et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2018)

Article Computer Science, Information Systems

Exploring influence maximization in online and offline double-layer propagation scheme

Yongjian Yang et al.

INFORMATION SCIENCES (2018)

Article Physics, Multidisciplinary

Localization of diffusion sources in complex networks with sparse observations

Zhao-Long Hu et al.

PHYSICS LETTERS A (2018)

Proceedings Paper Computer Science, Information Systems

Locating Sources in Online Social Networks via Random Walk

Zhijian Zhang et al.

2017 IEEE 6TH INTERNATIONAL CONGRESS ON BIG DATA (BIGDATA CONGRESS 2017) (2017)

Article Computer Science, Interdisciplinary Applications

Locating multiple sources in social networks under the SIR model: A divide-and-conquer approach

Wenyu Zang et al.

JOURNAL OF COMPUTATIONAL SCIENCE (2015)