暂无分享,去创建一个
[1] Patrice Marcotte,et al. An overview of bilevel optimization , 2007, Ann. Oper. Res..
[2] Jeffrey A. Gottfried,et al. News use across social media platforms 2016 , 2016 .
[3] Milind Tambe,et al. Security Games for Controlling Contagion , 2012, AAAI.
[4] Jure Leskovec,et al. Antisocial Behavior in Online Discussion Communities , 2015, ICWSM.
[5] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[6] J. Wallinga,et al. Different Epidemic Curves for Severe Acute Respiratory Syndrome Reveal Similar Impacts of Control Measures , 2004, American journal of epidemiology.
[7] Le Song,et al. Learning Networks of Heterogeneous Influence , 2012, NIPS.
[8] Le Song,et al. Uncover Topic-Sensitive Information Diffusion Networks , 2013, AISTATS.
[9] Blaine Nelson,et al. Can machine learning be secure? , 2006, ASIACCS '06.
[10] Yevgeniy Vorobeychik,et al. Feature Cross-Substitution in Adversarial Classification , 2014, NIPS.
[11] A. Barabasi,et al. Evolution of the social network of scientific collaborations , 2001, cond-mat/0104162.
[12] M. Gentzkow,et al. Social Media and Fake News in the 2016 Election , 2017 .
[13] Le Song,et al. Scalable Influence Estimation in Continuous-Time Diffusion Networks , 2013, NIPS.
[14] Gordon V. Cormack,et al. Email Spam Filtering: A Systematic Review , 2008, Found. Trends Inf. Retr..
[15] Xiaojin Zhu,et al. The Security of Latent Dirichlet Allocation , 2015, AISTATS.
[16] Éva Tardos,et al. Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..
[17] Pedro M. Domingos,et al. Adversarial classification , 2004, KDD.
[18] Tobias Scheffer,et al. Stackelberg games for adversarial prediction problems , 2011, KDD.
[19] Xiaojin Zhu,et al. Using Machine Teaching to Identify Optimal Training-Set Attacks on Machine Learners , 2015, AAAI.
[20] Lars Backstrom,et al. The Anatomy of the Facebook Social Graph , 2011, ArXiv.
[21] Christopher Meek,et al. Adversarial learning , 2005, KDD '05.
[22] Yevgeniy Vorobeychik,et al. Optimal Personalized Filtering Against Spear-Phishing Attacks , 2015, AAAI.
[23] Duncan J. Watts,et al. Collective dynamics of ‘small-world’ networks , 1998, Nature.
[24] Albert,et al. Emergence of scaling in random networks , 1999, Science.
[25] V. A. Zorich,et al. Mathematical analysis I , 2015 .
[26] Divyakant Agrawal,et al. Limiting the spread of misinformation in social networks , 2011, WWW.
[27] Yevgeniy Vorobeychik,et al. Securing interdependent assets , 2012, Autonomous Agents and Multi-Agent Systems.
[28] Yevgeniy Vorobeychik,et al. A General Retraining Framework for Scalable Adversarial Classification , 2016, ArXiv.