Mining Social Media: A Brief Introduction
暂无分享,去创建一个
[1] Huan Liu,et al. Exploiting vulnerability to secure user privacy on a social networking site , 2011, KDD.
[2] Kristen LeFevre,et al. Privacy wizards for social networking sites , 2010, WWW '10.
[3] Chao Liu,et al. Recommender systems with social regularization , 2011, WSDM '11.
[4] Morris Sloman,et al. A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.
[5] Huan Liu,et al. Synthesis Lectures on Data Mining and Knowledge Discovery , 2009 .
[6] Sushil Jajodia,et al. Who is tweeting on Twitter: human, bot, or cyborg? , 2010, ACSAC '10.
[7] LiuHuan,et al. Quantifying the trustworthiness of social media content , 2011 .
[8] R. Suganya,et al. Data Mining Concepts and Techniques , 2010 .
[9] Bing Liu,et al. Identifying comparative sentences in text documents , 2006, SIGIR.
[10] Anna Cinzia Squicciarini,et al. WWW 2009 MADRID! Track: Security and Privacy / Session: Web Privacy Collective Privacy Management in Social Networks , 2022 .
[11] Nitin Indurkhya,et al. Handbook of Natural Language Processing , 2010 .
[12] M. McPherson,et al. Birds of a Feather: Homophily in Social Networks , 2001 .
[13] Nitin Agarwal,et al. Modeling blogger influence in a community , 2011, Social Network Analysis and Mining.
[14] Bing Liu,et al. Mining and summarizing customer reviews , 2004, KDD.
[15] Mohammad Ali Abbasi,et al. Lessons Learned in Using Social Media for Disaster Relief - ASU Crisis Response Game , 2012, SBP.
[16] Huiji Gao,et al. Harnessing the Crowdsourcing Power of Social Media for Disaster Relief , 2011, IEEE Intelligent Systems.
[17] Huan Liu,et al. Exploring Social-Historical Ties on Location-Based Social Networks , 2012, ICWSM.
[18] Huan Liu,et al. Spectral Feature Selection for Data Mining , 2011 .
[19] P. Lazarsfeld,et al. Friendship as Social process: a substantive and methodological analysis , 1964 .
[20] Ioannis Konstas,et al. On social networks and collaborative recommendation , 2009, SIGIR.
[21] Arun Sundararajan,et al. Distinguishing influence-based contagion from homophily-driven diffusion in dynamic networks , 2009, Proceedings of the National Academy of Sciences.
[22] Vitaly Shmatikov,et al. De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[23] Jennifer Neville,et al. Randomization tests for distinguishing social influence and homophily effects , 2010, WWW '10.
[24] Eli Berger. Dynamic Monopolies of Constant Size , 2001, J. Comb. Theory, Ser. B.
[25] Philip S. Yu,et al. Identifying the influential bloggers in a community , 2008, WSDM '08.
[26] Balachander Krishnamurthy,et al. On the leakage of personally identifiable information via online social networks , 2010, Comput. Commun. Rev..
[27] Ellen Riloff,et al. Learning Extraction Patterns for Subjective Expressions , 2003, EMNLP.
[28] Daniel T. Larose,et al. Discovering Knowledge in Data: An Introduction to Data Mining , 2005 .
[29] Danah Boyd,et al. Detecting Spam in a Twitter Network , 2009, First Monday.
[30] Jon M. Kleinberg,et al. Group formation in large social networks: membership, growth, and evolution , 2006, KDD '06.
[31] Stephen Marsh,et al. Formalising Trust as a Computational Concept , 1994 .
[32] Bo Pang,et al. Thumbs up? Sentiment Classification using Machine Learning Techniques , 2002, EMNLP.
[33] Alexander Grey,et al. The Mathematical Theory of Infectious Diseases and Its Applications , 1977 .
[34] Bing Liu,et al. Opinion spam and analysis , 2008, WSDM '08.
[35] Bing Liu,et al. Sentiment Analysis and Subjectivity , 2010, Handbook of Natural Language Processing.
[36] Vijay Mahajan,et al. New Product Diffusion Models in Marketing: A Review and Directions for Research: , 1990 .
[37] James A. Hendler,et al. Inferring binary trust relationships in Web-based social networks , 2006, TOIT.
[38] อนิรุธ สืบสิงห์,et al. Data Mining Practical Machine Learning Tools and Techniques , 2014 .
[39] Peter D. Turney. Thumbs Up or Thumbs Down? Semantic Orientation Applied to Unsupervised Classification of Reviews , 2002, ACL.
[40] Oren Etzioni,et al. Extracting Product Features and Opinions from Reviews , 2005, HLT.
[41] Huan Liu,et al. Quantifying the trustworthiness of social media content , 2011, Distributed and Parallel Databases.
[42] P. Sztompka. Trust: A Sociological Theory , 2000 .
[43] A. Kaplan,et al. Users of the world, unite! The challenges and opportunities of Social Media , 2010 .
[44] Bobby Bhattacharjee,et al. Persona: an online social network with user-defined privacy , 2009, SIGCOMM '09.
[45] Huan Liu,et al. mTrust: discerning multi-faceted trust in a connected world , 2012, WSDM '12.
[46] Vitaly Shmatikov,et al. Robust De-anonymization of Large Sparse Datasets , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[47] Huan Liu,et al. Promoting Coordination for Disaster Relief - From Crowdsourcing to Coordination , 2011, SBP.
[48] Alessandro Acquisti,et al. Information revelation and privacy in online social networks , 2005, WPES '05.
[49] Hong Yu,et al. Towards Answering Opinion Questions: Separating Facts from Opinions and Identifying the Polarity of Opinion Sentences , 2003, EMNLP.
[50] Reza Zafarani,et al. Understanding User Migration Patterns in Social Media , 2011, AAAI.
[51] Lise Getoor,et al. To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles , 2009, WWW '09.
[52] Christopher Krügel,et al. A Practical Attack to De-anonymize Social Network Users , 2010, 2010 IEEE Symposium on Security and Privacy.
[53] Hiroshi Motoda,et al. Computational Methods of Feature Selection , 2007 .
[54] M. Macy. Chains of Cooperation: Threshold Effects in Collective Action , 1991 .
[55] Lillian Lee,et al. Opinion Mining and Sentiment Analysis , 2008, Found. Trends Inf. Retr..
[56] Hugo Liu. InterestMap : Harvesting Social Network Profiles for Recommendations , 2004 .
[57] Wolfgang Nejdl,et al. Security and Trust Issues in Semantic Grids , 2005, Semantic Grid.
[58] David S. Rosenblum,et al. What Anyone Can Know: The Privacy Risks of Social Networking Sites , 2007, IEEE Security & Privacy.
[59] Rebecca Goolsby,et al. Social media as crisis platform: The future of community maps/crisis maps , 2010, TIST.
[60] N. Ling. The Mathematical Theory of Infectious Diseases and its applications , 1978 .
[61] Yolanda Gil,et al. A survey of trust in computer science and the Semantic Web , 2007, J. Web Semant..
[62] Mark S. Granovetter. Threshold Models of Collective Behavior , 1978, American Journal of Sociology.
[63] Lik Mui,et al. A Computational Model of Trust and Reputation for E-businesses , 2002 .
[64] Huan Liu,et al. Community Detection and Mining in Social Media , 2010, Community Detection and Mining in Social Media.
[65] Jure Leskovec,et al. Supervised random walks: predicting and recommending links in social networks , 2010, WSDM '11.