User role identification based on social behavior and networking analysis for information dissemination
暂无分享,去创建一个
Qun Jin | Xiaokang Zhou | Bo Wu | Qun Jin | Xiaokang Zhou | Bo Wu
[1] Ye Na,et al. User identification based on multiple attribute decision making in social networks , 2013, China Communications.
[2] Yan Yu,et al. Role analysis of social network users based on neighborhood dissemination capability , 2014, 2014 IEEE 5th International Conference on Software Engineering and Service Science.
[3] Xin Xu,et al. Identifying related users in Weibo platform , 2015, 2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD).
[4] Aravind Srinivasan,et al. Your Friends Have More Friends Than You Do: Identifying Influential Mobile Users Through Random-Walk Sampling , 2014, IEEE/ACM Transactions on Networking.
[5] Wei Chen,et al. Diffusion of “Following” Links in Microblogging Networks , 2015, IEEE Transactions on Knowledge and Data Engineering.
[6] Wei Chen,et al. Information diffusion efficiency in online social networks , 2015, 2015 IEEE International Conference on Digital Signal Processing (DSP).
[7] Carson Kai-Sang Leung,et al. Finding Popular Friends in Social Networks , 2012, 2012 Second International Conference on Cloud and Green Computing.
[8] Jiming Chen,et al. Social Discovery: Exploring the Correlation Among Three-Dimensional Social Relationships , 2015, IEEE Transactions on Computational Social Systems.
[9] Bofeng Zhang,et al. Friend Recommendation Based on the Similarity of Micro-blog User Model , 2013, 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing.
[10] Pasquale De Meo,et al. Analysis of a Heterogeneous Social Network of Humans and Cultural Objects , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[11] Carson Kai-Sang Leung,et al. Finding groups of friends who are significant across multiple domains in social networks , 2013, 2013 Fifth International Conference on Computational Aspects of Social Networks.
[12] Ian H. Witten,et al. Data mining: practical machine learning tools and techniques, 3rd Edition , 1999 .
[13] Hui Zhao,et al. Group Recommendation Using Topic Identification in Social Networks , 2014, 2014 Sixth International Conference on Intelligent Human-Machine Systems and Cybernetics.
[14] Ee-Peng Lim,et al. Who is Retweeting the Tweeters? Modeling, Originating, and Promoting Behaviors in the Twitter Network , 2012, TMIS.
[15] Carson Kai-Sang Leung,et al. Finding Strong Groups of Friends among Friends in Social Networks , 2011, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing.
[16] Wanlei Zhou,et al. Are the popular users always important for information dissemination in online social networks? , 2014, IEEE Network.
[17] Ray-Guang Cheng,et al. Modeling Information Dissemination in Generalized Social Networks , 2013, IEEE Communications Letters.
[18] Qun Jin,et al. User Correlation Discovery and Dynamical Profiling Based on Social Streams , 2012, AMT.
[19] Amedapu Srinivas,et al. Identification of influential nodes from social networks based on Enhanced Degree Centrality Measure , 2015, 2015 IEEE International Advance Computing Conference (IACC).
[20] B. Latané. The psychology of social impact. , 1981 .
[21] Jure Leskovec,et al. Modeling Information Diffusion in Implicit Networks , 2010, 2010 IEEE International Conference on Data Mining.
[22] Haibin Zhu,et al. Policy evaluation and analysis of choosing whom to tweet information on social media , 2014, 2014 IEEE International Conference on Systems, Man, and Cybernetics (SMC).
[23] Salvatore Marano,et al. Multi-layer sociality in opportunistic networks: An extensive analysis of online and offline node social behaviors , 2015, 2015 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS).
[24] Zhongjie Wang,et al. Data Collection and Modeling of Personal Social Behaviors , 2015, 2015 International Conference on Service Science (ICSS).
[25] Jin Xie,et al. Make best use of social networks via more valuable friend recommendations , 2012, 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet).
[26] J. Jackson,et al. Social Impact Theory: A Social Forces Model of Influence , 1987 .
[27] Hua Lu,et al. Finding top-k local users in geo-tagged social media data , 2015, 2015 IEEE 31st International Conference on Data Engineering.
[28] M. McPherson,et al. Birds of a Feather: Homophily in Social Networks , 2001 .
[29] Sushil Jajodia,et al. Profiling Online Social Behaviors for Compromised Account Detection , 2016, IEEE Transactions on Information Forensics and Security.
[30] Aravind Srinivasan,et al. Your friends have more friends than you do: identifying influential mobile users through random walks , 2012, MobiHoc '12.
[31] Edward Y. Chang,et al. AdHeat: an influence-based diffusion model for propagating hints to match ads , 2010, WWW '10.
[32] Wei Wang,et al. Multi-dimensional attributes and measures for dynamical user profiling in social networking environments , 2014, Multimedia Tools and Applications.
[33] M. Shamim Hossain,et al. Relational User Attribute Inference in Social Media , 2015, IEEE Transactions on Multimedia.
[34] Wen-Hai Chih,et al. Investigating the ripple effect in virtual communities: An example of Facebook Fan Pages , 2015, Comput. Hum. Behav..
[35] Xu Yan,et al. Friend recommendation of microblog in classification framework: Using multiple social behavior features , 2014, 2014 International Conference on Behavioral, Economic, and Socio-Cultural Computing (BESC2014).
[36] Jiming Hu,et al. Mechanism of information dissemination under socialization networking environment , 2013, Proceedings of 2013 IEEE International Conference on Service Operations and Logistics, and Informatics.
[37] Sibel Adali,et al. Predicting Personality with Social Behavior , 2012, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.
[38] Ling Liu,et al. Probabilistic Diffusion of Social Influence with Incentives , 2014, IEEE Transactions on Services Computing.
[39] Barry Smyth,et al. Uncovering Measurements of Social and Demographic Behavior From Smartphone Location Data , 2013, IEEE Transactions on Human-Machine Systems.