Determining credibility from social network structure
暂无分享,去创建一个
Darren Scott Appling | Erica Briscoe | IV RudolphLouisMappus | Heather Hayes | E. Briscoe | IV RudolphLouisMappus | D. S. Appling | Heather Hayes
[1] Mohsen Lesani,et al. FUZZY TRUST AGGREGATION AND PERSONALIZED TRUST INFERENCE IN VIRTUAL SOCIAL NETWORKS , 2009, Comput. Intell..
[2] Christos Faloutsos,et al. Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining , 2013, ASONAM 2013.
[3] Eric Gilbert,et al. Predicting tie strength with social media , 2009, CHI.
[4] James J. Lindsay,et al. Cues to deception. , 2003, Psychological bulletin.
[5] Barruquer Moner. IX. References , 1971 .
[6] E. David,et al. Networks, Crowds, and Markets: Reasoning about a Highly Connected World , 2010 .
[7] J. Golbeck,et al. FilmTrust: movie recommendations using trust in web-based social networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..
[8] Daniel M. Romero,et al. Influence and passivity in social media , 2010, ECML/PKDD.
[9] Jon M. Kleinberg,et al. Networks, Crowds, and Markets: Reasoning about a Highly Connected World [Book Review] , 2013, IEEE Technol. Soc. Mag..
[10] Ramanathan V. Guha,et al. Propagation of trust and distrust , 2004, WWW '04.
[11] Tanya Y. Berger-Wolf,et al. A framework for analysis of dynamic social networks , 2006, KDD '06.
[12] Chris Arney,et al. Networks, Crowds, and Markets: Reasoning about a Highly Connected World (Easley, D. and Kleinberg, J.; 2010) [Book Review] , 2013, IEEE Technology and Society Magazine.
[13] A. Hama,et al. How Many Friends Does One Person Need? Dunbar's Number and Other Evolutionary Quirks , 2011 .
[14] Jennifer Golbeck,et al. Computing and Applying Trust in Web-based Social Networks , 2005 .
[15] J. Nunamaker,et al. Automating Linguistics-Based Cues for Detecting Deception in Text-Based Asynchronous Computer-Mediated Communications , 2004 .
[16] Rajeev Motwani,et al. The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.
[17] Young Ae Kim,et al. Strategies for predicting local trust based on trust propagation in social networks , 2011, Knowl. Based Syst..
[18] Barbara Poblete,et al. Information credibility on twitter , 2011, WWW.
[19] N. Luhmann. Familiarity, Confidence, Trust: Problems and Alternatives , 2000 .
[20] Richard P. Larrick,et al. Social network schemas and the learning of incomplete networks. , 2005, Journal of personality and social psychology.
[21] Cory L. Armstrong,et al. Blogs of Information: How Gender Cues and Individual Motivations Influence Perceptions of Credibility , 2009, J. Comput. Mediat. Commun..
[22] E. Churchill,et al. Badges in Social Media: A Social Psychological Perspective , 2011 .
[23] Elizabeth D. Liddy,et al. Assessing Credibility of Weblogs , 2006, AAAI Spring Symposium: Computational Approaches to Analyzing Weblogs.
[24] Guy Lebanon,et al. A Comparative Study of Social Media and Traditional Polling in the Egyptian Uprising of 2011 , 2013, SBP.
[25] Matthew E. Brashears. Humans use Compression Heuristics to Improve the Recall of Social Networks , 2013, Scientific Reports.
[26] Eric Gilbert,et al. A longitudinal study of follow predictors on twitter , 2013, CHI.
[27] Mark S. Granovetter. T H E S T R E N G T H O F WEAK TIES: A NETWORK THEORY REVISITED , 1983 .