Information Propagation Prediction Based on Key Users Authentication in Microblogging
暂无分享,去创建一个
[1] Wanlei Zhou,et al. Security in next generation wireless networks , 2010, Secur. Commun. Networks.
[2] Ping Wang,et al. fuzzyPSM: A New Password Strength Meter Using Fuzzy Probabilistic Context-Free Grammars , 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[3] Gleb Gusev,et al. Prediction of retweet cascade size over time , 2012, CIKM.
[4] Jianmin Wang,et al. Micro-blog in China: identify influential users and automatically classify posts on Sina micro-blog , 2014, J. Ambient Intell. Humaniz. Comput..
[5] Hosung Park,et al. What is Twitter, a social network or a news media? , 2010, WWW '10.
[6] Muhammad Khurram Khan,et al. A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments , 2017, Secur. Commun. Networks.
[7] Ying Zhang,et al. Retweet Modeling Using Conditional Random Fields , 2011, 2011 IEEE 11th International Conference on Data Mining Workshops.
[8] Chenyu Wang,et al. Cryptanalysis of Three Password-Based Remote User Authentication Schemes with Non-Tamper-Resistant Smart Card , 2017, Secur. Commun. Networks.
[9] Virgílio A. F. Almeida,et al. Finding trendsetters in information networks , 2012, KDD.
[10] Jure Leskovec,et al. Can cascades be predicted? , 2014, WWW.
[11] Yung-Hui Li,et al. An Accurate and Efficient User Authentication Mechanism on Smart Glasses Based on Iris Recognition , 2017, Mob. Inf. Syst..
[12] 赵辉,et al. Micro-blogs Entity Recognition Based on DSTCRF , 2014 .
[13] Ping Wang,et al. Targeted Online Password Guessing: An Underestimated Threat , 2016, CCS.
[14] Jure Leskovec,et al. Modeling Information Diffusion in Implicit Networks , 2010, 2010 IEEE International Conference on Data Mining.
[15] Y. Wang,et al. A Multidimensional Nonnegative Matrix Factorization Model for Retweeting Behavior Prediction , 2015 .
[16] Krishna P. Gummadi,et al. Measuring User Influence in Twitter: The Million Follower Fallacy , 2010, ICWSM.
[17] Juan-Zi Li,et al. Understanding retweeting behaviors in social networks , 2010, CIKM.
[18] Kaiming,et al. Short Texts Classification Through Reference Document Expansion , 2014 .