Game-Theoretic Target Selection in Contagion-Based Domains
暂无分享,去创建一个
[1] Wei Chen,et al. Influence Blocking Maximization in Social Networks under the Competitive Linear Threshold Model , 2011, SDM.
[2] Divyakant Agrawal,et al. Limiting the spread of misinformation in social networks , 2011, WWW.
[3] Vincent Conitzer,et al. Computing the optimal strategy to commit to , 2006, EC '06.
[4] Nicola Basilico,et al. Automated Abstractions for Patrolling Security Games , 2011, AAAI.
[5] Rajmohan Rajaraman,et al. Existence Theorems and Approximation Algorithms for Generalized Network Security Games , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[6] Sarit Kraus,et al. Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.
[7] Allan Borodin,et al. Threshold Models for Competitive Influence in Social Networks , 2010, WINE.
[8] Asuman E. Ozdaglar,et al. Optimization-based influencing of village social networks in a counterinsurgency , 2011, TIST.
[9] Vincent Conitzer,et al. Multi-Step Multi-Sensor Hider-Seeker Games , 2009, IJCAI.
[10] K. Pauwels,et al. Effects of Word-of-Mouth versus Traditional Marketing: Findings from an Internet Social Networking Site , 2009 .
[11] Madhav V. Marathe,et al. Finding Critical Nodes for Inhibiting Diffusion of Complex Contagions in Social Networks , 2010, ECML/PKDD.
[12] Vincent Conitzer,et al. A double oracle algorithm for zero-sum security games on graphs , 2011, AAMAS.
[13] Mark E. J. Newman,et al. Power-Law Distributions in Empirical Data , 2007, SIAM Rev..
[14] James Aspnes,et al. Inoculation strategies for victims of viruses and the sum-of-squares partition problem , 2005, SODA '05.
[15] Masahiro Kimura,et al. Extracting influential nodes on a social network for information diffusion , 2009, Data Mining and Knowledge Discovery.
[16] Avrim Blum,et al. Planning in the Presence of Cost Functions Controlled by an Adversary , 2003, ICML.
[17] Po-An Chen,et al. Better vaccination strategies for better people , 2010, EC '10.
[18] C. Q. Lee,et al. The Computer Journal , 1958, Nature.
[19] Yevgeniy Vorobeychik,et al. Computing Randomized Security Strategies in Networked Domains , 2011, Applied Adversarial Reasoning and Risk Modeling.
[20] Albert,et al. Emergence of scaling in random networks , 1999, Science.
[21] Benjamin W. K. Hung. Optimization-based selection of influential agents in a rural Afghan social network , 2010 .
[22] Nicholas J. Howard,et al. Finding optimal strategies for influencing social networks in two player games , 2010 .
[23] Priya Shetty,et al. Experts concerned about vaccination backlash , 2010, The Lancet.
[24] Shishir Bharathi,et al. Competitive Influence Maximization in Social Networks , 2007, WINE.
[25] Milind Tambe,et al. Security Games for Controlling Contagion , 2012, AAAI.
[26] Wei Chen,et al. Scalable influence maximization for prevalent viral marketing in large-scale social networks , 2010, KDD.
[27] Éva Tardos,et al. Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..
[28] References , 1971 .
[29] James Aspnes,et al. Worm Versus Alert: Who Wins in a Battle for Control of a Large-Scale Network? , 2007, OPODIS.
[30] Tanya Y. Berger-Wolf,et al. Finding Spread Blockers in Dynamic Networks , 2008, SNAKDD.
[31] Andreas Krause,et al. Cost-effective outbreak detection in networks , 2007, KDD '07.
[32] Sergey Brin,et al. The Anatomy of a Large-Scale Hypertextual Web Search Engine , 1998, Comput. Networks.