Maximum a Posteriori Estimation for Information Source Detection
暂无分享,去创建一个
Enhong Chen | Qi Liu | Feida Zhu | Zhefeng Wang | Biao Chang | Tong Xu | Enhong Chen | Feida Zhu | Qi Liu | Tong Xu | Zhefeng Wang | B. Chang | Biao Chang | Enhong Chen
[1] C. Jordan. Sur les assemblages de lignes. , 1869 .
[2] B. R. Heap. Permutations by Interchanges , 1963, Comput. J..
[3] Alexander Grey,et al. The Mathematical Theory of Infectious Diseases and Its Applications , 1977 .
[4] Mark S. Granovetter. Threshold Models of Collective Behavior , 1978, American Journal of Sociology.
[5] W. O. Kermack,et al. Contributions to the mathematical theory of epidemics—II. The problem of endemicity , 1991, Bulletin of mathematical biology.
[6] Duncan J. Watts,et al. Collective dynamics of ‘small-world’ networks , 1998, Nature.
[7] Albert,et al. Emergence of scaling in random networks , 1999, Science.
[8] Jacob Goldenberg,et al. Talk of the Network: A Complex Systems Look at the Underlying Process of Word-of-Mouth , 2001 .
[9] Edward Ott,et al. Characterizing the dynamical importance of network nodes and links. , 2006, Physical review letters.
[10] Christos Faloutsos,et al. Graph evolution: Densification and shrinking diameters , 2006, TKDD.
[11] Nasser M. Nasrabadi,et al. Pattern Recognition and Machine Learning , 2006, Technometrics.
[12] Jure Leskovec,et al. Predicting positive and negative links in online social networks , 2010, WWW '10.
[13] Laks V. S. Lakshmanan,et al. Learning influence probabilities in social networks , 2010, WSDM '10.
[14] Dimitrios Gunopulos,et al. Finding effectors in social networks , 2010, KDD.
[15] Devavrat Shah,et al. Detecting sources of computer viruses in networks: theory and experiment , 2010, SIGMETRICS '10.
[16] Esteban Moro Egido,et al. Branching Dynamics of Viral Information Spreading , 2011, Physical review. E, Statistical, nonlinear, and soft matter physics.
[17] Devavrat Shah,et al. Rumors in a Network: Who's the Culprit? , 2009, IEEE Transactions on Information Theory.
[18] L. D. Costa,et al. Identifying the starting point of a spreading process in complex networks. , 2010, Physical review. E, Statistical, nonlinear, and soft matter physics.
[19] Nam P. Nguyen,et al. Sources of misinformation in Online Social Networks: Who to suspect? , 2012, MILCOM 2012 - 2012 IEEE Military Communications Conference.
[20] Enhong Chen,et al. On Approximation of Real-World Influence Spread , 2012, ECML/PKDD.
[21] Martin Vetterli,et al. Locating the Source of Diffusion in Large-Scale Networks , 2012, Physical review letters.
[22] Vincenzo Fioriti,et al. Predicting the sources of an outbreak with a spectral technique , 2012, ArXiv.
[23] Christos Faloutsos,et al. Spotting Culprits in Epidemics: How Many and Which Ones? , 2012, 2012 IEEE 12th International Conference on Data Mining.
[24] Lada A. Adamic,et al. The role of social networks in information diffusion , 2012, WWW.
[25] Hui Xiong,et al. Influential seed items recommendation , 2012, RecSys '12.
[26] Chee Wei Tan,et al. Rooting out the rumor culprit from suspects , 2013, 2013 IEEE International Symposium on Information Theory.
[27] Huan Liu,et al. Seeking provenance of information using social media , 2013, CIKM.
[28] Wuqiong Luo,et al. Identifying Infection Sources and Regions in Large Networks , 2012, IEEE Transactions on Signal Processing.
[29] Yue M. Lu,et al. A fast Monte Carlo algorithm for source localization on graphs , 2013, Optics & Photonics - Optical Engineering + Applications.
[30] Huan Liu,et al. Recovering information recipients in social media via provenance , 2013, 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013).
[31] Hui Xiong,et al. Learning to annotate via social interaction analytics , 2013, Knowledge and Information Systems.
[32] Hui Xiong,et al. Influence Maximization over Large-Scale Social Networks: A Bounded Linear Approach , 2014, CIKM.
[33] Alessandro Ingrosso,et al. The patient-zero problem with noisy observations , 2014, 1408.0907.
[34] Jure Leskovec,et al. {SNAP Datasets}: {Stanford} Large Network Dataset Collection , 2014 .
[35] Reza Zafarani,et al. Social Media Mining: An Introduction , 2014 .
[36] Lenka Zdeborová,et al. Inferring the origin of an epidemy with dynamic message-passing algorithm , 2013, Physical review. E, Statistical, nonlinear, and soft matter physics.
[37] Riccardo Zecchina,et al. Bayesian inference of epidemics on networks via Belief Propagation , 2013, Physical review letters.
[38] Enhong Chen,et al. Maximizing the Coverage of Information Propagation in Social Networks , 2015, IJCAI.
[39] Qi Liu,et al. Modeling Social Attention for Stock Analysis: An Influence Propagation Perspective , 2015, 2015 IEEE International Conference on Data Mining.
[40] Wenyi Zhang,et al. Rooting our Rumor Sources in Online Social Networks: The Value of Diversity From Multiple Observations , 2015, IEEE Journal of Selected Topics in Signal Processing.
[41] Éva Tardos,et al. Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..
[42] Enhong Chen,et al. Information Source Detection via Maximum A Posteriori Estimation , 2015, 2015 IEEE International Conference on Data Mining.
[43] Lei Ying,et al. Information source detection in the SIR model: A sample path based approach , 2012, 2013 Information Theory and Applications Workshop (ITA).
[44] Vivek S. Borkar,et al. Fast rumor source identification via random walks , 2016, Social Network Analysis and Mining.
[45] Wen-Xu Wang,et al. Locating the source of diffusion in complex networks by time-reversal backward spreading. , 2016, Physical review. E.
[46] Preetam Ghosh,et al. Multiple Infection Sources Identification with Provable Guarantees , 2016, CIKM.
[47] Hui Xiong,et al. An Influence Propagation View of PageRank , 2017, ACM Trans. Knowl. Discov. Data.
[48] Vivek S. Borkar,et al. Temporally Agnostic Rumor-Source Detection , 2017, IEEE Transactions on Signal and Information Processing over Networks.
[49] Joy Kuri,et al. Using Node Centrality and Optimal Control to Maximize Information Diffusion in Social Networks , 2016, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[50] Manuel Roveri,et al. A Cognitive Monitoring System for Detecting and Isolating Contaminants and Faults in Intelligent Buildings , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[51] Hui Xiong,et al. Price Shock Detection With an Influence-Based Model of Social Attention , 2017, ACM Trans. Manag. Inf. Syst..
[52] Qipeng Liu,et al. Competitiveness Maximization on Complex Networks , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[53] Yongli Li,et al. Utility-Based Model for Characterizing the Evolution of Social Networks , 2020, IEEE Transactions on Systems, Man, and Cybernetics: Systems.