Rumor restraining based on propagation prediction with limited observations in large-scale social networks
暂无分享,去创建一个
Yonghong Chen | Hui Tian | Tian Wang | Yiqiao Cai | Qun Wu
[1] Guanhua Yan,et al. Malware propagation in online social networks: nature, dynamics, and defense implications , 2011, ASIACCS '11.
[2] Piet Van Mieghem,et al. Epidemic processes in complex networks , 2014, ArXiv.
[3] Yang Xiang,et al. Modeling the Propagation of Worms in Networks: A Survey , 2014, IEEE Communications Surveys & Tutorials.
[4] Eunsoo Seo,et al. Identifying rumors and their sources in social networks , 2012, Defense + Commercial Sensing.
[5] Riccardo Zecchina,et al. Bayesian inference of epidemics on networks via Belief Propagation , 2013, Physical review letters.
[6] Soroush Vosoughi,et al. A Human-Machine Collaborative System for Identifying Rumors on Twitter , 2015, 2015 IEEE International Conference on Data Mining Workshop (ICDMW).
[7] Martin Vetterli,et al. Locating the Source of Diffusion in Large-Scale Networks , 2012, Physical review letters.
[8] Guoliang Xing,et al. Exploiting Statistical Mobility Models for Efficient Wi-Fi Deployment , 2013, IEEE Transactions on Vehicular Technology.
[9] Wanlei Zhou,et al. A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks , 2015, IEEE Transactions on Computers.
[10] Wanlei Zhou,et al. Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies , 2017, IEEE Communications Surveys & Tutorials.
[11] Kyomin Jung,et al. Prominent Features of Rumor Propagation in Online Social Media , 2013, 2013 IEEE 13th International Conference on Data Mining.
[12] Marco Conti,et al. The structure of online social networks mirrors those in the offline world , 2015, Soc. Networks.
[13] Jie Wu,et al. CPMC: An Efficient Proximity Malware Coping Scheme in Smartphone-based Mobile Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[14] Donald F. Towsley,et al. Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms , 2007, IEEE Transactions on Dependable and Secure Computing.
[15] Mark Newman,et al. Networks: An Introduction , 2010 .
[16] Cécile Favre,et al. Information diffusion in online social networks: a survey , 2013, SGMD.
[17] Wanlei Zhou,et al. Locating Defense Positions for Thwarting the Propagation of Topological Worms , 2012, IEEE Communications Letters.
[18] Ning Zhong,et al. Network immunization and virus propagation in email networks: experimental evaluation and analysis , 2010, Knowledge and Information Systems.
[19] Weijia Jia,et al. BlueCat: An Efficient Way for Relative Mobile Localization , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.
[20] Zhipeng Cai,et al. Modeling Propagation Dynamics and Developing Optimized Countermeasures for Rumor Spreading in Online Social Networks , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems.
[21] Wanlei Zhou,et al. To Shut Them Up or to Clarify: Restraining the Spread of Rumors in Online Social Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.
[22] Yun Liu,et al. An epidemic model of rumor diffusion in online social networks , 2013 .
[23] Nam P. Nguyen,et al. Overlapping communities in dynamic networks: their detection and mobile applications , 2011, MobiCom.
[24] Nam P. Nguyen,et al. A novel method for worm containment on dynamic social networks , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.
[25] Jun Zhang,et al. Modeling and Analysis on the Propagation Dynamics of Modern Email Malware , 2014, IEEE Transactions on Dependable and Secure Computing.
[26] Cai Yiqiao,et al. The Inhibition and Clearup of the Mobile Worm in Wireless Sensor Networks , 2016 .