Source detection of rumor in social network - A review
暂无分享,去创建一个
[1] V. P. Sahana,et al. Automatic detection of rumoured tweets and finding its origin , 2015, 2015 International Conference on Computing and Network Communications (CoCoNet).
[2] Duncan J. Watts,et al. Collective dynamics of ‘small-world’ networks , 1998, Nature.
[3] John C. S. Lui,et al. Information Spreading Forensics via Sequential Dependent Snapshots , 2018, IEEE/ACM Transactions on Networking.
[4] Jun Zhang,et al. Catch Me If You Can: Detecting Compromised Users Through Partial Observation on Networks , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
[5] Christos Faloutsos,et al. R-MAT: A Recursive Model for Graph Mining , 2004, SDM.
[6] Vivek S. Borkar,et al. Fast rumor source identification via random walks , 2016, Social Network Analysis and Mining.
[7] Stefan Burr,et al. The Mathematics of networks , 1982 .
[8] Jure Leskovec,et al. Can cascades be predicted? , 2014, WWW.
[9] Devavrat Shah,et al. Finding Rumor Sources on Random Trees , 2011, Oper. Res..
[10] Shin-Ichi Nakano,et al. A Linear-Time Algorithm to Find Four Independent Spanning Trees in Four-Connected Planar Graphs , 1998, WG.
[11] Wanlei Zhou,et al. Rumor Source Identification in Social Networks with Time-Varying Topology , 2018, IEEE Transactions on Dependable and Secure Computing.
[12] Yongdong Zhang,et al. Detection and Analysis of 2016 US Presidential Election Related Rumors on Twitter , 2017, SBP-BRiMS.
[13] Shanshan Zhang,et al. A Survey on Information Diffusion in Online Social Networks: Models and Methods , 2017, Inf..
[14] Onur Varol,et al. Deception strategies and threats for online discussions , 2018, First Monday.
[15] Soroush Vosoughi,et al. Rumor Gauge , 2017, ACM Trans. Knowl. Discov. Data.
[16] Sergio Luna,et al. Social media in emergency management advances, challenges and future directions , 2015, 2015 Annual IEEE Systems Conference (SysCon) Proceedings.
[17] Feng Fu,et al. Dueling biological and social contagions , 2017, Scientific Reports.
[18] Michael Fuchs,et al. Rumor source detection for rumor spreading on random increasing trees , 2015 .
[19] Jiyoung Woo,et al. Epidemic model for information diffusion in web forums: experiments in marketing exchange and political dialog , 2016, SpringerPlus.
[20] Panagiotis Takis Metaxas,et al. Using TwitterTrails.com to Investigate Rumor Propagation , 2015, CSCW Companion.
[21] Sinan Aral,et al. The spread of true and false news online , 2018, Science.
[22] Dariusz Król,et al. On Rumor Source Detection and Its Experimental Verification on Twitter , 2017, ACIIDS.
[23] Wuqiong Luo,et al. Finding an infection source under the SIS model , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[24] Oscar Cordón,et al. An agent-based model for understanding the influence of the 11-M terrorist attacks on the 2004 Spanish elections , 2017, Knowl. Based Syst..
[25] Wenbin Hu,et al. An Event Detection Method for Social Networks Based on Evolution Fluctuations of Nodes , 2018, IEEE Access.
[26] Douglas J. Klein,et al. Centrality measure in graphs , 2010 .
[27] Jaeyoung Choi,et al. Rumor source detection under querying with untruthful answers , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.
[28] Mark E. J. Newman,et al. The Structure and Function of Complex Networks , 2003, SIAM Rev..
[29] Albert,et al. Emergence of scaling in random networks , 1999, Science.
[30] He Chen,et al. Scalable Rumor Source Detection under Independent Cascade Model in Online Social Networks , 2015, 2015 11th International Conference on Mobile Ad-hoc and Sensor Networks (MSN).
[31] Cécile Favre,et al. Information diffusion in online social networks: a survey , 2013, SGMD.
[32] Ioannis Kotsiopoulos,et al. Social Media in Crisis Management: Role, Potential, and Risk , 2014, UCC.
[33] M. De Domenico,et al. The Anatomy of a Scientific Rumor , 2013, Scientific Reports.
[34] Jacob Ratkiewicz,et al. Detecting and Tracking the Spread of Astroturf Memes in Microblog Streams , 2010, ArXiv.
[35] P. Bonacich. Power and Centrality: A Family of Measures , 1987, American Journal of Sociology.
[36] L. D. Costa,et al. Identifying the starting point of a spreading process in complex networks. , 2010, Physical review. E, Statistical, nonlinear, and soft matter physics.
[37] Devavrat Shah,et al. Rumor centrality: a universal source detector , 2012, SIGMETRICS '12.
[38] G. Geethakumari,et al. Detecting misinformation in online social networks using cognitive psychology , 2014, Human-centric Computing and Information Sciences.
[39] D. Helbing,et al. The Hidden Geometry of Complex, Network-Driven Contagion Phenomena , 2013, Science.
[40] Masahiro Kimura,et al. Discovering Influential Nodes for SIS Models in Social Networks , 2009, Discovery Science.
[41] Beom Jun Kim,et al. Attack vulnerability of complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[42] Tianguang Chu,et al. Learning the structure of influence diffusion in the independent cascade model , 2017, 2017 36th Chinese Control Conference (CCC).
[43] Wanlei Zhou,et al. Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies , 2017, IEEE Communications Surveys & Tutorials.
[44] Albert-László Barabási,et al. Error and attack tolerance of complex networks , 2000, Nature.
[45] Wuqiong Luo,et al. How to Identify an Infection Source With Limited Observations , 2013, IEEE Journal of Selected Topics in Signal Processing.
[46] Massimo Franceschetti,et al. Rumor source detection under probabilistic sampling , 2013, 2013 IEEE International Symposium on Information Theory.
[47] Ponnurangam Kumaraguru,et al. TweetCred: Real-Time Credibility Assessment of Content on Twitter , 2014, SocInfo.
[48] Amos Azaria,et al. The DARPA Twitter Bot Challenge , 2016, Computer.
[49] Robert Paluch,et al. Fast and accurate detection of spread source in large complex networks , 2018, Scientific Reports.
[50] Albert-László Barabási,et al. Linked - how everything is connected to everything else and what it means for business, science, and everyday life , 2003 .
[51] Mile Šikić,et al. Identification of Patient Zero in Static and Temporal Networks: Robustness and Limitations. , 2015, Physical review letters.
[52] Li Guo,et al. Locating multiple sources in social networks under the SIR model: A divide-and-conquer approach , 2015, J. Comput. Sci..
[53] Wanlei Zhou,et al. K-Center: An Approach on the Multi-Source Identification of Information Diffusion , 2015, IEEE Transactions on Information Forensics and Security.
[54] Filippo Menczer,et al. Early detection of promoted campaigns on social media , 2017, EPJ Data Science.
[55] Huiyan Kang,et al. Epidemic spreading on adaptively weighted scale-free networks , 2017, Journal of mathematical biology.
[56] Siegfried Depner,et al. Towards a property graph generator for benchmarking , 2017, GRADES@SIGMOD/PODS.
[57] Qiaozhu Mei,et al. Enquiring Minds: Early Detection of Rumors in Social Media from Enquiry Posts , 2015, WWW.
[58] Jing He,et al. Towards Anomalous Diffusion Sources Detection in a Large Network , 2016, ACM Trans. Internet Techn..
[59] Devavrat Shah,et al. Rumors in a Network: Who's the Culprit? , 2009, IEEE Transactions on Information Theory.
[60] Lei Ying,et al. A robust information source estimator with sparse observations , 2014 .
[61] Gianlorenzo D'Angelo,et al. Influence Maximization in the Independent Cascade Model , 2016, ICTCS.
[62] Zhen Jin,et al. Modeling and analyzing of botnet interactions , 2011 .
[63] Anthony H. Dekker,et al. Centrality In Social Networks: Theoretical And Simulation Approaches , 2008 .
[64] Li Guo,et al. Discovering Multiple Diffusion Source Nodes in Social Networks , 2014, ICCS.
[65] Alireza Louni,et al. A two-stage algorithm to estimate the source of information diffusion in social media networks , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[66] Dilek Günneç,et al. Influence maximization in social networks under Deterministic Linear Threshold Model , 2018, Knowl. Based Syst..
[67] Lei Shu,et al. A Survey on Gas Leakage Source Detection and Boundary Tracking with Wireless Sensor Networks , 2016, IEEE Access.
[68] Shashi Shekhar,et al. Capacity-Constrained Network-Voronoi Diagram: A Summary of Results , 2013, SSTD.
[69] Xiang Li,et al. Misinformation in Online Social Networks: Detect Them All with a Limited Budget , 2016, TOIS.
[70] Wenyi Zhang,et al. Rooting our Rumor Sources in Online Social Networks: The Value of Diversity From Multiple Observations , 2015, IEEE Journal of Selected Topics in Signal Processing.
[71] Shailendra Narayan Singh,et al. Online influence maximization using rapid continuous time independent cascade model , 2017, 2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence.
[72] Nam P. Nguyen,et al. Sources of misinformation in Online Social Networks: Who to suspect? , 2012, MILCOM 2012 - 2012 IEEE Military Communications Conference.
[73] Chee Wei Tan,et al. Rumor source detection with multiple observations: fundamental limits and algorithms , 2014, SIGMETRICS '14.
[74] Kate Starbird,et al. Examining the Alternative Media Ecosystem Through the Production of Alternative Narratives of Mass Shooting Events on Twitter , 2017, ICWSM.
[75] Wenyi Zhang,et al. On inferring rumor source for SIS model under multiple observations , 2015, 2015 IEEE International Conference on Digital Signal Processing (DSP).
[76] Jon Kleinberg,et al. Maximizing the spread of influence through a social network , 2003, KDD '03.
[77] Chee Wei Tan,et al. Rooting out the rumor culprit from suspects , 2013, 2013 IEEE International Symposium on Information Theory.
[78] Jacob Ratkiewicz,et al. Truthy: mapping the spread of astroturf in microblog streams , 2010, WWW.
[79] G. Geethakumari,et al. Identifying Sources of Misinformation in Online Social Networks , 2014, SIRS.
[80] Filippo Menczer,et al. Hoaxy: A Platform for Tracking Online Misinformation , 2016, WWW.
[81] Filippo Menczer,et al. Anatomy of an online misinformation network , 2018, PloS one.
[82] Martine Labbé,et al. The Voronoi Partition of a Network and Its Implications in Location Theory , 1992, INFORMS J. Comput..
[83] Indrajit Bhattacharya,et al. Analysis and Early Detection of Rumors in a Post Disaster Scenario , 2018, Information Systems Frontiers.
[84] Filippo Menczer,et al. The rise of social bots , 2014, Commun. ACM.
[85] Lata Narayanan,et al. Community Detection in Evolving Networks , 2017, 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).
[86] Eiji Aramaki,et al. How do rumors spread during a crisis?: Analysis of rumor expansion and disaffirmation on Twitter after 3.11 in Japan , 2014, Int. J. Web Inf. Syst..
[87] Florian Boudin,et al. A Comparison of Centrality Measures for Graph-Based Keyphrase Extraction , 2013, IJCNLP.
[88] Jaeyoung Choi,et al. Estimating the rumor source with anti-rumor in social networks , 2016, 2016 IEEE 24th International Conference on Network Protocols (ICNP).
[89] Albert-László Barabási,et al. Controllability of complex networks , 2011, Nature.
[90] Martin Vetterli,et al. Locating the Source of Diffusion in Large-Scale Networks , 2012, Physical review letters.
[91] Wuqiong Luo,et al. Identifying Infection Sources and Regions in Large Networks , 2012, IEEE Transactions on Signal Processing.
[92] Lei Ying,et al. Information source detection in the SIR model: A sample path based approach , 2012, 2013 Information Theory and Applications Workshop (ITA).
[93] Kate Starbird,et al. Rumors, False Flags, and Digital Vigilantes: Misinformation on Twitter after the 2013 Boston Marathon Bombing , 2014 .
[94] L. Freeman. Centrality in social networks conceptual clarification , 1978 .
[95] Krishna P. Gummadi,et al. On the evolution of user interaction in Facebook , 2009, WOSN '09.
[96] Dragomir R. Radev,et al. Rumor has it: Identifying Misinformation in Microblogs , 2011, EMNLP.
[97] Weili Wu,et al. A novel approach for detecting multiple rumor sources in networks with partial observations , 2015, Journal of Combinatorial Optimization.
[98] Preetam Ghosh,et al. Multiple Infection Sources Identification with Provable Guarantees , 2016, CIKM.
[99] Christos Faloutsos,et al. Spotting Culprits in Epidemics: How Many and Which Ones? , 2012, 2012 IEEE 12th International Conference on Data Mining.