Experience
暂无分享,去创建一个
Reema Aswani | Arpan Kumar Kar | P. Vigneswara Ilavarasan | A. Kar | P. V. Ilavarasan | R. Aswani | P. Ilavarasan
[1] Dervis Karaboga,et al. A comprehensive survey: artificial bee colony (ABC) algorithm and applications , 2012, Artificial Intelligence Review.
[2] D. Watts,et al. Origins of Homophily in an Evolving Social Network1 , 2009, American Journal of Sociology.
[3] Lada A. Adamic,et al. Social influence and the diffusion of user-created content , 2009, EC '09.
[4] Dries F. Benoit,et al. Identifying influencers in a social network: The value of real referral data , 2016, Decis. Support Syst..
[5] Yogesh Kumar Dwivedi,et al. Measuring social media influencer index- insights from facebook, Twitter and Instagram , 2019, Journal of Retailing and Consumer Services.
[6] Kevin Driscoll,et al. The diffusion of misinformation on social media: Temporal pattern, message, and source , 2018, Comput. Hum. Behav..
[7] Mark S. Granovetter. The Strength of Weak Ties , 1973, American Journal of Sociology.
[8] Hosung Park,et al. What is Twitter, a social network or a news media? , 2010, WWW '10.
[9] Karen E. Fisher,et al. A social diffusion model of misinformation and disinformation for understanding human information behaviour , 2013, Inf. Res..
[10] Jordan L. Boyd-Graber,et al. Mr. LDA: a flexible large scale topic modeling package using variational inference in MapReduce , 2012, WWW.
[11] Ravi Kumar,et al. Influence and correlation in social networks , 2008, KDD.
[12] R. Wyer. Cognitive Organization and Change: An Information Processing Approach , 2019 .
[13] Arkaitz Zubiaga,et al. Making the Most of Tweet-Inherent Features for Social Spam Detection on Twitter , 2015, #MSM.
[14] P. Vigneswara Ilavarasan,et al. Exploring Content Virality in Facebook: A Semantic Based Approach , 2017, I3E.
[15] Kyumin Lee,et al. Uncovering social spammers: social honeypots + machine learning , 2010, SIGIR.
[16] Yogesh Kumar Dwivedi,et al. Search engine marketing is not all gold: Insights from Twitter and SEOClerks , 2018, Int. J. Inf. Manag..
[17] Daniel M. Romero,et al. Influence and passivity in social media , 2010, ECML/PKDD.
[18] Satya Prakash Ghrera,et al. Identifying buzz in social media: a hybrid approach using artificial bee colony and k-nearest neighbors for outlier detection , 2017, Social Network Analysis and Mining.
[19] P. Hsu. Contribution to the theory of "Student's" t-test as applied to the problem of two samples. , 1938 .
[20] B. Chae,et al. Insights from hashtag #supplychain and Twitter Analytics: Considering Twitter and Twitter data for supply chain practice and research , 2015 .
[21] M. Gentzkow,et al. Social Media and Fake News in the 2016 Election , 2017 .
[22] Ullrich K. H. Ecker,et al. Misinformation and Its Correction , 2012, Psychological science in the public interest : a journal of the American Psychological Society.
[23] Steven E. Stemler,et al. An Overview of Content Analysis. , 2001 .
[24] Lada A. Adamic,et al. Friends and neighbors on the Web , 2003, Soc. Networks.
[25] Kyomin Jung,et al. Prominent Features of Rumor Propagation in Online Social Media , 2013, 2013 IEEE 13th International Conference on Data Mining.
[26] Adam J. Mills. Virality in social media: the SPIN Framework , 2012 .
[27] A. Kaplan,et al. Users of the world, unite! The challenges and opportunities of Social Media , 2010 .
[28] P. Vigneswara Ilavarasan,et al. Detection of Spammers in Twitter marketing: A Hybrid Approach Using Social Media Analytics and Bio Inspired Computing , 2017, Information Systems Frontiers.
[29] Amir Hossein Gandomi,et al. Cuckoo search algorithm: a metaheuristic approach to solve structural optimization problems , 2011, Engineering with Computers.
[30] Clay Shirky. The political power of social media: Technology, the public sphere, and political change , 2011 .
[31] Kate Starbird,et al. Rumors, False Flags, and Digital Vigilantes: Misinformation on Twitter after the 2013 Boston Marathon Bombing , 2014 .
[32] Xin-She Yang,et al. A New Metaheuristic Bat-Inspired Algorithm , 2010, NICSO.
[33] Alex Hai Wang,et al. Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach , 2010, DBSec.
[34] Arkaitz Zubiaga,et al. Detection and Resolution of Rumours in Social Media , 2017, ACM Comput. Surv..
[35] R. Ehrenberg. Social media sway: Worries over political misinformation on Twitter attract scientists' attention , 2012 .
[36] Kyumin Lee,et al. Seven Months with the Devils: A Long-Term Study of Content Polluters on Twitter , 2011, ICWSM.
[37] P. Kumaraguru,et al. $1.00 per RT #BostonMarathon #PrayForBoston: Analyzing fake content on Twitter , 2013, 2013 APWG eCrime Researchers Summit.
[38] Gilad Mishne,et al. Finding high-quality content in social media , 2008, WSDM '08.
[39] S. P. Ghrera,et al. A Novel Approach to Outlier Detection using Modified Grey Wolf Optimization and k-Nearest Neighbors Algorithm , 2016 .
[40] C. Manski. Identification of Endogenous Social Effects: The Reflection Problem , 1993 .
[41] Jure Leskovec,et al. The dynamics of viral marketing , 2005, EC '06.
[42] N. Dalkey,et al. An Experimental Application of the Delphi Method to the Use of Experts , 1963 .
[43] Xin-She Yang,et al. Firefly algorithm, stochastic test functions and design optimisation , 2010, Int. J. Bio Inspired Comput..
[44] Barbara Poblete,et al. Twitter under crisis: can we trust what we RT? , 2010, SOMA '10.
[45] Jong Kim,et al. Spam Filtering in Twitter Using Sender-Receiver Relationship , 2011, RAID.
[46] G. Geethakumari,et al. Detecting misinformation in online social networks using cognitive psychology , 2014, Human-centric Computing and Information Sciences.
[47] A. Lindgreen,et al. Why Pass on Viral Messages? Because They Connect Emotionally , 2007 .
[48] Joshua A. Tucker,et al. Political Knowledge and Misinformation in the Era of Social Media: Evidence From the 2015 UK Election , 2020, British Journal of Political Science.
[49] Arpan Kumar Kar,et al. Swarm Intelligence: A Review of Algorithms , 2017 .
[50] Filippo Menczer,et al. The spread of fake news by social bots , 2017, ArXiv.
[51] Scott Counts,et al. Tweeting is believing?: understanding microblog credibility perceptions , 2012, CSCW.
[52] Arpan Kumar Kar,et al. "Technology enabled Health" - Insights from twitter analytics with a socio-technical perspective , 2018, Int. J. Inf. Manag..
[53] Lada A. Adamic,et al. The role of social networks in information diffusion , 2012, WWW.
[54] Daniel Z. Levin,et al. The Strength of Weak Ties You Can Trust: The Mediating Role of Trust in Effective Knowledge Transfer , 2004, Manag. Sci..
[55] P. Vigneswara Ilavarasan,et al. Review of Discussions on Internet of Things (IoT): Insights from Twitter Analytics , 2017, J. Glob. Inf. Manag..
[56] Arpan Kumar Kar,et al. Bio inspired computing - A review of algorithms and scope of applications , 2016, Expert Syst. Appl..
[57] François Nemo,et al. Relevance: Communication and cognition: Dan Sperber and Deirdre Wilson, Oxford: Basil Blackwell, 1986. 279 pp. £8.50 (paperback), £27.50 (hardback). , 1988 .
[58] Dervis Karaboga,et al. A powerful and efficient algorithm for numerical function optimization: artificial bee colony (ABC) algorithm , 2007, J. Glob. Optim..
[59] P. Vigneswara Ilavarasan,et al. Social Media Analytics: Literature Review and Directions for Future Research , 2017, Decis. Anal..
[60] Ellen M Cotter,et al. Influence of Emotional Content and Perceived Relevance on Spread of Urban Legends: A Pilot Study , 2008, Psychological reports.
[61] S. P. Ghrera,et al. Identifying Popular Online News: An Approach Using Chaotic Cuckoo Search Algorithm , 2017, 2017 2nd International Conference on Computational Systems and Information Technology for Sustainable Solution (CSITSS).
[62] Adrian K. Ho,et al. Social media patient testimonials in implant dentistry: information or misinformation? , 2017, Clinical oral implants research.
[63] Susan T. Dumais,et al. Resonance on the web: web dynamics and revisitation patterns , 2009, CHI.
[64] Alexandra Marin,et al. Are respondents more likely to list alters with certain characteristics?: Implications for name generator data , 2004, Soc. Networks.
[65] Arun Sundararajan,et al. Distinguishing influence-based contagion from homophily-driven diffusion in dynamic networks , 2009, Proceedings of the National Academy of Sciences.
[66] Anupam Joshi,et al. Faking Sandy: characterizing and identifying fake images on Twitter during Hurricane Sandy , 2013, WWW.
[67] Sushil Jajodia,et al. Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg? , 2012, IEEE Transactions on Dependable and Secure Computing.
[68] David J. Brenes,et al. Overcoming Spammers in Twitter – A Tale of Five Algorithms1 , 2010 .
[69] Simon Fong,et al. Integrating nature-inspired optimization algorithms to K-means clustering , 2012, Seventh International Conference on Digital Information Management (ICDIM 2012).
[70] Chuan Yu,et al. Trends in the diffusion of misinformation on social media , 2018, Research & Politics.
[71] Barbara Poblete,et al. Information credibility on twitter , 2011, WWW.
[72] Chang-Tien Lu,et al. Misinformation Propagation in the Age of Twitter , 2014, Computer.
[73] Andrew Lewis,et al. Grey Wolf Optimizer , 2014, Adv. Eng. Softw..
[74] Seyed Mohammad Mirjalili. How effective is the Grey Wolf optimizer in training multi-layer perceptrons , 2014, Applied Intelligence.
[75] Vern Paxson,et al. Detecting and Analyzing Automated Activity on Twitter , 2011, PAM.
[76] Y. Kashima,et al. Talking about Others: Emotionality and the Dissemination of Social Information , 2009 .
[77] Jonah A. Berger. Arousal Increases Social Transmission of Information , 2011, Psychological science.
[78] Ponnurangam Kumaraguru,et al. Credibility ranking of tweets during high impact events , 2012, PSOSM '12.
[79] G. Caldarelli,et al. The spreading of misinformation online , 2016, Proceedings of the National Academy of Sciences.
[80] Sushil Jajodia,et al. Who is tweeting on Twitter: human, bot, or cyborg? , 2010, ACSAC '10.
[81] Kyounghee Hazel Kwon,et al. An Exploration of Social Media in Extreme Events: Rumor Theory and Twitter during the Haiti Earthquake 2010 , 2010, ICIS.
[82] J. Gastwirth,et al. The impact of Levene’s test of equality of variances on statistical theory and practice , 2009, 1010.0308.
[83] Amanda Lee Hughes,et al. Social Media in Disaster Communication , 2018 .
[84] Jacob Ratkiewicz,et al. Truthy: mapping the spread of astroturf in microblog streams , 2010, WWW.
[85] Virgílio A. F. Almeida,et al. Detecting Spammers on Twitter , 2010 .
[86] Katherine L. Milkman,et al. Social Transmission, Emotion, and the Virality of Online Content , 2010 .
[87] Gözde Özbal,et al. Exploring Text Virality in Social Networks , 2011, ICWSM.
[88] Krishna P. Gummadi,et al. Measuring User Influence in Twitter: The Million Follower Fallacy , 2010, ICWSM.
[89] Alex Hai Wang,et al. Don't follow me: Spam detection in Twitter , 2010, 2010 International Conference on Security and Cryptography (SECRYPT).
[90] Elia Gabarron,et al. Ebola, Twitter, and misinformation: a dangerous combination? , 2014, BMJ : British Medical Journal.
[91] J. Aaker,et al. Dimensions of Brand Personality , 1997 .
[92] Norbert Schwarz,et al. Judgment in a Social Context: Biases, Shortcomings, and the Logic of Conversation , 1994 .