Information cascades in complex networks

M Jalili, M Perc - Journal of Complex Networks, 2017 - academic.oup.com
Abstract Information cascades are important dynamical processes in complex networks. An
information cascade can describe the spreading dynamics of rumour, disease, memes, or …

Graph data anonymization, de-anonymization attacks, and de-anonymizability quantification: A survey

S Ji, P Mittal, R Beyah - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Nowadays, many computer and communication systems generate graph data. Graph data
span many different domains, ranging from online social network data from networks like …

Hustle and brand: The sociotechnical sha** of influence

D Carter - Social Media+ Society, 2016 - journals.sagepub.com
While social media platforms are often assumed to be sites of speaking, they are also
important sites of knowing, where businesses use content produced by individuals in order …

Integrating Internet of Things (IoT) into STEM undergraduate education: Case study of a modern technology infused courseware for embedded system course

J He, DCT Lo, Y **e, J Lartigue - 2016 IEEE frontiers in …, 2016 - ieeexplore.ieee.org
Internet of Things (IoT) is rapidly emerging as the next generation of communication
infrastructure, where myriad of multi-scale sensors and devices are seamlessly blended for …

{SecGraph}: A uniform and open-source evaluation system for graph data anonymization and de-anonymization

S Ji, W Li, P Mittal, X Hu, R Beyah - 24th USENIX Security Symposium …, 2015 - usenix.org
In this paper, we analyze and systematize the state-ofthe-art graph data privacy and utility
techniques. Specifically, we propose and develop SecGraph (available at [1]), a uniform and …

Social Network Analysis: A Survey on Process, Tools, and Application

SS Singh, S Muhuri, S Mishra, D Srivastava… - ACM Computing …, 2024 - dl.acm.org
Due to the explosive rise of online social networks, social network analysis (SNA) has
emerged as a significant academic field in recent years. Understanding and examining …

Tiptop:(almost) exact solutions for influence maximization in billion-scale networks

X Li, JD Smith, TN Dinh, MT Thai - IEEE/ACM Transactions on …, 2019 - ieeexplore.ieee.org
In this paper, we study the cost-aware target viral marketing (CTVM) problem, a
generalization of influence maximization. CTVM asks for the most cost-effective users to …

Submodular cost submodular cover with an approximate oracle

V Crawford, A Kuhnle, M Thai - International Conference on …, 2019 - proceedings.mlr.press
In this work, we study the Submodular Cost Submodular Cover problem, which is to
minimize the submodular cost required to ensure that the submodular benefit function …

Internet of things (iot)-based learning framework to facilitate stem undergraduate education

JS He, S Ji, PO Bobbie - Proceedings of the SouthEast Conference, 2017 - dl.acm.org
Internet of Things (IoT) is rapidly emerging as the next generation of communication
infrastructure, where myriad of multi-scale sensors and devices are seamlessly blended for …

Spreading social influence with both positive and negative opinions in online networks

JS He, M Han, S Ji, T Du, Z Li - Big Data Mining and Analytics, 2019 - ieeexplore.ieee.org
Spreading social influence with both positive and negative opinions in online networks
Social networks are important media for spreading information, ideas, and influence among …