Information cascades in complex networks
Abstract Information cascades are important dynamical processes in complex networks. An
information cascade can describe the spreading dynamics of rumour, disease, memes, or …
information cascade can describe the spreading dynamics of rumour, disease, memes, or …
Graph data anonymization, de-anonymization attacks, and de-anonymizability quantification: A survey
Nowadays, many computer and communication systems generate graph data. Graph data
span many different domains, ranging from online social network data from networks like …
span many different domains, ranging from online social network data from networks like …
Hustle and brand: The sociotechnical sha** of influence
D Carter - Social Media+ Society, 2016 - journals.sagepub.com
While social media platforms are often assumed to be sites of speaking, they are also
important sites of knowing, where businesses use content produced by individuals in order …
important sites of knowing, where businesses use content produced by individuals in order …
Integrating Internet of Things (IoT) into STEM undergraduate education: Case study of a modern technology infused courseware for embedded system course
Internet of Things (IoT) is rapidly emerging as the next generation of communication
infrastructure, where myriad of multi-scale sensors and devices are seamlessly blended for …
infrastructure, where myriad of multi-scale sensors and devices are seamlessly blended for …
{SecGraph}: A uniform and open-source evaluation system for graph data anonymization and de-anonymization
In this paper, we analyze and systematize the state-ofthe-art graph data privacy and utility
techniques. Specifically, we propose and develop SecGraph (available at [1]), a uniform and …
techniques. Specifically, we propose and develop SecGraph (available at [1]), a uniform and …
Social Network Analysis: A Survey on Process, Tools, and Application
Due to the explosive rise of online social networks, social network analysis (SNA) has
emerged as a significant academic field in recent years. Understanding and examining …
emerged as a significant academic field in recent years. Understanding and examining …
Tiptop:(almost) exact solutions for influence maximization in billion-scale networks
In this paper, we study the cost-aware target viral marketing (CTVM) problem, a
generalization of influence maximization. CTVM asks for the most cost-effective users to …
generalization of influence maximization. CTVM asks for the most cost-effective users to …
Submodular cost submodular cover with an approximate oracle
In this work, we study the Submodular Cost Submodular Cover problem, which is to
minimize the submodular cost required to ensure that the submodular benefit function …
minimize the submodular cost required to ensure that the submodular benefit function …
Internet of things (iot)-based learning framework to facilitate stem undergraduate education
Internet of Things (IoT) is rapidly emerging as the next generation of communication
infrastructure, where myriad of multi-scale sensors and devices are seamlessly blended for …
infrastructure, where myriad of multi-scale sensors and devices are seamlessly blended for …
Spreading social influence with both positive and negative opinions in online networks
Spreading social influence with both positive and negative opinions in online networks
Social networks are important media for spreading information, ideas, and influence among …
Social networks are important media for spreading information, ideas, and influence among …