0% Complete
فارسی
Home
/
یازدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
Revert Propagation: Who are responsible for a contagion initialization in a Diffusion Network?
Authors :
Arman Sepehr
1
Mohammadzaman Zamani
2
Hamid Beigy
3
Shabnam Behzad
4
1- دانشگاه صنعتی شریف
2- Stony Brook University
3- دانشگاه صنعتی شریف
4- Georgetown University
Keywords :
Source Localization, Information Propagation, Diffusion Networks, Information Cascades
Abstract :
Millions of stories are transferred in a social network and some of them are malicious. Can we identify the source node(s) that are responsible to initiate the propagation originally? If so, when they initiated the propagation? In this paper, we present an efficient algorithm for finding a node initiating a piece of information into the network and also inferring the time when it is initiated. We propose Source Location Estimation method, sole, that estimate the source probability for each node and then choose the source set which are maximize the probability using a well-known greedy method with a theoretical guarantees. The Observed nodes are detected nodes which are known clearly that spread specified malicious information in the network but small fraction of nodes are detected. The latter infected nodes are hidden, which spread the information in the network, however, they're not identified yet. In this problem, we first estimate the shortest path between other nodes to observed ones for each propagation trace, sole. Our experiments on real-world propagation through networks show the superiority of our approach in detecting true sources and promote the top ten accuracy from less than $10\%$ for the state-of-the-art methods to approximately $30\%$.
Papers List
List of archived papers
Classification of mental states of human concentration based on EEG signal
Mehran Safari Dehnavi - Vahid Safari Dehnavi - Dr Masoud Shafiee
Paths-oriented Test Data Generation using Genetic Algorithm
Mohammad Reza Hassanpour Charmchi - Dr Bagher Rahimpour cami
A Swarm Intelligence Approach to Design Optimal Repeaters in Multilayer Graphene Nanoribbon Interconnects
Majid Sanaeepur - Maryam Momeni
An OWA-Powered Dynamic Customer Churn Modeling in the banking industry Based on Customer Behavioral Vectors
Masoud Alizadeh - Mohammad Soleymannejad - Behzad Moshiri
Electrophysiological Modeling and Interactive Approaches of Electrical Circuits and Hypergraphs for Understanding Neural Circuit Dynamics
Arian Baymani - Maryam Naderi Soorki
Distributed Learning Automata-based Algorithm for Finding K-Clique in Complex Social Networks
Mohammad Mehdi Daliri Khomami - Alireza Rezvanian - Ali Mohammad Saghiri - Mohammad Reza Meybodi
AOV-IDS: Arithmetic Optimizer with Voting classifier for Intrusion Detection System
Amir Soltany Mahboob - Mohammad Reza Ostadi Moghaddam - Shima Yousefi
Exploring the Relationship Between Gameplay Log Data and Depression & Anxiety
Soroush Elyasi - Arya Varasteh Nezhad - Fattaneh Taghiyareh
DynamicEvoStream : خوشه بندی پویای جریان داده تکاملی در زمانهای بیکاری
زهرا عمیقی - مرتضی یوسف صنعتی - میرحسین دزفولیان
Detection and Identification of Cyber-Attacks in Cyber-Physical Systems Based on Machine Learning Methods
Zohre Nasiri Zarandi
more
Samin Hamayesh - Version 42.3.1