0% Complete
فارسی
Home
/
یازدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
Revert Propagation: Who are responsible for a contagion initialization in a Diffusion Network?
Authors :
Arman Sepehr
1
Mohammadzaman Zamani
2
Hamid Beigy
3
Shabnam Behzad
4
1- دانشگاه صنعتی شریف
2- Stony Brook University
3- دانشگاه صنعتی شریف
4- Georgetown University
Keywords :
Source Localization, Information Propagation, Diffusion Networks, Information Cascades
Abstract :
Millions of stories are transferred in a social network and some of them are malicious. Can we identify the source node(s) that are responsible to initiate the propagation originally? If so, when they initiated the propagation? In this paper, we present an efficient algorithm for finding a node initiating a piece of information into the network and also inferring the time when it is initiated. We propose Source Location Estimation method, sole, that estimate the source probability for each node and then choose the source set which are maximize the probability using a well-known greedy method with a theoretical guarantees. The Observed nodes are detected nodes which are known clearly that spread specified malicious information in the network but small fraction of nodes are detected. The latter infected nodes are hidden, which spread the information in the network, however, they're not identified yet. In this problem, we first estimate the shortest path between other nodes to observed ones for each propagation trace, sole. Our experiments on real-world propagation through networks show the superiority of our approach in detecting true sources and promote the top ten accuracy from less than $10\%$ for the state-of-the-art methods to approximately $30\%$.
Papers List
List of archived papers
User Preferences Elicitation in Bilateral Automated Negotiation Using Recursive Least Square Estimation
Farnaz Salmanian - Dr Hamid Jazayeri - Dr Javad Kazemitabar
A Biased Random Key Genetic Algorithm for the Dial-a-Ride Problem
ُSomayeh Sohrabi - Koorush Ziarati - Morteza Keshtkaran
بررسی روش یادگیری انتقالی جهت پیشبینی پیوند
علی روحانی فر - کمال میرزایی بدرآبادی
Predictive Maintenance using LSTM and Adaptive Windowing
Aien Ghanbari Adivi - Behrouz Shahgholi Ghahfarokhi
پیدا کردن خبره در انجمنهای پرسش و پاسخ با استفاده از الگوریتم طبقهبندی ترکیبی
مهراد قاضی پور - علیرضا رضوانیان
کشف لبه در تصاویر پزشکی با استفاده از اتوماتای سلولی سلسله مراتبی
مریم علینقی زاده - علیرضا رضوانیان
Improving hypergraph attention and hypergraph convolution networks
Mustafa Mohammadi Gharasuie - Mahmood Shabankhah - Ali Kamandi
A novel approach audio watermarking based on (GBT,DCT,SVD)
Mahdi Mosleh
Recommendation Systems in Smart Agriculture: Pathway to a well-designed system
Ahmad Nameni - Amir Ghafarian Daneshmand - Omid Mahdi Ebadati E
A Graph Attention-Based Autoencoder for Critical Path Anomaly Detection in Microservices
Mahdi Naderi - Hossein Momeni - Shayan Shahini
more
Samin Hamayesh - Version 41.3.1