0% Complete
English
صفحه اصلی
/
یازدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
Revert Propagation: Who are responsible for a contagion initialization in a Diffusion Network?
نویسندگان :
Arman Sepehr
1
Mohammadzaman Zamani
2
Hamid Beigy
3
Shabnam Behzad
4
1- دانشگاه صنعتی شریف
2- Stony Brook University
3- دانشگاه صنعتی شریف
4- Georgetown University
کلمات کلیدی :
Source Localization, Information Propagation, Diffusion Networks, Information Cascades
چکیده :
Millions of stories are transferred in a social network and some of them are malicious. Can we identify the source node(s) that are responsible to initiate the propagation originally? If so, when they initiated the propagation? In this paper, we present an efficient algorithm for finding a node initiating a piece of information into the network and also inferring the time when it is initiated. We propose Source Location Estimation method, sole, that estimate the source probability for each node and then choose the source set which are maximize the probability using a well-known greedy method with a theoretical guarantees. The Observed nodes are detected nodes which are known clearly that spread specified malicious information in the network but small fraction of nodes are detected. The latter infected nodes are hidden, which spread the information in the network, however, they're not identified yet. In this problem, we first estimate the shortest path between other nodes to observed ones for each propagation trace, sole. Our experiments on real-world propagation through networks show the superiority of our approach in detecting true sources and promote the top ten accuracy from less than $10\%$ for the state-of-the-art methods to approximately $30\%$.
لیست مقالات
لیست مقالات بایگانی شده
شناسایی حملات فیشینگ با استفاده از الگوریتم عقاب آتشین و شبکه عصبی کانولوشن
علی کوشاری - مهدی فرتاش
IT-based and Non-IT-based methods to separate and collect waste
Hoda Harati - Farzad Haghighi-Rad - Reza Yousefi Zenouz
A Community-Based Method for Identifying Influential Nodes using Network Embedding
Nargess Vafaei - Dr Mohammad Reza Keyvanpour
SBST challenges from the perspective of the test techniques
Sepideh Kashefi Gargari - Dr Mohammad Reza Keyvanpour
Analysing effect of news polarity on stock market prediction: a machine learning approach
Golshid Ranjbaran - Dr Mohammad-Shahram Moin - Dr Sasan H Alizadeh - Dr Abbas Koochari
جمعآوری، تحلیل و خلاصه سازی نظرات کاربران فارسی زبان در شبکههای اجتماعی پیرامون بیماری فراگیر کووید-19
محمدرضا شمس - محمد یاسین فخار محمدرضا شمس - محمد یاسین فخار -
A Comparative Evaluation of Machine Learning Models for Anomaly-Based IDS in IoT Networks
Seyed Amir Mousavi - Mostafa Sadeghi - Mohammad Sadeq Sirjani
تولید خودکار موارد آزمون برای پوشش مسیر اصلی با الگوریتم جایا
ُSaba Yadegari - Mohammad-Reza Keyvanpour
Adaptive Stopping Criteria-based A-RANSAC algorithm in Copy Move Image Forgery detection
ZAHRA HOSEINNEJAD - Dr MEHDI NASRI
PeCoQ: A Dataset for Persian Complex Question Answering over Knowledge Graph
Romina Etezadi - Mehrnoush Shamsfard
بیشتر
ثمین همایش، سامانه مدیریت کنفرانس ها و جشنواره ها - نگارش 42.5.2