0% Complete
English
صفحه اصلی
/
یازدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
Revert Propagation: Who are responsible for a contagion initialization in a Diffusion Network?
نویسندگان :
Arman Sepehr
1
Mohammadzaman Zamani
2
Hamid Beigy
3
Shabnam Behzad
4
1- دانشگاه صنعتی شریف
2- Stony Brook University
3- دانشگاه صنعتی شریف
4- Georgetown University
کلمات کلیدی :
Source Localization, Information Propagation, Diffusion Networks, Information Cascades
چکیده :
Millions of stories are transferred in a social network and some of them are malicious. Can we identify the source node(s) that are responsible to initiate the propagation originally? If so, when they initiated the propagation? In this paper, we present an efficient algorithm for finding a node initiating a piece of information into the network and also inferring the time when it is initiated. We propose Source Location Estimation method, sole, that estimate the source probability for each node and then choose the source set which are maximize the probability using a well-known greedy method with a theoretical guarantees. The Observed nodes are detected nodes which are known clearly that spread specified malicious information in the network but small fraction of nodes are detected. The latter infected nodes are hidden, which spread the information in the network, however, they're not identified yet. In this problem, we first estimate the shortest path between other nodes to observed ones for each propagation trace, sole. Our experiments on real-world propagation through networks show the superiority of our approach in detecting true sources and promote the top ten accuracy from less than $10\%$ for the state-of-the-art methods to approximately $30\%$.
لیست مقالات
لیست مقالات بایگانی شده
A Community-Based Method for Identifying Influential Nodes using Network Embedding
Nargess Vafaei - Dr Mohammad Reza Keyvanpour
ارائه مدل یادگیری ماشین برای پیشبینی سریزمانی باینری از دیدگاه مسئلههای دستهبندی با کاربرد در پیشبینی نتهای موسیقی
نیلوفر ع��دلخانی - حسام عمرانپور
بررسی کارآمدی فناوری وب 0.2 در پشتیبانی از فرآیندهای انسان محور و دانش مبنا
سید احسان ملیحی - فاطمه مشایخی کردکلا
3D Mesh ONoC: Design of low Insertion Loss and Non-blocking Optical Router and Efficient Routing Algorithm
Sanaz Asadinia - Elham Yaghoubi - Mostafa Sadeghi - Mahdi Mehrabi
Movable Antenna Design for UAV-Aided Federated Learning via Deep Reinforcement Learning
MOHSEN Ahmadzadeh - Saeid Pakravan - Ghosheh Abed Hodtani
Designing an AI-assisted toolbox for fitness activity recognition based on deep CNN
Ali Bidaran - Dr Saeed Sharifian
ارائه راهکاری جهت مقابله با حملات DoS در شبکه های نرم افزارمحور
ویدا هاشمی - احمد بختیاری شهری - رضا جاویدان
A Novel Service Deployment Policy in Fog Computing Considering The Degree of Availability and Fog Landscape Utilization Using Multiobjective Evolutionary Algorithms
Maryam Eslami - Dr Mehdi Sakhaei-nia
Distributed coordination protocol for event data exchange in IoT monitoring applications
Behnam Khazael - Hadi Tabatabaee Malazi
A qualitative spoofing detection system based on LSTMs for IoMT
Iman Jafarian - Amirmasoud Sepehrian - Siavash Khorsandi
بیشتر
ثمین همایش، سامانه مدیریت کنفرانس ها و جشنواره ها - نگارش 42.2.4