0% Complete
English
صفحه اصلی
/
یازدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
Revert Propagation: Who are responsible for a contagion initialization in a Diffusion Network?
نویسندگان :
Arman Sepehr
1
Mohammadzaman Zamani
2
Hamid Beigy
3
Shabnam Behzad
4
1- دانشگاه صنعتی شریف
2- Stony Brook University
3- دانشگاه صنعتی شریف
4- Georgetown University
کلمات کلیدی :
Source Localization, Information Propagation, Diffusion Networks, Information Cascades
چکیده :
Millions of stories are transferred in a social network and some of them are malicious. Can we identify the source node(s) that are responsible to initiate the propagation originally? If so, when they initiated the propagation? In this paper, we present an efficient algorithm for finding a node initiating a piece of information into the network and also inferring the time when it is initiated. We propose Source Location Estimation method, sole, that estimate the source probability for each node and then choose the source set which are maximize the probability using a well-known greedy method with a theoretical guarantees. The Observed nodes are detected nodes which are known clearly that spread specified malicious information in the network but small fraction of nodes are detected. The latter infected nodes are hidden, which spread the information in the network, however, they're not identified yet. In this problem, we first estimate the shortest path between other nodes to observed ones for each propagation trace, sole. Our experiments on real-world propagation through networks show the superiority of our approach in detecting true sources and promote the top ten accuracy from less than $10\%$ for the state-of-the-art methods to approximately $30\%$.
لیست مقالات
لیست مقالات بایگانی شده
بهبود دقت و کارایی در شبکههای عصبی کانولوشنی با استفاده از روشهای محاسبات تقریبی
محمدرضا رفیعی نژاد - محمدرضا بینش مروستی - سید امیر اصغری
Effective Classifier for Predicting Churn in Payment Terminals Using RFM model and Deep Neural Network
Dr Mahila Dadfarnia - Ali Alemi Matinpour - Dr Monireh Abdoos
Improving Fog Computing Scalability in Software Defined Network using Critical Requests Prediction in IoT
Hajar Ghanbari
Enhancing Persian Speech Emotion Recognition with Contrastive Learning and Multimodal Fusion
Mobina Esmaeili - Vajiheh Sabeti
Statistical Disorder Parameters Computing For Hyperspectral Image Anomaly Detection
Dr Maryam Imani
Violence detection using one-dimensional convolutional networks
Narges Honarjoo - Ali Abdari - Dr Azadeh Mansouri
LuckyAgent2022: A Stop-Learning Multi-Armed Bandit Automated Negotiating Agent
Arash Ebrahimnezhad - Faria Nassiri-Mofakham
جانمایی توزیعشده محتوا برای ذخیرهسازی موقت در شبکههای سلولی کوچک با حضور کاربران مخرب
زهرا رشیدی - دکتر وصال حکمی - حانیه سلمانطاهری زهرا رشیدی - وصال حکمی - حانیه سلمانطاهری -
استخراج ویژگی مجموعه دادههای پزشکی دارای ابعاد بالا با استفاده از برنامه نویسی ژنتیک چند منظوره
سحر فقیهی راد - دکتر سیده نفیسه آل محمد سحر فقیهی راد - سیده نفیسه آل محمد -
Comparative Study of Deep Reinforcement Learning and Genetic Algorithm Approaches for IoT Machine Learning Job Deployment in Fog Computing
Amir Moazeni - Omid Bushehrian
بیشتر
ثمین همایش، سامانه مدیریت کنفرانس ها و جشنواره ها - نگارش 42.5.2