0% Complete
فارسی
Home
/
یازدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
Revert Propagation: Who are responsible for a contagion initialization in a Diffusion Network?
Authors :
Arman Sepehr
1
Mohammadzaman Zamani
2
Hamid Beigy
3
Shabnam Behzad
4
1- دانشگاه صنعتی شریف
2- Stony Brook University
3- دانشگاه صنعتی شریف
4- Georgetown University
Keywords :
Source Localization, Information Propagation, Diffusion Networks, Information Cascades
Abstract :
Millions of stories are transferred in a social network and some of them are malicious. Can we identify the source node(s) that are responsible to initiate the propagation originally? If so, when they initiated the propagation? In this paper, we present an efficient algorithm for finding a node initiating a piece of information into the network and also inferring the time when it is initiated. We propose Source Location Estimation method, sole, that estimate the source probability for each node and then choose the source set which are maximize the probability using a well-known greedy method with a theoretical guarantees. The Observed nodes are detected nodes which are known clearly that spread specified malicious information in the network but small fraction of nodes are detected. The latter infected nodes are hidden, which spread the information in the network, however, they're not identified yet. In this problem, we first estimate the shortest path between other nodes to observed ones for each propagation trace, sole. Our experiments on real-world propagation through networks show the superiority of our approach in detecting true sources and promote the top ten accuracy from less than $10\%$ for the state-of-the-art methods to approximately $30\%$.
Papers List
List of archived papers
Automatic Analysis of Inconsistencies in Inter-Enterprise Business Processes: Introducing a Formal Adaptation Patterns Catalog
Somayeh Ashourian - Shohreh َAjoudanian
Predicting Concentration of Particulate Matter (PM2.5) in Hamedan using Machine Learning Algorithms
Anita Karim Ghassabpour - Hatam Abdoli - Muharram Mansoorizadeh - Saeid Seyedi
حفظ حریم خصوصی در انتشار نسخه های متوالی دادههای شبکه اجتماعی با امکان افزایش یال
طاهره سرزهی - دکتر مهری رجایی طاهره سرزهی - مهری رجایی -
Analysing effect of news polarity on stock market prediction: a machine learning approach
Golshid Ranjbaran - Dr Mohammad-Shahram Moin - Dr Sasan H Alizadeh - Dr Abbas Koochari
Benchmarking Embedding Models for Persian-Language Semantic Information Retrieval
Mahmood Kalantari - Mehdi Feghhi - Nasser Mozayani
پیش بینی ارتباط میزان مرگ و میر با هم زمانی وجود دو بیماری در مبتلایان به کرونا به کمک بگارگیری شبکه عصبی Word2Vec
سمن مثقالی - دکتر جواد عسکری سمن مثقالی - جواد عسکری -
Improving Deep Neural Network Accelerator for Malaria Diseased Blood Cells using FPGA
Hadi Rezaeikarjani - Mojtaba Valinataj
Classification of Personality Traits on Facebook Using Key Phrase Extraction, Language Models and Machine Learning
Faezeh Safari - Abdolah Chalechale
نقشه های شناختی فازی پیشرفته (FCM) رویکردی برای مدل سازی سیستم های پیچیده ی پویا
فریبا اسلامی امیرآبادی - کمال میرزایی بدرآبادی
Distributed coordination protocol for event data exchange in IoT monitoring applications
Behnam Khazael - Hadi Tabatabaee Malazi
Samin Hamayesh - Version 40.3.1