default search action
11th ASONAM 2019: Vancouver, BC, Canada
- Francesca Spezzano, Wei Chen, Xiaokui Xiao:
ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, Vancouver, British Columbia, Canada, 27-30 August, 2019. ACM 2019, ISBN 978-1-4503-6868-1
Communities I
- Michele Coscia:
Discovering communities of community discovery. 1-8 - Neda Zarayeneh, Ananth Kalyanaraman:
A fast and efficient incremental approach toward dynamic community detection. 9-16 - Young D. Kwon, Reza Hadi Mogavi, Ehsan ul Haq, Youngjin Kwon, Xiaojuan Ma, Pan Hui:
Effects of ego networks and communities on self-disclosure in an online social network. 17-24
Misbehavior & misinformation I
- Courtland VanDam, Farzan Masrour, Pang-Ning Tan, Tyler Wilson:
You have been CAUTE!: early detection of compromised accounts on social media. 25-32 - Thai Le, Kai Shu, Maria D. Molina, Dongwon Lee, S. Shyam Sundar, Huan Liu:
5 sources of clickbaits you should know!: using synthetic clickbaits to improve prediction and distinguish between bot-generated and human-written headlines. 33-40 - Limeng Cui, Suhang Wang, Dongwon Lee:
SAME: sentiment-aware multi-modal embedding for detecting fake news. 41-48
Network embedding
- Jundong Li, Liang Wu, Ruocheng Guo, Chenghao Liu, Huan Liu:
Multi-level network embedding with boosted low-rank matrix approximation. 49-56 - Aynaz Taheri, Tanya Y. Berger-Wolf:
Predictive temporal embedding of dynamic graphs. 57-64 - Benedek Rozemberczki, Ryan Davies, Rik Sarkar, Charles Sutton:
GEMSEC: graph embedding with self clustering. 65-72
Information & influence diffusion I
- Antoine J.-P. Tixier, Maria-Evgenia G. Rossi, Fragkiskos D. Malliaros, Jesse Read, Michalis Vazirgiannis:
Perturb and combine to identify influential spreaders in real-world networks. 73-80 - Yang Chen, Jiamou Liu:
Becoming gatekeepers together with allies: collaborative brokerage over social networks. 81-88 - Yu Zhang:
Diversifying seeds and audience in social influence maximization. 89-94 - Arash Ghayoori, Rakesh Nagi:
Seed investment bounds for viral marketing under generalized diffusion. 95-100 - Xiao Yang, Seungbae Kim, Yizhou Sun:
How do influencers mention brands in social media?: sponsorship prediction of Instagram posts. 101-104
Misbehavior & misinformation II
- Sooji Han, Jie Gao, Fabio Ciravegna:
Neural language model based training data augmentation for weakly supervised early rumor detection. 105-112 - Amir Pouran Ben Veyseh, My T. Thai, Thien Huu Nguyen, Dejing Dou:
Rumor detection in social networks via deep contextual modeling. 113-120 - Wataru Kudo, Mao Nishiguchi, Fujio Toriumi:
Fraudulent user detection on rating networks based on expanded balance theory and GCNs. 121-126 - Udit Arora, William Scott Paka, Tanmoy Chakraborty:
Multitask learning for blackmarket tweet detection. 127-130 - Mohammad Raihanul Islam, Sathappan Muthiah, Naren Ramakrishnan:
RumorSleuth: joint detection of rumor veracity and user stance. 131-136
Network analysis with machine learning I
- Aravind Sankar, Xinyang Zhang, Kevin Chen-Chuan Chang:
Meta-GNN: metagraph neural network for semi-supervised learning in attributed heterogeneous information networks. 137-144 - Suhansanu Kumar, Heting Gao, Changyu Wang, Kevin Chen-Chuan Chang, Hari Sundaram:
Hierarchical multi-armed bandits for discovering hidden populations. 145-153 - Yang Zhang, Hongxiao Wang, Daniel Yue Zhang, Yiwen Lu, Dong Wang:
RiskCast: social sensing based traffic risk forecasting via inductive multi-view learning. 154-157 - Sumeet Kumar, Kathleen M. Carley:
What to track on the Twitter streaming API?: a knapsack bandits approach to dynamically update the search terms. 158-163 - Renhao Cui, Gagan Agrawal, Rajiv Ramnath:
Tweets can tell: activity recognition using hybrid long short-term memory model. 164-167
Communities II
- Yulong Pei, George H. L. Fletcher, Mykola Pechenizkiy:
Joint role and community detection in networks via L2, 1 norm regularized nonnegative matrix tri-factorization. 168-175 - Jean Marie Tshimula, Belkacem Chikhaoui, Shengrui Wang:
HAR-search: a method to discover hidden affinity relationships in online communities. 176-183 - Domenico Mandaglio, Andrea Tagarelli:
Dynamic consensus community detection and combinatorial multi-armed bandit. 184-187
Social media analysis
- Marija Stanojevic, Jumanah Alshehri, Zoran Obradovic:
Surveying public opinion using label prediction on social media data. 188-195 - Taoran Ji, Xuchao Zhang, Nathan Self, Kaiqun Fu, Chang-Tien Lu, Naren Ramakrishnan:
Feature driven learning framework for cybersecurity event detection. 196-203 - Virgile Landeiro, Aron Culotta:
Collecting representative social media samples from a search engine by adaptive query generation. 204-207 - Mahsa Ghorbani, Mahdieh Soleymani Baghshah, Hamid R. Rabiee:
MGCN: semi-supervised classification in multi-layer graphs with graph convolutional networks. 208-211
Network analysis with machine learning II
- Vachik S. Dave, Baichuan Zhang, Pin-Yu Chen, Mohammad Al Hasan:
Neural-brane: an inductive approach for attributed network embedding. 212-215 - Kun Tu, Jian Li, Don Towsley, Dave Braines, Liam D. Turner:
gl2vec: learning feature representation using graphlets for directed networks. 216-221 - Caleb Belth, Fahad Kamran, Donna Tjandra, Danai Koutra:
When to remember where you came from: node representation learning in higher-order networks. 222-225
Information & influence diffusion II
- Soumajyoti Sarkar, Ashkan Aleali, Paulo Shakarian, Mika Armenta, Danielle Sanchez, Kiran Lakkaraju:
Impact of social influence on adoption behavior: an online controlled experimental evaluation. 226-233 - Thiago H. P. Silva, Alberto H. F. Laender, Pedro O. S. Vaz de Melo:
Characterizing knowledge-transfer relationships in dynamic attributed networks. 234-241 - Emily M. Fischer, Souvik Ghosh, Gennady Samorodnitsky:
Epidemic threshold and lifetime distribution for information diffusion on simultaneously growing networks. 242-249 - Jianjun Luo, Xinyue Liu, Xiangnan Kong:
Competitive opinion maximization in social networks. 250-257
Elections and politics
- Huyen T. Le, G. R. Boynton, Zubair Shafiq, Padmini Srinivasan:
A postmortem of suspended Twitter accounts in the 2016 U.S. presidential election. 258-265 - Hamid Karimi, Tyler Derr, Aaron Brookhouse, Jiliang Tang:
Multi-factor congressional vote prediction. 266-273 - Indu Manickam, Andrew S. Lan, Gautam Dasarathy, Richard G. Baraniuk:
IdeoTrace: a framework for ideology tracing with a case study on the 2016 U.S. presidential election. 274-281 - Alexandru Topîrceanu, Radu-Emil Precup:
A novel methodology for improving election poll prediction using time-aware polling. 282-285
Network analysis I
- Michele Coscia, Luca Rossi:
The impact of projection and backboning on network topologies. 286-293 - Katchaguy Areekijseree, Sucheta Soundarajan:
Measuring the sampling robustness of complex networks. 294-301 - Xiuwen Zheng, Amarnath Gupta:
Social network of extreme tweeters: a case study. 302-306 - Laurence Brandenberger, Giona Casiraghi, Vahan Nanumyan, Frank Schweitzer:
Quantifying triadic closure in multi-edge social networks. 307-310 - Seyed Amin Mirlohi Falavarjani, Ebrahim Bagheri, Ssu Yu Zoe Chou, Jelena Jovanovic, Ali A. Ghorbani:
On the causal relation between users' real-world activities and their affective processes. 311-314
Recommendations
- Chia-Wei Chen, Sheng-Chuan Chou, Chang-You Tai, Lun-Wei Ku:
Phrase-guided attention web article recommendation for next clicks and views. 315-324 - Deqing Yang, Ziyi Wang, Junyang Jiang, Yanghua Xiao:
Knowledge embedding towards the recommendation with sparse user-item interactions. 325-332 - Daniel Yue Zhang, Bo Ni, Qiyu Zhi, Thomas Plummer, Qi Li, Hao Zheng, Qingkai Zeng, Yang Zhang, Dong Wang:
Through the eyes of a poet: classical poetry recommendation with visual input on social media. 333-340
Applications I
- Henry K. Dambanemuya, Madhav Joshi, Emoke-Ágnes Horvát:
Network perspective on the efficiency of peace accords implementation. 341-348 - Sreeja Nair, Adriana Iamnitchi, John Skvoretz:
Promoting social conventions across polarized networks: an empirical study. 349-352 - Mayank Kejriwal, Peilin Zhou:
Low-supervision urgency detection and transfer in short crisis messages. 353-356
Behavioral modeling
- Vanessa Cedeno-Mieles, Zhihao Hu, Xinwei Deng, Yihui Ren, Abhijin Adiga, Christopher L. Barrett, Saliya Ekanayake, Gizem Korkmaz, Chris J. Kuhlman, Dustin Machi, Madhav V. Marathe, S. S. Ravi, Brian J. Goode, Naren Ramakrishnan, Parang Saraf, Nathan Self, Noshir Contractor, Joshua M. Epstein, Michael W. Macy:
Mechanistic and data-driven agent-based models to explain human behavior in online networked group anagram games. 357-364 - Binxuan Huang, Kathleen M. Carley:
A large-scale empirical study of geotagging behavior on Twitter. 365-373 - Rahul Pandey, Carlos Castillo, Hemant Purohit:
Modeling human annotation errors to design bias-aware systems for social stream processing. 374-377
Network algorithms
- Peng Ni, Masatoshi Hanai, Wen Jun Tan, Wentong Cai:
Efficient closeness centrality computation in time-evolving graphs. 378-385 - Huda Nassar, Austin R. Benson, David F. Gleich:
Pairwise link prediction. 386-393 - Frédéric Simard:
On computing distances and latencies in link streams. 394-397
Network modeling
- Chen Avin, Zvi Lotker, Yinon Nahum, David Peleg:
Random preferential attachment hypergraph. 398-405 - Julian Müller, Ulrik Brandes:
The evolution of roles. 406-413 - Haripriya Chakraborty, Liang Zhao:
Modeling the dynamics of resource exchange networks. 414-419
Misinformation & online content
- Jesper Holmström, Daniel Jönsson, Filip Polbratt, Olav Nilsson, Linnea Lundström, Sebastian Ragnarsson, Anton Forsberg, Karl Andersson, Niklas Carlsson:
Do we read what we share?: analyzing the click dynamic of news articles shared on Twitter. 420-425 - Alexandre M. Sousa, Jussara M. Almeida, Flavio V. D. de Figueiredo:
Analyzing and modeling user curiosity in online content consumption: a LastFM case study. 426-431 - Bhavtosh Rath, Wei Gao, Jaideep Srivastava:
Evaluating vulnerability to fake news in social networks: a community health assessment model. 432-435 - Kai Shu, Xinyi Zhou, Suhang Wang, Reza Zafarani, Huan Liu:
The role of user profiles for fake news detection. 436-439
Modeling & algorithms
- Malik Magdon-Ismail, Kshiteesh Hegde:
The intrinsic scale of networks is small. 440-447 - Farzan Masrour, Pang-Ning Tan, Abdol-Hossein Esfahanian:
OPTANE: an OPtimal transport algorithm for NEtwork alignment. 448-451 - Sai Kiran Narayanaswami, Balaraman Ravindran, Venkatesh Ramaiyan:
Generalized random Surfer-Pair models. 452-455 - Yulong Pei, Jianpeng Zhang, George H. L. Fletcher, Mykola Pechenizkiy:
Infinite motif stochastic blockmodel for role discovery in networks. 456-459 - Feiyu Long, Nianwen Ning, Chenguang Song, Bin Wu:
Strengthening social networks analysis by networks fusion. 460-463
Applications II
- Rashid Tahir, Faizan Ahmed, Hammas Saeed, Shiza Ali, Fareed Zaffar, Christo Wilson:
Bringing the kid back into YouTube kids: detecting inappropriate content on video streaming platforms. 464-469 - Pamela Bilo Thomas, Rachel Krohn, Tim Weninger:
Dynamics of team library adoptions: an exploration of GitHub commit logs. 470-473 - Lea Baumann, Sonja Utz:
How to encourage people to build diverse business networks? 474-479 - Kaustav Basu, Arunabha Sen:
Monitoring individuals in drug trafficking organizations: a social network analysis. 480-483 - Victor S. Bursztyn, Larry Birnbaum:
Thousands of small, constant rallies: a large-scale analysis of partisan WhatsApp groups. 484-488 - Yo-Der Song, Mingwei Gong, Aniket Mahanti:
Measurement and analysis of an adult video streaming service. 489-492
Network analysis II
- Mitchell Goist, Ted Hsuan Yun Chen, Christopher Boylan:
Reconstructing and analyzing the transnational human trafficking network. 493-500 - Pujan Paudel, Trung T. Nguyen, Amartya Hatua, Andrew H. Sung:
How the tables have turned: studying the new wave of social bots on Twitter using complex network analysis techniques. 501-508 - Ninareh Mehrabi, Fred Morstatter, Nanyun Peng, Aram Galstyan:
Debiasing community detection: the importance of lowly connected nodes. 509-512 - Obaida Hanteer, Luca Rossi:
The meaning of dissimilar: an evaluation of various similarity quantification approaches used to evaluate community detection solutions. 513-518 - Mahboubeh Ahmadalinezhad, Masoud Makrehchi, Neil Seward:
Basketball lineup performance prediction using network analysis. 519-524
POSTER SESSION: Posters madness session
- Chung-Chi Chen, Hen-Hsen Huang, Hsin-Hsi Chen:
Next cashtag prediction on social trading platforms with auxiliary tasks. 525-527 - David Spence, Christopher Inskip, Novi Quadrianto, David Weir:
Quantification under class-conditional dataset shift. 528-529 - Dipanjyoti Paul, Rahul Kumar, Sriparna Saha, Jimson Mathew:
Online feature selection for multi-label classification in multi-objective optimization framework. 530-531 - Katchaguy Areekijseree, Yuzhe Richard Tang, Sucheta Soundarajan:
Computing node clustering coefficients securely. 532-533 - Liang Feng, Qianchuan Zhao, Cangqi Zhou:
An efficient method to find communities in K-partite networks. 534-535 - Maryam Ramezani, Mina Rafiei, Soroush Omranpour, Hamid R. Rabiee:
News labeling as early as possible: real or fake? 536-537 - Masaomi Kimura:
CAB-NC: the correspondence analysis based network clustering method. 538-539 - Meysam Ghaffari, Ashok Srinivasan, Xiuwen Liu:
High-resolution home location prediction from tweets using deep learning with dynamic structure. 540-542 - Parham Hamouni, Taraneh Khazaei, Ehsan Amjadian:
TF-MF: improving multiview representation for Twitter user geolocation prediction. 543-545 - Shalini Priya, Saharsh Singh, Sourav Kumar Dandapat, Kripabandhu Ghosh, Joydeep Chandra:
Identifying infrastructure damage during earthquake using deep active learning. 551-552 - Taha Hassan, Bob Edmison, Larry Cox II, Matthew Louvet, Daron Williams:
Exploring the context of course rankings on online academic forums. 553-556 - Vivek K. Singh, Connor Hofenbitzer:
Fairness across network positions in cyberbullying detection algorithms. 557-559 - Zhou Yang, Long Hoang Nguyen, Fang Jin:
Opioid relapse prediction with GAN. 560-567 - Adrien Benamira, Benjamin Devillers, Etienne Lesot, Ayush K. Ray, Manal Saadi, Fragkiskos D. Malliaros:
Semi-supervised learning and graph neural networks for fake news detection. 568-569
Multidisciplinary session
- Dany Perwita Sari, Yun-Shang Chiou:
Transformation in architecture and spatial organization at Javanese house. 570-577 - Roland Molontay, Marcell Nagy:
Two decades of network science: as seen through the co-authorship network of network scientists. 578-583 - Marcell Nagy, Roland Molontay:
On the structural properties of social networks and their measurement-calibrated synthetic counterparts. 584-588 - Mattia Gasparini, Giorgia Ramponi, Marco Brambilla, Stefano Ceri:
Assigning users to domains of interest based on content and network similarity with champion instances. 589-592 - Soumajyoti Sarkar, Paulo Shakarian, Mika Armenta, Danielle Sanchez, Kiran Lakkaraju:
Can social influence be exploited to compromise security: an online experimental evaluation. 593-596 - Fernando H. Calderon, Li-Kai Cheng, Ming-Jen Lin, Yen-Hao Huang, Yi-Shin Chen:
Content-based echo chamber detection on social media platforms. 597-600 - Shuo Zhang, Mayank Kejriwal:
Concept drift in bias and sensationalism detection: an experimental study. 601-604 - Dionisios N. Sotiropoulos, Ifigeneia Georgoula, Christos Bilanakos:
Optimal influence strategies in an oligopolistic competition network environment. 605-612 - Apratim Das, Alex Aravind, Mark Dale:
Algorithm and application for signed graphlets. 613-620 - Meysam Ghaffari, Ashok Srinivasan, Anuj Mubayi, Xiuwen Liu, Krishnan Viswanathan:
Next-generation high-resolution vector-borne disease risk assessment. 621-624 - Arunkumar Bagavathi, Pedram Bashiri, Shannon Reid, Matthew Phillips, Siddharth Krishnan:
Examining untempered social media: analyzing cascades of polarized conversations. 625-632 - Apratim Das, Mike Drakos, Alex Aravind, Darwin Horning:
Water governance network analysis using graphlet mining. 633-640 - Michelle Bowman, Subrata Acharya:
Risk assessment of pharmacies & electronic prescriptions. 641-644 - Maria Camila Rivera Serna, Subrata Acharya:
FastestER: a web application to enable effective emergency department service. 645-648 - Abigail Garrett, Naeemul Hassan:
Understanding the silence of sexual harassment victims through the #WhyIDidntReport movement. 649-652 - Naeemul Hassan, Manash Kumar Mandal, Mansurul Bhuiyan, Aparna Moitra, Syed Ishtiaque Ahmed:
Can women break the glass ceiling?: an analysis of #MeToo hashtagged posts on Twitter. 653-656
Industry track session
- Alireza Pourali, Fattane Zarrinkalam, Ebrahim Bagheri:
Neural embedding features for point-of-interest recommendation. 657-662 - Yang Zhang, Xiangyu Dong, Daniel Yue Zhang, Dong Wang:
A syntax-based learning approach to geo-locating abnormal traffic events using social sensing. 663-670 - Yingtong Dou, Weijian Li, Zhirong Liu, Zhenhua Dong, Jiebo Luo, Philip S. Yu:
Uncovering download fraud activities in mobile app markets. 671-678 - Ankit Kumar Saw, Nitendra Rajput:
Beauty lies in the face of the beholder: a Bi-channel CNN architecture for attractiveness modeling in matrimony. 679-682 - Shreya Jain, Dipankar Niranjan, Hemank Lamba, Neil Shah, Ponnurangam Kumaraguru:
Characterizing and detecting livestreaming chatbots. 683-690 - Shin-Ying Huang, Yen-Wen Huang, Ching-Hao Mao:
A multi-channel cybersecurity news and threat intelligent engine - SecBuzzer. 691-695 - Mandira Hegde, Ian McCulloh, John Piorkowski:
Examining MOOC superposter behavior using social network analysis. 696-700
DEMONSTRATION SESSION: Demo's track session
- Adewale Obadimu, Muhammad Nihal Hussain, Nitin Agarwal:
Blog data analytics using blogtrackers. 701-704 - Mayank Kejriwal, Peilin Zhou:
SAVIZ: interactive exploration and visualization of situation labeling classifiers over crisis social media data. 705-708 - Thomas Marcoux, Nitin Agarwal, Adewale Obadimu, Muhammad Nihal Hussain:
Understanding information operations using YouTubeTracker. 709-712 - Trang Ha, Quyen Hoang, Kyumin Lee:
Building a task blacklist for online social platforms. 713-716 - Ying Zhao, Charles C. Zhou, Sihui Huang:
Theory and use case of game-theoretic lexical link analysis. 717-720
PhD track session
- Henry K. Dambanemuya, Emoke-Ágnes Horvát:
Network-aware multi-agent simulations of herder-farmer conflicts. 721-722 - Pallavi Jain, Robert Ross, Bianca Schoen-Phelan:
Estimating distributed representation performance in disaster-related social media classification. 723-727 - Renny Márquez, Richard Weber, André C. P. L. F. de Carvalho:
A non-negative matrix factorization approach to update communities in temporal networks using node features. 728-732 - Johanna M. Werz, Valerie Varney, Ingrid Isenhardt:
The curse of self-presentation: looking for career patterns in online CVs. 733-736 - Ki-Young Shin, Woosang Song, Jinhee Kim, Jong-Hyeok Lee:
News credibility scroing: suggestion of research methodology to determine the reliability of news distributed in SNS. 737-740
FAB
- Carson K. Leung, Fan Jiang, Yibin Zhang:
Flexible compression of big data. 741-748 - Konstantinos F. Xylogiannopoulos, Panagiotis Karampelas, Reda Alhajj:
Multivariate motif detection in local weather big data. 749-756 - Sirui Sun, Bin Wu, Zixing Zhang, Nianwen Ning, Bai Wang:
A hierarchical insurance recommendation framework using GraphOLAM approach. 757-764 - Ahmet Anil Müngen, Emre Dogan, Mehmet Kaya:
Text generation with diversified source literature review. 765-770 - Emanuela Todeva, David Knoke, Donka Keskinova:
Multi-stage clustering with complementary structural analysis of 2-mode networks. 771-778 - Tung Nguyen, Li Zhang, Aron Culotta:
Estimating tie strength in follower networks to measure brand perceptions. 779-786 - Sheung Yat Law, Dharshana Kasthurirathna, Mahendra Piraveenan:
Placement matters in making good decisions sooner: the influence of topology in reaching public utility thresholds. 787-795 - Richard Takacs, Ian McCulloh:
Dormant bots in social media: Twitter and the 2018 U.S. senate election. 796-800 - Konstantinos F. Xylogiannopoulos:
Exhaustive exact string matching: the analysis of the full human genome. 801-808 - Ahmet Engin Bayrak, Faruk Polat:
Reducing features to improve link prediction performance in location based social networks, non-monotonically selected subset from feature clusters. 809-815 - Lihi Idan, Joan Feigenbaum:
Show me your friends, and I will tell you whom you vote for: predicting voting behavior in social networks. 816-824 - Esen Tutaysalgir, Pinar Karagoz, Ismail H. Toroslu:
Clustering based personality prediction on turkish tweets. 825-828 - Sharon Grubner Hasson, John Piorkowski, Ian McCulloh:
Social media as a main source of customer feedback: alternative to customer satisfaction surveys. 829-832
FOSINT-SI
- Zoheb Borbora, Arpita Chandra, Ponnurangam Kumaraguru, Jaideep Srivastava:
On churn and social contagion. 833-841 - Tor Berglind, Björn Pelzer, Lisa Kaati:
Levels of hate in online environments. 842-847 - Anu Shrestha, Francesca Spezzano:
Online misinformation: from the deceiver to the victim. 847-850 - Justin Song, Valerie Spicer, Andrew J. Park, Herbert H. Tsang, Patricia L. Brantingham:
Computational method for identifying the boundaries of crime with street profile and discrete calculus. 851-854 - Vivin Paliath, Paulo Shakarian:
Reasoning about sequential cyberattacks. 855-862 - Shao-Fang Wen, Mazaher Kianpour, Stewart Kowalski:
An empirical study of security culture in open source software communities. 863-870 - Avishek Bose, Vahid Behzadan, Carlos A. Aguirre, William H. Hsu:
A novel approach for detection and ranking of trendy and emerging cyber threat events in Twitter streams. 871-878 - Aditya Pingle, Aritran Piplai, Sudip Mittal, Anupam Joshi, James Holt, Richard Zak:
RelExt: relation extraction using deep learning approaches for cybersecurity knowledge graph improvement. 879-886 - Konstantinos F. Xylogiannopoulos, Panagiotis Karampelas, Reda Alhajj:
Text mining for malware classification using multivariate all repeated patterns detection. 887-894 - Mohammed Almukaynizi, Malay Shah, Paulo Shakarian:
A hybrid KRR-ML approach to predict malicious email campaigns. 895-898 - Mohammed Rashed, John Piorkowski, Ian McCulloh:
Evaluation of extremist cohesion in a darknet forum using ERGM and LDA. 899-902 - Emily Alfs, Doina Caragea, Dewan Chaulagain, Sankardas Roy, Nathan Albin, Pietro Poggi-Corradini:
Identifying Android malware using network-based approaches. 903-906 - Choukri Djellali, Mehdi Adda, Mohamed Tarik Moutacalli:
A comparative study to deep learning for pattern recognition, by using online and batch learning; taking cybersecurity as a case. 907-912
HI-BI-BI symposium
- Joseph M. de Guia, Madhavi Devaraj, Carson K. Leung:
DeepGx: deep learning using gene expression for cancer classification. 913-920 - Hanane Grissette, ELhabib Nfaoui:
Daily life patients sentiment analysis model based on well-encoded embedding vocabulary for related-medication text. 921-928 - Hüseyin Vural, Mehmet Kaya, Reda Alhajj:
A model based on random walk with restart to predict circRNA-disease associations on heterogeneous network. 929-932 - Carmela Comito, Agostino Forestiero, Giuseppe Papuzzo:
A clinical decision support framework for automatic disease diagnoses. 933-936 - Krunal Dhiraj Patel, Andrew Heppner, Gautam Srivastava, Vijay Mago:
Analyzing use of Twitter by diabetes online community. 937-944 - Anu Shrestha, Francesca Spezzano:
Detecting depressed users in online forums. 945-951 - Farahnaz Golrooy Motlagh, Saeedeh Shekarpour, Amit P. Sheth, Krishnaprasad Thirunarayan, Michael L. Raymer:
Predicting public opinion on drug legalization: social media analysis and consumption trends. 952-961 - Hankyu Jang, Samuel Justice, Philip M. Polgreen, Alberto M. Segre, Daniel K. Sewell, Sriram V. Pemmaraju:
Evaluating architectural changes to alter pathogen dynamics in a dialysis unit: for the CDC MInD-healthcare group. 961-968
WORKSHOP SESSION: SI workshop session
- Jan Hauffa, Wolfgang Bräu, Georg Groh:
Detection of topical influence in social networks via granger-causal inference: a Twitter case study. 969-977 - Sukankana Chakraborty, Sebastian Stein, Markus Brede, Ananthram Swami, Geeth de Mel, Valerio Restocchi:
Competitive influence maximisation using voting dynamics. 978-985 - Mihai Valentin Avram, Shubhanshu Mishra, Nikolaus Nova Parulian, Jana Diesner:
Adversarial perturbations to manipulate the perception of power and influence in networks. 986-994
WORKSHOP SESSION: MSNDS workshop session
- Patryk Pazura, Jaroslaw Jankowski, Kamil Bortko, Piotr Bartkow:
Increasing the diffusional characteristics of networks through optimal topology changes within sub-graphs. 994-1000 - Li-Chen Cheng, Song-Lin Tsai:
Deep learning for automated sentiment analysis of social media. 1001-1004 - Takayasu Fushimi, Kennichi Kanno:
Extraction of user demands based on similar tweets graph. 1005-1012 - Shih-Hung Wu, Jun-Wei Wang:
Integrating neural and syntactic features on the helpfulness analysis of the online customer reviews. 1013-1017 - K. (Lynn) Putman, Hanjo D. Boekhout, Frank W. Takes:
Fast incremental computation of harmonic closeness centrality in directed weighted networks. 1018-1025 - Min-Yuh Day, Jian-Ting Lin:
Artificial intelligence for ETF market prediction and portfolio optimization. 1026-1033 - Logan Praznik, Gautam Srivastava, Chetan Harichandra Mendhe, Vijay Mago:
Vertex-weighted measures for link prediction in hashtag graphs. 1034-1041 - Gui-Ru Li, Chia-Hui Chang:
Semantic role labeling for opinion target extraction from chinese social network. 1042-1047
WORKSHOP SESSION: SNAA workshop session
- Christopher Yong, Charalampos Chelmis, Wonhyung Lee, Daphney-Stavroula Zois:
Understanding online civic engagement: a multi-neighborhood study of SeeClickFix. 1048-1055 - Charalampos Chelmis, Mengfan Yao, Wonhyung Lee:
Web and society: a first look into the network of human service providers. 1056-1063 - Do Yeon Kim, Xiaohang Li, Sheng Wang, Yunying Zhuo, Roy Ka-Wei Lee:
Topic enhanced word embedding for toxic content detection in Q&A sites. 1064-1071 - Arpita Chandra, Zoheb Borbora, Ponnurangam Kumaraguru, Jaideep Srivastava:
Finding your social space: empirical study of social exploration in multiplayer online games. 1072-1080 - Abu Saleh Md Tayeen, Abderrahmen Mtibaa, Satyajayant Misra:
Location, location, location!: quantifying the true impact of location on business reviews using a Yelp dataset. 1081-1088 - Sandra Mitrovic, Laurent Lecoutere, Jochen De Weerdt:
A comparison of methods for link sign prediction with signed network embeddings. 1089-1096
WORKSHOP SESSION: SNAST workshop session
- Lingwei Chen, Shifu Hou, Yanfang Ye, Thirimachos Bourlai, Shouhuai Xu, Liang Zhao:
iTrustSO: an intelligent system for automatic detection of insecure code snippets in stack overflow. 1097-1104 - Dimitrios Lappas, Panagiotis Karampelas, George Fessakis:
The role of social media surveillance in search and rescue missions. 1105-1111 - Sho Tsugawa, Sumaru Niida:
The impact of social network structure on the growth and survival of online communities. 1112-1119 - Jacob Rose, Thirimachos Bourlai:
Deep learning based estimation of facial attributes on challenging mobile phone face datasets. 1120-1127 - Dimitris Spiliotopoulos, Costas Vassilakis, Dionisis Margaris:
Data-driven country safety monitoring terrorist attack prediction. 1128-1135 - Kaustav Basu, Arunabha Sen:
On augmented identifying codes for monitoring drug trafficking organizations. 1136-1139 - Suha Reddy Mokalla, Thirimachos Bourlai:
On designing MWIR and visible band based DeepFace detection models. 1140-1147
WORKSHOP SESSION: READNet workshop session
- Meisam Hejazinia, Pavlos Mitsoulis-Ntompos, Serena Zhang:
Deep personalized re-targeting. 1148-1154 - Mariella Bonomo, Gaspare Ciaccio, Andrea De Salve, Simona E. Rombo:
Customer recommendation based on profile matching and customized campaigns in on-line social networks. 1155-1159 - Dionisis Margaris, Dimitris Spiliotopoulos, Costas Vassilakis:
Social relations versus near neighbours: reliable recommenders in limited information social network collaborative filtering for online advertising. 1160-1167 - Carmela Comito:
Travel routes recommendations via online social networks. 1168-1173 - Gianluca Lax, Antonia Russo:
A system to enforce user's preference in OSN advertising. 1174-1178
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.