10,168 Hits in 5.0 sec

Link injection for boosting information spread in social networks

Stefanos Antaris, Dimitrios Rafailidis, Alexandros Nanopoulos
2014 Social Network Analysis and Mining  
In this paper, we propose a novel method that predicts new social links that can be inserted among existing users of a social network, aiming directly at boosting information spread and increasing its  ...  Social media have become popular platforms for spreading information.  ...  Conclusions In this paper, we have presented a link injection methodology to boost the spread of information in social networks.  ... 
doi:10.1007/s13278-014-0236-y fatcat:rmrxarn54zfv5h32xjllb5rovq

Crossing the Boundaries of Communities via Limited Link Injection for Information Diffusion In Social Networks

Dimitrios Rafailidis, Alexandros Nanopoulos
2015 Proceedings of the 24th International Conference on World Wide Web - WWW '15 Companion  
We propose a new link-injection method aiming at boosting the overall diffusion of information in social networks.  ...  In our experiments with five real world networks, we demonstrate that our method can significantly spread the information diffusion by performing limited link injection, essential to real-world applications  ...  CONCLUSIONS Our link injection method can significantly boost information diffusion in social networks, especially when promoting to inject links that cross the boundaries of users' communities.  ... 
doi:10.1145/2740908.2742733 dblp:conf/www/RafailidisN15 fatcat:rq5soyoyjjatboyutvkqnprrpq

Endangering the Endangered: Impact of fake Covid-19 Social Media Communications in Zimbabwe

Isaac Mhute, Hugh Mangeya, Ernest Jakaza
2021 Pharos journal of theology  
for such misleading communications and in every case to quickly counter their impact by availing correct information to the people.  ...  It accomplishes this by qualitatively analyzing purposively sampled fake communications in circulation on social media as well as some of the utterances and behaviors people make in response to them.  ...  Another boost for the claim came inform of destruction of the 5G boosters in a number of places including Wuhan during the period the communication conquered the media.  ... 
doi:10.46222/pharosjot.102.211 fatcat:4bdgfwl3w5d37ksxcitvbhabf4

Preventing Social Sites from Publishing Malicious Content

Deepak Ranjan
2016 International Journal Of Engineering And Computer Science  
Malicious websites steals the valuable information of the visitors and infect their system for further attacks.  ...  In fact, it is a popular tool for any class of user over the Internet. Rich Web based applications are available over the World Wide Web to provide such types of services.  ...  Internet users now spend more time on social networking sites Information can spread very fast and easily within the social media networks.  ... 
doi:10.18535/ijecs/v5i10.55 fatcat:t23wujzctbbgpkp7rgtu6uixey

Asynchronous Rumour Spreading in Social and Signed Topologies [article]

Christos Patsonakis, Mema Roussopoulos
2015 arXiv   pre-print
This protocol is, to date, the best-performing rumour spreading protocol for simple, scalable, and robust information dissemination in distributed systems.  ...  We also study the behaviour of the protocol on a special type of social graph, called signed networks (e.g., Slashdot and Epinions), whose links indicate stronger trust relationships.  ...  Rumours spread well in social networks due to their high density, i.e., there are many links that the protocol can use to disseminate information to many different nodes.  ... 
arXiv:1310.6119v3 fatcat:luzfcm5zsjfzjmqom7opd5zewy

Spammer Classification Using Ensemble Methods over Structural Social Network Features

Sajid Yousuf Bhat, Muhammad Abulaish, Abdulrahman A. Mirza
2014 2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT)  
social networks.  ...  In literature, various machine learning techniques have been extensively used to detect spam and spammers in online social networks.  ...  ACKNOWLEDGEMENT The authors acknowledge the support provided by the King Abdulaziz City for Science and Technology (KACST), Kingdom of Saudi Arabia under the NPST project number 11-INF1594-02.  ... 
doi:10.1109/wi-iat.2014.133 dblp:conf/webi/BhatAM14 fatcat:dml4gl3jt5hg5nkmzrzcguzg4e

Trends in the Spread of Fake News in the Mass Media

2019 Media Watch  
The empirical review deals with the trends in spreading fake news in the media landscape.  ...  For these purposes, the article establishes the fundamental mechanisms for using fake news.  ...  Dizikes (2018) find that misleading information spreads more rapidly on social networks than real news does.  ... 
doi:10.15655/mw/2019/v10i1/49561 fatcat:rxjk4fi4wbaavgddc44oqn2yti

The history of digital spam

Emilio Ferrara
2019 Communications of the ACM  
In this article, I will briefly review the history of digital spam: starting from its quintessential incarnation, spam emails, to modern-days forms of spam affecting the Web and social media, the survey  ...  : that's what Lorrie Faith Cranor and Brian LaMacchia exclaimed in the title of a popular call-to-action article that appeared twenty years ago on Communications of the ACM.  ...  ACKNOWLEDGMENTS The author would like to thank current and former members of the USC Information Sciences Institute's MINDS research group, as well as of the Indiana University's CNetS group, for invaluable  ... 
doi:10.1145/3299768 fatcat:ht45pgouvfhjnaka2uxqv4nahm

Cognitive-Inspired Conversational-Strategy Reasoner for Socially-Aware Agents

Oscar J. Romero, Ran Zhao, Justine Cassell
2017 Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence  
user desires so as to boost the strength of the relationship between the user and system (rapport), and therefore the user's engagement and willingness to divulge the information the agent needs to efficiently  ...  In this work we propose a novel module for a dialogue system that allows a conversational agent to utter phrases that do not just meet the system's task intentions, but also work towards achieving the  ...  the amount of energy a goal injects into the network, and δ is the amount of activation energy a protected goal takes away from the network.  ... 
doi:10.24963/ijcai.2017/532 dblp:conf/ijcai/RomeroZC17 fatcat:3rkxqlzxmfbx7hv2i4ttzzwese

A Survey on Techniques to Detect Malicious Activites on Web

Abdul Rahaman Wahab Sait, Dr.M.Arunadevi, Dr.T.Meyyappan
2019 International Journal of Advanced Computer Science and Applications  
The world wide web is more vulnerable for malicious activities.  ...  Spam-advertisements, Sybil attacks, Rumour propagation, financial frauds, malware dissemination, and Sql injection are some of the malicious activities on web.  ...  Social networking service consists of a representation of a user profile and their social links and different types of additional services.  ... 
doi:10.14569/ijacsa.2019.0100226 fatcat:yongiihdhjf7zflimnlrds7vd4

Message prioritization of epidemic forwarding in delay-tolerant networks

Xu Liu, Yuanzhu Chen, Cheng Li, Walter Taylor, Jason H. Moore
2014 2014 International Conference on Computing, Networking and Communications (ICNC)  
We compare a few such message prioritization methods using computer simulation and observe their performance in terms how widely and quickly information can be distributed across the network.  ...  Delay-tolerant networking is the innovation of extending the capabilities of communication networks in the temporal domain.  ...  As such, the system helps newly injected message to spread in the network more quickly. 3) Oblivious -Node A maintains a FIFO queue of all messages by the time they are injected into the network as in  ... 
doi:10.1109/iccnc.2014.6785399 dblp:conf/iccnc/LiuCLTM14 fatcat:evdumtn5mnaa3fio2x3y2q4zj4


Jacob Ratkiewicz, Michael Conover, Mark Meiss, Bruno Gonçalves, Snehal Patil, Alessandro Flammini, Filippo Menczer
2011 Proceedings of the 20th international conference companion on World wide web - WWW '11  
Online social media are complementing and in some cases replacing person-to-person social interaction and redefining the diffusion of information.  ...  We introduce an extensible framework that will enable the real-time analysis of meme diffusion in social media by mining, visualizing, mapping, classifying, and modeling massive streams of public microblogging  ...  We thank the Gephi toolkit for aid in our visualizations and the many users who have provided feedback and annotations. We acknowledge support from NSF (grant No.  ... 
doi:10.1145/1963192.1963301 dblp:conf/www/RatkiewiczCMGPFM11 fatcat:qz2x6uscwvhlnfsddicwb7yumi

SybilBelief: A Semi-Supervised Learning Approach for Structure-Based Sybil Detection

Neil Zhenqiang Gong, Mario Frank, Prateek Mittal
2014 IEEE Transactions on Information Forensics and Security  
Recently, there has been a growing interest in leveraging social networks to mitigate Sybil attacks.  ...  SybilBelief takes a social network of the nodes in the system, a small set of known benign nodes, and, optionally, a small set of known Sybils as input.  ...  Sybil accounts in online social networks are used for criminal activities such as spreading spam or malware [3] , stealing other users' private information [4] , [5] , and manipulating web search results  ... 
doi:10.1109/tifs.2014.2316975 fatcat:p3e2galowva27gv6wiet3t3qyy

Reconstructing missing complex networks against adversarial interventions

Yuankun Xue, Paul Bogdan
2019 Nature Communications  
The demonstrated effectiveness establishes its good potential for capturing hidden information in much broader research domains.  ...  network structure in a simulated removal process.  ...  We consider an extended social network with 4049 nodes (including hidden nodes injected for information manipulation, referred as injected nodes, and ordinary user nodes) built from Facebook network dataset  ... 
doi:10.1038/s41467-019-09774-x pmid:30988308 pmcid:PMC6465316 fatcat:dwgoec6hf5gjhl6yqrxvcvz5ne

Propagation Models for Trust and Distrust in Social Networks

Cai-Nicolas Ziegler, Georg Lausen
2005 Information Systems Frontiers  
Compelling in its simplicity, Appleseed borrows many ideas from spreading activation models in psychology and relates their concepts to trust evaluation in an intuitive fashion.  ...  However, besides understanding information metadata stated by subjects, knowing about their credibility becomes equally crucial.  ...  Acknowledgments We are very grateful to Lule Ahmedi, Nathan Dimmock, Kai Simon, and Paolo Massa for insightful comments and fruitful discussions, which helped us improve the quality of the paper.  ... 
doi:10.1007/s10796-005-4807-3 fatcat:ylz6nuo52ng3pf2aolm64levbi
« Previous Showing results 1 — 15 out of 10,168 results