


default search action
11th ASONAM 2019: Vancouver, BC, Canada
- Francesca Spezzano
, Wei Chen, Xiaokui Xiao:
ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, Vancouver, British Columbia, Canada, 27-30 August, 2019. ACM 2019, ISBN 978-1-4503-6868-1
Communities I
- Michele Coscia:
Discovering communities of community discovery. 1-8 - Neda Zarayeneh, Ananth Kalyanaraman:
A fast and efficient incremental approach toward dynamic community detection. 9-16 - Young D. Kwon
, Reza Hadi Mogavi, Ehsan ul Haq, Youngjin Kwon
, Xiaojuan Ma, Pan Hui:
Effects of ego networks and communities on self-disclosure in an online social network. 17-24
Misbehavior & misinformation I
- Courtland VanDam, Farzan Masrour, Pang-Ning Tan
, Tyler Wilson:
You have been CAUTE!: early detection of compromised accounts on social media. 25-32 - Thai Le, Kai Shu, Maria D. Molina, Dongwon Lee
, S. Shyam Sundar, Huan Liu:
5 sources of clickbaits you should know!: using synthetic clickbaits to improve prediction and distinguish between bot-generated and human-written headlines. 33-40 - Limeng Cui, Suhang Wang
, Dongwon Lee
:
SAME: sentiment-aware multi-modal embedding for detecting fake news. 41-48
Network embedding
- Jundong Li, Liang Wu, Ruocheng Guo, Chenghao Liu, Huan Liu:
Multi-level network embedding with boosted low-rank matrix approximation. 49-56 - Aynaz Taheri, Tanya Y. Berger-Wolf:
Predictive temporal embedding of dynamic graphs. 57-64 - Benedek Rozemberczki, Ryan Davies, Rik Sarkar, Charles Sutton:
GEMSEC: graph embedding with self clustering. 65-72
Information & influence diffusion I
- Antoine J.-P. Tixier, Maria-Evgenia G. Rossi
, Fragkiskos D. Malliaros, Jesse Read, Michalis Vazirgiannis:
Perturb and combine to identify influential spreaders in real-world networks. 73-80 - Yang Chen, Jiamou Liu:
Becoming gatekeepers together with allies: collaborative brokerage over social networks. 81-88 - Yu Zhang:
Diversifying seeds and audience in social influence maximization. 89-94 - Arash Ghayoori, Rakesh Nagi
:
Seed investment bounds for viral marketing under generalized diffusion. 95-100 - Xiao Yang, Seungbae Kim, Yizhou Sun:
How do influencers mention brands in social media?: sponsorship prediction of Instagram posts. 101-104
Misbehavior & misinformation II
- Sooji Han
, Jie Gao
, Fabio Ciravegna:
Neural language model based training data augmentation for weakly supervised early rumor detection. 105-112 - Amir Pouran Ben Veyseh, My T. Thai, Thien Huu Nguyen, Dejing Dou:
Rumor detection in social networks via deep contextual modeling. 113-120 - Wataru Kudo, Mao Nishiguchi, Fujio Toriumi
:
Fraudulent user detection on rating networks based on expanded balance theory and GCNs. 121-126 - Udit Arora, William Scott Paka, Tanmoy Chakraborty
:
Multitask learning for blackmarket tweet detection. 127-130 - Mohammad Raihanul Islam, Sathappan Muthiah, Naren Ramakrishnan
:
RumorSleuth: joint detection of rumor veracity and user stance. 131-136
Network analysis with machine learning I
- Aravind Sankar, Xinyang Zhang, Kevin Chen-Chuan Chang:
Meta-GNN: metagraph neural network for semi-supervised learning in attributed heterogeneous information networks. 137-144 - Suhansanu Kumar, Heting Gao, Changyu Wang, Kevin Chen-Chuan Chang, Hari Sundaram
:
Hierarchical multi-armed bandits for discovering hidden populations. 145-153 - Yang Zhang, Hongxiao Wang, Daniel Yue Zhang, Yiwen Lu, Dong Wang:
RiskCast: social sensing based traffic risk forecasting via inductive multi-view learning. 154-157 - Sumeet Kumar
, Kathleen M. Carley:
What to track on the Twitter streaming API?: a knapsack bandits approach to dynamically update the search terms. 158-163 - Renhao Cui, Gagan Agrawal, Rajiv Ramnath:
Tweets can tell: activity recognition using hybrid long short-term memory model. 164-167
Communities II
- Yulong Pei, George H. L. Fletcher
, Mykola Pechenizkiy
:
Joint role and community detection in networks via L2, 1 norm regularized nonnegative matrix tri-factorization. 168-175 - Jean Marie Tshimula, Belkacem Chikhaoui, Shengrui Wang:
HAR-search: a method to discover hidden affinity relationships in online communities. 176-183 - Domenico Mandaglio
, Andrea Tagarelli:
Dynamic consensus community detection and combinatorial multi-armed bandit. 184-187
Social media analysis
- Marija Stanojevic, Jumanah Alshehri
, Zoran Obradovic:
Surveying public opinion using label prediction on social media data. 188-195 - Taoran Ji
, Xuchao Zhang, Nathan Self, Kaiqun Fu, Chang-Tien Lu
, Naren Ramakrishnan
:
Feature driven learning framework for cybersecurity event detection. 196-203 - Virgile Landeiro, Aron Culotta:
Collecting representative social media samples from a search engine by adaptive query generation. 204-207 - Mahsa Ghorbani, Mahdieh Soleymani Baghshah, Hamid R. Rabiee:
MGCN: semi-supervised classification in multi-layer graphs with graph convolutional networks. 208-211
Network analysis with machine learning II
- Vachik S. Dave
, Baichuan Zhang, Pin-Yu Chen, Mohammad Al Hasan:
Neural-brane: an inductive approach for attributed network embedding. 212-215 - Kun Tu, Jian Li, Don Towsley
, Dave Braines
, Liam D. Turner:
gl2vec: learning feature representation using graphlets for directed networks. 216-221 - Caleb Belth, Fahad Kamran, Donna Tjandra, Danai Koutra
:
When to remember where you came from: node representation learning in higher-order networks. 222-225
Information & influence diffusion II
- Soumajyoti Sarkar, Ashkan Aleali, Paulo Shakarian, Mika Armenta, Danielle Sanchez, Kiran Lakkaraju:
Impact of social influence on adoption behavior: an online controlled experimental evaluation. 226-233 - Thiago H. P. Silva, Alberto H. F. Laender, Pedro O. S. Vaz de Melo:
Characterizing knowledge-transfer relationships in dynamic attributed networks. 234-241 - Emily M. Fischer, Souvik Ghosh, Gennady Samorodnitsky:
Epidemic threshold and lifetime distribution for information diffusion on simultaneously growing networks. 242-249 - Jianjun Luo, Xinyue Liu, Xiangnan Kong:
Competitive opinion maximization in social networks. 250-257
Elections and politics
- Huyen T. Le, G. R. Boynton, Zubair Shafiq, Padmini Srinivasan
:
A postmortem of suspended Twitter accounts in the 2016 U.S. presidential election. 258-265 - Hamid Karimi, Tyler Derr
, Aaron Brookhouse, Jiliang Tang:
Multi-factor congressional vote prediction. 266-273 - Indu Manickam, Andrew S. Lan, Gautam Dasarathy
, Richard G. Baraniuk:
IdeoTrace: a framework for ideology tracing with a case study on the 2016 U.S. presidential election. 274-281 - Alexandru Topîrceanu, Radu-Emil Precup
:
A novel methodology for improving election poll prediction using time-aware polling. 282-285
Network analysis I
- Michele Coscia, Luca Rossi:
The impact of projection and backboning on network topologies. 286-293 - Katchaguy Areekijseree, Sucheta Soundarajan:
Measuring the sampling robustness of complex networks. 294-301 - Xiuwen Zheng, Amarnath Gupta:
Social network of extreme tweeters: a case study. 302-306 - Laurence Brandenberger
, Giona Casiraghi
, Vahan Nanumyan, Frank Schweitzer:
Quantifying triadic closure in multi-edge social networks. 307-310 - Seyed Amin Mirlohi Falavarjani, Ebrahim Bagheri, Ssu Yu Zoe Chou, Jelena Jovanovic, Ali A. Ghorbani:
On the causal relation between users' real-world activities and their affective processes. 311-314
Recommendations
- Chia-Wei Chen, Sheng-Chuan Chou, Chang-You Tai, Lun-Wei Ku
:
Phrase-guided attention web article recommendation for next clicks and views. 315-324 - Deqing Yang, Ziyi Wang, Junyang Jiang, Yanghua Xiao:
Knowledge embedding towards the recommendation with sparse user-item interactions. 325-332 - Daniel Yue Zhang, Bo Ni, Qiyu Zhi, Thomas Plummer, Qi Li, Hao Zheng, Qingkai Zeng, Yang Zhang, Dong Wang:
Through the eyes of a poet: classical poetry recommendation with visual input on social media. 333-340
Applications I
- Henry K. Dambanemuya
, Madhav Joshi
, Emoke-Ágnes Horvát:
Network perspective on the efficiency of peace accords implementation. 341-348 - Sreeja Nair, Adriana Iamnitchi
, John Skvoretz:
Promoting social conventions across polarized networks: an empirical study. 349-352 - Mayank Kejriwal, Peilin Zhou:
Low-supervision urgency detection and transfer in short crisis messages. 353-356
Behavioral modeling
- Vanessa Cedeno-Mieles
, Zhihao Hu
, Xinwei Deng, Yihui Ren
, Abhijin Adiga, Christopher L. Barrett, Saliya Ekanayake, Gizem Korkmaz, Chris J. Kuhlman, Dustin Machi, Madhav V. Marathe, S. S. Ravi, Brian J. Goode, Naren Ramakrishnan
, Parang Saraf
, Nathan Self, Noshir Contractor, Joshua M. Epstein, Michael W. Macy:
Mechanistic and data-driven agent-based models to explain human behavior in online networked group anagram games. 357-364 - Binxuan Huang, Kathleen M. Carley:
A large-scale empirical study of geotagging behavior on Twitter. 365-373 - Rahul Pandey, Carlos Castillo, Hemant Purohit
:
Modeling human annotation errors to design bias-aware systems for social stream processing. 374-377
Network algorithms
- Peng Ni, Masatoshi Hanai, Wen Jun Tan
, Wentong Cai
:
Efficient closeness centrality computation in time-evolving graphs. 378-385 - Huda Nassar, Austin R. Benson, David F. Gleich
:
Pairwise link prediction. 386-393 - Frédéric Simard
:
On computing distances and latencies in link streams. 394-397
Network modeling
- Chen Avin, Zvi Lotker, Yinon Nahum, David Peleg:
Random preferential attachment hypergraph. 398-405 - Julian Müller
, Ulrik Brandes:
The evolution of roles. 406-413 - Haripriya Chakraborty, Liang Zhao:
Modeling the dynamics of resource exchange networks. 414-419
Misinformation & online content
- Jesper Holmström, Daniel Jönsson, Filip Polbratt, Olav Nilsson, Linnea Lundström, Sebastian Ragnarsson, Anton Forsberg, Karl Andersson, Niklas Carlsson:
Do we read what we share?: analyzing the click dynamic of news articles shared on Twitter. 420-425 - Alexandre M. Sousa, Jussara M. Almeida, Flavio V. D. de Figueiredo:
Analyzing and modeling user curiosity in online content consumption: a LastFM case study. 426-431 - Bhavtosh Rath, Wei Gao, Jaideep Srivastava:
Evaluating vulnerability to fake news in social networks: a community health assessment model. 432-435 - Kai Shu, Xinyi Zhou, Suhang Wang
, Reza Zafarani, Huan Liu:
The role of user profiles for fake news detection. 436-439
Modeling & algorithms
- Malik Magdon-Ismail, Kshiteesh Hegde
:
The intrinsic scale of networks is small. 440-447 - Farzan Masrour, Pang-Ning Tan
, Abdol-Hossein Esfahanian:
OPTANE: an OPtimal transport algorithm for NEtwork alignment. 448-451 - Sai Kiran Narayanaswami, Balaraman Ravindran
, Venkatesh Ramaiyan:
Generalized random Surfer-Pair models. 452-455 - Yulong Pei, Jianpeng Zhang, George H. L. Fletcher
, Mykola Pechenizkiy
:
Infinite motif stochastic blockmodel for role discovery in networks. 456-459 - Feiyu Long, Nianwen Ning, Chenguang Song, Bin Wu:
Strengthening social networks analysis by networks fusion. 460-463
Applications II
- Rashid Tahir
, Faizan Ahmed, Hammas Saeed, Shiza Ali, Fareed Zaffar, Christo Wilson
:
Bringing the kid back into YouTube kids: detecting inappropriate content on video streaming platforms. 464-469 - Pamela Bilo Thomas, Rachel Krohn, Tim Weninger:
Dynamics of team library adoptions: an exploration of GitHub commit logs. 470-473 - Lea Baumann, Sonja Utz
:
How to encourage people to build diverse business networks? 474-479 - Kaustav Basu, Arunabha Sen:
Monitoring individuals in drug trafficking organizations: a social network analysis. 480-483 - Victor S. Bursztyn, Larry Birnbaum:
Thousands of small, constant rallies: a large-scale analysis of partisan WhatsApp groups. 484-488 - Yo-Der Song, Mingwei Gong, Aniket Mahanti
:
Measurement and analysis of an adult video streaming service. 489-492
Network analysis II
- Mitchell Goist, Ted Hsuan Yun Chen
, Christopher Boylan:
Reconstructing and analyzing the transnational human trafficking network. 493-500 - Pujan Paudel, Trung T. Nguyen
, Amartya Hatua, Andrew H. Sung:
How the tables have turned: studying the new wave of social bots on Twitter using complex network analysis techniques. 501-508 - Ninareh Mehrabi, Fred Morstatter
, Nanyun Peng, Aram Galstyan:
Debiasing community detection: the importance of lowly connected nodes. 509-512 - Obaida Hanteer, Luca Rossi:
The meaning of dissimilar: an evaluation of various similarity quantification approaches used to evaluate community detection solutions. 513-518 - Mahboubeh Ahmadalinezhad, Masoud Makrehchi, Neil Seward:
Basketball lineup performance prediction using network analysis. 519-524
POSTER SESSION: Posters madness session
- Chung-Chi Chen
, Hen-Hsen Huang, Hsin-Hsi Chen:
Next cashtag prediction on social trading platforms with auxiliary tasks. 525-527 - David Spence, Christopher Inskip, Novi Quadrianto
, David Weir:
Quantification under class-conditional dataset shift. 528-529 - Dipanjyoti Paul, Rahul Kumar, Sriparna Saha, Jimson Mathew:
Online feature selection for multi-label classification in multi-objective optimization framework. 530-531 - Katchaguy Areekijseree, Yuzhe Richard Tang, Sucheta Soundarajan:
Computing node clustering coefficients securely. 532-533 - Liang Feng, Qianchuan Zhao, Cangqi Zhou:
An efficient method to find communities in K-partite networks. 534-535 - Maryam Ramezani, Mina Rafiei, Soroush Omranpour, Hamid R. Rabiee:
News labeling as early as possible: real or fake? 536-537 - Masaomi Kimura:
CAB-NC: the correspondence analysis based network clustering method. 538-539 - Meysam Ghaffari, Ashok Srinivasan
, Xiuwen Liu:
High-resolution home location prediction from tweets using deep learning with dynamic structure. 540-542 - Parham Hamouni, Taraneh Khazaei, Ehsan Amjadian
:
TF-MF: improving multiview representation for Twitter user geolocation prediction. 543-545 - Shalini Priya, Saharsh Singh, Sourav Kumar Dandapat, Kripabandhu Ghosh, Joydeep Chandra:
Identifying infrastructure damage during earthquake using deep active learning. 551-552 - Taha Hassan, Bob Edmison, Larry Cox II, Matthew Louvet, Daron Williams:
Exploring the context of course rankings on online academic forums. 553-556 - Vivek K. Singh, Connor Hofenbitzer:
Fairness across network positions in cyberbullying detection algorithms. 557-559 - Zhou Yang, Long Hoang Nguyen, Fang Jin
:
Opioid relapse prediction with GAN. 560-567 - Adrien Benamira, Benjamin Devillers, Etienne Lesot, Ayush K. Ray, Manal Saadi, Fragkiskos D. Malliaros:
Semi-supervised learning and graph neural networks for fake news detection. 568-569
Multidisciplinary session
- Dany Perwita Sari
, Yun-Shang Chiou:
Transformation in architecture and spatial organization at Javanese house. 570-577 - Roland Molontay
, Marcell Nagy:
Two decades of network science: as seen through the co-authorship network of network scientists. 578-583 - Marcell Nagy, Roland Molontay
:
On the structural properties of social networks and their measurement-calibrated synthetic counterparts. 584-588 - Mattia Gasparini, Giorgia Ramponi, Marco Brambilla
, Stefano Ceri:
Assigning users to domains of interest based on content and network similarity with champion instances. 589-592 - Soumajyoti Sarkar, Paulo Shakarian, Mika Armenta, Danielle Sanchez, Kiran Lakkaraju:
Can social influence be exploited to compromise security: an online experimental evaluation. 593-596 - Fernando H. Calderon, Li-Kai Cheng, Ming-Jen Lin
, Yen-Hao Huang, Yi-Shin Chen:
Content-based echo chamber detection on social media platforms. 597-600 - Shuo Zhang, Mayank Kejriwal:
Concept drift in bias and sensationalism detection: an experimental study. 601-604 - Dionisios N. Sotiropoulos, Ifigeneia Georgoula, Christos Bilanakos:
Optimal influence strategies in an oligopolistic competition network environment. 605-612 - Apratim Das, Alex Aravind, Mark Dale:
Algorithm and application for signed graphlets. 613-620 - Meysam Ghaffari, Ashok Srinivasan
, Anuj Mubayi, Xiuwen Liu, Krishnan Viswanathan:
Next-generation high-resolution vector-borne disease risk assessment. 621-624 - Arunkumar Bagavathi
, Pedram Bashiri, Shannon Reid, Matthew Phillips, Siddharth Krishnan:
Examining untempered social media: analyzing cascades of polarized conversations. 625-632 - Apratim Das, Mike Drakos, Alex Aravind, Darwin Horning:
Water governance network analysis using graphlet mining. 633-640 - Michelle Bowman, Subrata Acharya:
Risk assessment of pharmacies & electronic prescriptions. 641-644 - Maria Camila Rivera Serna, Subrata Acharya:
FastestER: a web application to enable effective emergency department service. 645-648 - Abigail Garrett, Naeemul Hassan:
Understanding the silence of sexual harassment victims through the #WhyIDidntReport movement. 649-652 - Naeemul Hassan
, Manash Kumar Mandal, Mansurul Bhuiyan, Aparna Moitra, Syed Ishtiaque Ahmed
:
Can women break the glass ceiling?: an analysis of #MeToo hashtagged posts on Twitter. 653-656
Industry track session
- Alireza Pourali, Fattane Zarrinkalam, Ebrahim Bagheri:
Neural embedding features for point-of-interest recommendation. 657-662 - Yang Zhang, Xiangyu Dong, Daniel Yue Zhang, Dong Wang:
A syntax-based learning approach to geo-locating abnormal traffic events using social sensing. 663-670 - Yingtong Dou
, Weijian Li, Zhirong Liu, Zhenhua Dong, Jiebo Luo
, Philip S. Yu:
Uncovering download fraud activities in mobile app markets. 671-678 - Ankit Kumar Saw, Nitendra Rajput:
Beauty lies in the face of the beholder: a Bi-channel CNN architecture for attractiveness modeling in matrimony. 679-682 - Shreya Jain, Dipankar Niranjan, Hemank Lamba, Neil Shah, Ponnurangam Kumaraguru:
Characterizing and detecting livestreaming chatbots. 683-690 - Shin-Ying Huang, Yen-Wen Huang, Ching-Hao Mao:
A multi-channel cybersecurity news and threat intelligent engine - SecBuzzer. 691-695 - Mandira Hegde, Ian McCulloh
, John Piorkowski:
Examining MOOC superposter behavior using social network analysis. 696-700
DEMONSTRATION SESSION: Demo's track session
- Adewale Obadimu, Muhammad Nihal Hussain, Nitin Agarwal:
Blog data analytics using blogtrackers. 701-704 - Mayank Kejriwal, Peilin Zhou:
SAVIZ: interactive exploration and visualization of situation labeling classifiers over crisis social media data. 705-708 - Thomas Marcoux
, Nitin Agarwal, Adewale Obadimu, Muhammad Nihal Hussain:
Understanding information operations using YouTubeTracker. 709-712 - Trang Ha, Quyen Hoang, Kyumin Lee:
Building a task blacklist for online social platforms. 713-716 - Ying Zhao, Charles C. Zhou, Sihui Huang:
Theory and use case of game-theoretic lexical link analysis. 717-720
PhD track session
- Henry K. Dambanemuya
, Emoke-Ágnes Horvát:
Network-aware multi-agent simulations of herder-farmer conflicts. 721-722 - Pallavi Jain
, Robert Ross
, Bianca Schoen-Phelan:
Estimating distributed representation performance in disaster-related social media classification. 723-727 - Renny Márquez
, Richard Weber, André C. P. L. F. de Carvalho
:
A non-negative matrix factorization approach to update communities in temporal networks using node features. 728-732 - Johanna M. Werz
, Valerie Varney, Ingrid Isenhardt
:
The curse of self-presentation: looking for career patterns in online CVs. 733-736 - Ki-Young Shin, Woosang Song, Jinhee Kim, Jong-Hyeok Lee:
News credibility scroing: suggestion of research methodology to determine the reliability of news distributed in SNS. 737-740
FAB
- Carson K. Leung
, Fan Jiang, Yibin Zhang:
Flexible compression of big data. 741-748 - Konstantinos F. Xylogiannopoulos
, Panagiotis Karampelas
, Reda Alhajj:
Multivariate motif detection in local weather big data. 749-756 - Sirui Sun, Bin Wu, Zixing Zhang, Nianwen Ning, Bai Wang:
A hierarchical insurance recommendation framework using GraphOLAM approach. 757-764 - Ahmet Anil Müngen
, Emre Dogan, Mehmet Kaya
:
Text generation with diversified source literature review. 765-770 - Emanuela Todeva
, David Knoke, Donka Keskinova:
Multi-stage clustering with complementary structural analysis of 2-mode networks. 771-778 - Tung Nguyen, Li Zhang, Aron Culotta:
Estimating tie strength in follower networks to measure brand perceptions. 779-786 - Sheung Yat Law, Dharshana Kasthurirathna, Mahendra Piraveenan:
Placement matters in making good decisions sooner: the influence of topology in reaching public utility thresholds. 787-795 - Richard Takacs, Ian McCulloh
:
Dormant bots in social media: Twitter and the 2018 U.S. senate election. 796-800 - Konstantinos F. Xylogiannopoulos
:
Exhaustive exact string matching: the analysis of the full human genome. 801-808 - Ahmet Engin Bayrak, Faruk Polat:
Reducing features to improve link prediction performance in location based social networks, non-monotonically selected subset from feature clusters. 809-815 - Lihi Idan, Joan Feigenbaum:
Show me your friends, and I will tell you whom you vote for: predicting voting behavior in social networks. 816-824 - Esen Tutaysalgir, Pinar Karagoz
, Ismail H. Toroslu
:
Clustering based personality prediction on turkish tweets. 825-828 - Sharon Grubner Hasson, John Piorkowski, Ian McCulloh
:
Social media as a main source of customer feedback: alternative to customer satisfaction surveys. 829-832
FOSINT-SI
- Zoheb Borbora, Arpita Chandra, Ponnurangam Kumaraguru, Jaideep Srivastava:
On churn and social contagion. 833-841 - Tor Berglind, Björn Pelzer, Lisa Kaati:
Levels of hate in online environments. 842-847 - Anu Shrestha, Francesca Spezzano
:
Online misinformation: from the deceiver to the victim. 847-850 - Justin Song, Valerie Spicer, Andrew J. Park, Herbert H. Tsang
, Patricia L. Brantingham:
Computational method for identifying the boundaries of crime with street profile and discrete calculus. 851-854 - Vivin Paliath, Paulo Shakarian:
Reasoning about sequential cyberattacks. 855-862 - Shao-Fang Wen, Mazaher Kianpour
, Stewart Kowalski:
An empirical study of security culture in open source software communities. 863-870 - Avishek Bose, Vahid Behzadan, Carlos A. Aguirre, William H. Hsu:
A novel approach for detection and ranking of trendy and emerging cyber threat events in Twitter streams. 871-878 - Aditya Pingle, Aritran Piplai, Sudip Mittal, Anupam Joshi
, James Holt, Richard Zak
:
RelExt: relation extraction using deep learning approaches for cybersecurity knowledge graph improvement. 879-886 - Konstantinos F. Xylogiannopoulos
, Panagiotis Karampelas
, Reda Alhajj:
Text mining for malware classification using multivariate all repeated patterns detection. 887-894 - Mohammed Almukaynizi
, Malay Shah, Paulo Shakarian:
A hybrid KRR-ML approach to predict malicious email campaigns. 895-898 - Mohammed Rashed, John Piorkowski, Ian McCulloh
:
Evaluation of extremist cohesion in a darknet forum using ERGM and LDA. 899-902 - Emily Alfs, Doina Caragea
, Dewan Chaulagain, Sankardas Roy, Nathan Albin, Pietro Poggi-Corradini:
Identifying Android malware using network-based approaches. 903-906 - Choukri Djellali, Mehdi Adda
, Mohamed Tarik Moutacalli:
A comparative study to deep learning for pattern recognition, by using online and batch learning; taking cybersecurity as a case. 907-912
HI-BI-BI symposium
- Joseph M. de Guia
, Madhavi Devaraj, Carson K. Leung
:
DeepGx: deep learning using gene expression for cancer classification. 913-920 - Hanane Grissette
, ELhabib Nfaoui
:
Daily life patients sentiment analysis model based on well-encoded embedding vocabulary for related-medication text. 921-928 - Hüseyin Vural, Mehmet Kaya
, Reda Alhajj:
A model based on random walk with restart to predict circRNA-disease associations on heterogeneous network. 929-932 - Carmela Comito
, Agostino Forestiero
, Giuseppe Papuzzo
:
A clinical decision support framework for automatic disease diagnoses. 933-936 - Krunal Dhiraj Patel, Andrew Heppner, Gautam Srivastava, Vijay Mago
:
Analyzing use of Twitter by diabetes online community. 937-944 - Anu Shrestha, Francesca Spezzano
:
Detecting depressed users in online forums. 945-951 - Farahnaz Golrooy Motlagh, Saeedeh Shekarpour, Amit P. Sheth, Krishnaprasad Thirunarayan, Michael L. Raymer:
Predicting public opinion on drug legalization: social media analysis and consumption trends. 952-961 - Hankyu Jang, Samuel Justice, Philip M. Polgreen
, Alberto M. Segre, Daniel K. Sewell, Sriram V. Pemmaraju:
Evaluating architectural changes to alter pathogen dynamics in a dialysis unit: for the CDC MInD-healthcare group. 961-968
WORKSHOP SESSION: SI workshop session
- Jan Hauffa
, Wolfgang Bräu, Georg Groh:
Detection of topical influence in social networks via granger-causal inference: a Twitter case study. 969-977 - Sukankana Chakraborty
, Sebastian Stein
, Markus Brede, Ananthram Swami, Geeth de Mel, Valerio Restocchi
:
Competitive influence maximisation using voting dynamics. 978-985 - Mihai Valentin Avram, Shubhanshu Mishra, Nikolaus Nova Parulian
, Jana Diesner:
Adversarial perturbations to manipulate the perception of power and influence in networks. 986-994
WORKSHOP SESSION: MSNDS workshop session
- Patryk Pazura, Jaroslaw Jankowski, Kamil Bortko, Piotr Bartkow:
Increasing the diffusional characteristics of networks through optimal topology changes within sub-graphs. 994-1000 - Li-Chen Cheng, Song-Lin Tsai:
Deep learning for automated sentiment analysis of social media. 1001-1004 - Takayasu Fushimi, Kennichi Kanno:
Extraction of user demands based on similar tweets graph. 1005-1012 - Shih-Hung Wu
, Jun-Wei Wang:
Integrating neural and syntactic features on the helpfulness analysis of the online customer reviews. 1013-1017 - K. (Lynn) Putman, Hanjo D. Boekhout
, Frank W. Takes
:
Fast incremental computation of harmonic closeness centrality in directed weighted networks. 1018-1025 - Min-Yuh Day
, Jian-Ting Lin:
Artificial intelligence for ETF market prediction and portfolio optimization. 1026-1033 - Logan Praznik, Gautam Srivastava, Chetan Harichandra Mendhe, Vijay Mago
:
Vertex-weighted measures for link prediction in hashtag graphs. 1034-1041 - Gui-Ru Li, Chia-Hui Chang
:
Semantic role labeling for opinion target extraction from chinese social network. 1042-1047
WORKSHOP SESSION: SNAA workshop session
- Christopher Yong, Charalampos Chelmis, Wonhyung Lee, Daphney-Stavroula Zois
:
Understanding online civic engagement: a multi-neighborhood study of SeeClickFix. 1048-1055 - Charalampos Chelmis, Mengfan Yao, Wonhyung Lee:
Web and society: a first look into the network of human service providers. 1056-1063 - Do Yeon Kim, Xiaohang Li, Sheng Wang, Yunying Zhuo, Roy Ka-Wei Lee
:
Topic enhanced word embedding for toxic content detection in Q&A sites. 1064-1071 - Arpita Chandra, Zoheb Borbora, Ponnurangam Kumaraguru, Jaideep Srivastava:
Finding your social space: empirical study of social exploration in multiplayer online games. 1072-1080 - Abu Saleh Md Tayeen, Abderrahmen Mtibaa, Satyajayant Misra:
Location, location, location!: quantifying the true impact of location on business reviews using a Yelp dataset. 1081-1088 - Sandra Mitrovic
, Laurent Lecoutere, Jochen De Weerdt
:
A comparison of methods for link sign prediction with signed network embeddings. 1089-1096
WORKSHOP SESSION: SNAST workshop session
- Lingwei Chen, Shifu Hou, Yanfang Ye, Thirimachos Bourlai
, Shouhuai Xu, Liang Zhao:
iTrustSO: an intelligent system for automatic detection of insecure code snippets in stack overflow. 1097-1104 - Dimitrios Lappas, Panagiotis Karampelas
, George Fessakis
:
The role of social media surveillance in search and rescue missions. 1105-1111 - Sho Tsugawa, Sumaru Niida:
The impact of social network structure on the growth and survival of online communities. 1112-1119 - Jacob Rose, Thirimachos Bourlai
:
Deep learning based estimation of facial attributes on challenging mobile phone face datasets. 1120-1127 - Dimitris Spiliotopoulos, Costas Vassilakis, Dionisis Margaris
:
Data-driven country safety monitoring terrorist attack prediction. 1128-1135 - Kaustav Basu, Arunabha Sen:
On augmented identifying codes for monitoring drug trafficking organizations. 1136-1139 - Suha Reddy Mokalla, Thirimachos Bourlai
:
On designing MWIR and visible band based DeepFace detection models. 1140-1147
WORKSHOP SESSION: READNet workshop session
- Meisam Hejazinia, Pavlos Mitsoulis-Ntompos, Serena Zhang:
Deep personalized re-targeting. 1148-1154 - Mariella Bonomo
, Gaspare Ciaccio, Andrea De Salve, Simona E. Rombo:
Customer recommendation based on profile matching and customized campaigns in on-line social networks. 1155-1159 - Dionisis Margaris
, Dimitris Spiliotopoulos, Costas Vassilakis:
Social relations versus near neighbours: reliable recommenders in limited information social network collaborative filtering for online advertising. 1160-1167 - Carmela Comito
:
Travel routes recommendations via online social networks. 1168-1173 - Gianluca Lax, Antonia Russo
:
A system to enforce user's preference in OSN advertising. 1174-1178

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.