


Остановите войну!
for scientists:


default search action
11th ASONAM 2019: Vancouver, BC, Canada
- Francesca Spezzano
, Wei Chen, Xiaokui Xiao:
ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, Vancouver, British Columbia, Canada, 27-30 August, 2019. ACM 2019, ISBN 978-1-4503-6868-1
Communities I
- Michele Coscia:
Discovering communities of community discovery. 1-8 - Neda Zarayeneh, Ananth Kalyanaraman:
A fast and efficient incremental approach toward dynamic community detection. 9-16 - Young D. Kwon, Reza Hadi Mogavi, Ehsan ul Haq, Youngjin Kwon, Xiaojuan Ma, Pan Hui:
Effects of ego networks and communities on self-disclosure in an online social network. 17-24
Misbehavior & misinformation I
- Courtland VanDam, Farzan Masrour, Pang-Ning Tan
, Tyler Wilson:
You have been CAUTE!: early detection of compromised accounts on social media. 25-32 - Thai Le, Kai Shu, Maria D. Molina, Dongwon Lee
, S. Shyam Sundar, Huan Liu:
5 sources of clickbaits you should know!: using synthetic clickbaits to improve prediction and distinguish between bot-generated and human-written headlines. 33-40 - Limeng Cui, Suhang Wang, Dongwon Lee
:
SAME: sentiment-aware multi-modal embedding for detecting fake news. 41-48
Network embedding
- Jundong Li, Liang Wu, Ruocheng Guo, Chenghao Liu, Huan Liu:
Multi-level network embedding with boosted low-rank matrix approximation. 49-56 - Aynaz Taheri, Tanya Y. Berger-Wolf:
Predictive temporal embedding of dynamic graphs. 57-64 - Benedek Rozemberczki, Ryan Davies, Rik Sarkar, Charles Sutton:
GEMSEC: graph embedding with self clustering. 65-72
Information & influence diffusion I
- Antoine J.-P. Tixier, Maria-Evgenia G. Rossi, Fragkiskos D. Malliaros, Jesse Read, Michalis Vazirgiannis:
Perturb and combine to identify influential spreaders in real-world networks. 73-80 - Yang Chen, Jiamou Liu:
Becoming gatekeepers together with allies: collaborative brokerage over social networks. 81-88 - Yu Zhang:
Diversifying seeds and audience in social influence maximization. 89-94 - Arash Ghayoori, Rakesh Nagi:
Seed investment bounds for viral marketing under generalized diffusion. 95-100 - Xiao Yang, Seungbae Kim, Yizhou Sun:
How do influencers mention brands in social media?: sponsorship prediction of Instagram posts. 101-104
Misbehavior & misinformation II
- Sooji Han
, Jie Gao
, Fabio Ciravegna:
Neural language model based training data augmentation for weakly supervised early rumor detection. 105-112 - Amir Pouran Ben Veyseh, My T. Thai, Thien Huu Nguyen, Dejing Dou:
Rumor detection in social networks via deep contextual modeling. 113-120 - Wataru Kudo, Mao Nishiguchi, Fujio Toriumi
:
Fraudulent user detection on rating networks based on expanded balance theory and GCNs. 121-126 - Udit Arora, William Scott Paka, Tanmoy Chakraborty
:
Multitask learning for blackmarket tweet detection. 127-130 - Mohammad Raihanul Islam, Sathappan Muthiah, Naren Ramakrishnan
:
RumorSleuth: joint detection of rumor veracity and user stance. 131-136
Network analysis with machine learning I
- Aravind Sankar, Xinyang Zhang, Kevin Chen-Chuan Chang:
Meta-GNN: metagraph neural network for semi-supervised learning in attributed heterogeneous information networks. 137-144 - Suhansanu Kumar, Heting Gao, Changyu Wang, Kevin Chen-Chuan Chang, Hari Sundaram
:
Hierarchical multi-armed bandits for discovering hidden populations. 145-153 - Yang Zhang, Hongxiao Wang, Daniel Yue Zhang, Yiwen Lu, Dong Wang:
RiskCast: social sensing based traffic risk forecasting via inductive multi-view learning. 154-157 - Sumeet Kumar
, Kathleen M. Carley:
What to track on the Twitter streaming API?: a knapsack bandits approach to dynamically update the search terms. 158-163 - Renhao Cui, Gagan Agrawal, Rajiv Ramnath:
Tweets can tell: activity recognition using hybrid long short-term memory model. 164-167
Communities II
- Yulong Pei, George H. L. Fletcher, Mykola Pechenizkiy
:
Joint role and community detection in networks via L2, 1 norm regularized nonnegative matrix tri-factorization. 168-175 - Jean Marie Tshimula, Belkacem Chikhaoui, Shengrui Wang:
HAR-search: a method to discover hidden affinity relationships in online communities. 176-183 - Domenico Mandaglio, Andrea Tagarelli:
Dynamic consensus community detection and combinatorial multi-armed bandit. 184-187
Social media analysis
- Marija Stanojevic, Jumanah Alshehri
, Zoran Obradovic:
Surveying public opinion using label prediction on social media data. 188-195 - Taoran Ji, Xuchao Zhang, Nathan Self, Kaiqun Fu, Chang-Tien Lu
, Naren Ramakrishnan
:
Feature driven learning framework for cybersecurity event detection. 196-203 - Virgile Landeiro, Aron Culotta:
Collecting representative social media samples from a search engine by adaptive query generation. 204-207 - Mahsa Ghorbani, Mahdieh Soleymani Baghshah, Hamid R. Rabiee:
MGCN: semi-supervised classification in multi-layer graphs with graph convolutional networks. 208-211
Network analysis with machine learning II
- Vachik S. Dave, Baichuan Zhang, Pin-Yu Chen, Mohammad Al Hasan:
Neural-brane: an inductive approach for attributed network embedding. 212-215 - Kun Tu, Jian Li, Don Towsley, Dave Braines
, Liam D. Turner:
gl2vec: learning feature representation using graphlets for directed networks. 216-221 - Caleb Belth, Fahad Kamran, Donna Tjandra, Danai Koutra:
When to remember where you came from: node representation learning in higher-order networks. 222-225
Information & influence diffusion II
- Soumajyoti Sarkar, Ashkan Aleali, Paulo Shakarian, Mika Armenta, Danielle Sanchez, Kiran Lakkaraju:
Impact of social influence on adoption behavior: an online controlled experimental evaluation. 226-233 - Thiago H. P. Silva, Alberto H. F. Laender, Pedro O. S. Vaz de Melo:
Characterizing knowledge-transfer relationships in dynamic attributed networks. 234-241 - Emily M. Fischer, Souvik Ghosh, Gennady Samorodnitsky:
Epidemic threshold and lifetime distribution for information diffusion on simultaneously growing networks. 242-249 - Jianjun Luo, Xinyue Liu, Xiangnan Kong:
Competitive opinion maximization in social networks. 250-257
Elections and politics
- Huyen T. Le, G. R. Boynton, Zubair Shafiq, Padmini Srinivasan
:
A postmortem of suspended Twitter accounts in the 2016 U.S. presidential election. 258-265 - Hamid Karimi, Tyler Derr, Aaron Brookhouse, Jiliang Tang:
Multi-factor congressional vote prediction. 266-273 - Indu Manickam, Andrew S. Lan, Gautam Dasarathy, Richard G. Baraniuk:
IdeoTrace: a framework for ideology tracing with a case study on the 2016 U.S. presidential election. 274-281 - Alexandru Topîrceanu, Radu-Emil Precup
:
A novel methodology for improving election poll prediction using time-aware polling. 282-285
Network analysis I
- Michele Coscia, Luca Rossi:
The impact of projection and backboning on network topologies. 286-293 - Katchaguy Areekijseree, Sucheta Soundarajan:
Measuring the sampling robustness of complex networks. 294-301 - Xiuwen Zheng, Amarnath Gupta:
Social network of extreme tweeters: a case study. 302-306 - Laurence Brandenberger
, Giona Casiraghi
, Vahan Nanumyan, Frank Schweitzer:
Quantifying triadic closure in multi-edge social networks. 307-310 - Seyed Amin Mirlohi Falavarjani, Ebrahim Bagheri, Ssu Yu Zoe Chou, Jelena Jovanovic, Ali A. Ghorbani:
On the causal relation between users' real-world activities and their affective processes. 311-314
Recommendations
- Chia-Wei Chen, Sheng-Chuan Chou, Chang-You Tai, Lun-Wei Ku
:
Phrase-guided attention web article recommendation for next clicks and views. 315-324 - Deqing Yang, Ziyi Wang, Junyang Jiang, Yanghua Xiao:
Knowledge embedding towards the recommendation with sparse user-item interactions. 325-332 - Daniel Yue Zhang, Bo Ni, Qiyu Zhi, Thomas Plummer, Qi Li, Hao Zheng, Qingkai Zeng, Yang Zhang, Dong Wang:
Through the eyes of a poet: classical poetry recommendation with visual input on social media. 333-340
Applications I
- Henry K. Dambanemuya, Madhav Joshi
, Emoke-Ágnes Horvát:
Network perspective on the efficiency of peace accords implementation. 341-348 - Sreeja Nair, Adriana Iamnitchi
, John Skvoretz:
Promoting social conventions across polarized networks: an empirical study. 349-352 - Mayank Kejriwal, Peilin Zhou:
Low-supervision urgency detection and transfer in short crisis messages. 353-356
Behavioral modeling
- Vanessa Cedeno-Mieles
, Zhihao Hu, Xinwei Deng, Yihui Ren
, Abhijin Adiga, Christopher L. Barrett, Saliya Ekanayake, Gizem Korkmaz, Chris J. Kuhlman, Dustin Machi, Madhav V. Marathe, S. S. Ravi, Brian J. Goode, Naren Ramakrishnan
, Parang Saraf, Nathan Self, Noshir Contractor, Joshua M. Epstein, Michael W. Macy:
Mechanistic and data-driven agent-based models to explain human behavior in online networked group anagram games. 357-364 - Binxuan Huang, Kathleen M. Carley:
A large-scale empirical study of geotagging behavior on Twitter. 365-373 - Rahul Pandey, Carlos Castillo, Hemant Purohit:
Modeling human annotation errors to design bias-aware systems for social stream processing. 374-377
Network algorithms
- Peng Ni, Masatoshi Hanai, Wen Jun Tan, Wentong Cai
:
Efficient closeness centrality computation in time-evolving graphs. 378-385 - Huda Nassar, Austin R. Benson, David F. Gleich
:
Pairwise link prediction. 386-393 - Frédéric Simard
:
On computing distances and latencies in link streams. 394-397
Network modeling
- Chen Avin, Zvi Lotker, Yinon Nahum, David Peleg:
Random preferential attachment hypergraph. 398-405 - Julian Müller, Ulrik Brandes:
The evolution of roles. 406-413 - Haripriya Chakraborty, Liang Zhao:
Modeling the dynamics of resource exchange networks. 414-419
Misinformation & online content
- Jesper Holmström, Daniel Jönsson, Filip Polbratt, Olav Nilsson, Linnea Lundström, Sebastian Ragnarsson, Anton Forsberg, Karl Andersson, Niklas Carlsson:
Do we read what we share?: analyzing the click dynamic of news articles shared on Twitter. 420-425 - Alexandre M. Sousa, Jussara M. Almeida, Flavio V. D. de Figueiredo:
Analyzing and modeling user curiosity in online content consumption: a LastFM case study. 426-431 - Bhavtosh Rath, Wei Gao, Jaideep Srivastava:
Evaluating vulnerability to fake news in social networks: a community health assessment model. 432-435 - Kai Shu, Xinyi Zhou, Suhang Wang, Reza Zafarani, Huan Liu:
The role of user profiles for fake news detection. 436-439
Modeling & algorithms
- Malik Magdon-Ismail, Kshiteesh Hegde:
The intrinsic scale of networks is small. 440-447 - Farzan Masrour, Pang-Ning Tan
, Abdol-Hossein Esfahanian:
OPTANE: an OPtimal transport algorithm for NEtwork alignment. 448-451 - Sai Kiran Narayanaswami, Balaraman Ravindran
, Venkatesh Ramaiyan:
Generalized random Surfer-Pair models. 452-455 - Yulong Pei, Jianpeng Zhang, George H. L. Fletcher, Mykola Pechenizkiy
:
Infinite motif stochastic blockmodel for role discovery in networks. 456-459 - Feiyu Long, Nianwen Ning, Chenguang Song, Bin Wu:
Strengthening social networks analysis by networks fusion. 460-463
Applications II
- Rashid Tahir
, Faizan Ahmed, Hammas Saeed, Shiza Ali, Fareed Zaffar, Christo Wilson
:
Bringing the kid back into YouTube kids: detecting inappropriate content on video streaming platforms. 464-469 - Pamela Bilo Thomas, Rachel Krohn, Tim Weninger:
Dynamics of team library adoptions: an exploration of GitHub commit logs. 470-473 - Lea Baumann, Sonja Utz
:
How to encourage people to build diverse business networks? 474-479 - Kaustav Basu, Arunabha Sen:
Monitoring individuals in drug trafficking organizations: a social network analysis. 480-483 - Victor S. Bursztyn, Larry Birnbaum:
Thousands of small, constant rallies: a large-scale analysis of partisan WhatsApp groups. 484-488 - Yo-Der Song, Mingwei Gong, Aniket Mahanti:
Measurement and analysis of an adult video streaming service. 489-492
Network analysis II
- Mitchell Goist, Ted Hsuan Yun Chen
, Christopher Boylan:
Reconstructing and analyzing the transnational human trafficking network. 493-500 - Pujan Paudel, Trung T. Nguyen
, Amartya Hatua, Andrew H. Sung:
How the tables have turned: studying the new wave of social bots on Twitter using complex network analysis techniques. 501-508 - Ninareh Mehrabi, Fred Morstatter
, Nanyun Peng, Aram Galstyan:
Debiasing community detection: the importance of lowly connected nodes. 509-512 - Obaida Hanteer, Luca Rossi:
The meaning of dissimilar: an evaluation of various similarity quantification approaches used to evaluate community detection solutions. 513-518 - Mahboubeh Ahmadalinezhad, Masoud Makrehchi, Neil Seward:
Basketball lineup performance prediction using network analysis. 519-524
POSTER SESSION: Posters madness session
- Chung-Chi Chen
, Hen-Hsen Huang, Hsin-Hsi Chen:
Next cashtag prediction on social trading platforms with auxiliary tasks. 525-527 - David Spence, Christopher Inskip, Novi Quadrianto
, David Weir:
Quantification under class-conditional dataset shift. 528-529 - Dipanjyoti Paul, Rahul Kumar, Sriparna Saha, Jimson Mathew:
Online feature selection for multi-label classification in multi-objective optimization framework. 530-531 - Katchaguy Areekijseree, Yuzhe Richard Tang, Sucheta Soundarajan:
Computing node clustering coefficients securely. 532-533 - Liang Feng, Qianchuan Zhao, Cangqi Zhou:
An efficient method to find communities in K-partite networks. 534-535 - Maryam Ramezani, Mina Rafiei, Soroush Omranpour, Hamid R. Rabiee:
News labeling as early as possible: real or fake? 536-537 - Masaomi Kimura:
CAB-NC: the correspondence analysis based network clustering method. 538-539 - Meysam Ghaffari, Ashok Srinivasan, Xiuwen Liu:
High-resolution home location prediction from tweets using deep learning with dynamic structure. 540-542 - Parham Hamouni, Taraneh Khazaei, Ehsan Amjadian
:
TF-MF: improving multiview representation for Twitter user geolocation prediction. 543-545 - Shalini Priya, Saharsh Singh, Sourav Kumar Dandapat, Kripabandhu Ghosh, Joydeep Chandra:
Identifying infrastructure damage during earthquake using deep active learning. 551-552 - Taha Hassan, Bob Edmison, Larry Cox II, Matthew Louvet, Daron Williams:
Exploring the context of course rankings on online academic forums. 553-556 - Vivek K. Singh, Connor Hofenbitzer:
Fairness across network positions in cyberbullying detection algorithms. 557-559 - Zhou Yang, Long Hoang Nguyen, Fang Jin:
Opioid relapse prediction with GAN. 560-567 - Adrien Benamira, Benjamin Devillers, Etienne Lesot, Ayush K. Ray, Manal Saadi, Fragkiskos D. Malliaros:
Semi-supervised learning and graph neural networks for fake news detection. 568-569
Multidisciplinary session
- Dany Perwita Sari
, Yun-Shang Chiou:
Transformation in architecture and spatial organization at Javanese house. 570-577 - Roland Molontay, Marcell Nagy:
Two decades of network science: as seen through the co-authorship network of network scientists. 578-583 - Marcell Nagy, Roland Molontay:
On the structural properties of social networks and their measurement-calibrated synthetic counterparts. 584-588 - Mattia Gasparini, Giorgia Ramponi, Marco Brambilla
, Stefano Ceri:
Assigning users to domains of interest based on content and network similarity with champion instances. 589-592 - Soumajyoti Sarkar, Paulo Shakarian, Mika Armenta, Danielle Sanchez, Kiran Lakkaraju:
Can social influence be exploited to compromise security: an online experimental evaluation. 593-596 - Fernando H. Calderon, Li-Kai Cheng, Ming-Jen Lin
, Yen-Hao Huang, Yi-Shin Chen:
Content-based echo chamber detection on social media platforms. 597-600 - Shuo Zhang, Mayank Kejriwal:
Concept drift in bias and sensationalism detection: an experimental study. 601-604 - Dionisios N. Sotiropoulos, Ifigeneia Georgoula, Christos Bilanakos:
Optimal influence strategies in an oligopolistic competition network environment. 605-612 - Apratim Das, Alex Aravind, Mark Dale:
Algorithm and application for signed graphlets. 613-620 - Meysam Ghaffari, Ashok Srinivasan, Anuj Mubayi, Xiuwen Liu, Krishnan Viswanathan:
Next-generation high-resolution vector-borne disease risk assessment. 621-624 - Arunkumar Bagavathi, Pedram Bashiri, Shannon Reid, Matthew Phillips, Siddharth Krishnan:
Examining untempered social media: analyzing cascades of polarized conversations. 625-632 - Apratim Das, Mike Drakos, Alex Aravind, Darwin Horning:
Water governance network analysis using graphlet mining. 633-640 - Michelle Bowman, Subrata Acharya:
Risk assessment of pharmacies & electronic prescriptions. 641-644 - Maria Camila Rivera Serna, Subrata Acharya:
FastestER: a web application to enable effective emergency department service. 645-648 - Abigail Garrett, Naeemul Hassan:
Understanding the silence of sexual harassment victims through the #WhyIDidntReport movement. 649-652 - Naeemul Hassan, Manash Kumar Mandal, Mansurul Bhuiyan, Aparna Moitra, Syed Ishtiaque Ahmed:
Can women break the glass ceiling?: an analysis of #MeToo hashtagged posts on Twitter. 653-656
Industry track session
- Alireza Pourali, Fattane Zarrinkalam, Ebrahim Bagheri:
Neural embedding features for point-of-interest recommendation. 657-662 - Yang Zhang, Xiangyu Dong, Daniel Yue Zhang, Dong Wang:
A syntax-based learning approach to geo-locating abnormal traffic events using social sensing. 663-670 - Yingtong Dou
, Weijian Li, Zhirong Liu, Zhenhua Dong, Jiebo Luo
, Philip S. Yu:
Uncovering download fraud activities in mobile app markets. 671-678 - Ankit Kumar Saw, Nitendra Rajput:
Beauty lies in the face of the beholder: a Bi-channel CNN architecture for attractiveness modeling in matrimony. 679-682 - Shreya Jain, Dipankar Niranjan, Hemank Lamba, Neil Shah, Ponnurangam Kumaraguru:
Characterizing and detecting livestreaming chatbots. 683-690 - Shin-Ying Huang, Yen-Wen Huang, Ching-Hao Mao:
A multi-channel cybersecurity news and threat intelligent engine - SecBuzzer. 691-695 - Mandira Hegde, Ian McCulloh
, John Piorkowski:
Examining MOOC superposter behavior using social network analysis. 696-700