Authors | Article Title |
Aravind Sankar, Xinyang Zhang and Kevin Chen-Chuan Chang | Meta-GNN: Metagraph Neural Network for Semi-supervised learning in Attributed Heterogeneous Information Networks |
Michele Coscia | Discovering Communities of Community Discovery |
Marija Stanojevic, Jumanah Alshehri and Zoran Obradovic | Surveying public opinion using label prediction on social media data |
Michele Coscia and Luca Rossi | The Impact of Projection and Backboning on Network Topologies |
Vanessa Cedeno-Mieles, Zhihao Hu, Yihui Ren, Xinwei Deng, Abhijin Adiga, Christopher Barrett, Saliya Ekanayake, Gizem Korkmaz, Chris Kuhlman, Dustin Machi, Madhav Marathe, S. S. Ravi, Brian Goode, Naren Ramakrishnan, Parang Saraf, Nathan Self, Noshir Contractor, Joshua Epstein and Michael Macy | Mechanistic and Data-Driven Agent-Based Models to Explain Human Behavior in Online Networked Group Anagram Games |
Jundong Li, Liang Wu, Ruocheng Guo, Chenghao Liu and Huan Liu | Multi-Level Network Embedding with Boosted Low-Rank Matrix Approximation |
Peng Ni, Masatoshi Hanai, Wen Jun Tan and Wentong Cai | Efficient Closeness Centrality Computation in Time-Evolving Graphs |
Antoine Tixier, Maria Rossi, Fragkiskos Malliaros, Jesse Read and Michalis Vazirgiannis | Perturb and Combine to Identify Influential Spreaders in Real-World Networks |
Chen Avin, Zvi Lotker, Yinon Nahum and David Peleg | Random Preferential Attachment Hypergraphs |
Courtland Vandam, Farzan Masrour Shalmani, Pang-Ning Tan and Tyler Wilson | You have been CAUTE! Early Detection of Compromised Accounts on Social Media |
Chia-Wei Chen, Sheng-Chuan Chou, Chang-You Tai and Lun-Wei Ku | PGA: Phrase-Guided Attention Web Article Recommendation for Next Clicks and Views |
Binxuan Huang and Kathleen Carley | A Large-Scale Empirical Study of Geotagging Behavior on Twitter |
Taoran Ji, Xuchao Zhang, Nathan Self, Kaiqun Fu, Chang-Tien Lu and Naren Ramakrishnan | Feature Driven Learning Framework for Cybersecurity Event Detection |
Aynaz Taheri and Tanya Berger-Wolf | Predictive Temporal Embedding of Dynamic Graphs |
Katchaguy Areekijseree and Sucheta Soundarajan | Measuring the Sampling Robustness of Complex Networks |
Yang Chen and Jiamou Liu | Becoming Gatekeepers Together with Allies: Collaborative Brokerage over Social Networks |
Thai Le, Kai Shu, Maria D. Molina, Dongwon Lee, S. Shyam Sundar and Huan Liu | 5 Sources of Clickbaits You Should Know! Using Synthetic Clickbaits to Improve Prediction and Distinguish between Bot-Generated and Human-Written Headlines |
Deqing Yang, Ziyi Wang, Junyang Jiang and Yanghua Xiao | Knowledge Embedding towards the Recommendation with Sparse User-item Interactions |
Neda Zarayeneh and Ananth Kalyanaraman | A Fast and Efficient Incremental Approach toward Dynamic Community Detection |
Huyen Le, Bob Boynton, Zubair Shafiq and Padmini Srinivasan | A Postmortem of Suspended Twitter Accounts in the 2016 U.S. Presidential Election |
Mitchell Goist, Ted Hsuan Yun Chen and Christopher Boylan | Reconstructing and Analyzing the Transnational Human Trafficking Network |
Suhansanu Kumar, Heting Gao, Changyu Wang, Kevin Chang and Hari Sundaram | Hierarchical Multi-Armed Bandits for Discovering Hidden Populations |
Young Dae Kwon, Reza Hadi Mogavi, Ehsan Ul Haq, Youngjin Kwon, Xiaojuan Ma and Pan Hui | Effects of Ego Networks and Communities on Self-Disclosure in an Online Social Network |
Soumajyoti Sarkar, Ashkan Aleali, Paulo Shakarian, Mika Armenta, Danielle Sanchez and Kiran Lakkaraju | Impact of Social Influence on Adoption Behavior: An Online Controlled Experimental Evaluation |
Thiago Silva, Alberto Laender and Pedro Vaz de Melo | Characterizing Knowledge-Transfer Relationships in Dynamic Attributed Networks |
Hamid Karimi, Tyler Derr, Aaron Brookhouse and Jiliang Tang | Multi-Factor Congressional Vote Prediction |
Daniel Zhang, Bo Ni, Qiyu Zhi, Thomas Plummer, Qi Li, Hao Zheng, Qingkai Zeng, Yang Zhang and Dong Wang | Through The Eyes of A Poet: Classical Poetry Recommendation with Visual Input on Social Media |
Yulong Pei, George Fletcher and Mykola Pechenizkiy | Joint Role and Community Detection in Networks via L2,1 Norm Regularized Nonnegative Matrix Tri-Factorization |
Indu Manickam, Andrew Lan, Gautam Dasarthy and Richard Baraniuk | IdeoTrace: A Framework for Ideology Tracing with a Case Study on the 2016 U.S. Presidential Election |
Jean Marie Tshimula, Belkacem Chikhaoui and Shengrui Wang | HAR-search: A Method to Discover Hidden Affinity Relationships in Online Communities |
Julian Müller and Ulrik Brandes | The Evolution of Roles |
Benedek Rozemberczki, Ryan Davies, Rik Sarkar and Charles Sutton | GEMSEC: Graph Embedding with Self Clustering |
Emily M. Fischer, Souvik Ghosh and Gennady Samorodnitsky | Epidemic Threshold and Lifetime Distribution for Information Diffusion on Simultaneously Growing Networks |
Sooji Han, Jie Gao and Fabio Ciravegna | Neural Language Model Based Training Data Augmentation for Weakly Supervised Early Rumor Detection |
Malik Magdon-Ismail and Kshiteesh Hegde | The Intrinsic Scale Of Networks Is Small |
Limeng Cui, Suhang Wang and Dongwon Lee | SAME: Sentiment-Aware Multi-Modal Embedding for Detecting Fake News |
Henry Dambanemuya, Madhav Joshi and Ágnes Horvát | Network Perspective on the Efficiency of Peace Accords Implementation |
Amir Pouran Ben Veyseh, My T. Thai, Thien Huu Nguyen and Dejing Dou | Rumor Detection in Social Networks via Deep Contextual Modeling |
Huda Nassar, Austin Benson and David Gleich | Pairwise Link Prediction |
Pujan Paudel, Amartya Hatua, Trung Nguyen and Andrew H. Sung | How the Tables have Turned: Studying the New Wave of Social Bots on Twitter Using Complex Network Analysis Techniques |
Jianjun Luo, Xinyue Liu and Xiangnan Kong | Competitive Opinion Maximization in Social Networks |
Authors | Article Title |
Alexandru Topirceanu and Radu-Emil Precup | A Novel Methodology for Improving Election Poll Prediction Using Time-Aware Polling |
Yu Zhang | Diversifying Seeds and Audience in Social Influence Maximization |
Vachik Dave, Baichuan Zhang, Pin-Yu Chen and Mohammad Hasan | Neural-Brane: Neural Bayesian Personalized Ranking for Attributed Network Embedding |
Haripriya Chakraborty and Liang Zhao | Modeling the Dynamics of Resource Exchange Networks |
Victor S. Bursztyn, Larry Birnbaum and Doug Downey | Thousands of Small, Constant Rallies: A Large-Scale Analysis of Partisan WhatsApp Groups |
Lea Baumann and Sonja Utz | How to encourage people to build diverse business networks? |
Frédéric Simard | On computing distances and latencies in Link Streams |
Kun Tu, Jian Li, Don Towsley, Dave Braines and Liam Turner | gl2vec: Learning Feature Representation Using Graphlets for Directed Networks |
Xiuwen Zheng and Amarnath Gupta | Social Network of Extreme Tweeters: A Case Study |
Domenico Mandaglio and Andrea Tagarelli | Dynamic Consensus Community Detection and Combinatorial Multi-Armed Bandit |
Caleb Belth, Fahad Kamran, Donna Tjandra and Danai Koutra | When to Remember Where You Came from: Node Representation Learning in Higher-order Networks |
Yang Zhang, Hongxiao Wang, Daniel Zhang, Yiwen Lu and Dong Wang | RiskCast: Social Sensing based Traffic Risk Forecasting via Inductive Multi-View Learning |
Rashid Tahir, Fareed Zaffar, Faizan Ahmad, Christo Wilson, Hammas Saeed and Shiza Ali | Bringing the Kid back into YouTube Kids: Detecting Inappropriate Content on Video Streaming Platforms |
Sai Kiran Narayanaswami, Balaraman Ravindran and Venkatesh Ramaiyan | Generalized Random Surfer-Pair Models |
Ninareh Mehrabi, Fred Morstatter, Nanyun Peng and Aram Galstyan | Debiasing Community Detection: The Importance of Lowly Connected Nodes |
Mohammad Raihanul Islam, Sathappan Muthiah and Naren Ramakrishnan | RumorSleuth: Joint Detection of Rumor Veracity and User Stance |
Alexandre M. Sousa, Jussara M. Almeida and Flavio Figueiredo | Analyzing and Modeling User Curiosity in Online Content Consumption: A LastFM Case Study |
Seyed Amin Mirlohi Falavarjani, Ebrahim Bagheri, Ssu Yu Zoe Chou, Jelena Jovanovic and Ali A. Ghorbani | On the Causal Relation between Users' Real-World Activities and their Affective Processes |
Sumeet Kumar and Kathleen M. Carley | What to Track on the Twitter Streaming API? A Knapsack Bandits Approach to Dynamically Update the Search Terms |
Bhavtosh Rath, Wei Gao and Jaideep Srivastava | Evaluating Vulnerability to Fake News in Social Networks: A Community Health Assessment Model |
Yulong Pei, Jianpeng Zhang, George Fletcher and Mykola Pechenizkiy | Infinite Motif Stochastic Blockmodel for Role Discovery in Networks |
Arash Ghayoori and Rakesh Nagi | Seed Investment Bounds for Viral Marketing under Generalized Diffusion |
Pradyumna Prakhar Sinha, Rohan Mishra, Ramit Sawhney and Rajiv Ratn Shah | ASASNet - Exploiting Linguistic Homophily for Suicidal Ideation Detection in Social Media |
Virgile Landeiro and Aron Culotta | Collecting Representative Social Media Samples from a Search Engine by Adaptive Query Generation |
Xiao Yang, Seungbae Kim and Yizhou Sun | How Do Influencers Mention Brands in Social Media? Sponsorship Prediction of Instagram Posts |
Laurence Brandenberger, Giona Casiraghi, Vahan Nanumyan and Frank Schweitzer | Quantifying Triadic Closure in Multi-Edge Social Networks |
Kai Shu, Xinyi Zhou, Suhang Wang, Reza Zafarani and Huan Liu | The Role of User Profiles for Fake News Detection |
Pamela Bilo Thomas and Tim Weninger | Dynamics of Team Library Adoptions: An Exploration of GitHub Commit Logs |
Wataru Kudo, Mao Nishiguchi and Fujio Toriumi | Fraudulent User Detection on Rating Networks Based on Expanded Balance Theory and GCNs |
Sreeja Sreekantan Nair, Adriana Iamnitchi and John Skvoretz | Promoting Social Conventions across Polarized Networks: An Empirical Study |
Rahul Pandey, Carlos Castillo and Hemant Purohit | Modeling Human Annotation Errors to Design Bias-Aware Systems for Social Stream Processing |
Mahboubeh Ahmadalinezhad, Masoud Makrehchi and Neil Seward | Lineup Performance Prediction Through Network Analysis |
Jesper Holmström, Daniel Jonsson, Filip Polbratt, Olav Nilsson, Linnea Lundström, Sebastian Ragnarsson, Anton Forsberg, Karl Andersson and Niklas Carlsson | Do we Read what we Share? Analyzing the Click Dynamic of News Article's Shared on Twitter |
Udit Arora, William Scott Pakka and Tanmoy Chakraborty | Multitask Learning for Blackmarket Tweet Detection |
Renhao Cui, Gagan Agrawal and Rajiv Ramnath | Tweets Can Tell: Activity Recognition using Hybrid Long Short-Term Memory Model |
Mayank Kejriwal and Peilin Zhou | Low-supervision urgency detection and transfer in short crisis messages |
Farzan Masrour Shalmani, Pang-Ning Tan and Abdol-Hossein Esfahanian | OPTANE: An OPtimal Transport Algorithm for Network Alignment |
Kaustav Basu and Arunabha Sen | Monitoring Individuals in Drug Trafficking Organizations: A Social Network Analysis |
Feiyu Long, Nianwen Ning, Chenguang Song and Bin Wu | Strengthening Social Networks Analysis by Networks Fusion |
Yo-Der Song, Benjamin Farrelly, Yiying Sun, Mingwei Gong and Aniket Mahanti | Measurement and Analysis of an Adult Video Streaming Service |
Obaida Hanteer and Luca Rossi | The Meaning of Dissimilar: An Evaluation of Various Similarity Quantification Approaches Used to Evaluate Community Detection Solutions |
Mahsa Ghorbani, Mahdieh Soleymani Baghshah and Hamid R. Rabiee | MGCN: Semi-supervised Classification in Multi-layer Graphs with Graph Convolutional Networks |
Authors | Article Title |
Liang Feng, Qianchuan Zhao and Cangqi Zhou | An Efficient Method to Find Communities in K-partite Networks |
Masaomi Kimura | CAB-NC: The Correspondence Analysis Based Network Clustering Method |
Chung-Chi Chen, Hen-Hsen Huang and Hsin-Hsi Chen | Next Cashtag Prediction in the Social Trading Platform with Auxiliary Tasks |
Katchaguy Areekijseree, Yuzhe Tang and Sucheta Soundarajan | Computing Node Clustering Coefficients Securely |
Dipanjyoti Paul, Rahul Kumar, Sriparna Saha and Jimson Mathew | Online Feature Selection for Multi-label Classification in Multiobjective Optimization Framework |
David Spence, Christopher Inskip, Novi Quadrianto and David Weir | Quantification Under Class-Conditional Dataset Shift |
Vivek Singh and Connor Hofenbitzer | Fairness across Network Positions in Cyberbullying Detection Algorithms |
Gabriel P. Oliveira, Natércia A. Batista, Michele A. Brandão and Mirella M. Moro | Exploring Semantic Properties on GitHub Heterogeneous Networks |
Zhou Yang, Long Nguyen and Fang Jin | Opioid Relapse Prediction with GAN |
Taha Hassan, Bob Edmison, Larry Cox, Matthew Louvet and Daron Williams | Exploring the Context of Course Rankings on Online Academic Forums |
Parham Hamouni, Taraneh Khazaei and Ehsan Amjadian | TF-MF: Improving Multiview Representation for Twitter User Geolocation Prediction |
Shalini Priya, Saharsh Singh, Sourav Kumar Dandapat, Kripabandhu Ghosh and Joydeep Chandra | Identifying Infrastructure Damage during Earthquake using Deep Active Learning |
Meysam Ghaffari, Ashok Srinivasan and Xiuwen Liu | High-resolution home location prediction from tweets using deep learning with dynamic structure |
Maryam Ramezani, Mina Rafiei, Soroush Omranpour and Hamid R. Rabiee | News Labeling as Early as Possible: Real or Fake? |
Adrien Benamira, Benjamin Devillers, Etienne Lesot, Ayush K. Ray, Fragkiskos D. Malliaros and Manal Saadi | Semi-Supervised Learning and Graph Neural Networks for Fake News Detection |
Dany Perwita Sari and Yun-Shang Chiou | Transformation in Architecture and Spatial Organization at Javanese house |
Dionysios Sotiropoulos, Ifigeneia Georgoula and Christos Bilanakos | Optimal Influence Strategies in an Oligopolistic Competition Network Environment |
Apratim Das, Alex Aravind and Mark Dale | Algorithm and Application for Signed Graphlets |
Arunkumar Bagavathi, Pedram Bashiri, Shannon Reid, Matthew Phillips and Siddharth Krishnan | Examining Untempered Social Media: Analyzing Cascades of Polarized Conversations |
Apratim Das, Mike Drakos, Alex Aravind and Darwin Horning | Water Governance Network Analysis using Graphlet Mining |
Roland Molontay and Marcell Nagy | Two Decades of Network Science - as seen through the co-authorship network of network scientists |
Marcell Nagy and Roland Molontay | On the Structural Properties of Social Networks and their Measurement-calibrated Synthetic Counterparts |
Mattia Gasparini, Giorgia Ramponi, Marco Brambilla and Stefano Ceri | Assigning Users to Domains of Interest Based on Content and Network Similarity with Champion Instances |
Soumajyoti Sarkar, Paulo Shakarian, Mika Armenta, Danielle Sanchez and Kiran Lakkaraju | Can social influence be exploited to compromise security: An online experimental evaluation |
Fernando Henrique Calderon Alvarado, Li-Kai Cheng, Ming-Jen Lin, Yen Hao Huang and Yi-Shin Chen | Content-Based Echo Chamber Detection on SocialMedia Platforms |
Shuo Zhang and Mayank Kejriwal | Concept Drift in Bias and Sensationalism Detection: An Experimental Study |
Giona Casiraghi | NRM: Multiplex Network Regression Models for Relational Datasets |
Meysam Ghaffari, Ashok Srinivasan, Anuj Mubayi, Xiuwen Liu and Krishnan Viswanathan | Next-Generation High-Resolution Vector-Borne Disease Risk Assessment |
Michelle Bowman and Subrata Acharya | Risk Assessment of Pharmacies and Electronic Prescriptions |
Maria Rivera and Subrata Acharya | FastestER: A Web Application to enable effective Emergency Department Service |
Mario Vincenzo Tomasello, Giacomo Vaccario and Frank Schweitzer | Data-driven modeling of collaboration networks: A cross-domain analysis |
Abigail Garrett and Naeemul Hassan | Understanding the Silence of Sexual Harassment Victims Through the #WhyIDidntReport Movement |
Naeemul Hassan, Manash Kumar Mandal, Mansurul Bhuiyan, Aparna Moitra and Syed Ishtiaque Ahmed | Can Women Break the Glass Ceiling?: An Analysis of #MeToo Hashtagged Posts on Twitter |
Authors | Article Title |
Alireza Pourali, Fattane Zarrinkalam and Ebrahim Bagheri | Neural Embedding Features for Point-of-Interest Recommendation |
Yang Zhang, Xiangyu Dong, Daniel Zhang and Dong Wang | A Syntax-based Learning Approach to Geo-locating Abnormal Traffic Events using Social Sensing |
Yingtong Dou, Philip Yu | Uncovering Download Fraud Activities in Mobile App Market |
Ankit Kumar Saw | Beauty lies in the face of the beholder: A bi-channel CNN architecture for attractiveness modelling in matrimony |
Shreya Jain, Dipankar Niranjan, Hemank Lamba, Neil Shah, Ponnurangam Kumaraguru | Characterizing and Detecting Livestreaming Chatbots |
Shin-Ying Huang, Yen-Wen Huang, Ching-Hao Mao | A multi-channel cybersecurity news and threat intelligent engine - SecBuzzer |
Mandira Hegde, Ian Mcculloh and John Piorkowski | Examining MOOC superposter behavior using social network analysis |
Tianlin Gao, Ruikang Zhang, Feida Zhu | Early Rumor Detection With Large Pre-Trained Language Models |
Authors | Article Title |
Renny Márquez, Richard Weber and André C.P.L.F. de Carvalho | A non-negative matrix factorization approach to update communities in temporal networks using node features |
Christian Zingg, Giona Casiraghi, Giacomo Vaccario and Frank Schweitzer | What is the Entropy of a Social Organization? |
Pallavi Jain, Robert Ross and Bianca Schoen Phelan | Estimating Distributed Representation Performance in Disaster-Related Social Media Classification |
Johanna M. Werz, Valerie Varney and Ingrid Isenhardt | The curse of self-presentation: Looking for career patterns in online CVs |
Henry Dambanemuya and Agnes Horvat | Network-Aware Multi-Agent Simulations of Herder-Farmer Conflicts |
Ki-Young Shin, Woosang Song, Jinhee Kim and Jong-Hyeok Lee | News Credibility Scroing: Suggestion of research methodology to determine the reliability of news distributed in SNS |
Authors | Article Title |
Adewale Obadimu, Muhammad Nihal Hussain and Nitin Agarwal | Blog Data Analytics Using Blogtrackers |
Ying Zhao, Charles C. Zhou and Sihui Huang | Theory and Use Case of Game-theoretic Lexical Link Analysis |
Trang Ha, Quyen Hoang and Kyumin Lee | Building a Task Blacklist for Online Social Platforms |
Thomas Marcoux, Nitin Agarwal, Adewale Obadimu and Nihal Hussain | Understanding Information Operations using YouTubeTracker |
Mayank Kejriwal and Peilin Zhou | SAVIZ: Interactive Exploration and Visualization of Social Media over Crisis Data |
Zizhen Chen and David W. Matula | Visualizing the Natural Number Network |
Authors | Article Title |
Vivin Paliath and Paulo Shakarian | Reasoning about Sequential Cyberattacks |
Tor Berglind, Lisa Kaati and Björn Pelzer | Levels of Hate in Online Environments |
Shao-Fang Wen, Mazaher Kianpour and Stewart Kowalski | An Empirical Study of Security Culture in Open Source Software Communities |
Aditya Pingle, Aritran Piplai, Sudip Mittal, Anupam Joshi, James Holt and Richard Zak | RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement |
Zoheb Borbora, Arpita Chandra, Ponnurangam Kumaraguru and Jaideep Srivastava | On Churn and Social Contagion |
Avishek Bose, Vahid Behzadan, Carlos Aguirre and William Hsu | A Novel Approach for Detection and Ranking of Trendy and Emerging Cyber Threat Events in Twitter Streams |
Farahnaz Golrooy Motlagh, Saeedeh Shekarpour, Amit Sheth, Krishnaprasad Thirunarayan and Michael Raymer | Twitter Data Analysis and Consumption Trends for Predicting Public Opinion on Drug Policy Decision |
Mohammed Almukaynizi, Malay Shah and Paulo Shakarian | A Hybrid KRR-ML Approach to Predict Malicious Email Campaigns |
Mohammed Rashed, John Piorkowski and Ian Mcculloh | Evaluation of Extremist Cohesion in a Darknet Forum Using ERGM and LDA |
Choukri Djellali, Mehdi Adda and Mohamed Tarik Moutacalli | A Comparative Study to Deep Learning for Pattern Recognition, By using Online and Batch Learning Taking Cybersecurity as a case |
Emily Alfs, Doina Caragea, Dewan Chaulagain, Sankardas Roy, Nathan Albin and Pietro Poggi-Corradini | Identifying Android Malware Using Network-Based Approaches |
João Evangelista, Domingos Napolitano, Márcio Romero and Renato Sassi | Open Source Intelligence: A Bibliometric Study |
Anu Shrestha and Francesca Spezzano | Online Misinformation: From the Deceiver to the Victim |
Justin Song, Valerie Spicer, Andrew Park, Herbert H. Tsang and Patricia L. Brantingham | Computational Method for Identifying the Boundaries of Crime with Street Profile and Discrete Calculus |
Authors | Article Title |
Esen Tutaysalgir, Pinar Karagoz and Ismail Toroslu | Clustering based Personality Prediction on Turkish Tweets |
Carson Leung | Flexible Compression of Big Data |
Konstantinos Xylogiannopoulos | Exhaustive Exact String Matching: The Analysis of the Full Human Genome |
Konstantinos Xylogiannopoulos, Panagiotis Karampelas and Reda Alhajj | Multivariate motif detection in local weather big data |
Sheung Yat Law and Mahendra Piraveenan | Placement matters in making good decisions sooner: the influence of topology in reaching public utility thresholds |
Tung Nguyen, Li Zhang and Aron Culotta | Estimating Tie Strength in Follower Networks to Measure Brand Perceptions |
Lihi Idan and Joan Feigenbaum | Show me your friends and I’ll tell you whom you vote for: Predicting voting behavior in online social networks |
Rich Takacs and Ian Mcculloh | Dormant Bots in Social Media: Twitter and the 2018 U.S. Senate Election |
Ahmet Engin Bayrak and Faruk Polat | Reducing Features to Improve Link Prediction Performance in Location Based Social Networks, Non-Monotonically Selected Subset from Feature Clusters |
Emanuela Todeva, David Knoke and Donka Keskinova | Multi-Stage Clustering with Complementary Structural Analysis of 2-Mode Networks |
Lahiru Gunawardana, Prashan Ratnayake, Dharshana Kasthurirathna and Mahendra Piraveenan | Information theoretic approach for modeling bounded rationality in networked games |
Ahmet A. Müngen and Mehmet Kaya | Text Generation with Diversified Source Literature Review |
Authors | Article Title |
Hankyu Jang, Samuel Justice, Philip M. Polgreen, Alberto M. Segre, Daniel K. Sewell and Sriram V. Pemmaraju | Evaluating Architectural Changes to Alter Pathogen Dynamics in a Dialysis Unit |
Anu Shrestha and Francesca Spezzano | Detecting Depressed Users in Online Forums |
Joseph De Guia, Madhavi Devaraj and Carson Leung | DeepGx: Deep Learning Using Gene Expression for Cancer Classification |
Krunal Dhiraj Patel, Andrew Heppner, Gautam Srivastava and Vijay Mago | Analyzing Use of Twitter by Diabetes online Community |
Hanane Grissette and Elhabiba Nfaoui | Feeling the Future from Daily life patient’s Sentiment Analysis architecture based on Dynamic related-Sentiment embedding parameterization |
Farahnaz Golrooy Motlagh, Saeedeh Shekarpour, Amit Sheth, Krishnaprasad Thirunarayan and Michael L. Raymer | Twitter Data Analysis and Consumption Trends for Predicting Public Opinion on Marijuana Legalization |
Hüseyin Vural, Mehmet Kaya and Reda Alhajj | A Model Based on Random Walk with Restart to Predict CircRNA-Disease Associations on Heterogeneous Network |
Agostino Forestiero, Carmela Comito and Giuseppe Papuzzo | A Deep Learning Approach for Automatic Disease Diagnoses based on Patient Similarity |
Authors | Article Title |
Dimitrios Lappas, Panagiotis Karampelas and George Fessakis | The role of social media surveillance in search and rescue missions |
Lingwei Chen, Shifu Hou, Yanfang Ye, Thirimachos Bourlai, Shouhuai Xu and Liang Zhao | iTrustSO: An Intelligent System for Automatic Detection of Insecure Code Snippets in Stack Overflow |
Jacob Rose and Thirimachos Bourlai | Facial Attribute Estimation of Mobile Phone Face Data to aid in Biometric Systems |
Sho Tsugawa and Sumaru Niida | The Impact of Social Network Structure on the Growth and Survival of Online Communities |
Dimitris Spiliotopoulos, Costas Vassilakis and Dionisis Margaris | Data-driven Country Safety Monitoring Terrorist Attack Prediction |
Suha Reddy Mokalla and Thirimachos Bourlai | On Designing MWIR and Visible Band based DeepFace Detection Models |
Kaustav Basu and Arun Sen | On Augmented Identifying Codes for Monitoring Drug Trafficking Organizations |
Authors | Article Title |
Christopher Yong, Charalampos Chelmis, Wonhyung Lee and Daphney-Stavroula Zois | Understanding Online Civic Engagement: A Multi-Neighborhood Study of SeeClickFix |
Charalampos Chelmis, Mengfan Yao and Wonhyung Lee | Web and Society: A First Look into the Network of Human Service Providers |
Roy Ka-Wei Lee, Do Yeon Kim, Xiaohang Li, Sheng Wang and Yunying Zhuo | Topic Enhanced Word Embedding forToxic Content Detection in Q&A Sites |
Arpita Chandra, Zoheb Borbora, Ponnurangam Kumaraguru and Jaideep Srivastava | Finding Your Social Space: Empirical Study of Social Exploration in Multiplayer Online Games |
Abu Saleh Md. Tayeen, Abderrahmen Mtibaa and Satyajayant Misra | Location, Location, Location! Quantifying the True Impact of Location on Business Success Using a Yelp Dataset |
Sandra Mitrovic, Laurent Lecoutere and Jochen De Weerdt | A Comparison of Methods for Link Sign Prediction with Signed Network Embeddings |
Authors | Article Title |
Li Chen Cheng and Song-Lin Tsai | Deep Learning for Automated Sentiment Analysis of Social Media |
Min-Yuh Day and Jian-Ting Lin | Artificial Intelligence for ETF Market Prediction and Portfolio Optimization |
Patryk Pazura and Jaroslaw Jankowski | Increasing the Diffusional Characteristics of Networks Through Optimal Topology Changes within Sub-graphs |
Takayasu Fushimi and Kenichi Kanno | Extraction of User Demands Based on Similar Tweets Graph |
Shih-Hung Wu and Jun-Wei Wang | Integrating Neural and Syntactic Features on the Helpfulness Analysis of the Online Customer Reviews |
Gui-Ru Li and Chia-Hui Chang | Semantic Role Labeling for Opinion Target Extraction from Chinese Social Network |
Hsiang-En Cherng and Chia-Hui Chang | Short Text Conversation Based on Deep Neural Network and Anslysis on Evaluation Measures |
Logan Praznik, Gautam Srivastava, Chetan Mendhez and Vijay Magoz | Vertex-Weighted Measures for Link Prediction in Hashtag Sub-graphs |
K. (Lynn) Putman, Hanjo D. Boekhout and Frank W. Takes | Fast Incremental Computation of Harmonic Closeness Centrality in Directed Weighted Networks |
Authors | Article Title |
Meisam Hejazinia, Pavlos Mitsoulis-Ntompos and Serena Zhang | Deep Personalized Re-targeting |
Gianluca Lax and Antonia Russo | A System to Enforce User's Preference in OSN Advertising |
Carmela Comito: Travel Routes | Travel Routes Recommendations via Online Social Networks |
Dionisis Margaris, Dimitris Spiliotopoulos and Costas Vassilakis | Social Relations versus Near Neighbours: Reliable Recommenders in Limited Information Social Network Collaborative Filtering for Online Advertising |
Authors | Article Title |
Guillermo Romero Moreno, Long Tran-Thanh and Markus Brede | Continouous Influence Maximization for the Voter Dynamics: A Gradient Ascent Algorithm and Analytical Solutions |
Jan Hauffa, Wolfgang Bräu and Georg Groh | Detection of Topical Influence in Social Networks via Granger-Causal Inference: A Twitter Case Study |
Sukankana Chakraborty, Sebastian Stein, Markus Brede, Ananthram Swami, Geeth DeMel and Valerio Restocchi | Competitive Influence Maximisation using Voting Dynamics |
Mihai Valentin Avram, Shubhanshu Mishra, Nikolaus Nova Parulian and Jana Diesner | Manipulating network influence via adversarial perturbations |
Mariella Bonomo, Gaspare Ciaccio, Andrea De Salve and Simona E.Rombo | Customer Recommendation Based on Profile Matching and Customized Campaigns in On-Line Social Networks |