2018
DOI: 10.1016/j.physa.2018.02.128
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic node immunization for restraint of harmful information diffusion in social networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(14 citation statements)
references
References 14 publications
0
11
0
Order By: Relevance
“…Hence, the main research direction around this topic is to develop a fast, effective algorithm for seeking a proper subset of influence people. See [16][17][18][19], for some typical literature.…”
Section: Truth-publishing Approachesmentioning
confidence: 99%
“…Hence, the main research direction around this topic is to develop a fast, effective algorithm for seeking a proper subset of influence people. See [16][17][18][19], for some typical literature.…”
Section: Truth-publishing Approachesmentioning
confidence: 99%
“…Deep semantics Ma et al 2016Ma et al 2018Wu et al 2018Reis et al 2019Rashkin et al 2017Martin et al 2018Tseng et al 1999Karimi et al 2018Long et al 2017Shu et al 2019 Profiles Influence Interests Yang et al 2018Ghenai et al 2018 Dynamic networks Static networks Jin et al 2016Tacchini et al 2017Ma et al 2017Ruchansky et al 2017Wu et al 2018 Stance-based Ma et al 2018Lukasik et al 2019 Meta-data based Figure 2. The review of information credibility evaluation methods Wu et al, 2019a).…”
Section: Shallow Semanticsmentioning
confidence: 99%
“…To better evaluate information credibility, more and more credibility features are extracted around social media, especially user features. User-based methods capture disseminator's profile (Long et al, 2017;Shu et al, 2019b), influence (Yang et al, 2018), interests features (Ghenai & Mejova, 2018) and adopt various classification models to detect false information on social media, which demonstrate that these features as distinguishing credibility features are useful, and the concatenation of the user features and text features as the input of models achieves average performance improve-ments margin of about 5% than only text features as the input of models. Additionally, network-based methods involve static-based and dynamic-based.…”
Section: Information Credibility Evaluationmentioning
confidence: 99%
“…However, social networks are also actively used by scammers. Fraudsters, as well as terrorists, use networks to spread false, harmful, or even life-threatening information [8][9][10][11].…”
Section: Introductionmentioning
confidence: 99%