2016 Annual Conference on Information Science and Systems (CISS) 2016
DOI: 10.1109/ciss.2016.7460492
|View full text |Cite
|
Sign up to set email alerts
|

Optimal detection of influential spreaders in online social networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
3
2
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 22 publications
(10 citation statements)
references
References 19 publications
0
10
0
Order By: Relevance
“…These two estimators are closely related to the rumor centrality estimator. To be more precise, in the case of general tree, they are essentially the same as it is proved in [12] and [40] (Theorem 2) that…”
Section: The Basic Model: Quasi-regular Treementioning
confidence: 75%
See 1 more Smart Citation
“…These two estimators are closely related to the rumor centrality estimator. To be more precise, in the case of general tree, they are essentially the same as it is proved in [12] and [40] (Theorem 2) that…”
Section: The Basic Model: Quasi-regular Treementioning
confidence: 75%
“…Detailed discussion of these estimators can be found in [12] and [40]. Our presentation is slightly different from their original forms in view of Definition 3(c), which always casts the detection problem as a maximizing problem.…”
Section: The Basic Model: Quasi-regular Treementioning
confidence: 99%
“…Next, note that by choosing c 3 large enough, one can make t 2 smaller than t 1 . Now using (15) and (17), we can choose c 3 large enough such that for n large enough and any j = i, with probability at least (1 − ) we have:…”
Section: Figure 5: Casementioning
confidence: 99%
“…There are several notions of node centrality in graphs that have been proposed in the literature, such as distance centrality, betweenness centrality, degree centrality, and eigenvalue centrality (see for example [1,2]). These centrality measures find application in a wide variety of contexts, such as identifying influential/critical entities in social/communication networks [15,16], source/root detection in diffusion/growing networks [4,10,12,13], and facility location problems [14,22,23].…”
Section: Introductionmentioning
confidence: 99%
“…One possible approach is to maximize a real-valued estimator function e(s, T ) over each candidate source node s ∈ V , and each tree T rooted at s that spans the infected nodes U . To make this optimization procedure computationally tractable for a general graph, for each candidate source node s, a random breadth-first search (BFS) tree T BFS (s) is usually chosen (e.g., [9], [13], [18]), and the source node is estimated by arg max s∈V e(s, T BFS (s)).…”
Section: Introductionmentioning
confidence: 99%