Proceedings of the 9th international World Wide Web conference on Computer networks : the international journal of computer and telecommunications netowrking
Mining the network value of customers
Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining
Mining knowledge-sharing sites for viral marketing
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Maximizing the spread of influence through a social network
Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
Information diffusion through blogspace
Proceedings of the 13th international conference on World Wide Web
Cost-effective outbreak detection in networks
Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining
Extracting influential nodes for information diffusion on a social network
AAAI'07 Proceedings of the 22nd national conference on Artificial intelligence - Volume 2
Minimizing the spread of contamination by blocking links in a network
AAAI'08 Proceedings of the 23rd national conference on Artificial intelligence - Volume 2
Efficient estimation of influence functions for SIS model on social networks
IJCAI'09 Proceedings of the 21st international jont conference on Artifical intelligence
Discovering Influential Nodes for SIS Models in Social Networks
DS '09 Proceedings of the 12th International Conference on Discovery Science
Learning Continuous-Time Information Diffusion Model for Social Behavioral Data Analysis
ACML '09 Proceedings of the 1st Asian Conference on Machine Learning: Advances in Machine Learning
Acquiring expected influence curve from single diffusion sequence
PKAW'10 Proceedings of the 11th international conference on Knowledge management and acquisition for smart systems and services
PRICAI'10 Proceedings of the 11th Pacific Rim international conference on Trends in artificial intelligence
Selecting information diffusion models over social networks for behavioral analysis
ECML PKDD'10 Proceedings of the 2010 European conference on Machine learning and knowledge discovery in databases: Part III
Discovery of super-mediators of information diffusion in social networks
DS'10 Proceedings of the 13th international conference on Discovery science
Detecting changes in opinion value distribution for voter model
SBP'11 Proceedings of the 4th international conference on Social computing, behavioral-cultural modeling and prediction
Proceedings of the 22nd ACM conference on Hypertext and hypermedia
A rule-based policy language for selective trust propagation in social networks
Databases and Social Networks
The complexity and approximability of minimum contamination problems
TAMC'11 Proceedings of the 8th annual conference on Theory and applications of models of computation
Learning diffusion probability based on node attributes in social networks
ISMIS'11 Proceedings of the 19th international conference on Foundations of intelligent systems
Detecting anti-majority opinionists using value-weighted mixture voter model
DS'11 Proceedings of the 14th international conference on Discovery science
Behavioral analyses of information diffusion models by observed data of social network
SBP'10 Proceedings of the Third international conference on Social Computing, Behavioral Modeling, and Prediction
Graph embedding on spheres and its application to visualization of information diffusion data
Proceedings of the 21st international conference companion on World Wide Web
Controlling infection by blocking nodes and links simultaneously
WINE'11 Proceedings of the 7th international conference on Internet and Network Economics
The robust set problem: parameterized complexity and approximation
MFCS'12 Proceedings of the 37th international conference on Mathematical Foundations of Computer Science
Detecting changes in information diffusion patterns over social networks
ACM Transactions on Intelligent Systems and Technology (TIST) - Special Sections on Paraphrasing; Intelligent Systems for Socially Aware Computing; Social Computing, Behavioral-Cultural Modeling, and Prediction
On the inapproximability of minimizing cascading failures under the deterministic threshold model
Information Processing Letters
Affinity-driven blog cascade analysis and prediction
Data Mining and Knowledge Discovery
Towards combating rumors in social networks: Models and metrics
Intelligent Data Analysis - Dynamic Networks and Knowledge Discovery
Hi-index | 0.00 |
We address the problem of minimizing the propagation of undesirable things, such as computer viruses or malicious rumors, by blocking a limited number of links in a network, which is converse to the influence maximization problem in which the most influential nodes for information diffusion is searched in a social network. This minimization problem is more fundamental than the problem of preventing the spread of contamination by removing nodes in a network. We introduce two definitions for the contamination degree of a network, accordingly define two contamination minimization problems, and propose methods for efficiently finding good approximate solutions to these problems on the basis of a naturally greedy strategy. Using large social networks, we experimentally demonstrate that the proposed methods outperform conventional link-removal methods. We also show that unlike the case of blocking a limited number of nodes, the strategy of removing nodes with high out-degrees is not necessarily effective for these problems.