Abstract is missing.
- Jaccard Affiliation Graph (JAG) Model For Explaining Overlapping Community BehaviorsChen Luo, Anshumali Shrivastava. 1-8 [doi]
- Negapedia: The Negative Side of WikipediaMassimo Marchiori, Enrico Bonetti Vieno. 1-4 [doi]
- From Data Points to Data Curves: A New Approach on Big Data Curves ClusteringKonstantinos F. Xylogiannopoulos. 1-4 [doi]
- Social Bots for Online Public Health InterventionsAshok Deb, Anuja Majmundar, Sungyong Seo, Akira Matsui, Rajat Tandon, Shen Yan, Jon-Patrick Allem, Emilio Ferrara. 1-4 [doi]
- Detecting Local Communities in Networks with Edge UncertaintyChi Zhang, Osmar R. Zaïane. 9-16 [doi]
- ProxiClust: Data Sparsification and Community Detection for Assembly-Free Metagenomic BinningShivani Shah, Jacques-Henri Sublernontier, Fatma Bouali, Gilles Venturini. 17-20 [doi]
- Characterising and Evaluating Online Communities from Live Microblogging User InteractionsHugo Hromic, Conor Hayes. 21-24 [doi]
- Persistence of the Jordan Center in Random Growing TreesSarath Pattathil, Nikhil Karamchandani, Dhruti Shah. 25-32 [doi]
- Improved Triangle Counting in Graph Streams: Power of Multi-SamplingNeeraj Kavassery-Parakkat, Kiana Mousavi Hanjani, A. Pavan. 33-40 [doi]
- Listing All Maximal k-Plexes in Temporal GraphsMatthias Bentert, Anne-Sophie Himmel, Hendrik Molter, Marco Morik, Rolf Niedermeier, René Saitenmacher. 41-46 [doi]
- Node, Motif and Subgraph: Leveraging Network Functional Blocks Through Structural ConvolutionCarl Yang, Mengxiong Liu, Vincent W. Zheng, Jiawei Han 0001. 47-52 [doi]
- A Socio-linguistic Model for Cyberbullying DetectionSabina Tomkins, Lise Getoor, Yunfei Chen, Yi Zhang. 53-60 [doi]
- A Social Trust Metric For Scholarly Reputation MiningRamy Hanafy, Soha Makady, Abeer EIKorany. 61-68 [doi]
- Are they Our Brothers? Analysis and Detection of Religious Hate Speech in the Arabic TwittersphereNuha Albadi, Maram Kurdi, Shivakant Mishra. 69-76 [doi]
- When do Crowds Turn Violent? Uncovering Triggers from MediaYue Ning, Sathappan Muthiah, Naren Ramakrishnan, Huzefa Rangwala, David Mares. 77-82 [doi]
- How to Stop Violence Among Homeless: Extension of Voter Model and Intervention StrategiesAjitesh Srivastava, Robin Petering, Rajgopal Kannan, Eric Rice, Viktor K. Prasanna. 83-86 [doi]
- ALGeoSPF: A Hierarchical Factorization Model for POI RecommendationJean-Benoît Griesner, Talel Abdessalem, Hubert Naacke, Pierre Dosne. 87-90 [doi]
- Constrained Coupled Matrix-Tensor Factorization and its Application in Pattern and Topic DetectionSanaz Bahargam, Evangelos E. Papalexakis. 91-94 [doi]
- Segregation in Social Networks: A Simple Schelling-Like ModelOlivier Brandouy Gretha, Philippe Mathieu Cristal, Nicolas Mauhe. 95-98 [doi]
- Detecting Antagonistic and Allied Communities on Social MediaAmin-Salehi, Hasan Davulcu. 99-106 [doi]
- Local Detection of Critical Nodes in Active GraphsM. Yusuf Ozkaya, Ahmet Erdem Sanyuce, Ali Pinar, Ümit V. Çatalyürek. 107-110 [doi]
- SiNA: A Scalable Iterative Network AlignerAbdurrahman Yasar, Bora Uçar, Ümit V. Çatalyürek. 111-118 [doi]
- Social-EOC: Serviceability Model to Rank Social Media Requests for Emergency Operation CentersHemant Purohit, Carlos Castillo 0001, Muhammad Imran 0002, Rahul Pandey. 119-126 [doi]
- Social Tag Embedding for the Recommendation with Sparse User-Item InteractionsDeqing Yang, Lihan Chen, Jiaqing Liang, Yanghua Xiao, Wei Wang. 127-134 [doi]
- Mood-Aware Music Recommendation via Adaptive Song EmbeddingChaima Dhahri, Kazunori Matsumoto, Keiichiro Hoashi. 135-138 [doi]
- Exploiting User Actions for App RecommendationsKai Shu, Suhang Wang, Huan Liu, Jiliang Tang, Yi Chang, Ping Luo 0001. 139-142 [doi]
- Towards Reliable Missing Truth Discovery in Online Social Media Sensing ApplicationsDaniel Yue Zhang, Jose Badilla, Yang Zhang, Dong Wang 0002. 143-150 [doi]
- Estimating the Quality of Crowdsourced Translations Based on the Characteristics of Source and Target Words and ParticipantsMuhammad Rizal Khaefi, Rajius Idzalika, Imaduddin Amin, Zakiya Pramestri, Pamungkas Jutta, Yulistina Riyadi, George Hodge, Jong Gun Lee. 151-158 [doi]
- Missing Network Data A Comparison of Different Imputation MethodsRobert W. Krause, Mark Huisman, Christian Steglich, Tom A. B. Snijders. 159-163 [doi]
- DE-Crawler: A Densification-Expansion Algorithm for Online Data CollectionKatchaguy Areekijseree, Sucheta Soundarajan. 164-169 [doi]
- Full Cycle Analysis of a Large-Scale Botnet Attack on TwitterChristoph Besel, Juan Echeverría, Shi Zhou. 170-177 [doi]
- Model Bots, not Humans on Social MediaNikan Chavoshi, Abdullah Mueen. 178-185 [doi]
- Socialbots' First Words: Can Automatic Chatting Improve Influence in Twitter?Alkiviadis Savvopoulos, Pantelis Vikatos, Fabrício Benevenuto. 190-193 [doi]
- Localizing and Quantifying Damage in Social Media ImagesXukun Li, Doina Caragea, Huaiyu Zhang, Muhammad Imran. 194-201 [doi]
- Characterizing Infrastructure Damage After Earthquake: A Split-Query Based IR ApproachShalini Priya, Manish Bhanu, Sourav Kumar Dandapat, Kripabandhu Ghosh, Joydeep Chandra. 202-209 [doi]
- Diverse Teams Tend to do Good Work in Wikipedia (but Jacks of All Trades Don't)Jürgen Lerner, Alessandro Lomi. 214-221 [doi]
- Local and Global Information Preserved Network EmbeddingYao Ma 0001, Suhang Wang, Jiliang Tang. 222-225 [doi]
- Resilience and the Coevolution of Interdependent Multiplex NetworksAuroop Ganguly, Tanbay Mehta, Ravi Sundaram, Devesh Tiwari. 226-233 [doi]
- On Characterizing the Twitter Elite NetworkReza Motamedi, Saed Rezayi, Reza Rejaie, Walter Willinger. 234-241 [doi]
- Retweet Us, We will Retweet You: Spotting Collusive Retweeters Involved in Blackmarket ServicesHridoy Sankar Dutta, Aditya Chetan, Brihi Joshi, Tanmoy Chakraborty 0002. 242-249 [doi]
- Rejecting the Null Hypothesis of Apathetic Retweeting of US Politicians and SPLC-defined Hate Groups in the 2016 US Presidential ElectionRaazesh Sainudiin, Kumar Yogeeswaran, Kyle Nash, Rania Sahioun. 250-253 [doi]
- Predicting Delay Discounting from Social Media Likes with Unsupervised Feature LearningTao Ding, Warren K. Bickel, Shimei Pan. 254-257 [doi]
- Analyzing the Digital Traces of Political Manipulation: The 2016 Russian Interference Twitter CampaignAdam Badawy, Emilio Ferrara, Kristina Lerman. 258-265 [doi]
- Fight Under Uncertainty: Restraining Misinformation and Pushing out the TruthHuiling Zhang, Alan Kuhnle, J. David Smith, My T. Thai. 266-273 [doi]
- Weakly Supervised Learning for Fake News Detection on TwitterStefan Helmstetter, Heiko Paulheim. 274-277 [doi]
- CIMTDetect: A Community Infused Matrix-Tensor Coupled Factorization Based Method for Fake News DetectionShashank Gupta, Raghuveer Thirukovalluru, Manjira Sinha, Sandya Mannarswamy. 278-281 [doi]
- EGBTER: Capturing Degree Distribution, Clustering Coefficients, and Community Structure in a Single Random Graph ModelOmar El-Daghar, Erik Lundberg, Robert A. Bridges. 282-289 [doi]
- A Two-Stage Working Model Strategy for Network Analysis Under Hierarchical Exponential Random Graph ModelsMing Cao, Yong Chen, Kayo Fujimoto, Michael Schweinberger. 290-298 [doi]
- Evaluation of Political Party Cohesion Using Exponential Random Graph ModelingShambavi Sadayappan, Ian McCulloh, John Piorkowski. 298-301 [doi]
- Ontology Based Similarity for Information Technology SkillsYeshwanth Balachander, Teng-Sheng Moh. 302-305 [doi]
- SPR2EP: A Semi-Supervised Spam Review Detection FrameworkCennet Merve Yilmaz, Ahmet Onur Durahim. 306-313 [doi]
- End-to-End Compromised Account DetectionHamid Karimi, Courtland VanDam, Liyang Ye, Jiliang Tang. 314-321 [doi]
- Semi-supervised Content-Based Detection of Misinformation via Tensor EmbeddingsGisel Bastidas Guacho, Sara Abdali, Neil Shah, Evangelos E. Papalexakis. 322-325 [doi]
- Implicit Entity Linking Through Ad-Hoc RetrievalHawre Hosseini, Tam T. Nguyen, Ebrahim Bagheri. 326-329 [doi]
- Related Entity Finding on Highly-heterogeneous Knowledge GraphsRidho Reinanda, Edgar Meij, Joshua Pantony, Jonathan J. Dorando. 330-334 [doi]
- Trojan Horses in Amazon's Castle: Understanding the Incentivized Online ReviewsSoheil Jamshidi, Reza Rejaie, Jun Li. 335-342 [doi]
- Multi-Task Neural Learning Architecture for End-to-End Identification of Helpful ReviewsMiao Fan, Yue Feng, Mingming Sun, Ping Li, Haifeng Wang, Jianmin Wang. 343-350 [doi]
- A Computational Approach to Finding Contradictions in User Opinionated TextChuqin Li, Xi Niu, Ahmad Al-Doulat, Noseong Park. 351-356 [doi]
- Predicting Highly Rated Crowdfunded ProductsVishal Sharma, Kyumin Lee. 357-362 [doi]
- Opinions Power Opinions: Joint Link and Interaction Polarity Predictions in Signed NetworksTyler Derr, Zhiwei Wang, Jiliang Tang. 363-366 [doi]
- Crowdsourcing-Based Copyright Infringement Detection in Live Video StreamsDaniel Yue Zhang, Qi Li, Herman Tong, Jose Badilla, Yang Zhang, Dong Wang 0002. 367-374 [doi]
- Adult Content in Social Live Streaming Services: Characterizing Deviant Users and RelationshipsNikolaos Lykousas, Constantinos Patsakis, Vicenç Gómez. 375-382 [doi]
- Development of a Social Network for Research Support and Individual Well-Being ImprovementLucas V. A. Caldas, Antonio F. L. Jacob Jr., Simone S. C. Silva, Fernando A. R. Pontes, Fábio M. F. Lobato. 383-386 [doi]
- Of Wines and Reviews: Measuring and Modeling the Vivino Wine Social NetworkNeema Kotonya, Paolo De Cristofaro, Emiliano De Cristofaro. 387-392 [doi]
- Nowcasting Air Quality by Fusing Insights from Meteorological Data, Satellite Imagery and Social Media Images Using Deep LearningMuhammad Rizal Khaefi, Zakiya Pramestri, Imaduddin Amin, Jong Gun Lee. 393-396 [doi]
- Sounds of Silence Breakers: Exploring Sexual Violence on TwitterAparup Khatua, Erik Cambria, Apalak Khatua. 397-400 [doi]
- Cyberbullying Detection on Instagram with Optimal Online Feature SelectionMengfan Yao, Charalampos Chelmis, Daphney-Stavroula Zois. 401-408 [doi]
- A Model of Homophily, Common Knowledge and Collective Action Through FacebookGizem Korkmaz, Chris J. Kuhlman, Joshua Goldstein, Fernando Vega-Redondo. 409-412 [doi]
- Generative Modeling of Human Behavior and Social Interactions Using Abductive AnalysisYihui Ren, Vanessa Cedeno-Mieles, Zhihao Hu, Xinwei Deng, Abhijin Adiga, Christopher L. Barrett, Saliya Ekanayake, Brian J. Goode, Gizem Korkmaz, Chris J. Kuhlman, Dustin Machi, Madhav V. Marathe, Naren Ramakrishnan, S. S. Ravi, Parang Saraf, Nathan Self, Noshir Contractor, Joshua Epstein, Michael W. Macy. 413-420 [doi]
- Friend Recommendation in Location-Based Social Networks via Deep Pairwise LearningDimitrios Rafailidis, Fabio Crestani. 421-428 [doi]
- Leveraging the Power of Informative Users for Local Event DetectionHengtong Zhang, Fenglong Ma, Yaliang Li, Chao Zhang, Tianqi Wang, Yaqing Wang, Jing Gao, Lu Su. 429-436 [doi]
- How Well Did You Locate Me? Effective Evaluation of Twitter User GeolocationAhmed Mourad, Falk Scholer, Mark Sanderson, Walid Magdy. 437-440 [doi]
- Geo-Location Identification of Facebook PagesYu-Cheng Lin, Chun-Ming Lai, Jon William Chapman, Shyhtsun Felix Wu, George A. Barnett. 441-446 [doi]
- Mining and Modeling Complex Leadership Dynamics of Movement dataChainarong Amornbunchornvej, Tanya Y. Berger-Wolf. 447-454 [doi]
- Adaptive Submodular Influence Maximization with Myopic FeedbackGuillaume Salha, Nikolaos Tziortziotis, Michalis Vazirgiannis. 455-462 [doi]
- A 2-Layered Graph Based Diffusion Approach for Altmetric AnalysisMohan Timilsina, Haixuan Yang, Dietrich Rebholz-Schuhmann. 463-466 [doi]
- Simulating Payoff Distribution in Networks of Economic AgentsGabriel Barina, Mihai Udrescu, Alexandru Topirceanu, Mircea Vladutiu. 467-470 [doi]
- CADET: A Multi-View Learning Framework for Compromised Account Detection on TwitterCourtland VanDam, Pang-Ning Tan, Jiliang Tang, Hamid Karimi. 471-478 [doi]
- Weakly Supervised Cyberbullying Detection Using Co-Trained Ensembles of Embedding ModelsElaheh Raisi, Bert Huang. 479-486 [doi]
- Core2Vec: A Core-Preserving Feature Learning Framework for NetworksSoumya Sarkar, Aditya Bhagwat, Animesh Mukherjee 0001. 487-490 [doi]
- t-PNE: Tensor-Based Predictable Node EmbeddingsSaba A. Al-Sayouri, Ekta Gujral, Danai Koutra, Evangelos E. Papalexakis, Sarah S. Lam. 491-494 [doi]
- Fast Top-k Search with Relaxed Graph SimulationAbdelmalek Habi, Brice Effantin, Hamamache Kheddouci. 495-502 [doi]
- A Deep Multi-Modal Pairwise Ranking Model for User Generated Food DataHesam Salehian, Surender Reddy Yerva, Iman Barjasteh, Patrick D. Howell, Chul Lee. 503-510 [doi]
- Modeling the Impact of R Packages Using Dependency and Contributor NetworksGizem Korkmaz, Claire Kelling, Carol Robbins, Sallie A. Keller. 511-514 [doi]
- Inside the Right-Leaning Echo Chambers: Characterizing Gab, an Unmoderated Social SystemLucas Lima, Julio C. S. Reis, Philipe F. Melo, Fabricio Murai, Leandro Araújo Silva, Pantelis Vikatos, Fabrício Benevenuto. 515-522 [doi]
- Characterizing Politically Engaged Users' Behavior During the 2016 US Presidential CampaignJosemar Alves Caetano, Jussara M. Almeida, Humberto Torres Marques-Neto. 523-530 [doi]
- From Interaction to Participation: The Role of the Imagined Audience in Social Media Community Detection and an Application to Political Communication on TwitterObaida Hanteer, Luca Rossi 0003, Davide Vega D'Aurelio, Matteo Magnani. 531-534 [doi]
- Inspecting Interactions: Online News Media Synergies in Social MediaPraboda Rajapaksha, Reza Farahbakhsh, Noël Crespi, Bruno Defude. 535-539 [doi]
- Analyzing the News Coverage of Personalized NewspapersAbhijnan Chakraborty, Niloy Ganguly. 540-543 [doi]
- A Framework for Predicting Links Between Indirectly Interacting NodesLaxmi Amulya Gundala, Francesca Spezzano. 544-551 [doi]
- Acquiring Background Knowledge to Improve Moral Value PredictionYing Lin, Joe Hoover, Gwenyth Portillo-Wightman, Christina Park, Morteza Dehghani, Heng Ji. 552-559 [doi]
- Attributed Network Representation Learning Approaches for Link PredictionFarzan Masrour, Pang-Ning Tan, Abdol-Hossein Esfahanian, Courtland VanDam. 560-563 [doi]
- Link Prediction in the Criminal Network of AlbuquerqueIan Crandell, Gizem Korkmaz. 564-567 [doi]
- MIMiS: Minimally Intrusive Mining of Smartphone User BehaviorsPravallika Devineni, Evangelos E. Papalexakis, Kalina Michalska, Michalis Faloutsos. 568-569 [doi]
- Measuring the Information-Foraging Behaviors of Social Bots Through Word UsageZachary K. Stine, Tuja Khaund, Nitin Agarwal. 570-571 [doi]
- Language Use Similarities in Small Dutch Twitter CommunitiesHans van Halteren. 572-574 [doi]
- Discovering Influence Hierarchy Based on Frequent Social InteractionsT. M. G. Tennakoon, Richi Nayak. 575-576 [doi]
- Modeling Influence on Posting Engagement: The Gaza Great Return March Analyzed on TwitterAlon Bartal. 577-578 [doi]
- Unsupervised Crisis Information Extraction from Twitter DataRoberto Interdonato, Antoine Doucet, Jean-Loup Guillaume. 579-580 [doi]
- ProfileGen: Generation of Automatic and Realistic Artificial ProfilesAbigail Paradise, Dvir Cohen, Asaf Shabtai, Rami Puzis. 581-583 [doi]
- Homophily and Nationality Assortativity Among the Most Cited Researchers' Social NetworkMichal Vaanunu, Chen Avin. 584-586 [doi]
- This Paper is About Lexical Propagation on Twitter. H*ckin Smart. 12/10. Would Accept!Jennifer Golbeck, Cody Buntain. 587-590 [doi]
- A Study of Reddit-User's Response to RapeNur Shazwani Kamarudin, Vineeth Rakesh, Ghazaleh Beigi, Lydia Manikonda, Huan Liu 0001. 591-592 [doi]
- Five Shades of Untruth: Finer-Grained Classification of Fake NewsLiqiang Wang, Yafang Wang, Gerard de Melo, Gerhard Weikum. 593-594 [doi]
- What Banking and Phone Data Tell us about the Socioeconomic Groups and Their Consumption Patterns?Ángel Francisco Agudo-Peregrina, Diego Perez, Martin Langberg. 595-597 [doi]
- TED Talk Recommender Using Speech TranscriptsJaehoon Oh, Injung Lee, Yeon Seonwoo, Simin Sung, Ilbong Kwon, Jae-Gil Lee 0001. 598-600 [doi]
- Interactive Discovery System for Direct DemocracyPablo Aragón, Yago Bermejo, Vicenç Gómez, Andreas Kaltenbrunner. 601-604 [doi]
- Class Strength V2: An Adaptive Multilingual Tool for Tweet ClassificationDiana Cremarenco, Walid Magdy. 605-608 [doi]
- A Customer Complaint Analysis Tool for Mobile Network OperatorsFeyzullah Kalyoncu, Engin Zeydan, Ibrahim Onuralp Yigit, Ahmet Yildirim. 609-612 [doi]
- Smart and Connected Water Resource Management Via Social Media and Community EngagementLong Hoang Nguyen, Rattikorn Hewett, Akbar Siami Namin, Nicholas Alvarez, Cristina Bradatan, Fang Jin. 613-616 [doi]
- GeoTeGra: A System for the Creation of Knowledge Graph Based on Social Network Data with Geographical and Temporal InformationHardik Patel, Pavlos Paraskevopoulos, Matthias Renz. 617-620 [doi]
- A Game-Theoretic Lexical Link Analysis for Discovering High-Value Information from Big DataYing Zhao, Charles C. Zhou. 621-625 [doi]
- An End-to-End Scalable Copyright Detection System for Online Video Sharing PlatformsDaniel Yue Zhang, Jose Badilla, Herman Tong, Dong Wang 0002. 626-629 [doi]
- CitizenHelper-Adaptive: Expert-Augmented Streaming Analytics System for Emergency Services and Humanitarian OrganizationsRahul Pandey, Hemant Purohit. 630-633 [doi]
- Multi-Task Learning for Transit Service Disruption DetectionTaoran Ji, Kaiqun Fu, Nathan Self, Chang-Tien Lu, Naren Ramakrishnan. 634-641 [doi]
- A Nonnegative Matrix Factorization Approach for Multiple Local Community DetectionDany Kamuhanda, Kun He 0001. 642-649 [doi]
- Product Popularity Modeling Via Time Series EmbeddingSantosh K. C., Sohan De Sarkar, Arjun Mukherjee. 650-653 [doi]
- How Humans Versus Bots React to Deceptive and Trusted News Sources: A Case Study of Active UsersMaria Glenski, Tim Weninger, Svitlana Volkova. 654-661 [doi]
- Analyzing Behavioral Trends in Community Driven Discussion Platforms Like RedditSachin Thukral, Hardik Meisheri, Tushar Kataria, Aman Agarwal, Ishan Verma, Arnab Chatterjee, Lipika Dey. 662-669 [doi]
- A Lens into Employee Peer Reviews Via Sentiment-Aspect ModelingAbhinav Maurya, Leman Akoglu, Ramayya Krishnan, Daniel Bay. 670-677 [doi]
- A Framework for Enterprise Social Network Assessment and Weak Ties RecommendationFaisal Ghaffar, Teodora Sandra Buda, Haytham Assem, Armita Afsharinejad, Neil Hurley. 678-685 [doi]
- A Food Venue Recommender System Based on Multilingual Geo-Tagged Tweet AnalysisPanote Siriaraya, Yusuke Nakaoka, Yuanyuan Wang, Yukiko Kawai. 686-689 [doi]
- Extracting User Habits from Google Maps History LogsChristos Sardianos, Iraklis Varlamis, Grigoris Bouras. 690-697 [doi]
- Measuring the Influencers in the News Media's NarrativesSamuel Oliver Stern, David Tuckett, Robert Elliott Smith, Rickard Nyman. 698-701 [doi]
- Using Semantic Features for Enhancing Car Pooling SystemMena Samy, Abeer Mohamed Elkorany. 702-708 [doi]
- A Statistical Framework for Handling Network AnomaliesMohamed Bouguessa, Amani Chouchane. 709-714 [doi]
- Semi-Automatic Training Set Construction for Supervised Sentiment Analysis in Political ContextsS. Martin-Gutierrez, Juan Carlos Losada, Rosa M. Benito. 715-720 [doi]
- Transformation and Commonality of Spatial Organization of Christian Church by Social Network AnalysisYi-Chun Huang, Yun-Shang Chiou. 721-726 [doi]
- Bibliometric Network Analysis and Visualization of Research and Development Trends in Precision MedicineEunsoo Sohn, Kyung-Ran Noh, Bangrae Lee, Oh-Jin Kwon. 727-730 [doi]
- Deep Probabilistic Learning in Hidden Social Networks and Facsimile DetectionChristophe Thovex. 731-735 [doi]
- Contrastive Structured Anomaly Detection for Gaussian Graphical ModelsAbhinav Maurya, Mark Cheung. 736-739 [doi]
- Spatio-Temporal Networks of Social Conflicts: Analysis and ModelingGunjan Sehgal, Kiran Sharma, Arnab Chatterjee, Anirban Chakraborti. 740-743 [doi]
- Enhancing Diffusion Models by Embedding Cognitive ReasoningChaminda Bulumulla, Jeffrey Chan, Lin Padgham. 744-749 [doi]
- Wisdom in Adversity: A Twitter Study of the Japanese TsunamiPaolo Casani, Hayate Iso, Shoko Wakamiya, Eiji Aramaki. 750-754 [doi]
- A Multi-Method Approach to Activities of 'Photaku': Photo-Taking Fans in the Korean Entertainment IndustrySugyo Han, Zongmuk Yoon, Joongseek Lee. 755-758 [doi]
- Robust Distributed Voting Mechanism by ConsensusMiguel Rebello, Rosa M. Benito, Juan Carlos Losada, J. Galeano. 759-762 [doi]
- Scientific Knowledge Construction. A Proposal of a Prognostic Model Based on Disciplinary Complement NetworksGastón Olivares, Juan Pablo Cárdenas, Juan Carlos Losada, Rosa María Benito. 763-766 [doi]
- Inferring Bad Entities Through the Panama Papers NetworkMikel Joaristi, Edoardo Serra, Francesca Spezzano. 767-773 [doi]
- Information Requirements for National Level Cyber Situational AwarenessStefan Varga, Joel Brynielsson, Ulrik Franke. 774-781 [doi]
- DroidEye: Fortifying Security of Learning-Based Classifier Against Adversarial Android Malware AttacksLingwei Chen, Shifu Hou, Yanfang Ye, Shouhuai Xu. 782-789 [doi]
- Classification of Short-Texts Generated During Disasters: A Deep Neural Network Based ApproachShamik Kundu, P. K. Srijith, Maunendra Sankar Desarkar. 790-793 [doi]
- Analyzing Social and Communication Network Structures of Social Bots and HumansTuja Khaund, Kiran Kumar Bandeli, Muhammad Nihal Hussain, Adewale Obadimu, Samer Al-khateeb, Nitin Agarwal. 794-797 [doi]
- Hackers Hedging Bets: A Cross-Community Analysis of Three Online Hacking ForumsAndrew J. Park, Richard Frank, Alexander Mikhaylov, Myf Thomson. 798-805 [doi]
- Biases in the Facebook News Feed: A Case Study on the Italian ElectionsEduardo M. Hargreaves, Claudio Agosti, Daniel S. Menasché, Giovanni Neglia, Alexandre Reiffers-Masson, Eitan Altman. 806-812 [doi]
- Unknown Landscape Identification with CNN Transfer LearningEdoardo Serra, Ashish Sharma, Mikel Joaristi, Oxana Korzh. 813-820 [doi]
- On the Development of an Entity-Centric Timeline Extraction ToolJakub Piskorski, Vanni Zavarella, Martin Atkinson. 821-824 [doi]
- Bot Conversations are Different: Leveraging Network Metrics for Bot Detection in TwitterDavid M. Beskow, Kathleen M. Carley. 825-832 [doi]
- Social Network Mining for Recommendation of Friends Based on Music InterestsChenxi Fan, Huizi Hao, Carson K. Leung, Leslie Yu Sun, Jennifer Tran. 833-840 [doi]
- Clickstream Analytics: An Experimental Analysis of the Amazon Users' Simulated Monthly TrafficKonstantinos F. Xylogiannopoulos, Panagiotis Karampelas, Reda Alhajj. 841-848 [doi]
- Transactional Database Analysis by Discovering Pairwise Interactions StrengthsMauricio A. Valle, Gonzalo A. Ruz, Sergio Rica. 849-854 [doi]
- Exploring the Network Dynamics in a Flipped ClassroomFang-Ling Lin, Chyi-In Wu. 855-860 [doi]
- Revealing Political Sentiment with Twitter: The Case Study of the 2016 Italian Constitutional ReferendumMarco Campanale, Enrico Giacinto Caldarola. 861-868 [doi]
- A Generalized Fractional Program for Maximizing Content Popularity in Online Social NetworksAlexandre Reiffers-Masson, Yezekael Hayel, Eitan Altman, Guillaume Martel. 869-872 [doi]
- K-Truss Decomposition of Large Networks on a Single Consumer-Grade MachineJian Wu, Alison Goshulak, Venkatesh Srinivasan 0001, Alex Thomo. 873-880 [doi]
- Interactive Kernel Dimension Alternative Clustering on GPUsXiangyu Li, Chieh Wu, Shi Dong, Jennifer G. Dy, David R. Kaeli. 885-892 [doi]
- Fine-Grained Object Detection Using Transfer Learning and Data AugmentationRahul Dalal, Teng-Sheng Moh. 893-896 [doi]
- Efficient Transfer Learning for Neural Network Language ModelsJacek Skryzalin, Hamilton Link, Jeremy D. Wendt, Richard Field, Samuel N. Richter. 897-902 [doi]
- Outfit Recommender SystemNikita Ramesh, Teng-Sheng Moh. 903-910 [doi]
- A Paper Recommendation System Based on User's Research InterestsBetul Bulut, Buket Kaya, Reda Alhajj, Mehmet Kaya. 911-915 [doi]
- Mining 'Following' Patterns from Big but Sparsely Distributed Social Network DataCarson K. Leung, Ryan Middleton, Adam G. M. Pazdor, Yeyoung Won. 916-919 [doi]
- Mining Individual Features to Enhance Link Prediction Efficiency in Location Based Social NetworksAhmet Engin Bayrak, Faruk Polat. 920-925 [doi]
- One Size Does Not Fit All: Predicting Product Returns in E-Commerce PlatformsTanuj Joshi, Animesh Mukherjee 0001, Girish Ippadi. 926-927 [doi]
- Event Detection by Change Tracking on Community Structure of Temporal NetworksRiza Aktunc, Ismail Hakki Toroslu, Pinar Karagoz. 928-931 [doi]
- A Clickbait Detection Method on News SitesAyse Geckil, Ahmet Anil Mungen, Esra Gündogan, Mehmet Kaya. 932-937 [doi]
- Text Mining for Plagiarism Detection: Multivariate Pattern Detection for Recognition of Text SimilaritiesKonstantinos F. Xylogiannopoulos, Panagiotis Karampelas, Reda Alhajj. 938-945 [doi]
- A Parallel Community Detection Algorithm Based on Incremental Clustering in Dynamic NetworkCuiyun Zhang, Yunlei Zhang, Bin Wu. 946-953 [doi]
- Evolving Medical Ontologies Based on Causal InferenceHengyi Hu, Larry Kerschberg. 954-957 [doi]
- Positive Cognitive Restructuring Through an App Based on Context MessagesJordi Conesa, David Gañán, Antoni Pérez-Navarro, Rubén Nieto, Gemma Ruiz, Francesc Saigí Rubió, Beatriz Sora. 958-962 [doi]
- Improving Influenza Forecasting with Web-Based Social DataCarmela Comito, Agostino Forestiero, Clara Pizzuti. 963-970 [doi]
- Usage of Scientific References in MMR Vaccination Debates on TwitterAseel Addawood. 971-979 [doi]
- Patients Reactions to Non-Invasive and Invasive Prenatal Tests: A Machine-Based Analysis from Reddit PostsGiovanni Delnevo, Silvia Mirri, Lorenzo Monti, Catia Prandi, Manesha Putra, Marco Roccetti, Paola Salomoni, Robert J. Sokol. 980-987 [doi]
- Application of Eye-Tracking Technology to Predict Concentration on HIV Campaigns Among Students in South AfricaWilbert Sibanda, Zhongheng Zhang. 988-994 [doi]
- Impact of Size, Location, Symptomatic-Nature and Gender on the Rupture of Saccular Intracranial AneurysmsKhalid Mahmood Malik, Madan Krishnamurthy, Pawel Marcinek, Ghaus M. Malik. 995-1001 [doi]
- Prediction of New Potential Micro RNAs-Environmental Factor Associations Based on KATZ MeasureHuseyin Vural, Buket Kaya, Reda Alhajj, Mehmet Kaya. 1002-1006 [doi]
- Shortest Path Distance Approximation Using Deep Learning TechniquesFatemeh Salehi Rizi, Jörg Schlötterer, Michael Granitzer. 1007-1014 [doi]
- Exploring the Management of Government Social Media - Studies from the Facebook Fan Pages in TaiwanYing-Hsun Hung, Wen-Kuo Chen, Seng-cho Timothy Chou. 1015-1020 [doi]
- Elections and the Twitter Community: The Case of Right-Wing and Left-Wing Primaries for the 2017 French Presidential ElectionKarina Sokolova, Charles Perez. 1021-1026 [doi]
- AI Robo-Advisor with Big Data Analytics for Financial ServicesMin-Yuh Day, Tun-Kung Cheng, Jheng-Gang Li. 1027-1031 [doi]
- Individual-Level Social Capital in Weighted and Attributed Social NetworksRajesh Sharma, Kevin McAreavey, Jun Hong 0001, Faisal Ghaffar. 1032-1037 [doi]
- Influencing Information Spreading Processes in Complex Networks with Probability SprayingArtur Karczmarczyk, Kamil Bortko, Piotr Bartkow, Patryk Pazura, Jaroslaw Jankowski. 1038-1046 [doi]
- SemanPhone: Combining Semantic and Phonetic Word Association in Verbal Learning ContextJiyan Lu, Panos A. Kostakos, Mourad Oussalah 0002, Susanna Pirttikangas. 1047-1052 [doi]
- The Inclusion Measure for Community Evaluation and Detection in Unweighted NetworksNikolaos Koufos, Aristidis Likas. 1053-1056 [doi]
- Artificial Intelligence for Conversational Robo-AdvisorMin-Yuh Day, Jian-Ting Lin, Yuan-Chih Chen. 1057-1064 [doi]
- Building a Benchmark for Evaluating Link Prediction MethodsJunyan Xiao, Peng Wang, Yue Meng. 1065-1070 [doi]
- iDetector: Automate Underground Forum Analysis Based on Heterogeneous Information NetworkYiming Zhang, Yujie Fan, Shifu Hou, Jian Liu, Yanfang Ye, Thirimachos Bourlai. 1071-1078 [doi]
- Meta-Terrorism: Identifying Linguistic Patterns in Public Discourse After an AttackPanos Kostakos, Markus Nykanen, Mikael Martinviita, Abhinay Pandya, Mourad Oussalah 0002. 1079-1083 [doi]
- Detecting Hate Speech Within the Terrorist Argument: A Greek CaseIoanna K. Lekea, Panagiotis Karampelas. 1084-1091 [doi]
- Analyzing Disinformation and Crowd Manipulation Tactics on YouTubeMuhammad Nihal Hussain, Serpil Tokdemir, Nitin Agarwal, Samer Al-khateeb. 1092-1095 [doi]
- Covert Online Ethnography and Machine Learning for Detecting Individuals at Risk of Being Drawn into Online Sex WorkPanos Kostakos, Lucie Sprachalova, Abhinay Pandya, Mohamed Aboeleinen, Mourad Oussalah 0002. 1096-1099 [doi]
- Social Network Analysis of a Disaster Behavior Network: An Agent-Based Modeling ApproachRey C. Rodrigueza, Maria Regina Justina E. Estuar. 1100-1107 [doi]
- A Framework for Data-Driven Physical Security and Insider Threat DetectionVasileios Mavroeidis, Kamer Vishi, Audun Jøsang. 1108-1115 [doi]
- Content-Aware Tweet Location Inference Using Quadtree Spatial Partitioning and Jaccard-Cosine Word EmbeddingOluwaseun Ajao, Deepayan Bhowmik, Shahrzad Zargari. 1116-1123 [doi]
- Ear Detection in the Wild Using Faster R-CNN Deep LearningSusan El-Naggar, Ayman Abaza, Thirimachos Bourlai. 1124-1130 [doi]
- Introducing a Reliability Analysis Framework for High Performance Computing EnvironmentsS. Sharma, A. D. Clark. 1131-1138 [doi]
- A Temporal Clustering Approach for Social Recommender SystemsSajad Ahmadian, Nima Joorabloo, Mahdi Jalili, Majid Meghdadi, Mohsen Afsharchi, Yongli Ren. 1139-1144 [doi]
- Multilayer Value Metrics Using Lexical Link Analysis and Game Theory for Discovering Innovation from Big Data and Crowd-SourcingYing Zhao, Charles C. Zhou, Jennie K. Bellonio. 1145-1151 [doi]
- Discovering and Leveraging Communities in Dark Multi-Layered Networks for Network DisruptionRyan Miller, Ralucca Gera, Akrati Saxena, Tanmoy Chakraborty 0002. 1152-1159 [doi]
- Link Prediction Measures in Various Types of Information Networks: A ReviewT. Jaya Lakshmi, S. Durga Bhavani. 1160-1167 [doi]
- Community Detection with Edge Augmentation in Criminal NetworksAshwin Bahulkar, Boleslaw K. Szymanski, N. Orkun Baycik, Thomas C. Sharkey. 1168-1175 [doi]
- Network Similarity Using Distribution of Distance MatricesRalucca Gera, Ruriko Yoshida. 1176-1183 [doi]
- Emergence of Leader-Follower Hierarchy Among Players in an On-Line ExperimentBálint Tóth, Gergely Palla, Enys Mones, Gergo Havadi, Nóra Páll, Péter Pollner, Tamás Vicsek. 1184-1190 [doi]
- Detecting Spam Accounts on TwitterZulfikar Alom, Barbara Carminati, Elena Ferrari. 1191-1198 [doi]
- Uncovering Hierarchical Structure in Social Networks Using Isospectral ReductionsLeonid A. Bunimovich, Chi-Jen Wang, Seokjoo Chae, Benjamin Z. Webb. 1199-1206 [doi]
- Roles in Local Communities and Global Position in Social MediaAnna Zygmunt, Jaroslaw Kozlak, Bogdan Gliwa. 1204-1211 [doi]
- Topological Fragility Versus Antifragility: Understanding the Impact of Real-Time Repairs in Networks Under Targeted AttacksAlexandru Topirceanu, Mihai Udrescu. 1215-1222 [doi]
- Model to Generate Benchmark Graphs Based on Evolution DynamicsMohammad Qasim Pasta, Faraz Zaidi. 1223-1231 [doi]
- Network Formation by Contagion Averse Agents: Modeling Bounded Rationality with Logit LearningVladimir Marbukh. 1232-1233 [doi]
- Combining Temporal Aspects of Dynamic Networks with Node2Vec for a more Efficient Dynamic Link PredictionSam De Winter, Tim Decuypere, Sandra Mitrovic, Bart Baesens, Jochen De Weerdt. 1234-1241 [doi]
- Analyzing Preferential Attachment in Peer-to-Peer BITCOIN NetworksEe Hong Aw, Ralucca Gera, Kenneth Hicks, Nicholas Koeppen, Christopher Teska. 1242-1249 [doi]
- Impact of Attributes on Group FormationAshwin Bahulkar, Boleslaw K. Szymanski, Kevin S. Chan, Omar Lizardo. 1250-1257 [doi]
- Mining Personal Media Thresholds for Opinion Dynamics and Social InfluenceCasey Doyle, Alex Meandzija, Gyorgy Korniss, Boleslaw K. Szymanski, Derrik E. Asher, Elizabeth K. Bowman. 1258-1265 [doi]
- Identifying Influential Nodes to Inhibit Bootstrap Percolation on Hyperbolic NetworksChristine Marshall, James Cruickshank, Colm O'Riordan. 1266-1273 [doi]
- On Message Exchange Motifs Emerging During Human/Bot Interactions in Multilayer Networks: The Case of Two Riot EventsEma Kusen, Mark Strembeck. 1274-1279 [doi]
- Feature-Rich Ego-Network Circles in Mobile Phone Graphs: Tie Multiplexity and the Role of AltersChristian Quadri, Matteo Zignani, Sabrina Gaito, Gian Paolo Rossi 0001. 1280-1285 [doi]
- Followee Management: Helping Users Follow the Right Users on Online Social MediaAnjali Verma, Ashima Wadhwa, Navya Singh, Shivangi Beniwal, Rishabh Kaushal, Ponnurangam Kumaraguru. 1286-1290 [doi]
- Correlating NBA Team Network Centrality Measures with Game PerformanceAdam Reed, John Piorkowski, Ian McCulloh. 1291-1294 [doi]
- SCCD: Social Capital-Driven Career Development FrameworkFaisal Ghaffar, Teodora Sandra Buda, Haytham Assem, Armita Afsharinejad, Neil Hurley. 1295-1298 [doi]