Abstract is missing.
- Discovering communities of community discoveryMichele Coscia. 1-8 [doi]
- A fast and efficient incremental approach toward dynamic community detectionNeda Zarayeneh, Ananth Kalyanaraman. 9-16 [doi]
- Effects of ego networks and communities on self-disclosure in an online social networkYoung D. Kwon, Reza Hadi Mogavi, Ehsan ul Haq, Youngjin Kwon, Xiaojuan Ma, Pan Hui. 17-24 [doi]
- You have been CAUTE!: early detection of compromised accounts on social mediaCourtland VanDam, Farzan Masrour, Pang-Ning Tan, Tyler Wilson. 25-32 [doi]
- 5 sources of clickbaits you should know!: using synthetic clickbaits to improve prediction and distinguish between bot-generated and human-written headlinesThai Le, Kai Shu, Maria D. Molina, Dongwon Lee 0001, S. Shyam Sundar, Huan Liu 0001. 33-40 [doi]
- SAME: sentiment-aware multi-modal embedding for detecting fake newsLimeng Cui, Suhang Wang, Dongwon Lee 0001. 41-48 [doi]
- Multi-level network embedding with boosted low-rank matrix approximationJundong Li, Liang Wu 0006, Ruocheng Guo, Chenghao Liu, Huan Liu 0001. 49-56 [doi]
- Predictive temporal embedding of dynamic graphsAynaz Taheri, Tanya Y. Berger-Wolf. 57-64 [doi]
- GEMSEC: graph embedding with self clusteringBenedek Rozemberczki, Ryan Davies, Rik Sarkar, Charles A. Sutton. 65-72 [doi]
- Perturb and combine to identify influential spreaders in real-world networksAntoine J.-P. Tixier, Maria-Evgenia G. Rossi, Fragkiskos D. Malliaros, Jesse Read, Michalis Vazirgiannis. 73-80 [doi]
- Becoming gatekeepers together with allies: collaborative brokerage over social networksYang Chen, Jiamou Liu. 81-88 [doi]
- Diversifying seeds and audience in social influence maximizationYu Zhang. 89-94 [doi]
- Seed investment bounds for viral marketing under generalized diffusionArash Ghayoori, Rakesh Nagi. 95-100 [doi]
- How do influencers mention brands in social media?: sponsorship prediction of Instagram postsXiao Yang, Seungbae Kim, Yizhou Sun. 101-104 [doi]
- Neural language model based training data augmentation for weakly supervised early rumor detectionSooji Han, Jie Gao, Fabio Ciravegna. 105-112 [doi]
- Rumor detection in social networks via deep contextual modelingAmir Pouran Ben Veyseh, My T. Thai, Thien Huu Nguyen, Dejing Dou. 113-120 [doi]
- Fraudulent user detection on rating networks based on expanded balance theory and GCNsWataru Kudo, Mao Nishiguchi, Fujio Toriumi. 121-126 [doi]
- Multitask learning for blackmarket tweet detectionUdit Arora, William Scott Paka, Tanmoy Chakraborty 0002. 127-130 [doi]
- RumorSleuth: joint detection of rumor veracity and user stanceMohammad Raihanul Islam, Sathappan Muthiah, Naren Ramakrishnan. 131-136 [doi]
- Meta-GNN: metagraph neural network for semi-supervised learning in attributed heterogeneous information networksAravind Sankar, Xinyang Zhang, Kevin Chen-Chuan Chang. 137-144 [doi]
- Hierarchical multi-armed bandits for discovering hidden populationsSuhansanu Kumar, Heting Gao, Changyu Wang, Kevin Chen-Chuan Chang, Hari Sundaram. 145-153 [doi]
- RiskCast: social sensing based traffic risk forecasting via inductive multi-view learningYang Zhang, Hongxiao Wang, Daniel Yue Zhang, Yiwen Lu, Dong Wang 0002. 154-157 [doi]
- What to track on the Twitter streaming API?: a knapsack bandits approach to dynamically update the search termsSumeet Kumar, Kathleen M. Carley. 158-163 [doi]
- Tweets can tell: activity recognition using hybrid long short-term memory modelRenhao Cui, Gagan Agrawal, Rajiv Ramnath. 164-167 [doi]
- 2, 1 norm regularized nonnegative matrix tri-factorizationYulong Pei, George H. L. Fletcher, Mykola Pechenizkiy. 168-175 [doi]
- HAR-search: a method to discover hidden affinity relationships in online communitiesJean Marie Tshimula, Belkacem Chikhaoui, Shengrui Wang. 176-183 [doi]
- Dynamic consensus community detection and combinatorial multi-armed banditDomenico Mandaglio, Andrea Tagarelli. 184-187 [doi]
- Surveying public opinion using label prediction on social media dataMarija Stanojevic, Jumanah Alshehri, Zoran Obradovic. 188-195 [doi]
- Feature driven learning framework for cybersecurity event detectionTaoran Ji, Xuchao Zhang, Nathan Self, Kaiqun Fu, Chang-Tien Lu, Naren Ramakrishnan. 196-203 [doi]
- Collecting representative social media samples from a search engine by adaptive query generationVirgile Landeiro, Aron Culotta. 204-207 [doi]
- MGCN: semi-supervised classification in multi-layer graphs with graph convolutional networksMahsa Ghorbani, Mahdieh Soleymani Baghshah, Hamid R. Rabiee. 208-211 [doi]
- Neural-brane: an inductive approach for attributed network embeddingVachik S. Dave, Baichuan Zhang, Pin-Yu Chen, Mohammad Al Hasan. 212-215 [doi]
- gl2vec: learning feature representation using graphlets for directed networksKun Tu, Jian Li 0030, Don Towsley, Dave Braines, Liam D. Turner. 216-221 [doi]
- When to remember where you came from: node representation learning in higher-order networksCaleb Belth, Fahad Kamran, Donna Tjandra, Danai Koutra. 222-225 [doi]
- Impact of social influence on adoption behavior: an online controlled experimental evaluationSoumajyoti Sarkar, Ashkan Aleali, Paulo Shakarian, Mika Armenta, Danielle Sanchez, Kiran Lakkaraju. 226-233 [doi]
- Characterizing knowledge-transfer relationships in dynamic attributed networksThiago H. P. Silva, Alberto H. F. Laender, Pedro O. S. Vaz de Melo. 234-241 [doi]
- Epidemic threshold and lifetime distribution for information diffusion on simultaneously growing networksEmily M. Fischer, Souvik Ghosh, Gennady Samorodnitsky. 242-249 [doi]
- Competitive opinion maximization in social networksJianjun Luo, Xinyue Liu, Xiangnan Kong. 250-257 [doi]
- A postmortem of suspended Twitter accounts in the 2016 U.S. presidential electionHuyen T. Le, G. R. Boynton, Zubair Shafiq, Padmini Srinivasan. 258-265 [doi]
- Multi-factor congressional vote predictionHamid Karimi, Tyler Derr, Aaron Brookhouse, Jiliang Tang. 266-273 [doi]
- IdeoTrace: a framework for ideology tracing with a case study on the 2016 U.S. presidential electionIndu Manickam, Andrew S. Lan, Gautam Dasarathy, Richard G. Baraniuk. 274-281 [doi]
- A novel methodology for improving election poll prediction using time-aware pollingAlexandru Topîrceanu, Radu-Emil Precup. 282-285 [doi]
- The impact of projection and backboning on network topologiesMichele Coscia, Luca Rossi 0003. 286-293 [doi]
- Measuring the sampling robustness of complex networksKatchaguy Areekijseree, Sucheta Soundarajan. 294-301 [doi]
- Social network of extreme tweeters: a case studyXiuwen Zheng, Amarnath Gupta. 302-306 [doi]
- Quantifying triadic closure in multi-edge social networksLaurence Brandenberger, Giona Casiraghi, Vahan Nanumyan, Frank Schweitzer. 307-310 [doi]
- On the causal relation between users' real-world activities and their affective processesSeyed Amin Mirlohi Falavarjani, Ebrahim Bagheri, Ssu Yu Zoe Chou, Jelena Jovanovic, Ali A. Ghorbani. 311-314 [doi]
- Phrase-guided attention web article recommendation for next clicks and viewsChia-Wei Chen, Sheng-Chuan Chou, Chang-You Tai, Lun-Wei Ku. 315-324 [doi]
- Knowledge embedding towards the recommendation with sparse user-item interactionsDeqing Yang, Ziyi Wang, Junyang Jiang, Yanghua Xiao. 325-332 [doi]
- Through the eyes of a poet: classical poetry recommendation with visual input on social mediaDaniel Yue Zhang, Bo Ni, Qiyu Zhi, Thomas Plummer, Qi Li, Hao Zheng, Qingkai Zeng, Yang Zhang, Dong Wang 0002. 333-340 [doi]
- Network perspective on the efficiency of peace accords implementationHenry K. Dambanemuya, Madhav Joshi, Emoke-Ágnes Horvát. 341-348 [doi]
- Promoting social conventions across polarized networks: an empirical studySreeja Nair, Adriana Iamnitchi, John Skvoretz. 349-352 [doi]
- Low-supervision urgency detection and transfer in short crisis messagesMayank Kejriwal, Peilin Zhou. 353-356 [doi]
- Mechanistic and data-driven agent-based models to explain human behavior in online networked group anagram gamesVanessa Cedeno-Mieles, Zhihao Hu, Xinwei Deng, Yihui Ren, Abhijin Adiga, Christopher L. Barrett, Saliya Ekanayake, Gizem Korkmaz, Chris J. Kuhlman, Dustin Machi, Madhav V. Marathe, S. S. Ravi, Brian J. Goode, Naren Ramakrishnan, Parang Saraf, Nathan Self, Noshir Contractor, Joshua M. Epstein, Michael W. Macy. 357-364 [doi]
- A large-scale empirical study of geotagging behavior on TwitterBinxuan Huang, Kathleen M. Carley. 365-373 [doi]
- Modeling human annotation errors to design bias-aware systems for social stream processingRahul Pandey, Carlos Castillo 0001, Hemant Purohit. 374-377 [doi]
- Efficient closeness centrality computation in time-evolving graphsPeng Ni, Masatoshi Hanai, Wen Jun Tan, Wentong Cai. 378-385 [doi]
- Pairwise link predictionHuda Nassar, Austin R. Benson, David F. Gleich. 386-393 [doi]
- On computing distances and latencies in link streamsFrédéric Simard. 394-397 [doi]
- Random preferential attachment hypergraphChen Avin, Zvi Lotker, Yinon Nahum, David Peleg. 398-405 [doi]
- The evolution of rolesJulian Müller, Ulrik Brandes. 406-413 [doi]
- Modeling the dynamics of resource exchange networksHaripriya Chakraborty, Liang Zhao. 414-419 [doi]
- Do we read what we share?: analyzing the click dynamic of news articles shared on TwitterJesper Holmström, Daniel Jonsson, Filip Polbratt, Olav Nilsson, Linnea Lundström, Sebastian Ragnarsson, Anton Forsberg, Karl Andersson, Niklas Carlsson. 420-425 [doi]
- Analyzing and modeling user curiosity in online content consumption: a LastFM case studyAlexandre M. Sousa, Jussara M. Almeida, Flavio Figueiredo. 426-431 [doi]
- Evaluating vulnerability to fake news in social networks: a community health assessment modelBhavtosh Rath, Wei Gao 0001, Jaideep Srivastava. 432-435 [doi]
- The role of user profiles for fake news detectionKai Shu, Xinyi Zhou, Suhang Wang, Reza Zafarani, Huan Liu. 436-439 [doi]
- The intrinsic scale of networks is smallMalik Magdon-Ismail, Kshiteesh Hegde. 440-447 [doi]
- OPTANE: an OPtimal transport algorithm for NEtwork alignmentFarzan Masrour, Pang-Ning Tan, Abdol-Hossein Esfahanian. 448-451 [doi]
- Generalized random Surfer-Pair modelsSai Kiran Narayanaswami, Balaraman Ravindran, Venkatesh Ramaiyan. 452-455 [doi]
- Infinite motif stochastic blockmodel for role discovery in networksYulong Pei, Jianpeng Zhang, George H. L. Fletcher, Mykola Pechenizkiy. 456-459 [doi]
- Strengthening social networks analysis by networks fusionFeiyu Long, Nianwen Ning, Chenguang Song, Bin Wu. 460-463 [doi]
- Bringing the kid back into YouTube kids: detecting inappropriate content on video streaming platformsRashid Tahir, Faizan Ahmed, Hammas Saeed, Shiza Ali, Fareed Zaffar, Christo Wilson. 464-469 [doi]
- Dynamics of team library adoptions: an exploration of GitHub commit logsPamela Bilo Thomas, Rachel Krohn, Tim Weninger. 470-473 [doi]
- How to encourage people to build diverse business networks?Lea Baumann, Sonja Utz. 474-479 [doi]
- Monitoring individuals in drug trafficking organizations: a social network analysisKaustav Basu, Arunabha Sen. 480-483 [doi]
- Thousands of small, constant rallies: a large-scale analysis of partisan WhatsApp groupsVictor S. Bursztyn, Larry Birnbaum. 484-488 [doi]
- Measurement and analysis of an adult video streaming serviceYo-Der Song, Mingwei Gong, Aniket Mahanti. 489-492 [doi]
- Reconstructing and analyzing the transnational human trafficking networkMitchell Goist, Ted Hsuan Yun Chen, Christopher Boylan. 493-500 [doi]
- How the tables have turned: studying the new wave of social bots on Twitter using complex network analysis techniquesPujan Paudel, Trung T. Nguyen, Amartya Hatua, Andrew H. Sung. 501-508 [doi]
- Debiasing community detection: the importance of lowly connected nodesNinareh Mehrabi, Fred Morstatter, Nanyun Peng, Aram Galstyan. 509-512 [doi]
- The meaning of dissimilar: an evaluation of various similarity quantification approaches used to evaluate community detection solutionsObaida Hanteer, Luca Rossi 0003. 513-518 [doi]
- Basketball lineup performance prediction using network analysisMahboubeh Ahmadalinezhad, Masoud Makrehchi, Neil Seward. 519-524 [doi]
- Next cashtag prediction on social trading platforms with auxiliary tasksChung-Chi Chen, Hen-Hsen Huang, Hsin-Hsi Chen. 525-527 [doi]
- Quantification under class-conditional dataset shiftDavid Spence, Christopher Inskip, Novi Quadrianto, David Weir. 528-529 [doi]
- Online feature selection for multi-label classification in multi-objective optimization frameworkDipanjyoti Paul, Rahul Kumar, Sriparna Saha 0001, Jimson Mathew. 530-531 [doi]
- Computing node clustering coefficients securelyKatchaguy Areekijseree, Yuzhe Tang, Sucheta Soundarajan. 532-533 [doi]
- K-partite networksLiang Feng, Qianchuan Zhao, Cangqi Zhou. 534-535 [doi]
- News labeling as early as possible: real or fake?Maryam Ramezani, Mina Rafiei, Soroush Omranpour, Hamid R. Rabiee. 536-537 [doi]
- CAB-NC: the correspondence analysis based network clustering methodMasaomi Kimura. 538-539 [doi]
- High-resolution home location prediction from tweets using deep learning with dynamic structureMeysam Ghaffari, Ashok Srinivasan, Xiuwen Liu. 540-542 [doi]
- TF-MF: improving multiview representation for Twitter user geolocation predictionParham Hamouni, Taraneh Khazaei, Ehsan Amjadian. 543-545 [doi]
- Identifying infrastructure damage during earthquake using deep active learningShalini Priya, Saharsh Singh, Sourav Kumar Dandapat, Kripabandhu Ghosh, Joydeep Chandra. 551-552 [doi]
- Exploring the context of course rankings on online academic forumsTaha Hassan, Bob Edmison, Larry Cox II, Matthew Louvet, Daron Williams. 553-556 [doi]
- Fairness across network positions in cyberbullying detection algorithmsVivek K. Singh, Connor Hofenbitzer. 557-559 [doi]
- Opioid relapse prediction with GANZhou Yang, Long H. Nguyen, Fang Jin. 560-567 [doi]
- Semi-supervised learning and graph neural networks for fake news detectionAdrien Benamira, Benjamin Devillers, Etienne Lesot, Ayush K. Ray, Manal Saadi, Fragkiskos D. Malliaros. 568-569 [doi]
- Transformation in architecture and spatial organization at Javanese houseDany Perwita Sari, Yun-Shang Chiou. 570-577 [doi]
- Two decades of network science: as seen through the co-authorship network of network scientistsRoland Molontay, Marcell Nagy. 578-583 [doi]
- On the structural properties of social networks and their measurement-calibrated synthetic counterpartsMarcell Nagy, Roland Molontay. 584-588 [doi]
- Assigning users to domains of interest based on content and network similarity with champion instancesMattia Gasparini, Giorgia Ramponi, Marco Brambilla 0001, Stefano Ceri. 589-592 [doi]
- Can social influence be exploited to compromise security: an online experimental evaluationSoumajyoti Sarkar, Paulo Shakarian, Mika Armenta, Danielle Sanchez, Kiran Lakkaraju. 593-596 [doi]
- Content-based echo chamber detection on social media platformsFernando H. Calderon, Li-Kai Cheng, Ming-Jen Lin, Yen-Hao Huang, Yi-Shin Chen. 597-600 [doi]
- Concept drift in bias and sensationalism detection: an experimental studyShuo Zhang, Mayank Kejriwal. 601-604 [doi]
- Optimal influence strategies in an oligopolistic competition network environmentDionisios N. Sotiropoulos, Ifigeneia Georgoula, Christos Bilanakos. 605-612 [doi]
- Algorithm and application for signed graphletsApratim Das, Alex Aravind, Mark Dale. 613-620 [doi]
- Next-generation high-resolution vector-borne disease risk assessmentMeysam Ghaffari, Ashok Srinivasan, Anuj Mubayi, Xiuwen Liu, Krishnan Viswanathan. 621-624 [doi]
- Examining untempered social media: analyzing cascades of polarized conversationsArunkumar Bagavathi, Pedram Bashiri, Shannon Reid, Matthew Phillips, Siddharth Krishnan. 625-632 [doi]
- Water governance network analysis using graphlet miningApratim Das, Mike Drakos, Alex Aravind, Darwin Horning. 633-640 [doi]
- Risk assessment of pharmacies & electronic prescriptionsMichelle Bowman, Subrata Acharya. 641-644 [doi]
- FastestER: a web application to enable effective emergency department serviceMaria Camila Rivera Serna, Subrata Acharya. 645-648 [doi]
- Understanding the silence of sexual harassment victims through the #WhyIDidntReport movementAbigail Garrett, Naeemul Hassan. 649-652 [doi]
- Can women break the glass ceiling?: an analysis of #MeToo hashtagged posts on TwitterNaeemul Hassan, Manash Kumar Mandal, Mansurul Bhuiyan, Aparna Moitra, Syed Ishtiaque Ahmed. 653-656 [doi]
- Neural embedding features for point-of-interest recommendationAlireza Pourali, Fattane Zarrinkalam, Ebrahim Bagheri. 657-662 [doi]
- A syntax-based learning approach to geo-locating abnormal traffic events using social sensingYang Zhang, Xiangyu Dong, Daniel Zhang, Dong Wang. 663-670 [doi]
- Uncovering download fraud activities in mobile app marketsYingtong Dou, Weijian Li, Zhirong Liu, Zhenhua Dong, Jiebo Luo, Philip S. Yu. 671-678 [doi]
- Beauty lies in the face of the beholder: a Bi-channel CNN architecture for attractiveness modeling in matrimonyAnkit Kumar Saw, Nitendra Rajput. 679-682 [doi]
- Characterizing and detecting livestreaming chatbotsShreya Jain, Dipankar Niranjan, Hemank Lamba, Neil Shah, Ponnurangam Kumaraguru. 683-690 [doi]
- A multi-channel cybersecurity news and threat intelligent engine - SecBuzzerShin-Ying Huang, Yen-Wen Huang, Ching-Hao Mao. 691-695 [doi]
- Examining MOOC superposter behavior using social network analysisMandira Hegde, Ian McCulloh, John Piorkowski. 696-700 [doi]
- Blog data analytics using blogtrackersAdewale Obadimu, Muhammad Nihal Hussain, Nitin Agarwal. 701-704 [doi]
- SAVIZ: interactive exploration and visualization of situation labeling classifiers over crisis social media dataMayank Kejriwal, Peilin Zhou. 705-708 [doi]
- Understanding information operations using YouTubeTrackerThomas Marcoux, Nitin Agarwal, Adewale Obadimu, Muhammad Nihal Hussain. 709-712 [doi]
- Building a task blacklist for online social platformsTrang Ha, Quyen Hoang, Kyumin Lee. 713-716 [doi]
- Theory and use case of game-theoretic lexical link analysisYing Zhao, Charles C. Zhou, Sihui Huang. 717-720 [doi]
- Network-aware multi-agent simulations of herder-farmer conflictsHenry K. Dambanemuya, Emoke-Ágnes Horvát. 721-722 [doi]
- Estimating distributed representation performance in disaster-related social media classificationPallavi Jain, Robert Ross, Bianca Schoen-Phelan. 723-727 [doi]
- A non-negative matrix factorization approach to update communities in temporal networks using node featuresRenny Márquez, Richard Weber, André C. P. L. F. de Carvalho. 728-732 [doi]
- The curse of self-presentation: looking for career patterns in online CVsJohanna M. Werz, Valerie Varney, Ingrid Isenhardt. 733-736 [doi]
- News credibility scroing: suggestion of research methodology to determine the reliability of news distributed in SNSKi Young Shin, Woosang Song, Jinhee Kim, Jong-Hyeok Lee. 737-740 [doi]
- Flexible compression of big dataCarson K. Leung, Fan Jiang, Yibin Zhang. 741-748 [doi]
- Multivariate motif detection in local weather big dataKonstantinos F. Xylogiannopoulos, Panagiotis Karampelas, Reda Alhajj. 749-756 [doi]
- A hierarchical insurance recommendation framework using GraphOLAM approachSirui Sun, Bin Wu, Zixing Zhang 0002, Nianwen Ning, Bai Wang. 757-764 [doi]
- Text generation with diversified source literature reviewAhmet Anil Müngen, Emre Dogan, Mehmet Kaya. 765-770 [doi]
- Multi-stage clustering with complementary structural analysis of 2-mode networksEmanuela Todeva, David Knoke, Donka Keskinova. 771-778 [doi]
- Estimating tie strength in follower networks to measure brand perceptionsTung Nguyen, Li Zhang, Aron Culotta. 779-786 [doi]
- Placement matters in making good decisions sooner: the influence of topology in reaching public utility thresholdsSheung Yat Law, Dharshana Kasthurirathna, Mahendra Piraveenan. 787-795 [doi]
- Dormant bots in social media: Twitter and the 2018 U.S. senate electionRichard Takacs, Ian McCulloh. 796-800 [doi]
- Exhaustive exact string matching: the analysis of the full human genomeKonstantinos F. Xylogiannopoulos. 801-808 [doi]
- Reducing features to improve link prediction performance in location based social networks, non-monotonically selected subset from feature clustersAhmet Engin Bayrak, Faruk Polat. 809-815 [doi]
- Show me your friends, and i will tell you whom you vote for: predicting voting behavior in social networksLihi Idan, Joan Feigenbaum. 816-824 [doi]
- Clustering based personality prediction on turkish tweetsEsen Tutaysalgir, Pinar Karagoz, Ismail H. Toroslu. 825-828 [doi]
- Social media as a main source of customer feedback: alternative to customer satisfaction surveysSharon Grubner Hasson, John Piorkowski, Ian McCulloh. 829-832 [doi]
- On churn and social contagionZoheb Borbora, Arpita Chandra, Ponnurangam Kumaraguru, Jaideep Srivastava. 833-841 [doi]
- Levels of hate in online environmentsTor Berglind, Björn Pelzer, Lisa Kaati. 842-847 [doi]
- Online misinformation: from the deceiver to the victimAnu Shrestha, Francesca Spezzano. 847-850 [doi]
- Computational method for identifying the boundaries of crime with street profile and discrete calculusJustin Song, Valerie Spicer, Andrew J. Park, Herbert H. Tsang, Patricia L. Brantingham. 851-854 [doi]
- Reasoning about sequential cyberattacksVivin Paliath, Paulo Shakarian. 855-862 [doi]
- An empirical study of security culture in open source software communitiesShao-Fang Wen, Mazaher Kianpour, Stewart Kowalski. 863-870 [doi]
- A novel approach for detection and ranking of trendy and emerging cyber threat events in Twitter streamsAvishek Bose, Vahid Behzadan, Carlos Aguirre, William H. Hsu. 871-878 [doi]
- RelExt: relation extraction using deep learning approaches for cybersecurity knowledge graph improvementAditya Pingle, Aritran Piplai, Sudip Mittal, Anupam Joshi, James Holt, Richard Zak. 879-886 [doi]
- Text mining for malware classification using multivariate all repeated patterns detectionKonstantinos F. Xylogiannopoulos, Panagiotis Karampelas, Reda Alhajj. 887-894 [doi]
- A hybrid KRR-ML approach to predict malicious email campaignsMohammed Almukaynizi, Malay Shah, Paulo Shakarian. 895-898 [doi]
- Evaluation of extremist cohesion in a darknet forum using ERGM and LDAMohammed Rashed, John Piorkowski, Ian McCulloh. 899-902 [doi]
- Identifying Android malware using network-based approachesEmily Alfs, Doina Caragea, Dewan Chaulagain, Sankardas Roy, Nathan Albin, Pietro Poggi-Corradini. 903-906 [doi]
- A comparative study to deep learning for pattern recognition, by using online and batch learning; taking cybersecurity as a caseChoukri Djellali, Mehdi Adda, Mohamed Tarik Moutacalli. 907-912 [doi]
- DeepGx: deep learning using gene expression for cancer classificationJoseph M. de Guia, Madhavi Devaraj, Carson K. Leung. 913-920 [doi]
- Daily life patients sentiment analysis model based on well-encoded embedding vocabulary for related-medication textHanane Grisstte, ELhabib Nfaoui. 921-928 [doi]
- A model based on random walk with restart to predict circRNA-disease associations on heterogeneous networkHüseyin Vural, Mehmet Kaya, Reda Alhajj. 929-932 [doi]
- A clinical decision support framework for automatic disease diagnosesCarmela Comito, Agostino Forestiero, Giuseppe Papuzzo. 933-936 [doi]
- Analyzing use of Twitter by diabetes online communityKrunal Dhiraj Patel, Andrew Heppner, Gautam Srivastava, Vijay Mago. 937-944 [doi]
- Detecting depressed users in online forumsAnu Shrestha, Francesca Spezzano. 945-951 [doi]
- Predicting public opinion on drug legalization: social media analysis and consumption trendsFarahnaz Golrooy Motlagh, Saeedeh Shekarpour, Amit P. Sheth, Krishnaprasad Thirunarayan, Michael L. Raymer. 952-961 [doi]
- Evaluating architectural changes to alter pathogen dynamics in a dialysis unit: for the CDC MInD-healthcare groupHankyu Jang, Samuel Justice, Philip M. Polgreen, Alberto M. Segre, Daniel K. Sewell, Sriram V. Pemmaraju. 961-968 [doi]
- Detection of topical influence in social networks via granger-causal inference: a Twitter case studyJan Hauffa, Wolfgang Bräu, Georg Groh. 969-977 [doi]
- Competitive influence maximisation using voting dynamicsSukankana Chakraborty, Sebastian Stein 0001, Markus Brede, Ananthram Swami, Geeth de Mel, Valerio Restocchi. 978-985 [doi]
- Adversarial perturbations to manipulate the perception of power and influence in networksMihai Valentin Avram, Shubhanshu Mishra, Nikolaus Nova Parulian, Jana Diesner. 986-994 [doi]
- Increasing the diffusional characteristics of networks through optimal topology changes within sub-graphsPatryk Pazura, Jaroslaw Jankowski, Kamil Bortko, Piotr Bartkow. 994-1000 [doi]
- Deep learning for automated sentiment analysis of social mediaLi-Chen Cheng, Song-Lin Tsai. 1001-1004 [doi]
- Extraction of user demands based on similar tweets graphTakayasu Fushimi, Kennichi Kanno. 1005-1012 [doi]
- Integrating neural and syntactic features on the helpfulness analysis of the online customer reviewsShih-Hung Wu, Jun-Wei Wang 0003. 1013-1017 [doi]
- Fast incremental computation of harmonic closeness centrality in directed weighted networksK. (Lynn) Putman, Hanjo D. Boekhout, Frank W. Takes. 1018-1025 [doi]
- Artificial intelligence for ETF market prediction and portfolio optimizationMin-Yuh Day, Jian-Ting Lin. 1026-1033 [doi]
- Vertex-weighted measures for link prediction in hashtag graphsLogan Praznik, Gautam Srivastava, Chetan Mendhe, Vijay Mago. 1034-1041 [doi]
- Semantic role labeling for opinion target extraction from chinese social networkGui-Ru Li, Chia-Hui Chang. 1042-1047 [doi]
- Understanding online civic engagement: a multi-neighborhood study of SeeClickFixChristopher Yong, Charalampos Chelmis, Wonhyung Lee, Daphney-Stavroula Zois. 1048-1055 [doi]
- Web and society: a first look into the network of human service providersCharalampos Chelmis, Mengfan Yao, Wonhyung Lee. 1056-1063 [doi]
- Topic enhanced word embedding for toxic content detection in Q&A sitesDo Yeon Kim, Xiaohang Li, Sheng Wang, Yunying Zhuo, Roy Ka-Wei Lee. 1064-1071 [doi]
- Finding your social space: empirical study of social exploration in multiplayer online gamesArpita Chandra, Zoheb Borbora, Ponnurangam Kumaraguru, Jaideep Srivastava. 1072-1080 [doi]
- Location, location, location!: quantifying the true impact of location on business reviews using a Yelp datasetAbu Saleh Md Tayeen, Abderrahmen Mtibaa, Satyajayant Misra. 1081-1088 [doi]
- A comparison of methods for link sign prediction with signed network embeddingsSandra Mitrovic, Laurent Lecoutere, Jochen De Weerdt. 1089-1096 [doi]
- iTrustSO: an intelligent system for automatic detection of insecure code snippets in stack overflowLingwei Chen, Shifu Hou, Yanfang Ye, Thirimachos Bourlai, Shouhuai Xu, Liang Zhao 0002. 1097-1104 [doi]
- The role of social media surveillance in search and rescue missionsDimitrios Lappas, Panagiotis Karampelas, George Fessakis. 1105-1111 [doi]
- The impact of social network structure on the growth and survival of online communitiesSho Tsugawa, Sumaru Niida. 1112-1119 [doi]
- Deep learning based estimation of facial attributes on challenging mobile phone face datasetsJacob Rose, Thirimachos Bourlai. 1120-1127 [doi]
- Data-driven country safety monitoring terrorist attack predictionDimitris Spiliotopoulos, Costas Vassilakis, Dionisis Margaris. 1128-1135 [doi]
- On augmented identifying codes for monitoring drug trafficking organizationsKaustav Basu, Arunabha Sen. 1136-1139 [doi]
- On designing MWIR and visible band based DeepFace detection modelsSuha Reddy Mokalla, Thirimachos Bourlai. 1140-1147 [doi]
- Deep personalized re-targetingMeisam Hejazinia, Pavlos Mitsoulis-Ntompos, Serena Zhang. 1148-1154 [doi]
- Customer recommendation based on profile matching and customized campaigns in on-line social networksMariella Bonomo, Gaspare Ciaccio, Andrea De Salve, Simona E. Rombo. 1155-1159 [doi]
- Social relations versus near neighbours: reliable recommenders in limited information social network collaborative filtering for online advertisingDionisis Margaris, Dimitris Spiliotopoulos, Costas Vassilakis. 1160-1167 [doi]
- Travel routes recommendations via online social networksCarmela Comito. 1168-1173 [doi]
- A system to enforce user's preference in OSN advertisingGianluca Lax, Antonia Russo. 1174-1178 [doi]