Abstract is missing.
- Advances in Social Network Analysis and Mining in the Big Data Era: Overview of the IEEE/ACM ASONAM 2021 International ConferenceMichele Coscia, Alfredo Cuzzocrea, Kai Shu. [doi]
- Efficient analytical computation of expected frequency of motifs of small size by marginalization in uncertain networkTakayasu Fushimi, Kazumi Saito, Hiroshi Motoda. 1-8 [doi]
- Modelling social capital: the structural hole connections gameFaisal Ghaffar, Neil Hurley. 9-13 [doi]
- Which kind of rumors may undermine society: perspectives from court ordersChung-Chi Chen, Hen-Hsen Huang, Hsin-Hsi Chen. 14-17 [doi]
- Assessing the quality of the datasets by identifying mislabeled samplesVaibhav Pulastya, Gaurav Nuti, Yash Kumar Atri, Tanmoy Chakraborty 0002. 18-22 [doi]
- IAN: interpretable attention network for churn prediction in LBSNsLiang-Yu Chen, Yutong Chen, Young D. Kwon, Youwen Kang, Pan Hui 0001. 23-30 [doi]
- MMCoVaR: multimodal COVID-19 vaccine focused data repository for fake news detection and a baseline architecture for classificationMingxuan Chen, Xinqiao Chu, K. P. Subbalakshmi. 31-38 [doi]
- A spatial agent-based model for preemptive evacuation decisions during typhoonRey C. Rodrigueza, Maria Regina Justina E. Estuar. 39-42 [doi]
- Fairness and diversity in the recommendation and ranking of participatory media contentMehak Preet Dhaliwal, Muskaan, Aaditeshwar Seth. 43-47 [doi]
- Distinguishability of graphs: a case for quantum-inspired measuresAthanasia Polychronopoulou, Jumanah Alshehri, Zoran Obradovic. 48-55 [doi]
- Cosine similarity for multiplex network summarizationAthanasia Polychronopoulou, Fang Zhou, Zoran Obradovic. 56-63 [doi]
- Analyzing topic attention in online small groupsJosemar Alves Caetano, Jussara M. Almeida, Marcos André Gonçalves, Wagner Meira Jr., Humberto Torres Marques-Neto, Virgílio A. F. Almeida. 64-68 [doi]
- Peeking through the homelessness system with a network science lensCharalampos Chelmis, Khandker Sadia Rahman. 69-73 [doi]
- Real-time privacy risk quantification in online social networksAnisa Halimi, Erman Ayday. 74-81 [doi]
- The voice of silence: interpreting silence in truth discovery on social mediaHang Cui, Tarek F. Abdelzaher. 82-89 [doi]
- Racism is a virus: anti-asian hate and counterspeech in social media during the COVID-19 crisisBing He, Caleb Ziems, Sandeep Soni, Naren Ramakrishnan, Diyi Yang, Srijan Kumar. 90-94 [doi]
- Forecasting topic activity with exogenous and endogenous information signals in TwitterKin Wai Ng, Sameera Horawalavithana, Adriana Iamnitchi. 95-98 [doi]
- Interpretable business survival predictionAnish K. Vallapuram, Nikhil Nanda, Young D. Kwon, Pan Hui 0001. 99-106 [doi]
- A model for optimizing article recommendation for reducing polarizationInzamam Rahaman, Patrick Hosein. 107-110 [doi]
- Limitations of link deletion for suppressing real information diffusion on social mediaShiori Furukawa, Sho Tsugawa. 111-115 [doi]
- Constant community identification in million scale networks using image thresholding algorithmsAnjan Chowdhury, Sriram Srinivasan 0001, Sanjukta Bhowmick, Animesh Mukherjee 0001, Kuntal Ghosh. 116-120 [doi]
- How disease spread dynamics evolve over timeAhmad El Shoghri, Jessica Liebig, Raja Jurdak, Salil S. Kanhere. 121-128 [doi]
- Temporal dynamics of posts and user engagement of influencers on Facebook and InstagramLuca Vassio, Michele Garetto, Carla-Fabiana Chiasserini, Emilio Leonardi. 129-133 [doi]
- Forming a team of cost-effective and well-collaborated experts in social networks based on hierarchical skill modelFa-Yuan Liu, Shiou-Chi Li, Jen-Wei Huang. 134-137 [doi]
- Community detection in feature-rich networks to meet K-meansSoroosh Shalileh, Boris G. Mirkin. 138-142 [doi]
- GAWD: graph anomaly detection in weighted directed graph databasesMeng-Chieh Lee, Hung T. Nguyen 0003, Dimitris Berberidis, Vincent S. Tseng, Leman Akoglu. 143-150 [doi]
- A deep contrastive learning approach to extremely-sparse disaster damage assessment in social sensingYang Zhang, Ruohan Zong, Lanyu Shang, Ziyi Kou, Dong Wang. 151-158 [doi]
- HGATs: hierarchical graph attention networks for multiple comments integrationHuixin Zhan, Kun Zhang, Chenyi Hu, Victor S. Sheng. 159-163 [doi]
- Vibe check: social resonance learning for enhanced recommendationYin Zhang, Yun He, James Caverlee. 164-167 [doi]
- Deep diffusion-based forecasting of COVID-19 by incorporating network-level mobility informationPadmaksha Roy, Shailik Sarkar, Subhodip Biswas, Fanglan Chen, Zhiqian Chen, Naren Ramakrishnan, Chang-Tien Lu. 168-175 [doi]
- Group-node attention for community evolution predictionMatt Revelle, Carlotta Domeniconi, Ben U. Gelman. 176-183 [doi]
- Are you influenced?: modeling the diffusion of fake news in social mediaAbishai Joy, Anu Shrestha, Francesca Spezzano. 184-188 [doi]
- HawkEye: a robust reputation system for community-based counter-misinformationRohit Mujumdar, Srijan Kumar. 188-192 [doi]
- What's kooking?: characterizing India's emerging social network, KooAsmit Kumar Singh, Chirag Jain, Jivitesh Jain, Rishi Raj Jain, Shradha Sehgal, Tanisha Pandey, Ponnurangam Kumaraguru. 193-200 [doi]
- Temporalizing static graph autoencoders to handle temporal networksMounir Haddad, Cécile Bothorel, Philippe Lenca, Dominique Bedart. 201-208 [doi]
- Pricing social visibility service in online social networks: modeling and algorithmsShiyuan Zheng, Hong Xie 0004, John C. S. Lui. 209-213 [doi]
- Fast colonization algorithm for seed selection in complex networks based on community detectionAlexandru Topîrceanu, Mihai Udrescu. 214-218 [doi]
- Multi-view hypergraph convolution network for semantic annotation in LBSNsManisha Dubey, P. K. Srijith, Maunendra Sankar Desarkar. 219-227 [doi]
- Misogynoir: public online response towards self-reported misogynoirJoseph Kwarteng, Serena Coppolino Perfumi, Tracie Farrell, Miriam Fernández. 228-235 [doi]
- BotRGCN: Twitter bot detection with relational graph convolutional networksShangbin Feng, Herun Wan, Ningnan Wang, Minnan Luo. 236-239 [doi]
- Full Bitcoin blockchain data made easyJules Azad Emery, Matthieu Latapy. 240-243 [doi]
- Community formation and detection on GitHub collaboration networksBehnaz Moradi-Jamei, Brandon L. Kramer, J. Bayoán Santiago Calderón, Gizem Korkmaz. 244-251 [doi]
- Edge-centric network analysisGiuseppe Pirrò. 252-256 [doi]
- Identifying influential nodes using overlapping modularity vitalityStephany Rajeh, Marinette Savonnet, Éric Leclercq, Hocine Cherifi. 257-264 [doi]
- Forward and backward linear threshold ranksMaria J. Blesa, Pau García-Rodríguez, Maria J. Serna. 265-269 [doi]
- LinkMan: hyperlink-driven misbehavior detection in online security forumsRisul Islam, Ben Treves, Md Omar Faruk Rokon, Michalis Faloutsos. 270-277 [doi]
- Community deception in weighted networksValeria Fionda, Giuseppe Pirrò. 278-282 [doi]
- The banking transactions dataset and its comparative analysis with scale-free networksAkrati Saxena, Yulong Pei, Jan Veldsink, Werner van Ipenburg, George Fletcher 0001, Mykola Pechenizkiy. 283-296 [doi]
- Characterizing video-based online information environment using VTrackerThomas Marcoux, Oluwaseyi Adeliyi, Nitin Agarwal. 297-300 [doi]
- Unsupervised real-time induction and interactive visualization of taxonomies over domain-specific conceptsMayank Kejriwal, Ke Shen 0003. 301-304 [doi]
- The BiasChecker: how biased are social media searches?Can Yang, Bernardo Pereira Nunes, Jonatas Castro dos Santos, Sean Wolfgand Matsui Siqueira, Xinyuan Xu. 305-308 [doi]
- Analyzing online opinions and influence campaigns on blogs using BlogTrackerAbiola Akinnubi, Nitin Agarwal, Zachary K. Stine, Sodiq Oyedotun. 309-312 [doi]
- Knowledge graph based platform of COVID-19 drugs and symptomsZhenhe Pan, Shuang Jiang, Juntao Su, Muzhe Guo, Yuanlin Zhang 0002. 313-316 [doi]
- Bayesian inference of a social graph with trace feasibility guaranteesEffrosyni Papanastasiou, Anastasios Giovanidis. 317-324 [doi]
- The centrality of edges based on their role in induced triadsLauren Hudson, Roger M. Whitaker, Stuart M. Allen, Liam D. Turner, Diane Felmlee. 325-332 [doi]
- Unfolding the dimensionality structure of social networks in ideological embeddingsPedro Ramaciotti Morales, Jean-Philippe Cointet, Gabriel Muñoz Zolotoochin. 333-338 [doi]
- Mapping the complexity of suicide by combining participatory modeling and network sciencePhilippe J. Giabbanelli, Michael C. Galgoczy, Duc M. Nguyen, Romain Foy, Ketra L. Rice, Nisha Nataraj, Margaret M. Brown, Christopher R. Harper. 339-342 [doi]
- kNN queries on complex networksSuomi Kobayashi, Shohei Matsugu, Hiroaki Shiokawa. 343-347 [doi]
- POLAR: a holistic framework for the modelling of polarization and identification of polarizing topics in news mediaDemetris Paschalides, George Pallis 0001, Marios D. Dikaiakos. 348-355 [doi]
- Will you dance to the challenge?: predicting user participation of TikTok challengesLynnette Hui Xian Ng, John Yeh Han Tan, Darryl Jing Heng Tan, Roy Ka-Wei Lee. 356-360 [doi]
- SentiStance: quantifying the intertwined changes of sentiment and stance in response to an event in online forumsJakapun Tachaiya, Arman Irani, Kevin M. Esterling, Michalis Faloutsos. 361-368 [doi]
- Constraint-embedded paraphrase generation for commercial tweetsRenhao Cui, Gagan Agrawal, Rajiv Ramnath. 369-376 [doi]
- LocationTrails: a federated approach to learning location embeddingsSaket Gurukar, Srinivasan Parthasarathy 0001, Rajiv Ramnath, Catherine A. Calder, Sobhan Moosavi. 377-384 [doi]
- Meta-reinforcement learning via buffering graph signatures for live video streaming eventsStefanos Antaris, Dimitrios Rafailidis, Sarunas Girdzijauskas. 385-392 [doi]
- Detecting spam tweets using machine learning and effective preprocessingBerk Kardas, Ismail Erdem Bayar, Tansel Özyer, Reda Alhajj. 393-398 [doi]
- SCATE: shared cross attention transformer encoders for multimodal fake news detectionTanmay Sachan, Nikhil Pinnaparaju, Manish Gupta 0001, Vasudeva Varma. 399-406 [doi]
- DiffuScope: inferring post-specific diffusion networkMd Rashidul Hasan, Dheeman Saha, Farhan Asif Chowdhury, James Degnan, Abdullah Mueen 0001. 407-415 [doi]
- Hot topic detection and evaluation of multi-relation effectsNadir Emre Zirbilek, Mustafa Erakin, Tansel Özyer, Reda Alhajj. 416-422 [doi]
- Pruning digital contact networks for meso-scale epidemic surveillance using foursquare dataSofia Hurtado, Radu Marculescu, Justin Drake, Ravi Srinivasan. 423-430 [doi]
- The stock exchange of influencers: a financial approach for studying fanbase variation trendsFabio Bertone, Luca Vassio, Martino Trevisan. 431-435 [doi]
- Towards automatic generated content website based on content classification and auto-article generationI-Hsien Ting, Chia-Sung Yen. 436-438 [doi]
- Artificial intelligence for knowledge graphs of cryptocurrency anti-money laundering in fintechMin-Yuh Day. 439-446 [doi]
- My friends also prefer diverse music: homophily and link prediction with user preferences for mainstream, novelty, and diversity in musicTomislav Duricic, Dominik Kowald, Markus Schedl, Elisabeth Lex. 447-454 [doi]
- From #jobsearch to #mask: improving COVID-19 cascade prediction with spillover effectsNinghan Chen, Xihui Chen, Zhiqiang Zhong, Jun Pang 0001. 455-462 [doi]
- A novel knowledge-based multi-population framework for studying opinion dynamics of migrated individualsSarvnaz Sadeghi, Pooya Moradian Zadeh. 463-470 [doi]
- An insight into network structure measures and number of driver nodesAbida Sadaf, Luke Mathieson, Katarzyna Musial. 471-478 [doi]
- Social influence under improved multi-objective metaheuristicsFabián Riquelme, Francisco Muñoz, Rodrigo Olivares. 479-486 [doi]
- Diagnosis prediction based on similarity of patients physiological parametersCarmela Comito, Deborah Falcone, Agostino Forestiero. 487-494 [doi]
- Predictions of drug metabolism pathways through CYP 3A4 enzyme by analysing drug-target interactions network graphM. Taleb Albrijawi, Amrou Haj Ibrahim, Reda Alhajj. 495-501 [doi]
- Combining multiple clustering and network analysis for discoveries in gene expression dataSleiman Alhajj, Aya Alhajj, Sibel Tariyan Özyer. 502-509 [doi]
- Retrospective analysis of controversial topics on COVID-19 in JapanKunihiro Miyazaki, Takayuki Uchiba, Fujio Toriumi, Kenji Tanaka, Takeshi Sakaki. 510-517 [doi]
- Predicting COVID-19 with AI techniques: current research and future directionsCarmela Comito, Clara Pizzuti. 518-524 [doi]
- Fake news and COVID-19 vaccination: a comparative studyFarzaneh Jouyandeh, Sarvnaz Sadeghi, Bahareh Rahmatikargar, Pooya Moradian Zadeh. 525-531 [doi]
- Multi-stage graph peeling algorithm for probabilistic core decompositionYang Guo, Xuekui Zhang, Fatemeh Esfahani, Venkatesh Srinivasan 0001, Alex Thomo, Li Xing. 532-539 [doi]
- Approximating 4-cliques in streaming graphs: the power of dual samplingAnmol Mann, Venkatesh Srinivasan, Alex Thomo. 540-544 [doi]
- Compressing and mining social network dataConnor C. J. Hryhoruk, Carson K. Leung. 545-552 [doi]
- An auction-based mechanism to promote cooperation in resource exchange networksHaripriya Chakraborty, Liang Zhao. 553-560 [doi]
- Enriching demand prediction with product relationship information using graph neural networksYaren Yilmaz, Sule Gündüz Ögüdücü. 561-568 [doi]
- A mathematical model for friend discovery from dynamic social graphsCarson K. Leung, Sehaj Pal Singh. 569-576 [doi]
- Which acts model happiness?: an exploratory analysis on Twitter and GoodreadsMayank Bhasin, Harshit, Pawan Goyal 0002. 577-584 [doi]
- Deterministic influence maximization approach for sequential active marketingDmitri Goldenberg, Eyal Tzvi Tenzer. 585-590 [doi]
- Analyzing behavioral changes of Twitter users after exposure to misinformationYichen Wang, Richard Han, Tamara Lehman, Qin Lv, Shivakant Mishra. 591-598 [doi]
- Detecting cyber security related Twitter accounts and different sub-groups: a multi-classifier approachMohamad Imad Mahaini, Shujun Li. 599-606 [doi]
- Examining factors associated with Twitter account suspension following the 2020 U.S. presidential electionFarhan Asif Chowdhury, Dheeman Saha, Md Rashidul Hasan, Koustuv Saha, Abdullah Mueen 0001. 607-612 [doi]
- Conversations around organizational risk and insider threatLuke J. Osterritter, Kathleen M. Carley. 613-621 [doi]
- Automation of active reconnaissance phase: an automated API-based port and vulnerability scannerMalek Malkawi, Tansel Özyer, Reda Alhajj. 622-629 [doi]
- Using smart glasses for monitoring cyber threat intelligence feedsMikko Korkiakoski, Fatima Sadiq, Febrian Setianto, Ummi Khaira Latif, Paula Alavesa, Panos Kostakos. 630-634 [doi]
- Similarity ranking using handcrafted stylometric traits in a swedish contextJohan Fernquist, Björn Pelzer, Lukas Lundmark, Lisa Kaati, Fredrik Johansson. 635-642 [doi]
- Truth and travesty intertwined: a case study of #SSR counterpublic campaignKumari Neha, Tushar Mohan, Arun Balaji Buduru, Ponnurangam Kumaraguru. 643-648 [doi]
- GPT-2C: a parser for honeypot logs using large pre-trained language modelsFebrian Setianto, Erion Tsani, Fatima Sadiq, Georgios Domalis, Dimitris Tsakalidis, Panos Kostakos. 649-653 [doi]
- CARE: learning convolutional attentional recurrent embedding for sequential recommendationYu-Che Tsai, Cheng-Te Li. 654-660 [doi]