default search action
11th ASONAM 2019: Vancouver, BC, Canada
- Francesca Spezzano, Wei Chen, Xiaokui Xiao:
ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, Vancouver, British Columbia, Canada, 27-30 August, 2019. ACM 2019, ISBN 978-1-4503-6868-1
Communities I
- Michele Coscia:
Discovering communities of community discovery. 1-8 - Neda Zarayeneh, Ananth Kalyanaraman:
A fast and efficient incremental approach toward dynamic community detection. 9-16 - Young D. Kwon, Reza Hadi Mogavi, Ehsan ul Haq, Youngjin Kwon, Xiaojuan Ma, Pan Hui:
Effects of ego networks and communities on self-disclosure in an online social network. 17-24
Misbehavior & misinformation I
- Courtland VanDam, Farzan Masrour, Pang-Ning Tan, Tyler Wilson:
You have been CAUTE!: early detection of compromised accounts on social media. 25-32 - Thai Le, Kai Shu, Maria D. Molina, Dongwon Lee, S. Shyam Sundar, Huan Liu:
5 sources of clickbaits you should know!: using synthetic clickbaits to improve prediction and distinguish between bot-generated and human-written headlines. 33-40 - Limeng Cui, Suhang Wang, Dongwon Lee:
SAME: sentiment-aware multi-modal embedding for detecting fake news. 41-48
Network embedding
- Jundong Li, Liang Wu, Ruocheng Guo, Chenghao Liu, Huan Liu:
Multi-level network embedding with boosted low-rank matrix approximation. 49-56 - Aynaz Taheri, Tanya Y. Berger-Wolf:
Predictive temporal embedding of dynamic graphs. 57-64 - Benedek Rozemberczki, Ryan Davies, Rik Sarkar, Charles Sutton:
GEMSEC: graph embedding with self clustering. 65-72
Information & influence diffusion I
- Antoine J.-P. Tixier, Maria-Evgenia G. Rossi, Fragkiskos D. Malliaros, Jesse Read, Michalis Vazirgiannis:
Perturb and combine to identify influential spreaders in real-world networks. 73-80 - Yang Chen, Jiamou Liu:
Becoming gatekeepers together with allies: collaborative brokerage over social networks. 81-88 - Yu Zhang:
Diversifying seeds and audience in social influence maximization. 89-94 - Arash Ghayoori, Rakesh Nagi:
Seed investment bounds for viral marketing under generalized diffusion. 95-100 - Xiao Yang, Seungbae Kim, Yizhou Sun:
How do influencers mention brands in social media?: sponsorship prediction of Instagram posts. 101-104
Misbehavior & misinformation II
- Sooji Han, Jie Gao, Fabio Ciravegna:
Neural language model based training data augmentation for weakly supervised early rumor detection. 105-112 - Amir Pouran Ben Veyseh, My T. Thai, Thien Huu Nguyen, Dejing Dou:
Rumor detection in social networks via deep contextual modeling. 113-120 - Wataru Kudo, Mao Nishiguchi, Fujio Toriumi:
Fraudulent user detection on rating networks based on expanded balance theory and GCNs. 121-126 - Udit Arora, William Scott Paka, Tanmoy Chakraborty:
Multitask learning for blackmarket tweet detection. 127-130 - Mohammad Raihanul Islam, Sathappan Muthiah, Naren Ramakrishnan:
RumorSleuth: joint detection of rumor veracity and user stance. 131-136
Network analysis with machine learning I
- Aravind Sankar, Xinyang Zhang, Kevin Chen-Chuan Chang:
Meta-GNN: metagraph neural network for semi-supervised learning in attributed heterogeneous information networks. 137-144 - Suhansanu Kumar, Heting Gao, Changyu Wang, Kevin Chen-Chuan Chang, Hari Sundaram:
Hierarchical multi-armed bandits for discovering hidden populations. 145-153 - Yang Zhang, Hongxiao Wang, Daniel Yue Zhang, Yiwen Lu, Dong Wang:
RiskCast: social sensing based traffic risk forecasting via inductive multi-view learning. 154-157 - Sumeet Kumar, Kathleen M. Carley:
What to track on the Twitter streaming API?: a knapsack bandits approach to dynamically update the search terms. 158-163 - Renhao Cui, Gagan Agrawal, Rajiv Ramnath:
Tweets can tell: activity recognition using hybrid long short-term memory model. 164-167
Communities II
- Yulong Pei, George H. L. Fletcher, Mykola Pechenizkiy:
Joint role and community detection in networks via L2, 1 norm regularized nonnegative matrix tri-factorization. 168-175 - Jean Marie Tshimula, Belkacem Chikhaoui, Shengrui Wang:
HAR-search: a method to discover hidden affinity relationships in online communities. 176-183 - Domenico Mandaglio, Andrea Tagarelli:
Dynamic consensus community detection and combinatorial multi-armed bandit. 184-187
Social media analysis
- Marija Stanojevic, Jumanah Alshehri, Zoran Obradovic:
Surveying public opinion using label prediction on social media data. 188-195 - Taoran Ji, Xuchao Zhang, Nathan Self, Kaiqun Fu, Chang-Tien Lu, Naren Ramakrishnan:
Feature driven learning framework for cybersecurity event detection. 196-203 - Virgile Landeiro, Aron Culotta:
Collecting representative social media samples from a search engine by adaptive query generation. 204-207 - Mahsa Ghorbani, Mahdieh Soleymani Baghshah, Hamid R. Rabiee:
MGCN: semi-supervised classification in multi-layer graphs with graph convolutional networks. 208-211
Network analysis with machine learning II
- Vachik S. Dave, Baichuan Zhang, Pin-Yu Chen, Mohammad Al Hasan:
Neural-brane: an inductive approach for attributed network embedding. 212-215 - Kun Tu, Jian Li, Don Towsley, Dave Braines, Liam D. Turner:
gl2vec: learning feature representation using graphlets for directed networks. 216-221 - Caleb Belth, Fahad Kamran, Donna Tjandra, Danai Koutra:
When to remember where you came from: node representation learning in higher-order networks. 222-225
Information & influence diffusion II
- Soumajyoti Sarkar, Ashkan Aleali, Paulo Shakarian, Mika Armenta, Danielle Sanchez, Kiran Lakkaraju:
Impact of social influence on adoption behavior: an online controlled experimental evaluation. 226-233 - Thiago H. P. Silva, Alberto H. F. Laender, Pedro O. S. Vaz de Melo:
Characterizing knowledge-transfer relationships in dynamic attributed networks. 234-241 - Emily M. Fischer, Souvik Ghosh, Gennady Samorodnitsky:
Epidemic threshold and lifetime distribution for information diffusion on simultaneously growing networks. 242-249 - Jianjun Luo, Xinyue Liu, Xiangnan Kong:
Competitive opinion maximization in social networks. 250-257
Elections and politics
- Huyen T. Le, G. R. Boynton, Zubair Shafiq, Padmini Srinivasan:
A postmortem of suspended Twitter accounts in the 2016 U.S. presidential election. 258-265 - Hamid Karimi, Tyler Derr, Aaron Brookhouse, Jiliang Tang:
Multi-factor congressional vote prediction. 266-273 - Indu Manickam, Andrew S. Lan, Gautam Dasarathy, Richard G. Baraniuk:
IdeoTrace: a framework for ideology tracing with a case study on the 2016 U.S. presidential election. 274-281 - Alexandru Topîrceanu, Radu-Emil Precup:
A novel methodology for improving election poll prediction using time-aware polling. 282-285
Network analysis I
- Michele Coscia, Luca Rossi:
The impact of projection and backboning on network topologies. 286-293 - Katchaguy Areekijseree, Sucheta Soundarajan:
Measuring the sampling robustness of complex networks. 294-301 - Xiuwen Zheng, Amarnath Gupta:
Social network of extreme tweeters: a case study. 302-306 - Laurence Brandenberger, Giona Casiraghi, Vahan Nanumyan, Frank Schweitzer:
Quantifying triadic closure in multi-edge social networks. 307-310 - Seyed Amin Mirlohi Falavarjani, Ebrahim Bagheri, Ssu Yu Zoe Chou, Jelena Jovanovic, Ali A. Ghorbani:
On the causal relation between users' real-world activities and their affective processes. 311-314
Recommendations
- Chia-Wei Chen, Sheng-Chuan Chou, Chang-You Tai, Lun-Wei Ku:
Phrase-guided attention web article recommendation for next clicks and views. 315-324 - Deqing Yang, Ziyi Wang, Junyang Jiang, Yanghua Xiao:
Knowledge embedding towards the recommendation with sparse user-item interactions. 325-332 - Daniel Yue Zhang, Bo Ni, Qiyu Zhi, Thomas Plummer, Qi Li, Hao Zheng, Qingkai Zeng, Yang Zhang, Dong Wang:
Through the eyes of a poet: classical poetry recommendation with visual input on social media. 333-340
Applications I
- Henry K. Dambanemuya, Madhav Joshi, Emoke-Ágnes Horvát:
Network perspective on the efficiency of peace accords implementation. 341-348 - Sreeja Nair, Adriana Iamnitchi, John Skvoretz:
Promoting social conventions across polarized networks: an empirical study. 349-352 - Mayank Kejriwal, Peilin Zhou:
Low-supervision urgency detection and transfer in short crisis messages. 353-356
Behavioral modeling
- Vanessa Cedeno-Mieles, Zhihao Hu, Xinwei Deng, Yihui Ren, Abhijin Adiga, Christopher L. Barrett, Saliya Ekanayake, Gizem Korkmaz, Chris J. Kuhlman, Dustin Machi, Madhav V. Marathe, S. S. Ravi, Brian J. Goode, Naren Ramakrishnan, Parang Saraf, Nathan Self, Noshir Contractor, Joshua M. Epstein, Michael W. Macy:
Mechanistic and data-driven agent-based models to explain human behavior in online networked group anagram games. 357-364 - Binxuan Huang, Kathleen M. Carley:
A large-scale empirical study of geotagging behavior on Twitter. 365-373 - Rahul Pandey, Carlos Castillo, Hemant Purohit:
Modeling human annotation errors to design bias-aware systems for social stream processing. 374-377
Network algorithms
- Peng Ni, Masatoshi Hanai, Wen Jun Tan, Wentong Cai:
Efficient closeness centrality computation in time-evolving graphs. 378-385 - Huda Nassar, Austin R. Benson, David F. Gleich:
Pairwise link prediction. 386-393 - Frédéric Simard:
On computing distances and latencies in link streams. 394-397
Network modeling
- Chen Avin, Zvi Lotker, Yinon Nahum, David Peleg:
Random preferential attachment hypergraph. 398-405 - Julian Müller, Ulrik Brandes:
The evolution of roles. 406-413 - Haripriya Chakraborty, Liang Zhao:
Modeling the dynamics of resource exchange networks. 414-419
Misinformation & online content
- Jesper Holmström, Daniel Jönsson, Filip Polbratt, Olav Nilsson, Linnea Lundström, Sebastian Ragnarsson, Anton Forsberg, Karl Andersson, Niklas Carlsson:
Do we read what we share?: analyzing the click dynamic of news articles shared on Twitter. 420-425 - Alexandre M. Sousa, Jussara M. Almeida, Flavio V. D. de Figueiredo:
Analyzing and modeling user curiosity in online content consumption: a LastFM case study. 426-431 - Bhavtosh Rath, Wei Gao, Jaideep Srivastava:
Evaluating vulnerability to fake news in social networks: a community health assessment model. 432-435 - Kai Shu, Xinyi Zhou, Suhang Wang, Reza Zafarani, Huan Liu:
The role of user profiles for fake news detection. 436-439
Modeling & algorithms
- Malik Magdon-Ismail, Kshiteesh Hegde:
The intrinsic scale of networks is small. 440-447 - Farzan Masrour, Pang-Ning Tan, Abdol-Hossein Esfahanian:
OPTANE: an OPtimal transport algorithm for NEtwork alignment. 448-451 - Sai Kiran Narayanaswami, Balaraman Ravindran, Venkatesh Ramaiyan:
Generalized random Surfer-Pair models. 452-455 - Yulong Pei, Jianpeng Zhang, George H. L. Fletcher, Mykola Pechenizkiy:
Infinite motif stochastic blockmodel for role discovery in networks. 456-459 - Feiyu Long, Nianwen Ning, Chenguang Song, Bin Wu:
Strengthening social networks analysis by networks fusion. 460-463
Applications II
- Rashid Tahir, Faizan Ahmed, Hammas Saeed, Shiza Ali, Fareed Zaffar, Christo Wilson:
Bringing the kid back into YouTube kids: detecting inappropriate content on video streaming platforms. 464-469 - Pamela Bilo Thomas, Rachel Krohn, Tim Weninger:
Dynamics of team library adoptions: an exploration of GitHub commit logs. 470-473 - Lea Baumann, Sonja Utz:
How to encourage people to build diverse business networks? 474-479 - Kaustav Basu, Arunabha Sen:
Monitoring individuals in drug trafficking organizations: a social network analysis. 480-483 - Victor S. Bursztyn, Larry Birnbaum:
Thousands of small, constant rallies: a large-scale analysis of partisan WhatsApp groups. 484-488 - Yo-Der Song, Mingwei Gong, Aniket Mahanti:
Measurement and analysis of an adult video streaming service. 489-492
Network analysis II
- Mitchell Goist, Ted Hsuan Yun Chen, Christopher Boylan:
Reconstructing and analyzing the transnational human trafficking network. 493-500 - Pujan Paudel, Trung T. Nguyen, Amartya Hatua, Andrew H. Sung:
How the tables have turned: studying the new wave of social bots on Twitter using complex network analysis techniques. 501-508 - Ninareh Mehrabi, Fred Morstatter, Nanyun Peng, Aram Galstyan:
Debiasing community detection: the importance of lowly connected nodes. 509-512 - Obaida Hanteer, Luca Rossi:
The meaning of dissimilar: an evaluation of various similarity quantification approaches used to evaluate community detection solutions. 513-518 - Mahboubeh Ahmadalinezhad, Masoud Makrehchi, Neil Seward:
Basketball lineup performance prediction using network analysis. 519-524
POSTER SESSION: Posters madness session
- Chung-Chi Chen, Hen-Hsen Huang, Hsin-Hsi Chen:
Next cashtag prediction on social trading platforms with auxiliary tasks. 525-527 - David Spence, Christopher Inskip, Novi Quadrianto, David Weir:
Quantification under class-conditional dataset shift. 528-529 - Dipanjyoti Paul, Rahul Kumar, Sriparna Saha, Jimson Mathew:
Online feature selection for multi-label classification in multi-objective optimization framework. 530-531 - Katchaguy Areekijseree, Yuzhe Richard Tang, Sucheta Soundarajan:
Computing node clustering coefficients securely. 532-533 - Liang Feng, Qianchuan Zhao, Cangqi Zhou:
An efficient method to find communities in K-partite networks. 534-535 - Maryam Ramezani, Mina Rafiei, Soroush Omranpour, Hamid R. Rabiee:
News labeling as early as possible: real or fake? 536-537 - Masaomi Kimura:
CAB-NC: the correspondence analysis based network clustering method. 538-539 - Meysam Ghaffari, Ashok Srinivasan, Xiuwen Liu:
High-resolution home location prediction from tweets using deep learning with dynamic structure. 540-542 - Parham Hamouni, Taraneh Khazaei, Ehsan Amjadian:
TF-MF: improving multiview representation for Twitter user geolocation prediction. 543-545 - Shalini Priya, Saharsh Singh, Sourav Kumar Dandapat, Kripabandhu Ghosh, Joydeep Chandra:
Identifying infrastructure damage during earthquake using deep active learning. 551-552 - Taha Hassan, Bob Edmison, Larry Cox II, Matthew Louvet, Daron Williams:
Exploring the context of course rankings on online academic forums. 553-556 - Vivek K. Singh, Connor Hofenbitzer:
Fairness across network positions in cyberbullying detection algorithms. 557-559 - Zhou Yang, Long Hoang Nguyen, Fang Jin:
Opioid relapse prediction with GAN. 560-567 - Adrien Benamira, Benjamin Devillers, Etienne Lesot, Ayush K. Ray, Manal Saadi, Fragkiskos D. Malliaros:
Semi-supervised learning and graph neural networks for fake news detection. 568-569
Multidisciplinary session
- Dany Perwita Sari, Yun-Shang Chiou:
Transformation in architecture and spatial organization at Javanese house. 570-577 - Roland Molontay, Marcell Nagy:
Two decades of network science: as seen through the co-authorship network of network scientists. 578-583 - Marcell Nagy, Roland Molontay:
On the structural properties of social networks and their measurement-calibrated synthetic counterparts. 584-588 - Mattia Gasparini, Giorgia Ramponi, Marco Brambilla, Stefano Ceri:
Assigning users to domains of interest based on content and network similarity with champion instances. 589-592 - Soumajyoti Sarkar, Paulo Shakarian, Mika Armenta, Danielle Sanchez, Kiran Lakkaraju:
Can social influence be exploited to compromise security: an online experimental evaluation. 593-596 - Fernando H. Calderon, Li-Kai Cheng, Ming-Jen Lin, Yen-Hao Huang, Yi-Shin Chen:
Content-based echo chamber detection on social media platforms. 597-600 - Shuo Zhang, Mayank Kejriwal:
Concept drift in bias and sensationalism detection: an experimental study. 601-604 - Dionisios N. Sotiropoulos, Ifigeneia Georgoula, Christos Bilanakos:
Optimal influence strategies in an oligopolistic competition network environment. 605-612 - Apratim Das, Alex Aravind, Mark Dale:
Algorithm and application for signed graphlets. 613-620 - Meysam Ghaffari, Ashok Srinivasan, Anuj Mubayi, Xiuwen Liu, Krishnan Viswanathan:
Next-generation high-resolution vector-borne disease risk assessment. 621-624 - Arunkumar Bagavathi, Pedram Bashiri, Shannon Reid, Matthew Phillips, Siddharth Krishnan:
Examining untempered social media: analyzing cascades of polarized conversations. 625-632 - Apratim Das, Mike Drakos, Alex Aravind, Darwin Horning:
Water governance network analysis using graphlet mining. 633-640 - Michelle Bowman, Subrata Acharya:
Risk assessment of pharmacies & electronic prescriptions. 641-644 - Maria Camila Rivera Serna, Subrata Acharya:
FastestER: a web application to enable effective emergency department service. 645-648 - Abigail Garrett, Naeemul Hassan:
Understanding the silence of sexual harassment victims through the #WhyIDidntReport movement. 649-652 - Naeemul Hassan, Manash Kumar Mandal, Mansurul Bhuiyan, Aparna Moitra, Syed Ishtiaque Ahmed:
Can women break the glass ceiling?: an analysis of #MeToo hashtagged posts on Twitter. 653-656
Industry track session
- Alireza Pourali, Fattane Zarrinkalam, Ebrahim Bagheri:
Neural embedding features for point-of-interest recommendation. 657-662 - Yang Zhang, Xiangyu Dong, Daniel Yue Zhang, Dong Wang:
A syntax-based learning approach to geo-locating abnormal traffic events using social sensing. 663-670 - Yingtong Dou, Weijian Li, Zhirong Liu, Zhenhua Dong, Jiebo Luo, Philip S. Yu:
Uncovering download fraud activities in mobile app markets. 671-678 - Ankit Kumar Saw, Nitendra Rajput:
Beauty lies in the face of the beholder: a Bi-channel CNN architecture for attractiveness modeling in matrimony. 679-682 - Shreya Jain, Dipankar Niranjan, Hemank Lamba, Neil Shah, Ponnurangam Kumaraguru:
Characterizing and detecting livestreaming chatbots. 683-690 - Shin-Ying Huang, Yen-Wen Huang, Ching-Hao Mao:
A multi-channel cybersecurity news and threat intelligent engine - SecBuzzer. 691-695