


default search action
IEEE Transactions on Computational Social Systems, Volume 5
Volume 5, Number 1, March 2018
- Fei-Yue Wang, Yong Yuan, Xiao Wang, Rui Qin:

Societies 5.0: A New Paradigm for Computational Social Systems Research. 2-8 - Poonam Yadav

, Ioannis Charalampidis
, Jeremy Cohen
, John Darlington, François Grey:
A Collaborative Citizen Science Platform for Real-Time Volunteer Computing and Games. 9-19 - José Aguilar

, Gerardo Garcia:
An Adaptive Intelligent Management System of Advertising for Social Networks: A Case Study of Facebook. 20-32 - Cheng-Te Li

, Shou-De Lin:
Social Flocks: Simulating Crowds to Discover the Connection Between Spatial-Temporal Movements of People and Social Structure. 33-45 - Diego Perna

, Roberto Interdonato
, Andrea Tagarelli
:
Identifying Users With Alternate Behaviors of Lurking and Active Participation in Multilayer Social Networks. 46-63 - Sarbani Roy

, Paramita Dey
, Debajyoti Kundu
:
Social Network Analysis of Cricket Community Using a Composite Distributed Framework: From Implementation Viewpoint. 64-81 - Congyu Wu

, Matthew S. Gerber
:
Forecasting Civil Unrest Using Social Media and Protest Participation Theory. 82-94 - Yang Xing

, Chen Lv
, Zhaozhong Zhang, Huaji Wang, Xiaoxiang Na
, Dongpu Cao
, Efstathios Velenis
, Fei-Yue Wang:
Identification and Analysis of Driver Postures for In-Vehicle Driving Activities and Secondary Tasks Recognition. 95-108 - Klimis S. Ntalianis

, Anastasios D. Doulamis
, Nicolas Tsapatsoulis
, Nikos E. Mastorakis:
Social Relevance Feedback Based on Multimedia Content Power. 109-117 - Alun D. Preece

, Irena Spasic
, Kieran Evans, David Rogers
, William M. Webberley, Colin Roberts, Martin Innes:
Sentinel: A Codesigned Platform for Semantic Enrichment of Social Media Streams. 118-131 - Yahui Wu

, Su Deng, Hongbin Huang:
Control of Message Transmission in Delay/Disruption Tolerant Network. 132-143 - Khobaib Zaamout

, Ken Barker
:
Structure of Crowdsourcing Community Networks. 144-155 - Yung-Yin Lo, Wanjiun Liao

, Cheng-Shang Chang
, Ying-Chin Lee
:
Temporal Matrix Factorization for Tracking Concept Drift in Individual User Preferences. 156-168 - Surendra Sedhai, Aixin Sun

:
Semi-Supervised Spam Detection in Twitter Stream. 169-175 - Peijun Ye

, Shuai Wang
, Fei-Yue Wang:
A General Cognitive Architecture for Agent-Based Modeling in Artificial Societies. 176-185 - Eunice E. Santos, Eugene Santos

, John Korah
, Jeremy E. Thompson
, Yan Zhao
, Vairavan Murugappan
, Jacob Russell:
Modeling Social Resilience in Communities. 186-199 - Yu Luo

, Garud Iyengar
, Venkat Venkatasubramanian
:
Social Influence Makes Self-Interested Crowds Smarter: An Optimal Control Perspective. 200-209 - Rong-Kuan Shen, Yi-Nan Lin, Tong-Ying Tony Juang, Victor R. L. Shen

, Soo Yong Lim:
Automatic Detection of Video Shot Boundary in Social Media Using a Hybrid Approach of HLFPN and Keypoint Matching. 210-219 - Alex Cassidy

, Eric Cawi
, Arye Nehorai:
A Model for Decision Making Under the Influence of an Artificial Social Network. 220-228 - Stavros Souravlas, Angelo Sifaleras

:
Efficient Community-Based Data Distribution Over Multicast Trees. 229-243 - Shuai Wang

, Xiao Wang
, Peijun Ye
, Yong Yuan
, Shuo Liu
, Fei-Yue Wang:
Parallel Crime Scene Analysis Based on ACP Approach. 244-255 - Eleni Stai

, Eirini Milaiou, Vasileios Karyotis
, Symeon Papavassiliou
:
Temporal Dynamics of Information Diffusion in Twitter: Modeling and Experimentation. 256-264 - Rongsheng Dong

, Libing Li, Qingpeng Zhang
, Guoyong Cai:
Information Diffusion on Social Media During Natural Disasters. 265-276 - Ashutosh Trivedi, Shrisha Rao

:
Agent-Based Modeling of Emergency Evacuations Considering Human Panic Behavior. 277-288 - Wayes Tushar

, Chau Yuen
, Wen-Tai Li, David B. Smith, Tapan Kumar Saha
, Kristin L. Wood:
Motivational Psychology Driven AC Management Scheme: A Responsive Design Approach. 289-301
Volume 5, Number 2, June 2018
- Fei-Yue Wang

, Yong Yuan, Chunming Rong
, Jun Jason Zhang:
Parallel Blockchain: An Architecture for CPSS-Based Smart Societies. 303-310 - Cong Yang

, Olaf Flak, Marcin Grzegorzek
:
Representation and Matching of Team Managers: An Experimental Research. 311-323 - Ji Li

, Zhipeng Cai
, Jinbao Wang
, Meng Han, Yingshu Li
:
Truthful Incentive Mechanisms for Geographical Position Conflicting Mobile Crowdsensing Systems. 324-334 - Alireza Louni

, K. P. Subbalakshmi
:
Who Spread That Rumor: Finding the Source of Information in Large Online Social Networks With Probabilistically Varying Internode Relationship Strengths. 335-343 - Yishi Lin

, Wei Chen
, John C. S. Lui
:
Boosting Information Spread: An Algorithmic Approach. 344-357 - Stephen L. France

, Mahyar Sharif Vaghefi, William H. Batchelder
:
FlexCCT: A Methodological Framework and Software for Ratings Analysis and Wisdom of the Crowd Applications. 358-370 - Samya Muhuri

, Susanta Chakraborty
, Sabitri Nanda Chakraborty:
Extracting Social Network and Character Categorization From Bengali Literature. 371-381 - Eugenius Kaszkurewicz

, Amit Bhaya
:
Modeling Market Share Dynamics Under Advertising Effort and Word-of-Mouth Interactions Between Customers. 382-390 - Pei-Yuan Zhou

, Keith C. C. Chan
, Carol Xiaojuan Ou
:
Corporate Communication Network and Stock Price Movements: Insights From Data Mining. 391-402 - Koustav Rudra

, Ashish Sharma
, Niloy Ganguly
, Saptarshi Ghosh:
Characterizing and Countering Communal Microblogs During Disaster Events. 403-417 - Alan Kuhnle

, Md Abdul Alim
, Xiang Li, Huiling Zhang, My T. Thai
:
Multiplex Influence Maximization in Online Social Networks With Heterogeneous Diffusion Models. 418-429 - Yunpeng Xiao

, Xixi Li, Haohan Wang, Ming Xu
, Yanbing Liu
:
3-HBP: A Three-Level Hidden Bayesian Link Prediction Model in Social Networks. 430-443 - Yulia Tyshchuk

, William A. Wallace:
Modeling Human Behavior on Social Media in Response to Significant Events. 444-457 - Ghita Mezzour

, William Frankenstein, Kathleen M. Carley
, L. Richard Carley:
A Socio-Computational Approach to Predicting Bioweapon Proliferation. 458-467 - Guangmo Tong

, Weili Wu, Ding-Zhu Du:
Distributed Rumor Blocking With Multiple Positive Cascades. 468-480 - Xiaokang Wang

, Wei Wang
, Laurence T. Yang, Siwei Liao
, Dexiang Yin, M. Jamal Deen
:
A Distributed HOSVD Method With Its Incremental Computation for Big Data in Cyber-Physical-Social Systems. 481-492 - Kamal Taha

:
Disjoint Community Detection in Networks Based on the Relative Association of Members. 493-507 - Qi Xuan

, Mingming Zhou, Zhiyuan Zhang, Chenbo Fu
, Yun Xiang
, Zhefu Wu, Vladimir Filkov:
Modern Food Foraging Patterns: Geography and Cuisine Choices of Restaurant Patrons on Yelp. 508-517 - Jin-Hee Cho

:
Dynamics of Uncertain and Conflicting Opinions in Social Networks. 518-531 - Kashif Zia

, Dinesh Kumar Saini
, Arshad Muhammad
, Alois Ferscha:
Nature-Inspired Computational Model of Population Desegregation Under Group Leaders Influence. 532-543 - Yuling Hu, Xiao Wang

, Fei-Yue Wang
:
A Quantitative Study of Factors Influence on Evacuation in Building Fire Emergencies. 544-552 - Ge Guo

, Dandan Li
:
PMP-Based Set-Point Optimization and Sliding-Mode Control of Vehicular Platoons. 553-562 - Noha Alduaiji

, Amitava Datta
, Jianxin Li
:
Influence Propagation Model for Clique-Based Community Detection in Social Networks. 563-575 - Li Li

, Shuofeng Wang, Fei-Yue Wang:
An Analysis of Taxi Driver's Route Choice Behavior Using the Trace Records. 576-582 - Juanjuan Li

, Xiaochun Ni, Yong Yuan
:
The Reserve Price of Ad Impressions in Multi-Channel Real-Time Bidding Markets. 583-592
Volume 5, Number 3, September 2018
- Fei-Yue Wang, Yong Yuan, Juanjuan Li, Dongpu Cao

, Lingxi Li
, Petros A. Ioannou, Miguel Ángel Sotelo:
From Intelligent Vehicles to Smart Societies: A Parallel Driving Approach. 594-604 - Yalin E. Sagduyu

, Alexander Grushin
, Yi Shi
:
Synthetic Social Media Data Generation. 605-620 - Dmitri Goldenberg, Alon Sela

, Erez Shmueli
:
Timing Matters: Influence Maximization in Social Networks Through Scheduled Seeding. 621-638 - Vasanthan Raghavan

, Alexander G. Tartakovsky
:
Tracking Changes in Resilience and Level of Coordination in Terrorist Networks. 639-659 - Pratik Chattopadhyay

, Lipo Wang
, Yap-Peng Tan:
Scenario-Based Insider Threat Detection From Cyber Activities. 660-675 - Lixing Wang

:
Design Optimization of Food Safety Monitoring System With Social Network Analysis. 676-686 - Juanjuan Li

, Shuai Wang
, Yong Yuan
, Xiaochun Ni, Fei-Yue Wang:
Dynamic Optimization of Employees Work Strategies in a WeChat-Based Evaluation System. 687-697 - Zehong Hu

, Jie Zhang:
Toward General Robustness Evaluation of Incentive Mechanism Against Bounded Rationality. 698-712 - Bay-Yuan Hsu, Yi-Feng Lan, Chih-Ya Shen

:
On Automatic Formation of Effective Therapy Groups in Social Networks. 713-726 - Seyyed Hadi Sajadi, MohammadAmin Fazli

, Jafar Habibi:
The Affective Evolution of Social Norms in Social Networks. 727-735 - Wei Wei

, Shuai Liu
, Wenjia Li
, Ding-Zhu Du:
Fractal Intelligent Privacy Protection in Online Social Network Using Attribute-Based Encryption Schemes. 736-747 - Rui Qin

, Yong Yuan
, Fei-Yue Wang:
Research on the Selection Strategies of Blockchain Mining Pools. 748-757 - Xiao Xue

, Giagia Gao, Shufang Wang, Zhiyong Feng
:
Service Bridge: Transboundary Impact Evaluation Method of Internet. 758-772 - Youyang Qu

, Shui Yu
, Longxiang Gao
, Wanlei Zhou
, Sancheng Peng
:
A Hybrid Privacy Protection Scheme in Cyber-Physical Social Networks. 773-784 - Honghao Gao

, Shunyi Mao, Wanqiu Huang, Xiaoxian Yang:
Applying Probabilistic Model Checking to Financial Production Risk Evaluation and Control: A Case Study of Alibaba's Yu'e Bao. 785-795 - Lutao Zheng

, Guanjun Liu
, Chungang Yan, Changjun Jiang:
Transaction Fraud Detection Based on Total Order Relation and Behavior Diversity. 796-806 - Qingpeng Zhang

, Dominic DiFranzo
, Marie Joan Kristine Gloria, Bassem Makni, James A. Hendler
:
Analyzing the Flow of Trust in the Virtual World With Semantic Web Technologies. 807-815 - Suman Kalyan Maity

, Aman Kharb, Animesh Mukherjee:
Analyzing the Linguistic Structure of Question Texts to Characterize Answerability in Quora. 816-828 - Jun Jason Zhang

, Fei-Yue Wang, Xiao Wang
, Gang Xiong
, Fenghua Zhu, Yisheng Lv
, Jiachen Hou, Shuangshuang Han
, Yong Yuan
, Qingchun Lu, Yishi Lee:
Cyber-Physical-Social Systems: The State of the Art and Perspectives. 829-840 - Suman Kundu

, Sankar K. Pal
:
Double Bounded Rough Set, Tension Measure, and Social Link Prediction. 841-853 - Feng Wang

, Li Xu
, Wei Gao:
Comments on "SCLPV: Secure Certificateless Public Verification for Cloud-Based Cyber-Physical-Social Systems Against Malicious Auditors". 854-857 - Xiaoyan Lu

, Boleslaw K. Szymanski
:
Scalable Prediction of Global Online Media News Virality. 858-870 - Chengwen Luo

, Chaoxi Li, Hande Hong, Jianqiang Li
, Wei Li
, Zhong Ming, Albert Y. Zomaya
:
SODAR: Nonobtrusive Off-Line Social Structure Reconstruction Through Passive Wireless Sensing. 871-883 - Jonathan Ozik

, Nicholson T. Collier
, Justin M. Wozniak
, Charles M. Macal, Gary An
:
Extreme-Scale Dynamic Exploration of a Distributed Agent-Based Model With the EMEWS Framework. 884-895
Volume 5, Number 4, December 2018
- Fei-Yue Wang

, Yong Yuan, Jun Zhang, Rui Qin, Michael H. Smith:
Blockchainized Internet of Minds: A New Opportunity for Cyber-Physical-Social Systems. 897-906 - Palash Goyal

, Homa Hosseinmardi, Emilio Ferrara
, Aram Galstyan:
Capturing Edge Attributes via Network Embedding. 907-917 - Xiaonan Wang

, Yanli Li
, Xingwei Wang
:
Location-Related Content Communications With Mobility Support in Vehicular Scenarios. 918-930 - Zhiyi Lu

, Victor O. K. Li, Qiqi Shuai
:
Price Competition of Spreaders in Profit-Maximizing Sponsored Viral Marketing. 931-941 - Shuai Wang

, Jing Wang, Xiao Wang
, Tianyu Qiu, Yong Yuan
, Liwei Ouyang
, Yuanyuan Guo, Fei-Yue Wang
:
Blockchain-Powered Parallel Healthcare Systems Based on the ACP Approach. 942-950 - Paul Wagenseller III

, Feng Wang
, Weili Wu:
Size Matters: A Comparative Analysis of Community Detection Algorithms. 951-960 - Shu-Sen Zhang

, Xun Liang
, Xuan Zhang, Rui Xu:
On Identification of Organizational and Individual Users Based on Social Content Measurements. 961-972 - Sreekanth Madisetty

, Maunendra Sankar Desarkar
:
A Neural Network-Based Ensemble Approach for Spam Detection in Twitter. 973-984 - Yuke Li

, Jian Yang, Xiao Wang
, Shuangshuang Han
, Dongpu Cao
, Fei-Yue Wang
:
A CPSS-Based Network Resource Optimization Mechanism for Wireless Heterogeneous Networks. 985-994 - Noel Sardana, Robin Cohen, Jie Zhang, Shuo Chen

:
A Bayesian Multiagent Trust Model for Social Networks. 995-1008 - Tianchong Gao

, Feng Li, Yu Chen, Xukai Zou:
Local Differential Privately Anonymizing Online Social Networks Under HRG-Based Model. 1009-1020 - Kamal Berahmand

, Asgarali Bouyer
, Mahdi Vasighi
:
Community Detection in Complex Networks by Detecting and Expanding Core Nodes Through Extended Local Similarity of Nodes. 1021-1033 - Min Zhou

, Hairong Dong
, Bin Ning, Fei-Yue Wang
:
Recent Development in Pedestrian and Evacuation Dynamics: Bibliographic Analyses, Collaboration Patterns, and Future Directions. 1034-1048 - Christopher C. Yang

, Ling Jiang
:
Enriching User Experience in Online Health Communities Through Thread Recommendations and Heterogeneous Information Network Mining. 1049-1060 - Keng-Pei Lin

, Yi-Wei Chang
, Chih-Ya Shen
, Mei-Chu Lin
:
Leveraging Online Word of Mouth for Personalized App Recommendation. 1061-1070 - Maria Glenski

, Tim Weninger
, Svitlana Volkova
:
Propagation From Deceptive News Sources Who Shares, How Much, How Evenly, and How Quickly? 1071-1082 - Ankan Mullick

, Pawan Goyal, Niloy Ganguly
, Manish Gupta
:
Harnessing Twitter for Answering Opinion List Queries. 1083-1095 - Eric Lancaster, Tanmoy Chakraborty

, V. S. Subrahmanian:
MALTP: Parallel Prediction of Malicious Tweets. 1096-1108 - Rogério Luís Rizzi

, Wesley L. Kaizer
, Claudia Brandelero Rizzi
, Guilherme Galante
, Flávio Codeço Coelho
:
Modeling Direct Transmission Diseases Using Parallel Bitstring Agent-Based Models. 1109-1120 - Tianlong Gu, Minfeng Zhu

, Wei Chen
, Zhaosong Huang, Ross Maciejewski
, Liang Chang
:
Structuring Mobility Transition With an Adaptive Graph Representation. 1121-1132 - Shancang Li

, Shanshan Zhao, Yong Yuan
, Qindong Sun, Kewang Zhang:
Dynamic Security Risk Evaluation via Hybrid Bayesian Risk Graph in Cyber-Physical Social Systems. 1133-1141 - Lifei Lu, Lida Xu, Boyi Xu

, Guoqiang Li
, Hongming Cai
:
Fog Computing Approach for Music Cognition System Based on Machine Learning Algorithm. 1142-1151 - Nan Niu

, Wentao Wang
, Arushi Gupta, Mona Assarandarban, Li Da Xu, Juha Savolainen, Jing-Ru C. Cheng:
Requirements Socio-Technical Graphs for Managing Practitioners' Traceability Questions. 1152-1162 - Hao Jiang

, Zhiyi Hu
, Xianlong Zhao, Lintao Yang, Zhian Yang:
Exploring the Users' Preference Pattern of Application Services Between Different Mobile Phone Brands. 1163-1173 - Bo Zhou

, Curtis L. Maines, Stephen Tang, Qi Shi
, Po Yang
, Qiang Yang
, Jun Qi:
A 3-D Security Modeling Platform for Social IoT Environments. 1174-1188

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














