Efficient influence maximization in social networks W Chen, Y Wang, S Yang Proceedings of the 15th ACM SIGKDD international conference on Knowledge …, 2009 | 2744 | 2009 |
Scalable influence maximization for prevalent viral marketing in large-scale social networks W Chen, C Wang, Y Wang Proceedings of the 16th ACM SIGKDD international conference on Knowledge …, 2010 | 2164 | 2010 |
Prominent features of rumor propagation in online social media S Kwon, M Cha, K Jung, W Chen, Y Wang 2013 IEEE 13th international conference on data mining, 1103-1108, 2013 | 990 | 2013 |
Combinatorial multi-armed bandit: General framework and applications W Chen, Y Wang, Y Yuan International conference on machine learning, 151-159, 2013 | 820 | 2013 |
Influence maximization in social networks when negative opinions may emerge and propagate W Chen, A Collins, R Cummings, T Ke, Z Liu, D Rincon, X Sun, Y Wang, ... Proceedings of the 2011 siam international conference on data mining, 379-390, 2011 | 458 | 2011 |
Scalable influence maximization for independent cascade model in large-scale social networks C Wang, W Chen, Y Wang Data Mining and Knowledge Discovery 25, 545-576, 2012 | 409 | 2012 |
Influence diffusion dynamics and influence maximization in social networks with friend and foe relationships Y Li, W Chen, Y Wang, ZL Zhang Proceedings of the sixth ACM international conference on Web search and data …, 2013 | 260 | 2013 |
Combinatorial multi-armed bandit and its extension to probabilistically triggered arms W Chen, Y Wang, Y Yuan, Q Wang Journal of Machine Learning Research 17 (50), 1-33, 2016 | 247 | 2016 |
A game-theoretic framework to identify overlapping communities in social networks W Chen, Z Liu, X Sun, Y Wang Data Mining and Knowledge Discovery 21, 224-240, 2010 | 245 | 2010 |
Asymptotically optimal strategy-proof mechanisms for two-facility games P Lu, X Sun, Y Wang, ZA Zhu Proceedings of the 11th ACM conference on Electronic commerce, 315-324, 2010 | 199 | 2010 |
Tighter bounds for facility games P Lu, Y Wang, Y Zhou Internet and Network Economics: 5th International Workshop, WINE 2009, Rome …, 2009 | 128 | 2009 |
Influence assessment in social networks W Chen, Y Wang, S Yang, C Wang US Patent App. 12/790,075, 2011 | 99 | 2011 |
Two-sided online bipartite matching and vertex cover: Beating the greedy algorithm Y Wang, SC Wong Automata, Languages, and Programming: 42nd International Colloquium, ICALP …, 2015 | 95 | 2015 |
Complexity of data collection, aggregation, and selection for wireless sensor networks XY Li, Y Wang, Y Wang IEEE Transactions on computers 60 (3), 386-399, 2010 | 95 | 2010 |
Network topology inference based on end-to-end measurements X Jin, WPK Yiu, SHG Chan, Y Wang IEEE Journal on Selected areas in Communications 24 (12), 2182-2195, 2006 | 88 | 2006 |
Minimizing seed set selection with probabilistic coverage guarantee in a social network P Zhang, W Chen, X Sun, Y Wang, J Zhang Proceedings of the 20th ACM SIGKDD international conference on Knowledge …, 2014 | 84 | 2014 |
On maximizing tree bandwidth for topology-aware peer-to-peer streaming X Jin, WPK Yiu, SHG Chan, Y Wang IEEE transactions on multimedia 9 (8), 1580-1592, 2007 | 66 | 2007 |
Secretary problems: Laminar matroid and interval scheduling S Im, Y Wang Proceedings of the twenty-second annual ACM-SIAM symposium on Discrete …, 2011 | 65 | 2011 |
Constant-work-space algorithms for geometric problems T Asano, W Mulzer, G Rote, Y Wang Journal of Computational Geometry 2 (1), 46–68-46–68, 2011 | 60 | 2011 |
Aspects of rumor spreading on a microblog network S Kwon, M Cha, K Jung, W Chen, Y Wang Social Informatics: 5th International Conference, SocInfo 2013, Kyoto, Japan …, 2013 | 55 | 2013 |