L Chen, J Chen, C Xia - Journal of Information Security and Applications, 2022 - Elsevier
The scope of cyberspace weapons is expanding from the physical network domain to the cognitive information domain. Technologies such as network penetration, public opinion …
R Cañamares, P Castells - … 41st International ACM SIGIR Conference on …, 2018 - dl.acm.org
The use of IR methodology in the evaluation of recommender systems has become common practice in recent years. IR metrics have been found however to be strongly biased towards …
U Grandi - Trends in Computational Social Choice, 2017 - books.google.com
Individuals do not typically reason in isolation when confronted with collectivedecision making, but rather take into consideration the preferences of likeminded individuals and …
Election control considers the problem of an adversary who attempts to tamper with a voting process, in order to either ensure that their favored candidate wins (constructive control) or …
AIE Hosni, K Li - Knowledge-Based Systems, 2020 - Elsevier
The malicious rumors have tremendously attracted a more substantial number of researchers to join the fight against the propagation of these types of information in online …
Opinion diffusion is studied on social graphs where agents hold binary opinions and where social pressure leads them to conform to the opinion manifested by the majority of their …
We study the effects of campaigning, where the society is partitioned into voter clusters and a diffusion process propagates opinions in a network connecting the clusters. Our model can …
We introduce a voting model with multi-agent ranked delegations. This model generalises liquid democracy in two aspects: first, an agent's delegation can use the votes of multiple …
We propose a generalisation of liquid democracy in which a voter can either vote directly on the issues at stake, delegate her vote to another voter, or express complex delegations to a …