Dynamics of information diffusion and its applications on complex networks

ZK Zhang, C Liu, XX Zhan, X Lu, CX Zhang, YC Zhang - Physics Reports, 2016 - Elsevier
The ongoing rapid expansion of the Word Wide Web (WWW) greatly increases the
information of effective transmission from heterogeneous individuals to various systems …

Minimizing the spread of misinformation in online social networks: A survey

A Zareie, R Sakellariou - Journal of Network and Computer Applications, 2021 - Elsevier
Online social networks provide an opportunity to spread messages and news fast and
widely. One may appreciate the quick spread of legitimate news and messages but …

Reducing controversy by connecting opposing views

K Garimella, G De Francisci Morales, A Gionis… - Proceedings of the …, 2017 - dl.acm.org
Society is often polarized by controversial issues that split the population into groups with
opposing views. When such issues emerge on social media, we often observe the creation …

A restricted black-box adversarial framework towards attacking graph embedding models

H Chang, Y Rong, T Xu, W Huang, H Zhang… - Proceedings of the …, 2020 - ojs.aaai.org
With the great success of graph embedding model on both academic and industry area, the
robustness of graph embedding against adversarial attack inevitably becomes a central …

Graph vulnerability and robustness: A survey

S Freitas, D Yang, S Kumar, H Tong… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The study of network robustness is a critical tool in the characterization and sense making of
complex interconnected systems such as infrastructure, communication and social networks …

Not all low-pass filters are robust in graph convolutional networks

H Chang, Y Rong, T Xu, Y Bian… - Advances in …, 2021 - proceedings.neurips.cc
Abstract Graph Convolutional Networks (GCNs) are promising deep learning approaches in
learning representations for graph-structured data. Despite the proliferation of such …

Distributed consensus tracking for multi‐agent systems under two types of attacks

Z Feng, G Hu, G Wen - … Journal of Robust and Nonlinear Control, 2016 - Wiley Online Library
This paper studies a distributed coordinated control problem for a class of linear multi‐agent
systems subject to two types of attacks. The problem boils down to how to achieve secure …

DeltaCon Principled Massive-Graph Similarity Function with Attribution

D Koutra, N Shah, JT Vogelstein, B Gallagher… - ACM Transactions on …, 2016 - dl.acm.org
How much has a network changed since yesterday? How different is the wiring of Bob's
brain (a left-handed male) and Alice's brain (a right-handed female), and how is it different …

Prioritizing allocation of COVID-19 vaccines based on social contacts increases vaccination effectiveness

J Chen, S Hoops, A Marathe, H Mortveit, B Lewis… - MedRxiv, 2021 - medrxiv.org
We study allocation of COVID-19 vaccines to individuals based on the structural properties
of their underlying social contact network. Even optimistic estimates suggest that most …

Scalable diffusion-aware optimization of network topology

EB Khalil, B Dilkina, L Song - Proceedings of the 20th ACM SIGKDD …, 2014 - dl.acm.org
How can we optimize the topology of a networked system to bring a flu under control, propel
a video to popularity, or stifle a network malware in its infancy? Previous work on information …