Blocking simple and complex contagion by edge removal

CJ Kuhlman, G Tuli, S Swarup… - 2013 IEEE 13th …, 2013 - ieeexplore.ieee.org
Eliminating interactions among individuals is an important means of blocking contagion
spread, eg, closing schools during an epidemic or shutting down electronic communication …

Security games for controlling contagion

J Tsai, T Nguyen, M Tambe - Proceedings of the AAAI Conference on …, 2012 - ojs.aaai.org
Many strategic actions carry a 'contagious' component beyond the immediate locale of the
effort itself. Viral marketing and peacekeeping operations have both been observed to have …

Modelling the spatial and social dynamics of insurgency

PJ Giabbanelli - Security Informatics, 2014 - Springer
Insurgency emerges from many interactions between numerous social, economical, and
geographical factors. Adequately accounting for the large number of potentially relevant …

Graph structure-based heuristics for optimal targeting in social networks

M Bini, P Frasca, C Ravazzi… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In this article, we consider a dynamic model for competition in a social network, where two
strategic agents have fixed beliefs, and the nonstrategic/regular agents adjust their states …

[PDF][PDF] Identifying influential agents for advertising in multi-agent markets.

M Maghami, G Sukthankar - AAMAS, 2012 - researchgate.net
The question of how to influence people in a large social system is a perennial problem in
marketing, politics, and publishing. It differs from more personal inter-agent interactions that …

Game-theoretic target selection in contagion-based domains

J Tsai, TH Nguyen, N Weller, M Tambe - The Computer Journal, 2014 - ieeexplore.ieee.org
Many strategic actions carry a 'contagious' component beyond the immediate locale of the
effort itself. Viral marketing and peacekeeping operations have both been observed to have …

Partial information community detection in a multilayer network

SD Warnke - 2016 - apps.dtic.mil
Identifying communities in a dark network is a potentially difficult task. The nature of dark
networks, and their characteristic of concealing connections within the network, makes …

Hierarchical influence maximization for advertising in multi-agent markets

M Maghami, G Sukthankar - Proceedings of the 2013 IEEE/ACM …, 2013 - dl.acm.org
Maximizing product adoption within a customer social network under a constrained
advertising budget is an important special case of the general influence maximization …

Modeling and Twitter-based surveillance of smoking contagion

G Tuli - 2016 - vtechworks.lib.vt.edu
Nicotine, in the form of cigarette smoking, chewing tobacco, and most recently as vapor
smoking, is one of the most heavily used addictive drugs in the world. Since smoking …

The method of leader's overthrow in networks based on Shapley value

I Belik, K Jörnsten - Socio-Economic Planning Sciences, 2016 - Elsevier
Quantitative methods for leaders' detection and overthrow are useful tools for decision-
making in many real-life social networks. In the given research, we present algorithms that …