Author of the publication

Trust Hole Identification in Signed Networks.

, , , , and . ECML/PKDD (1), volume 9851 of Lecture Notes in Computer Science, page 697-713. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Inferring Social Influence of anti-Tobacco mass media campaigns., , , , and . BIBM, page 805-812. IEEE Computer Society, (2016)CPP-SNS: A Solution to Influence Maximization Problem under Cost Control., , , and . ICTAI, page 849-856. IEEE Computer Society, (2013)DiffusionGAN: Network Embedding for Information Diffusion Prediction with Generative Adversarial Nets., , , and . ISPA/BDCloud/SocialCom/SustainCom, page 808-816. IEEE, (2019)How TV advertising and social network help tobacco control campaigns influence more., , and . BCB, page 622-625. ACM, (2015)Discover Tipping Users for Cross Network Influencing (Invited Paper)., , , , and . IRI, page 67-76. IEEE Computer Society, (2016)Intertwined viral marketing in social networks., , , and . ASONAM, page 239-246. IEEE Computer Society, (2016)Opinion Mining in Online Social Media for Public Health Campaigns., , , , , , and . J. Medical Imaging Health Informatics, 9 (7): 1448-1452 (2019)Trust Hole Identification in Signed Networks., , , , and . ECML/PKDD (1), volume 9851 of Lecture Notes in Computer Science, page 697-713. Springer, (2016)Intertwined Viral Marketing through Online Social Networks., , , and . CoRR, (2016)Influence Maximization Based on True Threshold in Social Networks., , and . ICMTEL (1), volume 387 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 235-247. Springer, (2021)