


default search action
11th CSoNet 2022: Virtual Event
- Thang N. Dinh
, Minming Li
:
Computational Data and Social Networks - 11th International Conference, CSoNet 2022, Virtual Event, December 5-7, 2022, Proceedings. Lecture Notes in Computer Science 13831, Springer 2023, ISBN 978-3-031-26302-6
Machine Learning and Prediction
- Zhecheng Qiang
, Eduardo L. Pasiliao
, Alexander Semenov
, Qipeng P. Zheng
:
Incorporating Neighborhood Information and Sentence Embedding Similarity into a Repost Prediction Model in Social Media Networks. 3-14 - Marcus Röckl, Maximilian Paul, Andrzej Jarynowski
, Alexander Semenov, Vitaly Belik:
Driving Factors of Polarization on Twitter During Protests Against COVID-19 Mitigation Measures in Vienna. 15-26 - Keyu Chen, Ashley Feng, Rohan Aanegola, Koustuv Saha, Allie Wong
, Zach Schwitzky, Roy Ka-Wei Lee
, Robin O'Hanlon
, Munmun De Choudhury, Frederick L. Altice, Kaveh Khoshnood, Navin Kumar:
Categorizing Memes About the Ukraine Conflict. 27-38 - Salim Sazzed:
Analyzing Scientometric Indicators of Journals and Chief Editors: A Case Study in Artificial Intelligence (AI) Domain. 39-50 - Min Li
, Shuming Zhou
, Gaolin Chen
:
Link Prediction of Complex Networks Based on Local Path and Closeness Centrality. 51-63 - Maksim Borisov, Valeria Kolycheva
, Alexander Semenov, Dmitry Grigoriev:
The Influence of Color on Prices of Abstract Paintings. 64-68 - Jiadong Chen, Xiaofeng Gao, Guihai Chen:
ELA: A Time-Series Forecasting Model for Liner Shipping Based on EMD-LSTM and Attention. 69-80 - Hao Duc Do
:
Knowledge Transfer via Word Alignment and Its Application to Vietnamese POS Tagging. 81-92 - Tu Cam Thi Tran
, Lan Phuong Phan, Hiep Xuan Huynh
:
A Group Clustering Recommendation Approach Based on Energy Distance. 93-104
Security and Blockchain
- An Cong Tran
, Vu Vo Thanh, Nghi Cong Tran, Hai Thanh Nguyen:
An Implementation and Evaluation of Layer 2 for Ethereum with zk-Rollup. 107-115 - Issa Moussa Diop
, Chantal Cherifi
, Chérif Diallo
, Hocine Cherifi
:
Targeted Attack of the Air Transportation Network Global Component. 116-127 - Ayodeji Adeniran, David Mohaisen
:
Measuring Cryptocurrency Mining in Public Cloud Services: A Security Perspective. 128-140 - Mohamed Alqadhi, Abdulrahman Alabduljabbar, Kyle Thomas, Saeed Salem, DaeHun Nyang, David Mohaisen
:
Do Content Management Systems Impact the Security of Free Content Websites? 141-154
Fact-checking, Fake News, and Hate Speech
- Zaman Wahid
, Abdullah Al Imran
, Md. Rifatul Islam Rifat:
BNnetXtreme: An Enhanced Methodology for Bangla Fake News Detection Online. 157-166 - Abiola Osho
, Shuangqing Wei
, George T. Amariucai
:
Heuristic Gradient Optimization Approach to Controlling Susceptibility to Manipulation in Online Social Networks. 167-178 - Payal Shah, Swapna S. Gokhale:
Identifying Targeted and Generalized Offensive Speech from Anti-asian Social Media Conversations. 179-187 - Keyu Chen, Marzieh Babaeianjelodar, Yiwen Shi, Rohan Aanegola, Lam Yin Cheung, Preslav Ivanov Nakov, Shweta Yadav, Angus Bancroft, Ashiqur R. KhudaBukhsh, Munmun De Choudhury, Frederick L. Altice, Navin Kumar:
US News and Social Media Framing Around Vaping. 188-199
Network Analysis
- Akrati Saxena
, Nivedita Sethiya, Jaspal Singh Saini, Yayati Gupta, S. R. S. Iyengar:
Social Network Analysis of the Caste-Based Reservation System in India. 203-214 - Nawee Jaroonchokanan
, Teerasit Termsaithong, Sujin Suwanna:
Structure, Stability, Persistence and Entropy of Stock Networks During Financial Crises. 215-226 - Rajesh Vashishtha, Anurag Singh, Hocine Cherifi:
A Community Detection Algorithm Using Random Walk. 227-235 - Ali Baran Tasdemir
, Tuna Karacan
, Emir Kaan Kirmaci
, Lale Özkahya
:
Learning Heuristics for the Maximum Clique Enumeration Problem Using Low Dimensional Representations. 236-244
Optimization
- Sukankana Chakraborty
, Sebastian Stein
:
Competitive Influence Maximisation with Nonlinear Cost of Allocations. 247-258 - Hongxiang Zhang, Chunlin Hao, Wenying Guo, Yapu Zhang:
Frank Wolfe Algorithm for Nonmonotone One-Sided Smooth Function Maximization Problem. 259-267 - Hao Xiao, Qian Liu, Yang Zhou, Min Li:
Non-monotone k-Submodular Function Maximization with Individual Size Constraints. 268-279 - Nguyen Thi Uyen, Giang L. Nguyen, Canh V. Pham, Tran Xuan Sang, Hoang Huu Viet:
A Heuristic Algorithm for Student-Project Allocation Problem. 280-291 - Guopeng Li, Chi Zhang, Hongqiu Ni, Haisheng Tan:
Online File Caching on Multiple Caches in Latency-Sensitive Systems. 292-304

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.