ZHANG Yu-bo, ZHANG Xi-zhe, XU Chao, ZHANG Bin. Fast Source Localization Method for Social Network[J]. Journal of Northeastern University Natural Science, 2016, 37(4): 467-471.
[1]Dong W,Zhang W,Tan C W.Rooting out the rumor culprit from suspects[C]// IEEE International Symposium on Information Theory.Istanbul:IEEE,2013:2671-2675. [2]Budak C,Agrawal D,El-Abbadi A.Limiting the spread of misinformation in social networks[C]//Proceedings of the 20th International Conference on World Wide Web.Hyderabad:ACM,2011:665-674. [3]Shah D,Zaman T.Detecting sources of computer viruses in networks:theory and experiment[C]//ACM SIGMETRICS Performance Evaluation Review.New York:ACM,2010:203-214. [4]Lokhov A Y,Mezard M,Ohta H.Inferring the origin of an epidemic with dynamic message-passing algorithm[J].Physical Review E,2014 ,90(1):012801. [5]张聿博,张锡哲,张斌.面向社交网络信息源定位的观察点部署方法[J].软件学报,2014,25(12):2837-2851.(Zhang Yu-bo,Zhang Xi-zhe,Zhang Bin.Observer deployment method for locating the information source in social network[J]. Journal of Software,2014,25(12):2837-2851.) [6]Prakash B A,Vreeken J,Faloutsos C.Spotting culprits in epidemics:how many and which ones?[C]// IEEE 12th International Conference on Data Mining.Brussels:IEEE,2012:11-20. [7]Zhu K,Ying L.Information source detection in the SIR model:a sample path based approach[J].IEEE/ACM Transactions on Networking,2014,11(20):1-14. [8]Pinto P C,Thiran P,Vetterli M.Locating the source of diffusion in large-scale networks[J].Physical Review Letters,2012,109(6):068702. [9]Erd6s P,Rényi A.On random graphs I[J].Publications Mathematician, 1959,6:290-297. [10]Barabási A L,Albert R.Emergence of scaling in random networks[J].Science,1999,286(5439):509-512.