A risk defense method based on microscopic state prediction with partial information observations in social networks

Journal of Parallel and Distributed Computing - Tập 131 - Trang 189-199 - 2019
YouKe Wu1,2, Haiyang Huang3, Qun Wu3, Anfeng Liu4, Tian Wang3
1School of Economics and Finance, Huaqiao University, Quanzhou, Fujian, China
2Business School, Shantou University, Shantou, Guangdong, China
3College of Computer Science and Technology, Huaqiao University, Xiamen, Fujian, China
4College of Computer Information Science and Engineering, Central South University, Changsha, Hunan, China

Tài liệu tham khảo

Bai, 2018, Big data and fans economy oriented star node mining improved algorithm in social networks based on acquaintance immunization, J. Phys.: Conf. Ser., 1069, 012009 Bhuiyan, 2017, Dependable structural health monitoring using wireless sensor networks, IEEE Trans. Dependable Secure Comput., 14, 363, 10.1109/TDSC.2015.2469655 Garg, 2014, Modeling and analyzing information diffusion behaviour of social networks, 566 Gong, 2018, Privacy-aware multidimensional mobile service quality prediction and recommendation in distributed fog environment, Wirel. Commun. Mob. Comput., 2018, 10.1155/2018/3075849 Guan, 2017, Achieving efficient and secure data acquisition for cloud-supported internet of things in smart grid, IEEE Internet Things J., 4, 1934, 10.1109/JIOT.2017.2690522 Guan, 2018, Privacy-preserving and efficient aggregation based on blockchain for power grid communications in smart communities, IEEE Commun. Mag., 56, 82, 10.1109/MCOM.2018.1700401 Huang, 2019, Deployment optimization of data centers in vehicular networks, IEEE Access, 7, 20644, 10.1109/ACCESS.2019.2897615 Huang, 2019, A queuing delay utilization scheme for on-path service aggregation in services-oriented computing networks, IEEE Access, 7, 23816, 10.1109/ACCESS.2019.2899402 Huang, 2018, A low-latency communication scheme for mobile wireless sensor control systems, IEEE Trans. Syst. Man Cybern. Syst. Jiang, 2017, Identifying propagation sources in networks: State-of-the-art and comparative studies, IEEE Commun. Surv. Tutor., 19, 465, 10.1109/COMST.2016.2615098 Kim, 2016, Information propagation modeling in a drone network using disease epidemic models, 79 Kumar, 2018, An efficient immunization strategy using overlapping nodes and its neighborhoods, 1269 Ledzewicz, 2016, Optimal control for a SIR epidemiological model with time-varying populations, 1268 Li, 2019, Battery-friendly relay selection scheme for prolonging the lifetimes of sensor nodes in the Internet of Things, IEEE Access, 7, 33180, 10.1109/ACCESS.2019.2904079 Li, 2019, Optimizing the coverage via the UAVs with lower costs for information-centric internet of things, IEEE Access, 7, 15292, 10.1109/ACCESS.2019.2894172 Liu, 2017, Preserving privacy with probabilistic indistinguishability in weighted social networks, IEEE Trans. Parallel Distrib. Syst., 28, 1417, 10.1109/TPDS.2016.2615020 W. Luo, W.P. Tay, Finding an infection source under the SIS model, in: 2013 IEEE International Conference on Acoustics, Speech and Signal Processing, 2013, pp. 2930–2934, http://dx.doi.org/10.1109/ICASSP.2013.6638194. Luo, 2013, Identifying infection sources and regions in large networks, IEEE Trans. Signal Process., 61, 2850, 10.1109/TSP.2013.2256902 Peng, 2019, Multidimensional privacy preservation in location-based services, Future Gener. Comput. Syst., 93, 312, 10.1016/j.future.2018.10.025 Qi, 2017, Time–Location–Frequency–aware Internet of things service selection based on historical records, Int. J. Distrib. Sensor Netw., 13, 10.1177/1550147716688696 Qi, 2018, An exception handling approach for privacy-preserving service recommendation failure in a cloud environment, Sensors, 18, 2037, 10.3390/s18072037 Qi, 2016, Time-aware IoE service recommendation on sparse data, Mob. Inf. Syst., 2016 Ren, 2019, A collaboration platform for effective task and data reporter selection in crowdsourcing network, IEEE Access, 7, 19238, 10.1109/ACCESS.2019.2897062 Tan, 2019, An adaptive collection scheme-based matrix completion for data gathering in energy-harvesting wireless sensor networks, IEEE Access, 7, 6703, 10.1109/ACCESS.2019.2890862 Tan, 2016, Ecrmodel: An elastic collision-based rumor-propagation model in online social networks, IEEE Access, 4, 6105, 10.1109/ACCESS.2016.2612298 Teng, 2019, A cost-efficient greedy code dissemination scheme through vehicle to sensing devices (V2SD) communication in smart city, IEEE Access, 7, 16675, 10.1109/ACCESS.2019.2895899 S. Vosoughi, D. Roy, A human-machine collaborative system for identifying rumors on twitter, in: 2015 IEEE International Conference on Data Mining Workshop (ICDMW), 2015, pp. 47–50, http://dx.doi.org/10.1109/ICDMW.2015.221. Wang, 2019, Coupling resource management based on fog computing in smart city systems, J. Network Comput. Appl., 10.1016/j.jnca.2019.02.021 Wang, 2017, Data collection from WSNs to the cloud based on mobile fog elements, Future Gener. Comput. Syst. Wang, 2018, A novel trust mechanism based on fog computing in sensor–cloud system, Future Gener. Comput. Syst. Wang, 2018, A secure IoT service architecture with an efficient balance dynamics based on cloud and edge computing, IEEE Internet Things J. Wang, 2018, Fog-based computing and storage offloading for data synchronization in iot, IEEE Internet Things J. Wen, 2015, A sword with two edges: Propagation studies on both positive and negative information in online social networks, IEEE Trans. Comput., 64, 640, 10.1109/TC.2013.2295802 Wu, 2018, Using mobile nodes to control rumors in big data based on a new rumor propagation model in vehicular social networks, IEEE Access, 6, 62612, 10.1109/ACCESS.2018.2876394 Wu, 2017, Rumor restraining based on propagation prediction with limited observations in large-scale social networks, 1 Xia, 2018, Improved targeted immunization strategies based on two rounds of selection, Physica A, 496, 540, 10.1016/j.physa.2017.12.017 Xu, 2017, Privacy-preserving and scalable service recommendation based on simhash in a distributed cloud environment, Complexity, 2017, 1934, 10.1155/2017/3437854 Zhang, 2017, Anonymizing popularity in online social networks with full utility, Future Gener. Comput. Syst., 72, 227, 10.1016/j.future.2016.05.007 Zhang, 2018, Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system, Concurr. Comput.: Pract. Exper., e5109 Zhang, 2013, Network traffic classification using correlation information, IEEE Trans. Parallel Distrib. Syst., 24, 104, 10.1109/TPDS.2012.98