1 |
D. Shah and T. Zaman. Detecting Sources of Computer Viruses in Networks: Theory and Experiment. In Proceedings of ACM SIGMETRICS, 2010.
|
2 |
J. Choi, S. Moon, J. Woo, K. Son, J. Shin, and Y. Yi. Rumor, "Source Detection under Querying with Untruthful Answers. In Proceedings of IEEE INFOCOM, 2017.
|
3 |
J. Choi and Y. Yi, "Necessary and Sufficient Budgets in Information Source Finding with Querying: Adaptivity Gap," in Proceedings of IEEE ISIT, 2018.
|
4 |
W. Dong, W. Zhang, and C. W. Tan, "Rooting Out the Rumor Culprit from Suspects." in Proceedings of IEEE International Symposium on Information Theory (ISIT), 2013.
|
5 |
Z. Wang, W. Dong, W. Zhang, and C. W. Tan, "Rumor Source Detection with Multiple Observations: Fundamental Limits and Algorithms," in Proceedings, ACM SIGMETRICS, 2014.
|
6 |
J. Choi, S. Moon, J. Shin, and Y. Yi, "Estimating the Rumor Source with Anti-Rumor in Social Networks," in Proceedings of IEEE ICNP Workshop on Machine Learning, 2016.
|
7 |
G. Fanti, P. Kairouz, S. Oh, and P. Viswanath, "Spy vs. Spy: Rumor Source bfuscation," in Proceedings of ACM SIGMETRICS, 2015.
|
8 |
G. Fanti, P. Kairouz, S. Oh, K. Ramchandran, and P. Viswanath, "Rumor ource Obfuscation on Irregular Trees," in Proceedings of ACM SIGMETRICS, 2016.
|
9 |
G. Fanti, P. Kairouz, S. Oh, K. Ramchandran, and P. Viswanath, "Metadata-conscious Anonymous Messaging," in Proceedings of ICML, 2016.
|
10 |
W. Luo, W. P. Tay and M. Leng, Infection Sprading and Source Identification: A Hide and Seek Game. IEEE Transaction on Signal Processing, Vol. 64, No. 16, AUGUST 15, 2016.
|
11 |
J. Jaing, S. Wen, S. Yu, Y. Xiang, and W. Zhou, "K-Center: An Approach on the Multi-Source Identification of Information Diffusion," IEEE Transactions on Information Forensics and Security, Vol.10, pp.2616-2626, 2015.
DOI
|
12 |
F. Ji and W. P. Tay, "An Algorithmic Framework for Estimating Rumor Sources With Different Start Times," IEEE Transactions on Signal Processing, Vol.65, pp. 2517-2530, 2017.
DOI
|
13 |
Z. Wang, C. Wang, J. Pei, and X. Ye, "Multiple Source Detection without Knowing the Underlying Propagation Model," in Proceedings of AAAI, 2017.
|
14 |
W. Luo, W. P. Tay, and M. Leng, "How to Identify an Infection Source With Limited Observations," IEEE Journal of Selected Topics in Signal Processing, Voi.8, No.4, pp. 586-597, 2014.
DOI
|
15 |
K. Zhu and L. Ying, "Information Source Detection in Networks: Possibility and Impossibility Results," IEEE INFOCOM, 2017.
|
16 |
B. Chang, F. Zhu, E. Chen, and Q. Liu, "Information source detection via Maximum A Postreia Estimation,?" in Proceedings of IEEE ICDM, 2015.
|
17 |
J. Leskovec and J. McAuley, "Learning to Discover Social Circles in Ego Networks," in Proceedings of NIPS, 2012.
|