参考文献
[1]高正波. “阿拉伯之春”与虚拟社交网络[D]. 兰州: 兰州大学, 2014[2]魏亮, 魏薇, 卜哲. 网络空间安全[M]. 北京: 电子工业出版社, 2016[3]周茂君, 杜永欣. 重大突发公共事件中的谣言传播及协同治理机制——基于新冠肺炎疫情期间谣言信息的研究[J]. 传媒观察, 2020, 37(9): 1523[4]杨善林, 王佳佳, 代宝, 等. 在线社交网络用户行为研究现状与展望[J]. 中国科学院院刊, 2015, 30(2): 200215[5]杨云霞, 陈功香. 错误信息网络传播的影响因素、传播机制及抑制策略[J]. 心理学进展, 2021, 11(1): 6775[6]Mian A, Khan S. Coronavirus: The spread of misinformation[J]. BMC Medicine, 2020, 18(1): 12[7]陈慧敏, 金思辰, 林微, 等. 新冠疫情相关社交媒体谣言传播量化分析[J]. 计算机研究与发展, 2021, 58(7): 13661384[8]郑洪浩, 郝一诺, 于洪涛, 等. 基于改进Transformer的社交媒体谣言检测[J]. 网络与信息安全学报, 2022, 8(4): 168174[9]田亚平, 杨力, 王小琴, 等. 基于节点亲密度挖掘的谣言抑制算法[J]. 网络与信息安全学报, 2016, 2(11): 6169[10]He X, Song G, Chen W, et al. Influence blocking maximization in social networks under the competitive linear threshold model[C] Proc of the 2012 Siam Int Conf on Data Mining. Philadelphia: SDM, 2012: 463474[11]Chen W, Wang C, Wang Y. Scalable influence maximization for prevalent viral marketing in largescale social networks[C] Proc of the 16th ACM SIGKDD Int Conf on Knowledge Discovery and Data Mining. New York: ACM, 2010: 10291038[12]Arazkhani N, Meybodi M R, Rezvanian A. Influence blocking maximization in social network using centrality measures[C] Proc of the 5th Conf on Knowledge Based Engineering and Innovation (KBEI). Piscataway, NJ: IEEE, 2019: 492497[13]Lv J, Yang B, Yang Z, et al. A communitybased algorithm for influence blocking maximization in social networks[J]. Cluster Computing, 2019, 22(3): 55875602[14]Tong G A, Du D Z. Beyond uniform reverse sampling: A hybrid sampling technique for misinformation prevention[C] Proc of IEEE Conf on Computer Communications (INFOCOM 2019). Piscataway, NJ: IEEE, 2019: 17111719[15]Kempe D, Kleinberg J, Tardos . Maximizing the spread of influence through a social network[C] Proc of the 9th ACM SIGKDD Int Conf on Knowledge Discovery and Data Mining. New York: ACM, 2003: 137146[16]张欣欣, 许力, 徐振宇. 基于网络模体的移动社会网络信息可控传播方法[J]. 电子与信息学报, 2022, 44: 19[17]李美子, 米一菲, 张倩, 等. 社交网络中基于K核分解的意见领袖识别算法[J]. 计算机应用, 2022, 42(1): 2635[18]韩忠明, 陈炎, 刘雯, 等. 社会网络节点影响力分析研究[J]. 软件学报, 2017, 28(1): 84104[19]李阳, 吕欣. 社交网络空间的安全问题与应对策略[J]. 信息安全研究, 2015, 1(2): 126130[20]Christakis N A, Fowler J H. Connected: The Surprising Power of Our Social Networks and How They Shape Our Lives[M]. New York: Little, Brown and Company, 2009[21]Bakshy E, Karrer B, Adamic L A. Social influence and the diffusion of usercreated content[C] Proc of the 10th ACM Conf on Electronic Commerce. New York: ACM, 2009: 325334[22]Rui X, Meng F, Wang Z, et al. A reversed node ranking approach for influence maximization in social networks[J]. Applied Intelligence, 2019, 49(7): 26842698[23]Cheng S, Shen H, Huang J, et al. IMRank: Influence maximization via finding selfconsistent ranking[C] Proc of the 37th Int ACM SIGIR Conf on Research & Development in Information Retrieval. New York: ACM, 2014: 475484[24]Brin S, Page L. The anatomy of a largescale hypertextual Web search engine[J]. Computer Networks and ISDN Systems, 1998, 30(17): 107117
|