References(57)
[1]
D. Yin and Y. Shen, Location- and relation-based clustering on privacy-preserving social networks, Tsinghua Sci. and Technol.,vol. 23, no. 4, pp. 453–462, 2018.
[2]
D. Hume, A Treatise of Human Nature. London, UK: John Noon, 1739.
[3]
F. Chierichetti, S. Lattanzi, and A. Panconesi, Rumor spreading in social networks, in Automata, Languages and Programming, S. Albers, A. Marchetti-Spaccamela, Y. Matias, S. Nikoletseas, and W. Thomas, eds. Springer, 2009, pp. 375–386.
[4]
J. Kostka, Y. A. Oswald, and R. Wattenhofer, Word of mouth: Rumor dissemination in social networks, in Structural Information and Communication Complexity, A. A. Shvartsman and P. Felber, eds. Springer, 2008, pp. 185–196.
[5]
C. T. Li, S. D. Lin, and M. K. Shan, Finding influential mediators in social networks, in Proc. 20th Int Conf Companion on World Wide Web, Hyderabad, India, 2011, pp. 75–76.
[6]
D. Shah and T. Zaman, Rumors in a network: Who’s the culprit? IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 5163–5181, 2011.
[7]
L. B. Page and J. E. Perry, Reliability polynomials and link importance in networks, IEEE Trans. Reliab., vol. 43, no. 1, pp. 51–58, 1994.
[8]
D. R. Shier, Network Reliability and Algebraic Structures. New York, NY, USA: Clarendon Press, 1991.
[9]
K. H. Xu, Y. X. Guo, L. K. Guo, Y. G. Fang, and X. L. Li, Control of photo sharing over online social networks, in Proc. 2014 IEEE Global Communications Conf, Austin, TX, USA, 2014, pp. 704–709.
[10]
K. A. Harrison and A. H. Smith, Some new species and distribution records of Rhizopogon in North America, Can.J. Bot., vol. 46, no. 7, pp. 881–899, 1968.
[11]
Y. M. Tan, V. Venkatesh, and X. H. Gu, Resilient self-compressive monitoring for large-scale hosting infrastructures, IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 3, pp. 576–586, 2013.
[13]
R. A. Fisher, Statistical Methods for Research Workers. Genesis Publishing Pvt Ltd, 1925.
[14]
J. Pearl, Causality: Models, Reasoning and Inference. Cambridge, UK: Cambridge University Press, 2000.
[15]
J. Y. Campbell, A. W. C. Lo, and A. C. MacKinlay, The Econometrics of Financial Markets. Princeton, NJ, USA: Princeton University Press, 1997.
[16]
J. Cheney, Causality and the semantics of provenance, arXiv preprint arXiv: 1004.3241, 2010.
[17]
I. Hacking, Telepathy: Origins of randomization in experimental design, Isis, vol. 79, no. 3, pp. 427–451, 1988.
[18]
R. L. Wasserstein, Monte Carlo: Concepts, algorithms, and applications, Technometrics, vol. 39, no. 3, p. 338, 1997.
[19]
H. Chockler and J. Y. Halpern, Responsibility and blame: A structural-model approach, J. Artif. Intell. Res., vol. 22, pp. 93–115, 2004.
[20]
T. Eiter and T. Lukasiewicz, Complexity results for structure-based causality, Artif. Intell., vol. 142, no. 1, pp. 53–89, 2002.
[21]
A. Meliou, W. Gatterbauer, K. F. Moore, and D. Suciu, The complexity of causality and responsibility for query answers and non-answers, Proc. VLDB Endow., vol. 4, no. 1, pp. 34–45, 2010.
[22]
P. Buneman, S. Khanna, and W. C. Tan, Why and where: A characterization of data provenance, in Proc. 8th Int. Conf. Database Theory, London, UK, 2001, pp. 316–330.
[23]
I. Altintas, O. Barney, and E. Jaeger-Frank, Provenance collection support in the Kepler scientific workflow system, in Proc. Int. Provenance and Annotation Workshop, Chicago, IL, USA, 2006, pp. 118–132.
[24]
S. Milgram, The small world problem, Psychol. Today, vol. 2, no. 1, pp. 60–67, 1967.
[25]
G. Strang, Introduction to Applied Mathematics. Wellesley, MA, USA: Wellesley-Cambridge Press, 1986.
[26]
V. Chvatal, A greedy heuristic for the set-covering problem, Math. Oper. Res., vol. 4, no. 3, pp. 233–235, 1979.
[27]
B. Qin, S. Wang, X. F. Zhou, and X. Y. Du, Responsibility analysis for lineages of conjunctive queries with inequalities, IEEE Trans. Knowl. Data Eng., vol. 26, no. 6, pp. 1532–1543, 2014.
[28]
J. McAuley and J. Leskovec, Learning to discover social circles in ego networks, in Proc. 25th Int. Conf. Neural Information Processing Systems, 2012, pp. 539–547, 2012.
[29]
M. Gjoka, M. Kurant, C. T. Butts, and A. Markopoulou, Walking in Facebook: A case study of unbiased sampling of OSNs, in Proc. 2010 IEEE INFOCOM, San Diego, CA, USA, 2010, pp. 1–9.
[30]
M. J. Salganik and D. D. Heckathorn, Sampling and estimation in hidden populations using respondent-driven sampling, Sociol. Methodol., vol. 34, pp. 193–239, 2004.
[31]
E. M. Voorhees and D. K. Harman, TREC: Experiment and Evaluation in Information Retrieval. Cambridge, MA, USA: MIT Press, 2005.
[32]
K. Järvelin and J. Kekäläinen, IR evaluation methods for retrieving highly relevant documents, in Proc. 23rd Ann. Int. ACM SIGIR Conf. Research and Development in Information Retrieval, Athens, Greece, 2000, pp. 41–48.
[33]
J. Scott, Social Network Analysis. Thousand Oaks, CA, USA: SAGE Publications Ltd, 2017.
[34]
Z. Wang, X. J. Ye, C. K. Wang, Y. X. Wu, C. P. Wang, and K. W. Liang, RSDNE: Exploring relaxed similarity and dissimilarity from completely-imbalanced labels for network embedding, in Proc. 32nd AAAI Conf Artificial Intelligence, New Orleans, LA, USA, 2018, pp. 475–482.
[35]
Q. Wang, Z. Wang, and X. J. Ye, Equivalence between line and matrix factorization, arXiv preprint arXiv: 1707.05926, 2017.
[36]
S. Taylor and P. A. Todd, Understanding information technology usage: A test of competing models, Inf. Syst. Res., vol. 6, no. 2, pp. 144–176, 1995.
[37]
Z. Wang, C. K. Wang, J. S. Pei, X. J Ye, and P. S. Yu, Causality based propagation history ranking in social networks, in Proc. 25th Int. Joint Conf. Artificial Intelligence, New York, NY, USA, 2016, pp. 3917–3923.
[38]
X. Meng, G. Xu, T. Guo, Y. Yang, W. Shen, and K. Zhao, A novel routing method for social delay-tolerant networks, Tsinghua Sci. and Technol., vol. 24, no. 1, pp. 44–51, 2019.
[39]
M. Kitsak, L. K. Gallos, S. Havlin, F. Liljeros, L. Muchnik, H. E. Stanley, and H. A. Makse, Identification of influential’ spreaders in complex networks, Nat. Phys., vol. 6, no. 11, pp. 888–893, 2010.
[40]
Z. Wang, C. K. Wang, J. S. Pei, and X. J Ye, Multiple source detection without knowing the underlying propagation model, in Proc. 31st AAAI Conf. Artificial Intelligence, San Francisco, CA, USA, 2017, pp. 217–223.
[41]
W. Chen, Y. J. Wang, and S. Y. Yang, Efficient influence maximization in social networks, in Proc. 15th ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining, Paris, France, 2009, pp. 199–208.
[42]
S. Chen, J. Fan, G. L. Li, J. H. Feng, K. L. Tan, and J. H. Tang, Online topic-aware influence maximization, Proc. VLDB Endow., vol. 8, no. 6, pp. 666–677, 2015.
[43]
J. Kleinberg, Bursty and hierarchical structure in streams, Data Min. Knowl. Discovery, vol. 7, no. 4, pp. 373–397, 2003.
[44]
M. Cataldi, L. Di Caro, and C. Schifanella, Emerging topic detection on twitter based on temporal and social terms evaluation. in Proc. 10th Int. Workshop on Multimedia Data Mining, Washington, DC, USA, 2010, p. 4.
[45]
N. T. J. Bailey, The Mathematical Theory of Infectious Diseases and Its Applications. London, UK: Charles Griffin & Company Ltd., 1975.
[46]
S. Bikhchandani, D. Hirshleifer, and I. Welch, A theory of fads, fashion, custom, and cultural change as informational cascades, J. Polit. Econ., vol. 100, no. 5, pp. 992–1026, 1992.
[47]
D. Lewis, Causation, J. Philos., vol. 70, no. 17, pp. 556–567, 1973.
[48]
J. Y. Halpern and J. Pearl, Causes and explanations: A structural-model approach. Part I: Causes, Br. J. Philos. Sci., vol. 56, no. 4, pp. 843–887, 2005.
[49]
C. Freire, W. Gatterbauer, N. Immerman, and A. Meliou, The complexity of resilience and responsibility for self-join-free conjunctive queries, Proc. VLDB Endow., vol. 9, no. 3, pp. 180–191, 2015.
[50]
B. Qin, S. Wang, and X. Y. Du, Efficient responsibility analysis for query answers, in Proc. 18th Int. Conf. Database Systems for Advanced Applications, Wuhan, China, 2013, pp. 239–253.
[51]
X. Lian and L. Chen, Causality and responsibility: Probabilistic queries revisited in uncertain databases, in Proc. 22nd ACM Int. Conf. Information & Knowledge Management, San Francisco, CA, USA, 2013, pp. 349–358.
[52]
S. Kleinberg and G. Hripcsak, A review of causal inference for biomedical informatics, J. Biomed. Inf., vol. 44, no. 6, pp. 1102–1112, 2011.
[53]
J. Y. Li, L. Liu, and T. D. Le, Practical Approaches to Causal Relationship Exploration. Springer, 2015.
[54]
G. Salton and M. J. McGill, Introduction to Modern Information Retrieval. New York, NY, USA: McGraw-Hill, 1983.
[55]
W. B. Frakes and R. Baeza-Yates, Information Retrieval: Data Structures and Algorithms. Englewood Cliffs, NJ, USA: Prentice Hall, 1992.
[56]
J. M. Kleinberg, Authoritative sources in a hyperlinked environment, J. ACM, vol. 46, no. 5, pp. 604–632, 1999.
[57]
C. J. Colbourn, The Combinatorics of Network Reliability. New York, NY, USA: Oxford University Press, 1987.