4.7 Article

Identifying influential nodes in heterogeneous networks

期刊

EXPERT SYSTEMS WITH APPLICATIONS
卷 160, 期 -, 页码 -

出版社

PERGAMON-ELSEVIER SCIENCE LTD
DOI: 10.1016/j.eswa.2020.113580

关键词

Social media; Influence; Influential nodes; Scholar; Heterogeneous networks

资金

  1. IPM, Iran [CS1399-4-162]

向作者/读者索取更多资源

Identifying influential users and measure the influence of nodes in social networks have become an interesting and important topic of research. It is crucial to find out to what extent individuals influence each other because it can be used to control rumors, diseases, and diffusion. There are numerous relevant models most of which are based on a homogeneous network. However, in the real world, we face heterogeneous networks where the nodes and edges are different types. A network is homogeneous if and only if the edges and nodes are of the same type, and it is considered heterogeneous if the nodes and edges are different. In heterogeneous networks, there is a concept known as meta-path, which indicates the type of communication between two nodes. In this paper, we aim to locate influential nodes by calculating the entropy of different meta-paths. To evaluate information diffusion in a heterogeneous network, we used the known susceptible-infectious model. The results of our experiments on three real-world networks' dataset show that the proposed method outperforms state-of-the-art influence maximization algorithms. (c) 2020 Elsevier Ltd. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Hardware & Architecture

A blockchain-based secure storage and access control scheme for supply chain finance

Dun Li, Dezhi Han, Noel Crespi, Roberto Minerva, Kuan-Ching Li

Summary: Supply chain finance provides credit for small and medium-sized enterprises with low credit lines and small financing scales. This study proposes a Blockchain-based secure storage system, Fabric-SCF, to achieve data security and fine-grained access control. Experimental results show that Fabric-SCF performs efficiently in a simulated real-world operating scenario.

JOURNAL OF SUPERCOMPUTING (2023)

Article Chemistry, Analytical

Coverage Area Decision Model by Using Unmanned Aerial Vehicles Base Stations for Ad Hoc Networks

Saqib Majeed, Adnan Sohail, Kashif Naseer Qureshi, Saleem Iqbal, Ibrahim Tariq Javed, Noel Crespi, Wamda Nagmeldin, Abdelzahir Abdelmaboud

Summary: This paper proposes a coverage area decision model for UAV-BS in order to provide cellular network coverage using controlled and managed UAV nodes. The solution allows for real-time adjustment of node positions. Simulation results show that the proposed solution achieves better performance in network placement.

SENSORS (2022)

Article Chemistry, Analytical

Data Analytics, Self-Organization, and Security Provisioning for Smart Monitoring Systems

Raja Waseem Anwar, Kashif Naseer Qureshi, Wamda Nagmeldin, Abdelzahir Abdelmaboud, Kayhan Zrar Ghafoor, Ibrahim Tariq Javed, Noel Crespi

Summary: The concept of the Internet of Things (IoT) involves the connection of smart devices or objects to create a network. However, this new area faces challenges in handling big data and ensuring security. This paper proposes a data analytics model and self-organizing architecture for IoT networks, as well as a security model based on authentication, detection, and prediction mechanisms to enhance network security and protect against attacks.

SENSORS (2022)

Article Chemistry, Multidisciplinary

Towards Enabling Fault Tolerance and Reliable Green Communications in Next-Generation Wireless Systems

Rajkumar Singh Rathore, Omprakash Kaiwartya, Kashif Naseer Qureshi, Ibrahim Tariq Javed, Wamda Nagmeldin, Abdelzahir Abdelmaboud, Noel Crespi

Summary: This paper presents a fault-tolerant and reliable green communications framework for next-generation wireless systems. By selecting node-disjoint routes and fault-tolerant routes, the performance of the framework is improved. Simulation experiments validate the efficacy of the framework.

APPLIED SCIENCES-BASEL (2022)

Article Chemistry, Analytical

Widening Blockchain Technology toward Access Control for Service Provisioning in Cellular Networks

Fariba Ghaffari, Nischal Aryal, Emmanuel Bertin, Noel Crespi, Joaquin Garcia-Alfaro

Summary: Blockchain technology has witnessed a surge in new applications and initiatives to enhance decentralized security and trust by establishing new forms of relational reliance. This paper provides an overview of blockchain technology and its technological aspects, and presents a practical application of decentralized access control and pricing procedures in private cellular networks. The application facilitates the adoption of new business models by service and content providers, while addressing the scalability and operational complexity issues of conventional centralized access control systems. The design and implementation details of the proposed method in a real-world scenario using a private cellular network and blockchain technology are also provided.

SENSORS (2023)

Article Computer Science, Artificial Intelligence

IMC-NLT: Incomplete multi-view clustering by NMF and low-rank tensor

Zhenjiao Liu, Zhikui Chen, Yue Li, Liang Zhao, Tao Yang, Reza Farahbakhsh, Noel Crespi, Xiaodi Huang

Summary: This article presents a novel algorithm called IMC-NLT for incomplete multi-view clustering. By utilizing non-negative matrix factorization and a low-rank tensor, IMC-NLT effectively extracts hidden information from incomplete views, overcoming limitations of existing algorithms. Experimental results demonstrate that IMC-NLT outperforms baseline methods and produces stable and promising results.

EXPERT SYSTEMS WITH APPLICATIONS (2023)

Article Engineering, Electrical & Electronic

Divide and Conquer: A Business Model Agenda for Beyond-5G and 6G

Meroua Moussaoui, Emmanuel Bertin, Noel Crespi

Summary: This article focuses on investigating the business models (BMs) needed to effectively address the opportunities promised by beyond-5G (B5G) and 6G networks, as traditional telecom roles may disappear or transform while new ones emerge. It highlights the major BM changes introduced by 5G in the telecommunications ecosystem, derives perspectives for B5G/6G BMs, and proposes business opportunities for the involved actors.

IEEE COMMUNICATIONS MAGAZINE (2023)

Article Computer Science, Artificial Intelligence

Video anomaly detection with NTCN-ML: A novel TCN for multi-instance learning

Wenhao Shao, Ruliang Xiao, Praboda Rajapaksha, Mengzhu Wang, Noel Crespi, Zhigang Luo, Roberto Minerva

Summary: A key challenge in video anomaly detection is identifying rare abnormal patterns in positive instances, which show small variation compared to normal patterns and are heavily influenced by dominant negative instances. To address this, we propose a weakly supervised video anomaly detection model called NTCN-ML - Novel Temporal Convolutional Network Multi-Instance Learning Model. The NTCN-ML model extracts temporal representations of video data to construct a time-series pattern and optimize the multi-instance learning process by examining the correlation between positive and negative samples to balance feature association between rare positive and negative instances. The video anomaly detection using the NTCN-ML model achieved 95.3% and 85.1% accuracy on the UCF-Crime and ShanghaiTech datasets respectively, outperforming the baseline models.

PATTERN RECOGNITION (2023)

Article Engineering, Electrical & Electronic

Traffic Intensity Detection Using General-Purpose Sensing

Aung Kaung Myat, Roberto Minerva, Attaphongse Taparugssanagorn, Praboda Rajapaksha, Noel Crespi

Summary: The conventional approaches for traffic intensity detection in smart cities use specialized sensors with high costs and limited reuse. This article proposes the utilization of general-purpose sensing with cost-effective and easily deployable sensors, such as microphones and air quality sensors. The authors demonstrate how noise signatures can be leveraged to measure traffic intensity using vision-transformers models. The vehicle type detection approach shows better results in traffic intensity detection.

IEEE SENSORS LETTERS (2023)

Proceedings Paper Computer Science, Information Systems

Definition Of Digital Twin Network Data Model in The Context of Edge-Cloud Continuum

Syed Mohsan Raza, Roberto Minerva, Noel Crespi, Mehdi Karech

Summary: The telecommunications sector is exploring the use of Digital Twins to represent complex networks, which could harmonize different models of the Edge-Cloud Continuum. The Digital Twin Network (DTN) software framework aims to provide network operations with up-to-date and comprehensive views, along with simulating network behavior and learning from historical events. This work aims to consolidate a DTN data model representing the elements of the Edge-Cloud Continuum and bridge the telecommunications and Cloud industries.

2023 IEEE 9TH INTERNATIONAL CONFERENCE ON NETWORK SOFTWARIZATION, NETSOFT (2023)

Proceedings Paper Computer Science, Artificial Intelligence

User Profile and Mobile Number Portability for Beyond 5G: Blockchain-based Solution

Fariba Ghaffari, Emmanuel Bertin, Noel Crespi

Summary: Mobile Number Portability (MNP) allows users to switch operators while keeping their number. However, current systems have various issues such as central point of failure, low scalability, high latency, and data leakage. To address these issues, a Blockchain-based solution is proposed to manage user subscription and profile porting, eliminating central points and providing increased automation, low latency, and high confidentiality.

2023 26TH CONFERENCE ON INNOVATION IN CLOUDS, INTERNET AND NETWORKS AND WORKSHOPS, ICIN (2023)

Proceedings Paper Computer Science, Artificial Intelligence

Open Radio Access Network challenges for Next Generation Mobile Network

Nischal Aryal, Emmanuel Bertin, Noel Crespi

Summary: Due to the inflexibility of existing RAN systems, the disaggregation of software and hardware can enable small-scale infrastructure providers to enter the market, leading to a more competitive ecosystem. Open Radio Access Network (O-RAN) builds a multi-vendor RAN ecosystem, addressing network complexity and providing cost-effective platforms. However, challenges like interoperability and AI/ML management need to be addressed for wide deployment. This paper surveys existing issues and explores solutions in the Open RAN ecosystem.

2023 26TH CONFERENCE ON INNOVATION IN CLOUDS, INTERNET AND NETWORKS AND WORKSHOPS, ICIN (2023)

Proceedings Paper Computer Science, Hardware & Architecture

Private Cellular Network Deployment: Comparison of OpenAirInterface with Magma Core

Nischal Aryal, Fariba Ghaffari, Saeid Rezaei, Emmanuel Bertin, Noel Crespi

Summary: This paper presents the deployment procedure of a private 4G-LTE network with standard User Equipment in two different scenarios using OpenAirInterface and Magma core networks. It discusses the lessons learned from deploying the segregated end-to-end cellular network testbed, comparison of connection performance in two scenarios, challenges of connecting smartphones to the network, and comparison among the possible use-cases with each scenario.

2022 18TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT (CNSM 2022): INTELLIGENT MANAGEMENT OF DISRUPTIVE NETWORK TECHNOLOGIES AND SERVICES (2022)

Proceedings Paper Computer Science, Artificial Intelligence

Untangling the Overlap Between Blockchain and DLTs

Badr Bellaj, Aafaf Ouaddah, Emmanuel Bertin, Noel Crespi, Abdellatif Mezrioui

Summary: The success of Bitcoin and other cryptocurrencies has generated interest in Blockchain technology, but its evolution has led to diverging definitions and designs, making it difficult for designers and decision-makers to understand and choose suitable blockchain solutions.

INTELLIGENT COMPUTING, VOL 3 (2022)

Proceedings Paper Engineering, Electrical & Electronic

5G shortcomings and Beyond-5G/6G requirements

Meroua Moussaoui, Emmanuel Bertin, Noel Crespi

Summary: This article provides a summary of the major shortcomings of 5G networks and classifies them into six primary domains. Additionally, it discusses the research challenges that will be faced in the development of future B5G and 6G networks.

2022 1ST INTERNATIONAL CONFERENCE ON 6G NETWORKING (6GNET) (2022)

Review Computer Science, Artificial Intelligence

A comprehensive review of slope stability analysis based on artificial intelligence methods

Wei Gao, Shuangshuang Ge

Summary: This study provides a comprehensive review of slope stability research based on artificial intelligence methods, focusing on slope stability computation and evaluation. The review covers studies using quasi-physical intelligence methods, simulated evolutionary methods, swarm intelligence methods, hybrid intelligence methods, artificial neural network methods, vector machine methods, and other intelligence methods. The merits, demerits, and state-of-the-art research advancement of these studies are analyzed, and possible research directions for slope stability investigation based on artificial intelligence methods are suggested.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

Machine learning approaches for lateral strength estimation in squat shear walls: A comparative study and practical implications

Khuong Le Nguyen, Hoa Thi Trinh, Saeed Banihashemi, Thong M. Pham

Summary: This study investigated the influence of input parameters on the shear strength of RC squat walls and found that ensemble learning models, particularly XGBoost, can effectively predict the shear strength. The axial load had a greater influence than reinforcement ratio, and longitudinal reinforcement had a more significant impact compared to horizontal and vertical reinforcement. The performance of XGBoost model outperforms traditional design models and reducing input features still yields reliable predictions.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

DHESN: A deep hierarchical echo state network approach for algal bloom prediction

Bo Hu, Huiyan Zhang, Xiaoyi Wang, Li Wang, Jiping Xu, Qian Sun, Zhiyao Zhao, Lei Zhang

Summary: A deep hierarchical echo state network (DHESN) is proposed to address the limitations of shallow coupled structures. By using transfer entropy, candidate variables with strong causal relationships are selected and a hierarchical reservoir structure is established to improve prediction accuracy. Simulation results demonstrate that DHESN performs well in predicting algal bloom.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

Learning high-dependence Bayesian network classifier with robust topology

Limin Wang, Lingling Li, Qilong Li, Kuo Li

Summary: This paper discusses the urgency of learning complex multivariate probability distributions due to the increase in data variability and quantity. It introduces a highly scalable classifier called TAN, which utilizes maximum weighted spanning tree (MWST) for graphical modeling. The paper theoretically proves the feasibility of extending one-dependence MWST to model high-dependence relationships and proposes a heuristic search strategy to improve the fitness of the extended topology to data. Experimental results demonstrate that this algorithm achieves a good bias-variance tradeoff and competitive classification performance compared to other high-dependence or ensemble learning algorithms.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

Make a song curative: A spatio-temporal therapeutic music transfer model for anxiety reduction

Zhejing Hu, Gong Chen, Yan Liu, Xiao Ma, Nianhong Guan, Xiaoying Wang

Summary: Anxiety is a prevalent issue and music therapy has been found effective in reducing anxiety. To meet the diverse needs of individuals, a novel model called the spatio-temporal therapeutic music transfer model (StTMTM) is proposed.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

A modified reverse-based analysis logic mining model with Weighted Random 2 Satisfiability logic in Discrete Hopfield Neural Network and multi-objective training of Modified Niched Genetic Algorithm

Nur Ezlin Zamri, Mohd. Asyraf Mansor, Mohd Shareduwan Mohd Kasihmuddin, Siti Syatirah Sidik, Alyaa Alway, Nurul Atiqah Romli, Yueling Guo, Siti Zulaikha Mohd Jamaludin

Summary: In this study, a hybrid logic mining model was proposed by combining the logic mining approach with the Modified Niche Genetic Algorithm. This model improves the generalizability and storage capacity of the retrieved induced logic. Various modifications were made to address other issues. Experimental results demonstrate that the proposed model outperforms baseline methods in terms of accuracy, precision, specificity, and correlation coefficient.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

On taking advantage of opportunistic meta-knowledge to reduce configuration spaces for automated machine learning

David Jacob Kedziora, Tien-Dung Nguyen, Katarzyna Musial, Bogdan Gabrys

Summary: The paper addresses the problem of efficiently optimizing machine learning solutions by reducing the configuration space of ML pipelines and leveraging historical performance. The experiments conducted show that opportunistic/systematic meta-knowledge can improve ML outcomes, and configuration-space culling is optimal when balanced. The utility and impact of meta-knowledge depend on various factors and are crucial for generating informative meta-knowledge bases.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

Optimal location for an EVPL and capacitors in grid for voltage profile and power loss: FHO-SNN approach

G. Sophia Jasmine, Rajasekaran Stanislaus, N. Manoj Kumar, Thangamuthu Logeswaran

Summary: In the context of a rapidly expanding electric vehicle market, this research investigates the ideal locations for EV charging stations and capacitors in power grids to enhance voltage stability and reduce power losses. A hybrid approach combining the Fire Hawk Optimizer and Spiking Neural Network is proposed, which shows promising results in improving system performance. The optimization approach has the potential to enhance the stability and efficiency of electric grids.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

NLP-based approach for automated safety requirements information retrieval from project documents

Zhijiang Wu, Guofeng Ma

Summary: This study proposes a natural language processing-based framework for requirement retrieval and document association, which can help to mine and retrieve documents related to project managers' requirements. The framework analyzes the ontology relevance and emotional preference of requirements. The results show that the framework performs well in terms of iterations and threshold, and there is a significant matching between the retrieved documents and the requirements, which has significant managerial implications for construction safety management.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

Dog nose-print recognition based on the shape and spatial features of scales

Yung-Kuan Chan, Chuen-Horng Lin, Yuan-Rong Ben, Ching-Lin Wang, Shu-Chun Yang, Meng-Hsiun Tsai, Shyr-Shen Yu

Summary: This study proposes a novel method for dog identification using nose-print recognition, which can be applied to controlling stray dogs, locating lost pets, and pet insurance verification. The method achieves high recognition accuracy through two-stage segmentation and feature extraction using a genetic algorithm.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

Fostering supply chain resilience for omni-channel retailers: A two-phase approach for supplier selection and demand allocation under disruption risks

Shaohua Song, Elena Tappia, Guang Song, Xianliang Shi, T. C. E. Cheng

Summary: This study aims to optimize supplier selection and demand allocation decisions for omni-channel retailers in order to achieve supply chain resilience. It proposes a two-phase approach that takes into account various factors such as supplier evaluation and demand allocation.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

Accelerating Benders decomposition approach for shared parking spaces allocation considering parking unpunctuality and no-shows

Jinyan Hu, Yanping Jiang

Summary: This paper examines the allocation problem of shared parking spaces considering parking unpunctuality and no-shows. It proposes an effective approach using sample average approximation (SAA) combined with an accelerating Benders decomposition (ABD) algorithm to solve the problem. The numerical experiments demonstrate the significance of supply-demand balance for the operation and user satisfaction of the shared parking system.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Review Computer Science, Artificial Intelligence

Financial fraud detection using graph neural networks: A systematic review

Soroor Motie, Bijan Raahemi

Summary: Financial fraud is a persistent problem in the finance industry, but Graph Neural Networks (GNNs) have emerged as a powerful tool for detecting fraudulent activities. This systematic review provides a comprehensive overview of the current state-of-the-art technologies in using GNNs for financial fraud detection, identifies gaps and limitations in existing research, and suggests potential directions for future research.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Review Computer Science, Artificial Intelligence

Occluded person re-identification with deep learning: A survey and perspectives

Enhao Ning, Changshuo Wang, Huang Zhang, Xin Ning, Prayag Tiwari

Summary: This review provides a detailed overview of occluded person re-identification methods and conducts a systematic analysis and comparison of existing deep learning-based approaches. It offers important theoretical and practical references for future research in the field.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

A hierarchical attention detector for bearing surface defect detection

Jiajun Ma, Songyu Hu, Jianzhong Fu, Gui Chen

Summary: The article presents a novel visual hierarchical attention detector for multi-scale defect location and classification, utilizing texture, semantic, and instance features of defects through a hierarchical attention mechanism, achieving multi-scale defect detection in bearing images with complex backgrounds.

EXPERT SYSTEMS WITH APPLICATIONS (2024)