[1] |
KANNA A F , YACINE A , AJITH A . Models of influence in online social networks[J]. International Journal of Intelligent Systems, 2013,29(2):161-183.
|
[2] |
LIM S H , KIM S W , PARK SUN J . Determining content power users in a blog network: an approach and its applications[J]. IEEE Transac-tions on Systems, Man, and Cybernetics, Part A: Systems and Humans Archive, 2011,41(5):853-862.
|
[3] |
LI X , CHENG S Y , CHEN W L . Novel user influence measurement, based on user interaction in microblog[C]// The 2013 IEEE/ACM In-ternational Conference on Advances in Social Networks Analysis and MiningNiagara Falls. Canada. c2013:615-619.
|
[4] |
WU X M , WANG J M . Micro-blog in China: identify influential users and automatically classify posts on Sina micro-blog[J]. Journal of Ambient Intelligence and Humanized Computing, 2014,5(1):51-63.
|
[5] |
CHA M Y , HADDADI H , BENEVENUTO F . Measuring user influ-ence in Twitter: the million follower fallacy[C]// The Fourth Interna-tional AAAI Conference on Weblogs and Social Media. Washington, DC, USA. c2010:10-18.
|
[6] |
LEAVITT A , BURCHARD E , FISHER D , et al. The Influentials:New Approaches for Analyzing Influence on Twitter[R]. Web Ecolo-gy Project, 2009
|
[7] |
KITSAK M , GALLOS L K , HAVLIN S . Identification of influential spreaders in complex networks[J]. Nature Physics, 2010,6(11):888-893.
|
[8] |
BROWN P , FENG J L . Measuring user influence on Twitter using modified K -shell decomposition[C]// The 2011 ICWSM Workshop on the Social Mobile Web. Barcelona, Spain. c2011:18-23.
|
[9] |
CHEN D B , LV L Y , SHANG M S . Identifying influential nodes in complex networks[J]. Physica A: Statistical Mechanics and its Appli-cations, 2012,391(4):1777-1787.
|
[10] |
HUANG Y L , LI L . Analysis of user influence in social network based on behavior and relationship[C]// The 2nd International Conference on Measurement, Information and Control. Harbin, China. c2013:682-686.
|
[11] |
TANG X N , YANG C C . Ranking user influence in healthcare social media[J]. ACM Transactions on Intelligent Systems and Technology, 2012,3(4):565-582.
|
[12] |
UYSAL I , CRFOFT W B . User oriented tweet ranking: a filtering approach to microblogs[C]// The 20th ACM International Conference on Information and knowledge Management. Glasgow, Scotland. c2011:2261-2264.
|
[13] |
SUN B M , VINCENT T Y . Identifying influential users by their post-ings in social networks[C]// The23rd ACM Conference on Hypertext and Social Media Workshop on Modeling Social Media. Milwaukee, USA, c2012:1-8.
|
[14] |
STRINGHINI G , KRUEGEL C , VIGNA G . Detecting spammers on social networks[C]// The 26th Annual Computer Security Applications Conference. New York, NY, USA: ACM, c2010:1-9.
|
[15] |
CHU Z , GIANVECCHIO S , WANG H N . Detecting automation of Twitter accounts: are you a human, bot, or cyborg[J]. IEEE Transactions on Dependable and Secure Computing, 2012,9(6):811-824.
|
[16] |
BHAT S Y , ISLAMIA J M , DELHI N . Community-based features for identifying spammers in online social networks[C]// The 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. Niagara Falls,Canada, c2013:100-107.
|
[17] |
SUN Q D , WANG N , ZHOU Y D , et al. Modeling for user Interaction by influence transfer effect in online social networks[C]// The 39th IEEE Conference on Local Computer Networks. Edmonton, Canada, c2014:486-489.
|
[18] |
LIANG H , LU G , XU N S . Analyzing user influence of micro-blog[C]// 2012 IEEE fifth International Conference on Advanced Computational Intelligence(ICACI). Nanjing, China, c2012:15-22.
|
[19] |
BAKSHY E , HOFMAN J M , MASON W A , et al. Everyone's an influencer: quantifying influence on Twitter[C]// The 4th ACM Inter-national Conference on Web Search & Data Mining. HongKong, China, c2011:65-74.
|