Home - yizhihenpidehou/yzhpdh-s-bookcase GitHub Wiki

Welcome to the yzhpdh-s-bookcase wiki!

About SOCIAL MEDIA

Xinyi Zhou, Kai Shu, Vir V. Phoha, Huan Liu, and Reza Zafarani. 2022. “This is Fake! Shared it by Mistake”:Assessing the Intent of Fake News Spreaders. In Proceedings of the Web Conference 2022 (WWW '22). Association for Computing Machinery, New York, NY, USA, 3685–3694.(PDF)

Ahmadreza Mosallanezhad, Mansooreh Karami, Kai Shu, Michelle V. Mancenido, and Huan Liu. 2022. Domain Adaptive Fake News Detection via Reinforcement Learning. In Proceedings of the ACM Web Conference 2022 (WWW '22). Association for Computing Machinery, New York, NY, USA, 3632–3640. (PDF)

Munmun De Choudhury, Emre Kiciman, Mark Dredze, Glen Coppersmith, and Mrinal Kumar. 2016. Discovering Shifts to Suicidal Ideation from Mental Health Content in Social Media. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16). Association for Computing Machinery, New York, NY, USA, 2098–2110. (PDF)

About Covid-19

Salah Ghamizi, Renaud Rwemalika, Maxime Cordy, Lisa Veiber, Tegawendé F. Bissyandé, Mike Papadakis, Jacques Klein, and Yves Le Traon. 2020. Data-driven Simulation and Optimization for Covid-19 Exit Strategies. In Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (KDD '20). Association for Computing Machinery, New York, NY, USA, 3434–3442 (PDF)

About Security

Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, and Thomas Ristenpart. 2020. The tools and tactics used in intimate partner surveillance: an analysis of online infidelity forums. Proceedings of the 29th USENIX Conference on Security Symposium. USENIX Association, USA, Article 107, 1893–1909.(PDF)

Carlini, Nicholas. "Poisoning the Unlabeled Dataset of {Semi-Supervised} Learning." 30th USENIX Security Symposium (USENIX Security 21). 2021.(PDF)

Li, Huaxin, et al. "Privacy leakage via de-anonymization and aggregation in heterogeneous social networks." IEEE Transactions on Dependable and Secure Computing 17.2 (2017): 350-362.(PDF)

About Keywords Extractor

Campos R, Mangaravite V, Pasquali A, et al. Yake! collection-independent automatic keyword extractor[C]//European Conference on Information Retrieval. Springer, Cham, 2018: 806-810.(PDF)

About Attack/Defense

Carlini N. Poisoning the Unlabeled Dataset of {Semi-Supervised} Learning[C]//30th USENIX Security Symposium (USENIX Security 21). 2021: 1577-1592.(PDF)

Knittel, Lukas, et al. "XSinator. com: From a Formal Model to the Automatic Evaluation of Cross-Site Leaks in Web Browsers." CCS. 2021. (PDF)

#About Human Behavior & Prediction West, Robert, Jure Leskovec, and Christopher Potts. "Postmortem memory of public figures in news and social media." Proceedings of the National Academy of Sciences 118.38 (2021): e2106152118.(PDF)

Tang, Xianfeng, et al. "Knowing your fate: Friendship, action and temporal explanations for user engagement prediction on social apps." Proceedings of the 26th ACM SIGKDD international conference on knowledge discovery & data mining. 2020. (PDF)

About Graph Neural Network

Ying, Rex, et al. "Graph convolutional neural networks for web-scale recommender systems." Proceedings of the 24th ACM SIGKDD international conference on knowledge discovery & data mining. 2018.(PDF)

About Recommendation

Yuan, Quan, et al. "Time-aware point-of-interest recommendation." Proceedings of the 36th international ACM SIGIR conference on Research and development in information retrieval. 2013.(PDF)

#About Citation Network & Collaboration Gomez, Charles J., Andrew C. Herman, and Paolo Parigi. "Leading countries in global science increasingly receive more citations than other countries doing similar research." Nature Human Behaviour (2022): 1-11.(PDF)

Zeng, An, et al. "Impactful scientists have higher tendency to involve collaborators in new topics." Proceedings of the National Academy of Sciences 119.33 (2022): e2207436119.(PDF)

About Mobile

Lai, Zeqi, et al. "Furion: Engineering high-quality immersive virtual reality on today's mobile devices." Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking. 2017.(PDF)

Tan, Sheng, Jie Yang, and Yingying Chen. "Enabling fine-grained finger gesture recognition on commodity wifi devices." IEEE Transactions on Mobile Computing (2020).(PDF)

Sivanathan, Arunan, et al. "Classifying IoT devices in smart environments using network traffic characteristics." IEEE Transactions on Mobile Computing 18.8 (2018): 1745-1759.(PDF)

Liu, Yuxin, et al. "Vronicle: verifiable provenance for videos from mobile devices." Proceedings of the 20th Annual International Conference on Mobile Systems, Applications and Services. 2022.(PDF)

About Cross

Kong, Xiangnan, Jiawei Zhang, and Philip S. Yu. "Inferring anchor links across multiple heterogeneous social networks." Proceedings of the 22nd ACM international conference on Information & Knowledge Management. 2013.(PDF)

Zhang, Yutao, et al. "Cosnet: Connecting heterogeneous social networks with local and global consistency." Proceedings of the 21th ACM SIGKDD international conference on knowledge discovery and data mining. 2015.(PDF)

Wang, Xiang, et al. "Item silk road: Recommending items from information domains to social users." Proceedings of the 40th International ACM SIGIR conference on Research and Development in Information Retrieval. 2017.(PDF)

Shu, Kai, et al. "User identity linkage across online social networks: A review." Acm Sigkdd Explorations Newsletter 18.2 (2017): 5-17. (PDF)

Chen, Wei, et al. "Exploiting spatio-temporal user behaviors for user linkage." Proceedings of the 2017 ACM on Conference on Information and Knowledge Management. 2017.(PDF)

Jiao, Yizhu, et al. "Collective link prediction oriented network embedding with hierarchical graph attention." Proceedings of the 28th ACM international conference on information and knowledge management. 2019.(PDF)

Other

Lundberg, Scott M., et al. "From local explanations to global understanding with explainable AI for trees." Nature machine intelligence 2.1 (2020): 56-67.(PDF)