Default Cover Image

2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)

Aug. 28 2018 to Aug. 31 2018

Barcelona, Spain

Table of Contents

ASONAM 2018Freely available from IEEE.pp. xvii-xvii
IEEE/ACM ASONAM 2018Freely available from IEEE.pp. xviii-xviii
Welcome from the ASONAM 2018 Program ChairsFreely available from IEEE.pp. xix-xix
ASONAM 2018 Organizing CommitteeFreely available from IEEE.pp. xxii-xxiii
ASONAM 2018 Program CommitteeFreely available from IEEE.pp. xxiv-xxvi
Workshop on Social Influence (SI 2018)Freely available from IEEE.pp. xxxvii-xxxvii
[ASONAM 2018 Keynotes - 4 abstracts]Full-text access may be available. Sign in or learn about subscription options.pp. xxxix-xliii
ASONAM 2018 TutorialsFull-text access may be available. Sign in or learn about subscription options.pp. xliv-l
ASONAM 2018 PanelFreely available from IEEE.pp. li-li
IEEE/ACM ASONAM 2018Freely available from IEEE.pp. lii-lii
Technical PapersFreely available from IEEE.pp. liii-liii
ASONAM 2018Freely available from IEEE.pp. 1299-1306
Jaccard Affiliation Graph (JAG) Model For Explaining Overlapping Community BehaviorsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Detecting Local Communities in Networks with Edge UncertaintyFull-text access may be available. Sign in or learn about subscription options.pp. 9-16
Characterising and Evaluating Online Communities from Live Microblogging User InteractionsFull-text access may be available. Sign in or learn about subscription options.pp. 21-24
Persistence of the Jordan Center in Random Growing TreesFull-text access may be available. Sign in or learn about subscription options.pp. 25-32
Improved Triangle Counting in Graph Streams: Power of Multi-SamplingFull-text access may be available. Sign in or learn about subscription options.pp. 33-40
Listing All Maximal k-Plexes in Temporal GraphsFull-text access may be available. Sign in or learn about subscription options.pp. 41-46
Node, Motif and Subgraph: Leveraging Network Functional Blocks Through Structural ConvolutionFull-text access may be available. Sign in or learn about subscription options.pp. 47-52
A Socio-linguistic Model for Cyberbullying DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 53-60
A Social Trust Metric For Scholarly Reputation MiningFull-text access may be available. Sign in or learn about subscription options.pp. 61-68
Are they Our Brothers? Analysis and Detection of Religious Hate Speech in the Arabic TwittersphereFull-text access may be available. Sign in or learn about subscription options.pp. 69-76
When do Crowds Turn Violent? Uncovering Triggers from MediaFull-text access may be available. Sign in or learn about subscription options.pp. 77-82
ALGeoSPF: A Hierarchical Factorization Model for POI RecommendationFull-text access may be available. Sign in or learn about subscription options.pp. 87-90
Constrained Coupled Matrix-Tensor Factorization and its Application in Pattern and Topic DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 91-94
Segregation in Social Networks: A Simple Schelling-Like ModelFull-text access may be available. Sign in or learn about subscription options.pp. 95-98
Detecting Antagonistic and Allied Communities on Social MediaFull-text access may be available. Sign in or learn about subscription options.pp. 99-106
Local Detection of Critical Nodes in Active GraphsFull-text access may be available. Sign in or learn about subscription options.pp. 107-110
SiNA: A Scalable Iterative Network AlignerFull-text access may be available. Sign in or learn about subscription options.pp. 111-118
Social Tag Embedding for the Recommendation with Sparse User-Item InteractionsFull-text access may be available. Sign in or learn about subscription options.pp. 127-134
Mood-Aware Music Recommendation via Adaptive Song EmbeddingFull-text access may be available. Sign in or learn about subscription options.pp. 135-138
Exploiting User Actions for App RecommendationsFull-text access may be available. Sign in or learn about subscription options.pp. 139-142
Towards Reliable Missing Truth Discovery in Online Social Media Sensing ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 143-150
Missing Network Data A Comparison of Different Imputation MethodsFull-text access may be available. Sign in or learn about subscription options.pp. 159-163
DE-Crawler: A Densification-Expansion Algorithm for Online Data CollectionFull-text access may be available. Sign in or learn about subscription options.pp. 164-169
Full Cycle Analysis of a Large-Scale Botnet Attack on TwitterFull-text access may be available. Sign in or learn about subscription options.pp. 170-177
Model Bots, not Humans on Social MediaFull-text access may be available. Sign in or learn about subscription options.pp. 178-185
Social Bots for Online Public Health InterventionsFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Socialbots' First Words: Can Automatic Chatting Improve Influence in Twitter?Full-text access may be available. Sign in or learn about subscription options.pp. 190-193
Localizing and Quantifying Damage in Social Media ImagesFull-text access may be available. Sign in or learn about subscription options.pp. 194-201
Negapedia: The Negative Side of WikipediaFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Diverse Teams Tend to do Good Work in Wikipedia (but Jacks of All Trades Don't)Full-text access may be available. Sign in or learn about subscription options.pp. 214-221
Local and Global Information Preserved Network EmbeddingFull-text access may be available. Sign in or learn about subscription options.pp. 222-225
Resilience and the Coevolution of Interdependent Multiplex NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 226-233
On Characterizing the Twitter Elite NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 234-241
Predicting Delay Discounting from Social Media Likes with Unsupervised Feature LearningFull-text access may be available. Sign in or learn about subscription options.pp. 254-257
Analyzing the Digital Traces of Political Manipulation: The 2016 Russian Interference Twitter CampaignFull-text access may be available. Sign in or learn about subscription options.pp. 258-265
Fight Under Uncertainty: Restraining Misinformation and Pushing out the TruthFull-text access may be available. Sign in or learn about subscription options.pp. 266-273
Weakly Supervised Learning for Fake News Detection on TwitterFull-text access may be available. Sign in or learn about subscription options.pp. 274-277
Evaluation of Political Party Cohesion Using Exponential Random Graph ModelingFull-text access may be available. Sign in or learn about subscription options.pp. 298-301
Ontology Based Similarity for Information Technology SkillsFull-text access may be available. Sign in or learn about subscription options.pp. 302-305
SPR2EP: A Semi-Supervised Spam Review Detection FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 306-313
End-to-End Compromised Account DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 314-321
Semi-supervised Content-Based Detection of Misinformation via Tensor EmbeddingsFull-text access may be available. Sign in or learn about subscription options.pp. 322-325
Implicit Entity Linking Through Ad-Hoc RetrievalFull-text access may be available. Sign in or learn about subscription options.pp. 326-329
Related Entity Finding on Highly-heterogeneous Knowledge GraphsFull-text access may be available. Sign in or learn about subscription options.pp. 330-334
Trojan Horses in Amazon's Castle: Understanding the Incentivized Online ReviewsFull-text access may be available. Sign in or learn about subscription options.pp. 335-342
Multi-Task Neural Learning Architecture for End-to-End Identification of Helpful ReviewsFull-text access may be available. Sign in or learn about subscription options.pp. 343-350
A Computational Approach to Finding Contradictions in User Opinionated TextFull-text access may be available. Sign in or learn about subscription options.pp. 351-356
Predicting Highly Rated Crowdfunded ProductsFull-text access may be available. Sign in or learn about subscription options.pp. 357-362
Opinions Power Opinions: Joint Link and Interaction Polarity Predictions in Signed NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 363-366
Crowdsourcing-Based Copyright Infringement Detection in Live Video StreamsFull-text access may be available. Sign in or learn about subscription options.pp. 367-374
Of Wines and Reviews: Measuring and Modeling the Vivino Wine Social NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 387-392
Sounds of Silence Breakers: Exploring Sexual Violence on TwitterFull-text access may be available. Sign in or learn about subscription options.pp. 397-400
Cyberbullying Detection on Instagram with Optimal Online Feature SelectionFull-text access may be available. Sign in or learn about subscription options.pp. 401-408
A Model of Homophily, Common Knowledge and Collective Action Through FacebookFull-text access may be available. Sign in or learn about subscription options.pp. 409-412
Friend Recommendation in Location-Based Social Networks via Deep Pairwise LearningFull-text access may be available. Sign in or learn about subscription options.pp. 421-428
Leveraging the Power of Informative Users for Local Event DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 429-436
How Well Did You Locate Me? Effective Evaluation of Twitter User GeolocationFull-text access may be available. Sign in or learn about subscription options.pp. 437-440
Geo-Location Identification of Facebook PagesFull-text access may be available. Sign in or learn about subscription options.pp. 441-446
Mining and Modeling Complex Leadership Dynamics of Movement dataFull-text access may be available. Sign in or learn about subscription options.pp. 447-454
Adaptive Submodular Influence Maximization with Myopic FeedbackFull-text access may be available. Sign in or learn about subscription options.pp. 455-462
A 2-Layered Graph Based Diffusion Approach for Altmetric AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 463-466
Showing 100 out of 242