Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ASONAM
ASONAM 2018
Generate Citations
2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)
Aug. 28 2018 to Aug. 31 2018
Barcelona, Spain
Table of Contents
Proceedings of the 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2018)
Freely available from IEEE.
pp. 1-1
Proceedings of the 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Freely available from IEEE.
pp. i-xvi
ASONAM 2018
Freely available from IEEE.
pp. xvii-xvii
IEEE/ACM ASONAM 2018
Freely available from IEEE.
pp. xviii-xviii
Welcome from the ASONAM 2018 Program Chairs
Freely available from IEEE.
pp. xix-xix
2018 International Symposium on Foundations of Open Source Intelligence and Security Informatics - FOSINT-SI 2018
Freely available from IEEE.
pp. xx-xx
International Symposium on Foundations and Applications of Big Data Analytics (FAB 2018)
Freely available from IEEE.
pp. xxi-xxi
ASONAM 2018 Organizing Committee
Freely available from IEEE.
pp. xxii-xxiii
ASONAM 2018 Program Committee
Freely available from IEEE.
pp. xxiv-xxvi
International Symposium on Foundations of Open Source Intelligence and Security Informatics (FOSINT-SI 2018)
Freely available from IEEE.
pp. xxvii-xxvii
International Symposium on Foundations and Applications of Big Data Analytics (FAB 2018)
Freely available from IEEE.
pp. xxviii-xxix
International Symposium on Network Enabled Health Informatics, Biomedicine and Bioinformatics (HI-BI-BI 2018)
Freely available from IEEE.
pp. xxx-xxxi
The 9th International Workshop on Mining and Analyzing Social Networks for Decision Support (MSNDS 2018)
Freely available from IEEE.
pp. xxxii-xxxii
The Third International Workshop on Social Network Analysis Surveillance Technologies 2018 (SNAST 2018)
Freely available from IEEE.
pp. xxxiii-xxxiii
The 1st International Workshop on Multilayer and Heterogeneous Information Networks (MaHIN)
Freely available from IEEE.
pp. xxxiv-xxxiv
The 8th International Workshop on Social Network Analysis in Applications (SNAA 2018)
Freely available from IEEE.
pp. xxxv-xxxv
The 4th International Workshop on Dynamics on and of Networks (DYNO 2018)
Freely available from IEEE.
pp. xxxvi-xxxvi
Workshop on Social Influence (SI 2018)
Freely available from IEEE.
pp. xxxvii-xxxvii
International Workshop on Social Human Behavior Analysis through Online Social Networks and Media (SAO 2018)
Freely available from IEEE.
pp. xxxviii-xxxviii
[ASONAM 2018 Keynotes - 4 abstracts]
Full-text access may be available. Sign in or learn about subscription options.
pp. xxxix-xliii
ASONAM 2018 Tutorials
Full-text access may be available. Sign in or learn about subscription options.
pp. xliv-l
ASONAM 2018 Panel
Freely available from IEEE.
pp. li-li
IEEE/ACM ASONAM 2018
Freely available from IEEE.
pp. lii-lii
Technical Papers
Freely available from IEEE.
pp. liii-liii
ASONAM 2018
Freely available from IEEE.
pp. 1299-1306
Jaccard Affiliation Graph (JAG) Model For Explaining Overlapping Community Behaviors
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Chen Luo
,
Anshumali Shrivastava
Detecting Local Communities in Networks with Edge Uncertainty
Full-text access may be available. Sign in or learn about subscription options.
pp. 9-16
by
Chi Zhang
,
Osmar R. Zaïane
ProxiClust: Data Sparsification and Community Detection for Assembly-Free Metagenomic Binning
Full-text access may be available. Sign in or learn about subscription options.
pp. 17-20
by
Shivani Shah
,
Jacques-Henri Sublernontier
,
Fatma Bouali
,
Gilles Venturini
Characterising and Evaluating Online Communities from Live Microblogging User Interactions
Full-text access may be available. Sign in or learn about subscription options.
pp. 21-24
by
Hugo Hromic
,
Conor Hayes
Persistence of the Jordan Center in Random Growing Trees
Full-text access may be available. Sign in or learn about subscription options.
pp. 25-32
by
Sarath Pattathil
,
Nikhil Karamchandani
,
Dhruti Shah
Improved Triangle Counting in Graph Streams: Power of Multi-Sampling
Full-text access may be available. Sign in or learn about subscription options.
pp. 33-40
by
Neeraj Kavassery–Parakkat
,
Kiana Mousavi Hanjani
,
A. Pavan
Listing All Maximal k-Plexes in Temporal Graphs
Full-text access may be available. Sign in or learn about subscription options.
pp. 41-46
by
Matthias Bentert
,
Anne-Sophie Himmel
,
Hendrik Molter
,
Marco Morik
,
Rolf Niedermeier
,
René Saitenmacher
Node, Motif and Subgraph: Leveraging Network Functional Blocks Through Structural Convolution
Full-text access may be available. Sign in or learn about subscription options.
pp. 47-52
by
Carl Yang
,
Mengxiong Liu
,
Vincent W. Zheng
,
Jiawei Han
A Socio-linguistic Model for Cyberbullying Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 53-60
by
Sabina Tomkins
,
Lise Getoor
,
Yunfei Chen
,
Yi Zhang
A Social Trust Metric For Scholarly Reputation Mining
Full-text access may be available. Sign in or learn about subscription options.
pp. 61-68
by
Ramy Hanafy
,
Soha Makady
,
Abeer EI Korany
Are they Our Brothers? Analysis and Detection of Religious Hate Speech in the Arabic Twittersphere
Full-text access may be available. Sign in or learn about subscription options.
pp. 69-76
by
Nuha Albadi
,
Maram Kurdi
,
Shivakant Mishra
When do Crowds Turn Violent? Uncovering Triggers from Media
Full-text access may be available. Sign in or learn about subscription options.
pp. 77-82
by
Yue Ning
,
Sathappan Muthiah
,
Naren Ramakrishnan
,
Huzefa Rangwala
,
David Mares
How to Stop Violence Among Homeless: Extension of Voter Model and Intervention Strategies
Full-text access may be available. Sign in or learn about subscription options.
pp. 83-86
by
Ajitesh Srivastava
,
Robin Petering
,
Rajgopal Kannan
,
Eric Rice
,
Viktor K. Prasanna
ALGeoSPF: A Hierarchical Factorization Model for POI Recommendation
Full-text access may be available. Sign in or learn about subscription options.
pp. 87-90
by
Jean-Benoît Griesner
,
Talel Abdessalem
,
Hubert Naacke
,
Pierre Dosne
Constrained Coupled Matrix-Tensor Factorization and its Application in Pattern and Topic Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 91-94
by
Sanaz Bahargam
,
Evangelos E. Papalexakis
Segregation in Social Networks: A Simple Schelling-Like Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 95-98
by
Olivier Brandouy Gretha
,
Philippe Mathieu Cristal
,
Nicolas Mauhe
Detecting Antagonistic and Allied Communities on Social Media
Full-text access may be available. Sign in or learn about subscription options.
pp. 99-106
by
Amin Salehi
,
Hasan Davulcu
Local Detection of Critical Nodes in Active Graphs
Full-text access may be available. Sign in or learn about subscription options.
pp. 107-110
by
M. Yusuf Özkaya
,
Ahmet Erdem Sanyüce
,
Ali Pinar
,
Ümit V. Çatalyürek
SiNA: A Scalable Iterative Network Aligner
Full-text access may be available. Sign in or learn about subscription options.
pp. 111-118
by
Abdurrahman Yaşar
,
Bora Uçar
,
Ümit V. Çatalyürek
Social-EOC: Serviceability Model to Rank Social Media Requests for Emergency Operation Centers
Full-text access may be available. Sign in or learn about subscription options.
pp. 119-126
by
Hemant Purohit
,
Carlos Castillo
,
Muhammad Imran
,
Rahul Pandey
Social Tag Embedding for the Recommendation with Sparse User-Item Interactions
Full-text access may be available. Sign in or learn about subscription options.
pp. 127-134
by
Deqing Yang
,
Lihan Chen
,
Jiaqing Liang
,
Yanghua Xiao
,
Wei Wang
Mood-Aware Music Recommendation via Adaptive Song Embedding
Full-text access may be available. Sign in or learn about subscription options.
pp. 135-138
by
Chaima Dhahri
,
Kazunori Matsumoto
,
Keiichiro Hoashi
Exploiting User Actions for App Recommendations
Full-text access may be available. Sign in or learn about subscription options.
pp. 139-142
by
Kai Shu
,
Suhang Wang
,
Huan Liu
,
Jiliang Tang
,
Yi Chang
,
Ping Luo
Towards Reliable Missing Truth Discovery in Online Social Media Sensing Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 143-150
by
Daniel Yue Zhang
,
Jose Badilla
,
Yang Zhang
,
Dong Wang
Estimating the Quality of Crowdsourced Translations Based on the Characteristics of Source and Target Words and Participants
Full-text access may be available. Sign in or learn about subscription options.
pp. 151-158
by
Muhammad Rizal Khaefi
,
Rajius Idzalika
,
Imaduddin Amin
,
Zakiya Pramestri
,
Pamungkas Jutta
,
Yulistina Riyadi
,
George Hodge
,
Jong Gun Lee
Missing Network Data A Comparison of Different Imputation Methods
Full-text access may be available. Sign in or learn about subscription options.
pp. 159-163
by
Robert W. Krause
,
Mark Huisman
,
Christian Steglich
,
Tom A.B. Snijders
DE-Crawler: A Densification-Expansion Algorithm for Online Data Collection
Full-text access may be available. Sign in or learn about subscription options.
pp. 164-169
by
Katchaguy Areekijseree
,
Sucheta Soundarajan
Full Cycle Analysis of a Large-Scale Botnet Attack on Twitter
Full-text access may be available. Sign in or learn about subscription options.
pp. 170-177
by
Christoph Besel
,
Juan Echeverria
,
Shi Zhou
Model Bots, not Humans on Social Media
Full-text access may be available. Sign in or learn about subscription options.
pp. 178-185
by
Nikan Chavoshi
,
Abdullah Mueen
Social Bots for Online Public Health Interventions
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Ashok Deb
,
Anuja Majmundar
,
Sungyong Seo
,
Akira Matsui
,
Rajat Tandon
,
Shen Yan
,
Jon-Patrick Allem
,
Emilio Ferrara
Socialbots' First Words: Can Automatic Chatting Improve Influence in Twitter?
Full-text access may be available. Sign in or learn about subscription options.
pp. 190-193
by
Alkiviadis Savvopoulos
,
Pantelis Vikatos
,
Fabricio Benevenuto
Localizing and Quantifying Damage in Social Media Images
Full-text access may be available. Sign in or learn about subscription options.
pp. 194-201
by
Xukun Li
,
Doina Caragea
,
Huaiyu Zhang
,
Muhammad Imran
Characterizing Infrastructure Damage After Earthquake: A Split-Query Based IR Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 202-209
by
Shalini Priya
,
Manish Bhanu
,
Sourav Kumar Dandapat
,
Kripabandhu Ghosh
,
Joydeep Chandra
Negapedia: The Negative Side of Wikipedia
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Massimo Marchiori
,
Enrico Bonetti Vieno
Diverse Teams Tend to do Good Work in Wikipedia (but Jacks of All Trades Don't)
Full-text access may be available. Sign in or learn about subscription options.
pp. 214-221
by
Jürgen Lerner
,
Alessandro Lomi
Local and Global Information Preserved Network Embedding
Full-text access may be available. Sign in or learn about subscription options.
pp. 222-225
by
Yao Ma
,
Suhang Wang
,
Jiliang Tang
Resilience and the Coevolution of Interdependent Multiplex Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 226-233
by
Auroop Ganguly
,
Tanbay Mehta
,
Ravi Sundaram
,
Devesh Tiwari
On Characterizing the Twitter Elite Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 234-241
by
Reza Motamedi
,
Saed Rezayi
,
Reza Rejaie
,
Walter Willinger
Retweet Us, We will Retweet You: Spotting Collusive Retweeters Involved in Blackmarket Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 242-249
by
Hridoy Sankar Dutta
,
Aditya Chetan
,
Brihi Joshi
,
Tanmoy Chakraborty
Rejecting the Null Hypothesis of Apathetic Retweeting of US Politicians and SPLC-defined Hate Groups in the 2016 US Presidential Election
Full-text access may be available. Sign in or learn about subscription options.
pp. 250-253
by
Raazesh Sainudiin
,
Kumar Yogeeswaran
,
Kyle Nash
,
Rania Sahioun
Predicting Delay Discounting from Social Media Likes with Unsupervised Feature Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 254-257
by
Tao Ding
,
Warren K. Bickel
,
Shimei Pan
Analyzing the Digital Traces of Political Manipulation: The 2016 Russian Interference Twitter Campaign
Full-text access may be available. Sign in or learn about subscription options.
pp. 258-265
by
Adam Badawy
,
Emilio Ferrara
,
Kristina Lerman
Fight Under Uncertainty: Restraining Misinformation and Pushing out the Truth
Full-text access may be available. Sign in or learn about subscription options.
pp. 266-273
by
Huiling Zhang
,
Alan Kuhnle
,
J David Smith
,
My T. Thai
Weakly Supervised Learning for Fake News Detection on Twitter
Full-text access may be available. Sign in or learn about subscription options.
pp. 274-277
by
Stefan Helmstetter
,
Heiko Paulheim
CIMTDetect: A Community Infused Matrix-Tensor Coupled Factorization Based Method for Fake News Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 278-281
by
Shashank Gupta
,
Raghuveer Thirukovalluru
,
Manjira Sinha
,
Sandya Mannarswamy
EGBTER: Capturing Degree Distribution, Clustering Coefficients, and Community Structure in a Single Random Graph Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 282-289
by
Omar El-Daghar
,
Erik Lundberg
,
Robert Bridges
A Two-Stage Working Model Strategy for Network Analysis Under Hierarchical Exponential Random Graph Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 290-298
by
Ming Cao
,
Yong Chen
,
Kayo Fujimoto
,
Michael Schweinberger
Evaluation of Political Party Cohesion Using Exponential Random Graph Modeling
Full-text access may be available. Sign in or learn about subscription options.
pp. 298-301
by
Shambavi Sadayappan
,
Ian McCulloh
,
John Piorkowski
Ontology Based Similarity for Information Technology Skills
Full-text access may be available. Sign in or learn about subscription options.
pp. 302-305
by
Yeshwanth Balachander
,
Teng-Sheng Moh
SPR2EP: A Semi-Supervised Spam Review Detection Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 306-313
by
Cennet Merve Yilmaz
,
Ahmet Onur Durahim
End-to-End Compromised Account Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 314-321
by
Hamid Karimi
,
Courtland VanDam
,
Liyang Ye
,
Jiliang Tang
Semi-supervised Content-Based Detection of Misinformation via Tensor Embeddings
Full-text access may be available. Sign in or learn about subscription options.
pp. 322-325
by
Gisel Bastidas Guacho
,
Sara Abdali
,
Neil Shah
,
Evangelos E. Papalexakis
Implicit Entity Linking Through Ad-Hoc Retrieval
Full-text access may be available. Sign in or learn about subscription options.
pp. 326-329
by
Hawre Hosseini
,
Tam T. Nguyen
,
Ebrahim Bagheri
Related Entity Finding on Highly-heterogeneous Knowledge Graphs
Full-text access may be available. Sign in or learn about subscription options.
pp. 330-334
by
Ridho Reinanda
,
Edgar Meij
,
Joshua Pantony
,
Jonathan Dorando
Trojan Horses in Amazon's Castle: Understanding the Incentivized Online Reviews
Full-text access may be available. Sign in or learn about subscription options.
pp. 335-342
by
Soheil Jamshidi
,
Reza Rejaie
,
Jun Li
Multi-Task Neural Learning Architecture for End-to-End Identification of Helpful Reviews
Full-text access may be available. Sign in or learn about subscription options.
pp. 343-350
by
Miao Fan
,
Yue Feng
,
Mingming Sun
,
Ping Li
,
Haifeng Wang
,
Jianmin Wang
A Computational Approach to Finding Contradictions in User Opinionated Text
Full-text access may be available. Sign in or learn about subscription options.
pp. 351-356
by
Chuqin Li
,
Xi Niu
,
Ahmad Al-Doulat
,
Noseong Park
Predicting Highly Rated Crowdfunded Products
Full-text access may be available. Sign in or learn about subscription options.
pp. 357-362
by
Vishal Sharma
,
Kyumin Lee
Opinions Power Opinions: Joint Link and Interaction Polarity Predictions in Signed Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 363-366
by
Tyler Derr
,
Zhiwei Wang
,
Jiliang Tang
Crowdsourcing-Based Copyright Infringement Detection in Live Video Streams
Full-text access may be available. Sign in or learn about subscription options.
pp. 367-374
by
Daniel Yue Zhang
,
Qi Li
,
Herman Tong
,
Jose Badilla
,
Yang Zhang
,
Dong Wang
Adult Content in Social Live Streaming Services: Characterizing Deviant Users and Relationships
Full-text access may be available. Sign in or learn about subscription options.
pp. 375-382
by
Nikolaos Lykousas
,
Constantinos Patsakis
,
Vicenç Gómez
Development of a Social Network for Research Support and Individual Well-Being Improvement
Full-text access may be available. Sign in or learn about subscription options.
pp. 383-386
by
Lucas V.A. Caldas
,
Antonio F. L. Jacob
,
Simone S.C. Silva
,
Fernando A.R. Pontes
,
Fábio M.F. Lobato
Of Wines and Reviews: Measuring and Modeling the Vivino Wine Social Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 387-392
by
Neema Kotonya
,
Paolo De Cristofaro
,
Emiliano De Cristofaro
Nowcasting Air Quality by Fusing Insights from Meteorological Data, Satellite Imagery and Social Media Images Using Deep Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 393-396
by
Muhammad Rizal Khaefi
,
Zakiya Pramestri
,
Imaduddin Amin
,
Jong Gun Lee
Sounds of Silence Breakers: Exploring Sexual Violence on Twitter
Full-text access may be available. Sign in or learn about subscription options.
pp. 397-400
by
Aparup Khatua
,
Erik Cambria
,
Apalak Khatua
Cyberbullying Detection on Instagram with Optimal Online Feature Selection
Full-text access may be available. Sign in or learn about subscription options.
pp. 401-408
by
Mengfan Yao
,
Charalampos Chelmis
,
Daphney-Stavroula Zois
A Model of Homophily, Common Knowledge and Collective Action Through Facebook
Full-text access may be available. Sign in or learn about subscription options.
pp. 409-412
by
Gizem Korkmaz
,
Chris J. Kuhlman
,
Joshua Goldstein
,
Fernando Vega Redondo
Generative Modeling of Human Behavior and Social Interactions Using Abductive Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 413-420
by
Yihui Ren
,
Vanessa Cedeno-Mieles
,
Zhihao Hu
,
Xinwei Deng
,
Abhijin Adiga
,
Christopher Barrett
,
Saliya Ekanayake
,
Brian J. Goode
,
Gizem Korkmaz
,
Chris J. Kuhlman
,
Dustin Machi
,
Madhav V. Marathe
,
Naren Ramakrishnan
,
S. S. Ravi
,
Parang Sarat
,
Nathan Selt
,
Noshir Contractor
,
Joshua Epstein
,
Michael W. Macy
Friend Recommendation in Location-Based Social Networks via Deep Pairwise Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 421-428
by
Dimitrios Rafailidis
,
Fabio Crestani
Leveraging the Power of Informative Users for Local Event Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 429-436
by
Hengtong Zhang
,
Fenglong Ma
,
Yaliang Li
,
Chao Zhang
,
Tianqi Wang
,
Yaqing Wang
,
Jing Gao
,
Lu Su
How Well Did You Locate Me? Effective Evaluation of Twitter User Geolocation
Full-text access may be available. Sign in or learn about subscription options.
pp. 437-440
by
Ahmed Mourad
,
Falk Scholer
,
Mark Sanderson
,
Walid Magdy
Geo-Location Identification of Facebook Pages
Full-text access may be available. Sign in or learn about subscription options.
pp. 441-446
by
Yu-Cheng Lin
,
Chun-Ming Lai
,
Jon William Chapman
,
S. Felix Wu
,
George A. Barnett
Mining and Modeling Complex Leadership Dynamics of Movement data
Full-text access may be available. Sign in or learn about subscription options.
pp. 447-454
by
Chainarong Amornbunchornvej
,
Tanya Y. Berger-Wolf
Adaptive Submodular Influence Maximization with Myopic Feedback
Full-text access may be available. Sign in or learn about subscription options.
pp. 455-462
by
Guillaume Salha
,
Nikolaos Tziortziotis
,
Michalis Vazirgiannis
A 2-Layered Graph Based Diffusion Approach for Altmetric Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 463-466
by
Mohan Timilsina
,
Haixuan Yang
,
Dietrich Rebholz-Schuhmann
Showing 100 out of 242
Load More
Load All