-
1
-
-
77954890040
-
Detecting sources of computer viruses in networks: Theory and experiment
-
New York, NY
-
D. Shah and T. Zaman, "Detecting sources of computer viruses in networks: Theory and experiment," in Proc. Ann. ACM SIGMETRICS Conf., New York, NY, 2010, pp. 203-214.
-
(2010)
Proc. Ann. ACM SIGMETRICS Conf
, pp. 203-214
-
-
Shah, D.1
Zaman, T.2
-
2
-
-
79961005336
-
Rumors in a network: Who's the culprit?
-
Aug
-
-, "Rumors in a network: Who's the culprit?" IEEE Trans. Inf. Theory, vol. 57, pp. 5163-5181, Aug. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, pp. 5163-5181
-
-
Shah, D.1
Zaman, T.2
-
3
-
-
84864659856
-
Rumor centrality: A universal source detector
-
London, England, UK
-
-, "Rumor centrality: a universal source detector," in Proc. Ann. ACM SIGMETRICS Conf., London, England, UK, 2012, pp. 199-210.
-
(2012)
Proc. Ann. ACM SIGMETRICS Conf
, pp. 199-210
-
-
Shah, D.1
Zaman, T.2
-
5
-
-
84877888089
-
Identifying infection sources and regions in large networks
-
W. Luo, W. P. Tay, and M. Leng, "Identifying infection sources and regions in large networks," IEEE Trans. Signal Process., vol. 61, pp. 2850-2865.
-
IEEE Trans. Signal Process
, vol.61
, pp. 2850-2865
-
-
Luo, W.1
Tay, W.P.2
Leng, M.3
-
7
-
-
84890365660
-
Rooting out the rumor culprit from suspects
-
Istanbul, Turkey
-
W. Dong, W. Zhang, and C. W. Tan, "Rooting out the rumor culprit from suspects," in Proc. IEEE Int. Symp. Information Theory (ISIT), Istanbul, Turkey, 2013, pp. 2671-2675.
-
(2013)
Proc. IEEE Int. Symp. Information Theory (ISIT)
, pp. 2671-2675
-
-
Dong, W.1
Zhang, W.2
Tan, C.W.3
-
10
-
-
84890444243
-
Finding an infection source under the sis model
-
Vancouver, BC, May
-
W. Luo and W. P. Tay, "Finding an infection source under the SIS model," in Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing (ICASSP), Vancouver, BC, May 2013.
-
(2013)
Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing (ICASSP)
-
-
Luo, W.1
Tay, W.P.2
-
11
-
-
84897744551
-
Estimating infection sources in a network with incomplete observations
-
Austin, TX
-
-, "Estimating infection sources in a network with incomplete observations," in Proc. IEEE Global Conference on Signal and Information Processing (GlobalSIP), Austin, TX, 2013, pp. 301-304.
-
(2013)
Proc. IEEE Global Conference on Signal and Information Processing (GlobalSIP)
, pp. 301-304
-
-
Luo, W.1
Tay, W.P.2
-
12
-
-
84874077870
-
Spotting culprits in epidemics: How many and which ones?
-
Brussels, Belgium
-
B. A. Prakash, J. Vreeken, and C. Faloutsos, "Spotting culprits in epidemics: How many and which ones?" in IEEE Int. Conf. Data Mining (ICDM), Brussels, Belgium, 2012, pp. 11-20.
-
(2012)
IEEE Int. Conf. Data Mining (ICDM)
, pp. 11-20
-
-
Prakash, B.A.1
Vreeken, J.2
Faloutsos, C.3
-
13
-
-
84889005864
-
-
arXiv preprint arXiv:1303.5315
-
A. Y. Lokhov, M. Mezard, H. Ohta, and L. Zdeborova, "Inferring the origin of an epidemy with dynamic message-passing algorithm," arXiv preprint arXiv:1303.5315, 2013.
-
(2013)
Inferring the Origin of An Epidemy with Dynamic Message-passing Algorithm
-
-
Lokhov, A.Y.1
Mezard, M.2
Ohta, H.3
Zdeborova, L.4
-
15
-
-
84874807257
-
Identifying rumors and their sources in social networks
-
E. Seo, P. Mohapatra, and T. Abdelzaher, "Identifying rumors and their sources in social networks," in SPIE Defense, Security, and Sensing, 2012.
-
(2012)
SPIE Defense, Security, and Sensing
-
-
Seo, E.1
Mohapatra, P.2
Abdelzaher, T.3
-
18
-
-
84901393183
-
-
Technical Report, Arizona State University
-
Z. Chen, K. Zhu, and L. Ying, "Detecting multiple information sources in networks under the sir model," Technical Report, Arizona State University, 2014.
-
(2014)
Detecting Multiple Information Sources in Networks under the Sir Model
-
-
Chen, Z.1
Zhu, K.2
Ying, L.3
|