Research Output 1993 2019

Filter
Conference contribution
2019

Attribute Based Encryption for Information Sharing on Tactical Mobile Networks

Luo, J., Dong, Q., Huang, D. & Kang, M., Jan 2 2019, 2018 IEEE Military Communications Conference, MILCOM 2018. Institute of Electrical and Electronics Engineers Inc., p. 960-965 6 p. 8599802. (Proceedings - IEEE Military Communications Conference MILCOM; vol. 2019-October).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Wireless networks
Access control
1 Citation (Scopus)

Beyond news contents: The role of social context for fake news detection

Shu, K., Wang, S. & Liu, H., Jan 30 2019, WSDM 2019 - Proceedings of the 12th ACM International Conference on Web Search and Data Mining. Association for Computing Machinery, Inc, p. 312-320 9 p. (WSDM 2019 - Proceedings of the 12th ACM International Conference on Web Search and Data Mining).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ecosystems
Costs
Experiments

Combining Dynamic and Static Attack Information for Attack Tracing and Event Correlation

Alshamrani, A., Chowdhary, A., Mjihil, O., Myneni, S. & Huang, D., Feb 20 2019, 2018 IEEE Global Communications Conference, GLOBECOM 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8647326. (2018 IEEE Global Communications Conference, GLOBECOM 2018 - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

tracing
Tracing
attack
Attack
Intrusion detection

Fake News: Fundamental theories, detection strategies and challenges

Zhou, X., Zafarani, R., Shu, K. & Liu, H., Jan 30 2019, WSDM 2019 - Proceedings of the 12th ACM International Conference on Web Search and Data Mining. Association for Computing Machinery, Inc, p. 836-837 2 p. (WSDM 2019 - Proceedings of the 12th ACM International Conference on Web Search and Data Mining).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Information science
Social sciences
Information retrieval
Computer science
Data mining

Improving student learning performance in a virtual hands-on lab system in cybersecurity education

Zeng, Z., Deng, Y., Hsiao, I., Huang, D. & Chung, C. J., Mar 4 2019, Frontiers in Education: Fostering Innovation Through Diversity, FIE 2018 - Conference Proceedings. Institute of Electrical and Electronics Engineers Inc., 8658855. (Proceedings - Frontiers in Education Conference, FIE; vol. 2018-October).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

learning performance
Education
Students
learning
education

Interactive anomaly detection on attributed networks

Ding, K., Li, J. & Liu, H., Jan 30 2019, WSDM 2019 - Proceedings of the 12th ACM International Conference on Web Search and Data Mining. Association for Computing Machinery, Inc, p. 357-365 9 p. (WSDM 2019 - Proceedings of the 12th ACM International Conference on Web Search and Data Mining).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection
Labeling
Failure analysis
Costs
Experiments

Linked variational autoencoders for inferring substitutable and supplementary items

Rakesh, V., Wang, S., Shu, K. & Liu, H., Jan 30 2019, WSDM 2019 - Proceedings of the 12th ACM International Conference on Web Search and Data Mining. Association for Computing Machinery, Inc, p. 438-446 9 p. (WSDM 2019 - Proceedings of the 12th ACM International Conference on Web Search and Data Mining).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Collaborative filtering
Neural networks
Controllers
Experiments
Deep learning

Personalized Learning in a Virtual Hands-on Lab Platform for Computer Science Education

Deng, Y., Lu, D., Chung, C. J., Huang, D. & Zeng, Z., Mar 4 2019, Frontiers in Education: Fostering Innovation Through Diversity, FIE 2018 - Conference Proceedings. Institute of Electrical and Electronics Engineers Inc., 8659291. (Proceedings - Frontiers in Education Conference, FIE; vol. 2018-October).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

computer science
Computer science
Education
Students
learning

Protecting user privacy: An approach for untraceable web browsing history and unambiguous user profiles

Beigi, G., Guo, R., Nou, A., Zhang, Y. & Liu, H., Jan 30 2019, WSDM 2019 - Proceedings of the 12th ACM International Conference on Web Search and Data Mining. Association for Computing Machinery, Inc, p. 213-221 9 p. (WSDM 2019 - Proceedings of the 12th ACM International Conference on Web Search and Data Mining).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

History
Internet service providers
Websites
Internet
Communication

The danger of missing instructions: A systematic analysis of security requirements for MCPS

Lamp, J., Rubio-Medrano, C. E., Zhao, Z. & Ahn, G-J., Feb 21 2019, Proceedings - 2018 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies, CHASE 2018. Institute of Electrical and Electronics Engineers Inc., p. 94-99 6 p. (Proceedings - 2018 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies, CHASE 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer Security
instruction
Delivery of Health Care
Quality of Health Care
Documentation

Understanding and detecting private interactions in underground forums

Sun, Z., Rubio-Medrano, C. E., Zhao, Z., Bao, T., Doupe, A. & Ahn, G-J., Mar 13 2019, CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 303-314 12 p. (CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Learning systems
Detectors

Using social media to understand cyber attack behavior

Sliva, A., Shu, K. & Liu, H., Jan 1 2019, Advances in Human Factors, Business Management and Society - Proceedings of the AHFE 2018 International Conference on Human Factors, Business Management and Society, 2018. Springer Verlag, p. 636-645 10 p. (Advances in Intelligent Systems and Computing; vol. 783).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sensors
Experiments

XBully: Cyberbullying detection within a multi-modal context

Cheng, L., Li, J., Silva, Y., Hall, D. & Liu, H., Jan 30 2019, WSDM 2019 - Proceedings of the 12th ACM International Conference on Web Search and Data Mining. Association for Computing Machinery, Inc, p. 339-347 9 p. (WSDM 2019 - Proceedings of the 12th ACM International Conference on Web Search and Data Mining).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Heterogeneous networks
Identification (control systems)
2018

#metoo through the lens of social media

Manikonda, L., Beigi, G., Kambhampati, S. & Liu, H., Jan 1 2018, Social, Cultural, and Behavioral Modeling - 11th International Conference, SBP-BRiMS 2018, Proceedings. Bisgin, H., Thomson, R., Hyder, A. & Dancy, C. (eds.). Springer Verlag, p. 104-110 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10899 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Social Media
Lens
Lenses
Comparative Analysis
Sharing

Adaptive implicit friends identification over heterogeneous network for social recommendation

Yu, J., Gao, M., Li, J., Yin, H. & Liu, H., Oct 17 2018, CIKM 2018 - Proceedings of the 27th ACM International Conference on Information and Knowledge Management. Paton, N., Candan, S., Wang, H., Allan, J., Agrawal, R., Labrinidis, A., Cuzzocrea, A., Zaki, M., Srivastava, D., Broder, A. & Schuster, A. (eds.). Association for Computing Machinery, p. 357-366 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Social relations
Information networks
Network topology
Intuition
Recommender systems

AIM-SDN: Aacking information mismanagement in SDN-datastores

Dixit, V. H., Doupe, A., Shoshitaishvili, Y., Zhao, Z. & Ahn, G-J., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 664-676 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network management
Critical infrastructures
Controllers
Cloud computing
Information management

A study of reddit-user's response to rape

Kamarudin, N. S., Rakesh, V., Beigi, G., Manikouda, L. & Liu, H., Oct 24 2018, Proceedings of the 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2018. Tagarelli, A., Reddy, C. & Brandes, U. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 591-592 2 p. 8508855

Research output: Chapter in Book/Report/Conference proceedingConference contribution

rape
Processing
social media
sexual violence
language

Bridge enhanced signed directed network embedding

Chen, Y., Qian, T., Liu, H. & Sun, K., Oct 17 2018, CIKM 2018 - Proceedings of the 27th ACM International Conference on Information and Knowledge Management. Paton, N., Candan, S., Wang, H., Allan, J., Agrawal, R., Labrinidis, A., Cuzzocrea, A., Zaki, M., Srivastava, D., Broder, A. & Schuster, A. (eds.). Association for Computing Machinery, p. 773-782 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Node
Prediction
Network analysis
Social theory
Deep learning

CacheLight: Defeating the cachekit attack

Gutierrez, M., Zhao, Z., Doupe, A., Shoshitaishvili, Y. & Ahn, G-J., Oct 15 2018, ASHES 2018 - Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, co-located with CCS 2018. Association for Computing Machinery, p. 65-74 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data storage equipment
Inspection
Hardware
Malware
Hardware security

Challenges, opportunities and a framework for web environment forensics

Mabey, M., Doupe, A., Zhao, Z. & Ahn, G-J., Jan 1 2018, Advances in Digital Forensics XIV - 14th IFIP WG 11.9 International Conference, 2018. Peterson, G. & Shenoi, S. (eds.). Springer New York LLC, p. 11-33 23 p. (IFIP Advances in Information and Communication Technology; vol. 532).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

World Wide Web
Digital forensics
1 Citation (Scopus)

Challenges and preparedness of SDN-based firewalls

Dixit, V. H., Kyung, S., Zhao, Z., Doupe, A., Shoshitaishvili, Y. & Ahn, G-J., Mar 14 2018, SDN-NFVSec 2018 - Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks and Network Function Virtualization, Co-located with CODASPY 2018. Association for Computing Machinery, Inc, Vol. 2018-January. p. 33-38 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cost effectiveness
Scalability
Controllers
Industry
8 Citations (Scopus)

CrossFire: Cross media joint friend and item recommendations

Shu, K., Wang, S., Tang, J., Wang, Y. & Liu, H., Feb 2 2018, WSDM 2018 - Proceedings of the 11th ACM International Conference on Web Search and Data Mining. Association for Computing Machinery, Inc, Vol. 2018-Febuary. p. 522-530 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Deep Headline Generation for Clickbait Detection

Shu, K., Wang, S., Le, T., Lee, D. & Liu, H., Dec 27 2018, 2018 IEEE International Conference on Data Mining, ICDM 2018. Institute of Electrical and Electronics Engineers Inc., p. 467-476 10 p. 8594871. (Proceedings - IEEE International Conference on Data Mining, ICDM; vol. 2018-November).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Supervised learning
Ecosystems
Labeling
Semantics
Costs

Defining and detecting environment discrimination in android apps

Hong, Y., Hu, Y., Lai, C. M., Felix Wu, S., Neamtiu, I., McDaniel, P., Yu, P., Cam, H. & Ahn, G-J., Jan 1 2018, Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Proceedings. Springer Verlag, p. 510-529 20 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 238).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programs
Android (operating system)
Malware
Application programming interfaces (API)
Dynamic analysis

EDSGuard: Enforcing Network Security Requirements for Energy Delivery Systems

Coughlin, V., Rubio-Medrano, C., Zhao, Z. & Ahn, G-J., Dec 24 2018, 2018 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2018. Institute of Electrical and Electronics Engineers Inc., 8587430

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Geographical regions
Network security
Inspection
Network protocols
Monitoring
3 Citations (Scopus)

Exploiting emotion on reviews for recommender systems

Meng, X., Wang, S., Liu, H. & Zhang, Y., Jan 1 2018, 32nd AAAI Conference on Artificial Intelligence, AAAI 2018. AAAI press, p. 3788-3795 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Recommender systems

Exploiting user actions for app recommendations

Shu, K., Wang, S., Liu, H., Tang, J., Chang, Y. & Luo, P., Oct 24 2018, Proceedings of the 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2018. Tagarelli, A., Reddy, C. & Brandes, U. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 139-142 4 p. 8508447

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programs
functionality
scenario
1 Citation (Scopus)

Initiator: Noise-contrastive estimation for marked temporal point process

Guo, R., Li, J. & Liu, H., Jan 1 2018, Proceedings of the 27th International Joint Conference on Artificial Intelligence, IJCAI 2018. Lang, J. (ed.). International Joint Conferences on Artificial Intelligence, Vol. 2018-July. p. 2191-2197 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Maximum likelihood estimation
Recurrent neural networks
Mathematical models

Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis

Oest, A., Safei, Y., Doupe, A., Ahn, G-J., Wardman, B. & Warner, G., Jun 8 2018, Proceedings of the 2018 APWG Symposium on Electronic Crime Research, eCrime 2018. IEEE Computer Society, Vol. 2018-May. p. 1-12 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ecosystems
Websites
Paint
Servers
Phishing
1 Citation (Scopus)

Interactive Unknowns Recommendation in E-Learning Systems

Teng, S. Y., Li, J., Ting, L. P. Y., Chuang, K. T. & Liu, H., Dec 27 2018, 2018 IEEE International Conference on Data Mining, ICDM 2018. Institute of Electrical and Electronics Engineers Inc., p. 497-506 10 p. 8594874. (Proceedings - IEEE International Conference on Data Mining, ICDM; vol. 2018-November).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

E-learning
Learning systems
Students
Feedback
1 Citation (Scopus)

Learning partial-value variable relations for system modeling

Ye, N., Fok, T. Y., Wang, X., Collofello, J. & Dickson, N., Jun 13 2018, Proceedings - 2018 4th International Conference on Control, Automation and Robotics, ICCAR 2018. Institute of Electrical and Electronics Engineers Inc., p. 368-372 5 p. 8384702

Research output: Chapter in Book/Report/Conference proceedingConference contribution

System Modeling
Data mining
Learning systems
Energy utilization
Partial

Learning representations of ultrahigh-dimensional data for random distance-based outlier detection

Pang, G., Chen, L., Cao, L. & Liu, H., Jul 19 2018, KDD 2018 - Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Association for Computing Machinery, p. 2041-2050 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Detectors

Leveraging implicit contribution amounts to facilitate microfinancing requests

Ranganath, S., Beigi, G. & Liu, H., Feb 2 2018, WSDM 2018 - Proceedings of the 11th ACM International Conference on Web Search and Data Mining. Association for Computing Machinery, Inc, Vol. 2018-Febuary. p. 477-485 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Economics
Data storage equipment
Costs

Linked causal variational autoencoder for inferring paired spillover effects

Rakesh, V., Guo, R., Moraffah, R., Agarwal, N. & Liu, H., Oct 17 2018, CIKM 2018 - Proceedings of the 27th ACM International Conference on Information and Knowledge Management. Paton, N., Candan, S., Wang, H., Allan, J., Agrawal, R., Labrinidis, A., Cuzzocrea, A., Zaki, M., Srivastava, D., Broder, A. & Schuster, A. (eds.). Association for Computing Machinery, p. 1679-1682 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Spillover effects
Purchase
Inference
Consumer spending
Spillover

Maximum Distance Minimum Error (MDME): A non-parametric approach to feature selection for image-based high content screening data

Trevino, R. P., Lamkin, T. J., Smith, R., Kawamoto, S. A. & Liu, H., Mar 23 2018, 2017 Intelligent Systems Conference, IntelliSys 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-January. p. 670-677 8 p. 8324366

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Normal distribution
Minimum Distance
Feature Selection
Screening
Feature extraction
1 Citation (Scopus)

Measuring E-mail header injections on the world wide web

Chandramouli, S. P., Bajan, P. M., Kruegel, C., Vigna, G., Zhao, Z., Doupe, A. & Ahn, G-J., Apr 9 2018, Proceedings of the 33rd Annual ACM Symposium on Applied Computing, SAC 2018. Association for Computing Machinery, Vol. Part F137816. p. 1647-1656 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electronic mail
World Wide Web
Websites
Ruby

MTD 2018: 5th ACM workshop on moving target defense (MTD)

Albanese, M. & Huang, D., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2175-2176 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security of data
Computer networks
Computer systems
Industry
Secure communication

Multimodal fusion of brain networks with longitudinal couplings

Zhang, W., Shu, K., Wang, S., Liu, H. & Wang, Y., Jan 1 2018, Medical Image Computing and Computer Assisted Intervention – MICCAI 2018 - 21st International Conference, 2018, Proceedings. Frangi, A. F., Davatzikos, C., Fichtinger, G., Alberola-López, C. & Schnabel, J. A. (eds.). Springer Verlag, p. 3-11 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11072 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Neuroimaging
Brain
Fusion
Fusion reactions
Factorise
3 Citations (Scopus)

Personalized privacy-preserving social recommendation

Meng, X., Wang, S., Shu, K., Li, J., Chen, B., Liu, H. & Zhang, Y., Jan 1 2018, 32nd AAAI Conference on Artificial Intelligence, AAAI 2018. AAAI press, p. 3796-3803 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data privacy
Recommender systems

Riskpol: A risk assessment framework for preventing attribute-forgery attacks to ABAC policies

Rubio-Medrano, C. E., Zhao, Z. & Ahn, G-J., Mar 14 2018, ABAC 2018 - Proceedings of the 3rd ACM Workshop on Attribute-Based Access Control, Co-located with CODASPY 2018. Association for Computing Machinery, Inc, Vol. 2018-January. p. 54-60 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Risk assessment

Secore: Continuous extrospection with high visibility on multi-core ARM platforms

Zhang, P., Ngabonziza, B., Cho, H., Zhao, Z., Doupe, A. & Ahn, G-J., Mar 13 2018, CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, Vol. 2018-January. p. 161-163 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Visibility
Program processors
Monitoring
Internet of things
Coprocessor
2 Citations (Scopus)

Securing social media user data - An adversarial approach

Beigi, G., Shu, K., Zhang, Y. & Liu, H., Jul 3 2018, HT 2018 - Proceedings of the 29th ACM Conference on Hypertext and Social Media. Association for Computing Machinery, Inc, p. 165-173 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Similar but different: Exploiting users’ congruity for recommendation systems

Beigi, G. & Liu, H., Jan 1 2018, Social, Cultural, and Behavioral Modeling - 11th International Conference, SBP-BRiMS 2018, Proceedings. Bisgin, H., Thomson, R., Hyder, A. & Dancy, C. (eds.). Springer Verlag, p. 129-140 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10899 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Recommendation System
Recommender systems
Social Media
Building Blocks
Vary
1 Citation (Scopus)

Social cyber-security

Carley, K. M., Cervone, G., Agarwal, N. & Liu, H., Jan 1 2018, Social, Cultural, and Behavioral Modeling - 11th International Conference, SBP-BRiMS 2018, Proceedings. Bisgin, H., Thomson, R., Hyder, A. & Dancy, C. (eds.). Springer Verlag, p. 389-394 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10899 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Strategy
5 Citations (Scopus)

Sparse modeling-based sequential ensemble learning for effective outlier detection in high-dimensional numeric data

Pang, G., Cao, L., Chen, L., Lian, D. & Liu, H., Jan 1 2018, 32nd AAAI Conference on Artificial Intelligence, AAAI 2018. AAAI press, p. 3892-3899 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Feature extraction
Experiments
4 Citations (Scopus)

Streaming link prediction on dynamic atributed networks

Li, J., Wu, L., Cheng, K. & Liu, H., Feb 2 2018, WSDM 2018 - Proceedings of the 11th ACM International Conference on Web Search and Data Mining. Association for Computing Machinery, Inc, Vol. 2018-Febuary. p. 369-377 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data storage equipment
Marketing
Availability
Experiments

Towards explainable networked prediction

Li, L., Tong, H. & Liu, H., Oct 17 2018, CIKM 2018 - Proceedings of the 27th ACM International Conference on Information and Knowledge Management. Paton, N., Candan, S., Wang, H., Allan, J., Agrawal, R., Labrinidis, A., Cuzzocrea, A., Zaki, M., Srivastava, D., Broder, A. & Schuster, A. (eds.). Association for Computing Machinery, p. 1819-1822 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Prediction
Learning process
Learning systems
Top-down
Perturbation
9 Citations (Scopus)

Tracing fake-news footprints: Characterizing social media messages by how they propagate

Wu, L. & Liu, H., Feb 2 2018, WSDM 2018 - Proceedings of the 11th ACM International Conference on Web Search and Data Mining. Association for Computing Machinery, Inc, Vol. 2018-Febuary. p. 637-645 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Spreaders
1 Citation (Scopus)

Turning Clicks into purchases: Revenue optimization for product search in e-commerce

Wu, L., Hu, D., Hong, L. & Liu, H., Jun 27 2018, 41st International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 2018. Association for Computing Machinery, Inc, p. 365-374 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electronic commerce
Search engines
Feedback
Information retrieval
Labels
1 Citation (Scopus)

Understanding cyber attack behaviors with sentiment information on social media

Shu, K., Sliva, A., Sampson, J. & Liu, H., Jan 1 2018, Social, Cultural, and Behavioral Modeling - 11th International Conference, SBP-BRiMS 2018, Proceedings. Bisgin, H., Thomson, R., Hyder, A. & Dancy, C. (eds.). Springer Verlag, p. 377-388 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10899 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Social Media
Attack
Logistics
Planning
Communication