[1] NEWMAN M E J. The structure and function of complex networks[J]. SIAM Review, 2003,45(2):167-256.
[2] LAZER D M J, BAUM M A, BENKLER Y, et al. The science of fake news[J]. Science, 2018,359(6380):1094-1096.
[3] EDUNOV S, DIUK C, FILIZ I, et al.Three and a Half Degrees of Separation [EB/OL]. [2019-10-01]. https://www.mendeley.com/catalogue/three-half-degrees-separation/.
[4] GUESS A, NAGLER J, TUCKER J. Less than you think: Prevalence and predictors of fake news dissemination on Facebook[J].Science Advances, 2019,5(1):eaau4586.
[5] METAXAS P T, FINN S, MUSTAFARAJ E. Using TwitterTrails.com to investigate rumor propagation[C]// Proceedings of the 18th ACM Conference on Companion Computer Supported Cooperative Work and Social Computing. 2015:69-72.
[6] GUPTA A, KUMARAGURU P, CASTILLO C, et al. TweetCred: Real-time credibility assessment of content on Twitter[C]// The 6th International Conference on Social Informatics. 2014:228-243.
[7] SHAO C C, CIAMPAGLIA G L ,FLAMMINI A, et al. Hoaxy: A platform for tracking online misinformation[C]// Proceedings of the 3rd Workshop on Social News on the Web. 2016.
[8] Emergent Website. Home[EB/OL].[2019-10-01]. http://www.emergent.info/.
[9] Snopes Media Group Inc. Home[EB/OL].[2019-10-01]. https://www.snopes.com/.
[10]Factcheck.org. Home[EB/OL].[2019-10-01]. https://www.factcheck.org/.
[11]SHAH D, ZAMAN T R. Rumors in a network: Who’s the culprit?[J]. IEEE Transactions on Information Theory, 2011,57(8):5163-5181.
[12]SHAH D, ZAMAN T. Rumor centrality: A universal source detector[J]. ACM SIGMETRICS Performance Evaluation Review, 2012,40(1):199-210.
[13]〖JP3〗DONG W X, ZHANG W Y, TAN C W. Rooting out the rumor culprit from suspects[C]// Proceedings of IEEE International Symposium on Information Theory. 2013:2671-2675.
[14]YU P D, TAN C W, FU H L. Rumor source detection in finite graphs with boundary effects by message-passing algorithms[C]//IEEE/ACM International Conference on Advancesin Social Networks Analysis and Mining. 2018:175-192.
[15]〖JP3〗LUO W P, TAY W P, LENG M . How to identify an infection source with limited observations[J]. IEEE Journal of Selected Topics in Signal Processing, 2014,8(4):586-597.
[16]WANG Z X, ZHANG W Y, TAN C W. On inferring rumor source for SIS model under multiple observations[C]// IEEE International Conference on Digital Signal Processing. 2015:755-759.
[17]SAITO K, KIMURA M, MOTODA H. Discovering influential nodes for SIS models in social networks[C]// International Conference on Discovery Science. 2009:302-316.
[18]ZHU K, YING L. Information source detection in the SIR model: A sample path based approach[J]. IEEE/ACM Transactions on Networking, 2012,24(1):408-421.
[19]WOO J Y, CHEN H C. Epidemic model for information diffusion in Web forums: Experiments in marketing exchange and political dialog[J]. SpringerPlus, 2016:5(1):Article Number 66.
[20]SONG L P, JIN Z, SUN G Q. Modeling and analyzing of botnet interactions[J]. Physica A: Statistical Mechanics and Its Applications, 2011,390(2):347-358.
[21]ZANG W Y, ZHANG P, ZHOU C, et al. Locating multiple sources in social networks under the SIR model: A divide-and-conquer approach[J]. Journal of Computational Science, 2015,10:278-287.
[22]PALUCH R, LU X, SUCHECKI K, et al. Fast and accurate detection of spread source in large complex networks[J]. Scientific Reports, 2018,8(1):Article number 2508.
[23]CHOI J Y, MOON S W, WOO J, et al. Rumor source detection under querying with untruthful answers[C]// IEEE Conference on Computer Communications. 2017. |