{"id":269,"date":"2020-11-28T15:35:32","date_gmt":"2020-11-28T15:35:32","guid":{"rendered":"http:\/\/optnetsci.cise.ufl.edu\/CSoNet\/?page_id=269"},"modified":"2022-10-29T20:51:46","modified_gmt":"2022-10-29T20:51:46","slug":"accepted-papers","status":"publish","type":"page","link":"http:\/\/localhost\/CSoNet\/index.php\/accepted-papers\/","title":{"rendered":"Accepted Papers"},"content":{"rendered":"\n

Full papers<\/h4>\n\n\n\n
Title<\/th>Authors<\/th><\/tr><\/thead>
Social and Motivational Factors for the Spread of Physical Activities in a Health Social Network<\/td>Nhathai Phan (New Jersey Institute of Technology), David Kil (HealthMantic Inc.), Brigitte Piniewski (PeaceHealth Laboratories) and Dejing Dou (University of Oregon)<\/td><\/tr>
AdvEdge: Optimizing Adversarial Perturbations against Interpretable Deep Learning<\/td>Eldor Abdukhamidov (Sungkyunkwan university), Mohammed Abuhamad (Loyola University Chicago), Firuz Juraev (Sungkyunkwan University), Eric Chan-Tin (Loyola University Chicago) and Tamer Abuhmed (Sungkyunkwan University)<\/td><\/tr>
A Framework for Accelerating Graph Convolution Networks on Massive Datasets<\/td>Xiang Li (The Ohio State University), Ruoming Jin (Kent State University), Rajiv Ramnath (The Ohio State University) and Gagan Agrawal (Augustaa University)<\/td><\/tr>
Security Breaches in the Healthcare Domain: A Spatiotemporal Analysis<\/td>Mohammed Al Kinoon, Marwan Omar (University of Central Florida), Manar Mohaisen (Northeastern Illinois University) and David Mohaisen (University of Central Florida)<\/td><\/tr>
Network based Framework to Compare Vaccination Strategies<\/td>Rishi Ranjan Singh (Indian Institute of Technology Bhilai), Amit Kumar Dhar, Arzad Alam Kherani, Naveen Varghese Jacob, Devansh Bajpai and Ashitabh Misra (Indian Institute of Technology Bhilai, India)<\/td><\/tr>
Summarization Algorithms for News: a Study of the Coronavirus Theme and its Impact on the News Extracting Algorithm<\/td>Lyudmila Gadasina (Saint-Petersburg State University), Vladislav Veklenko (The Moscow Institute of Physics and Technology) and Pasi Luukka (LUT University)<\/td><\/tr>
Groups Influence with Minimum Cost in Social Network<\/td>Phuong Pham (Faculty of Information Technology, Ho Chi Minh city University of Food Industry), Canh Pham, Hieu Duong, Thanh Nguyen (Phenikaa University) and My T. Thai (University of Florida)<\/td><\/tr>
Mean User-Text Agglomeration (MUTA): Practical User Representation and Visualization for Detection of Online Influence Operations<\/td>Evan Crothers, Herna Viktor (University of Ottawa) and Nathalie Japkowicz (American University)<\/td><\/tr>
Streaming algorithms for maximizing non-submodular functions on the integer lattice<\/td>Bin Liu, Zihan Chen (Ocean University of China), Huijuan Wang (Qingdao University) and Weili Wu (The University of Texas at Dallas)<\/td><\/tr>
Causal Inference for Influence Propagation — Identifiability of the Independent Cascade Model<\/td>Shi Feng (Tsinghua University) and Wei Chen (Microsoft Research)<\/td><\/tr>
Influence and Activation Thresholds Target Set Selection within Community Structure<\/td>Zhecheng Qiang (University of Central Florida), Eduardo Pasiliao (Air Force Research Laboratory) and Qipeng Zheng (University of Central Florida)<\/td><\/tr>
Recovering communities in temporal networks using persistent edges<\/td>Konstantin Avrachenkov, Maximilien Dreveton (INRIA) and Lasse Leskel\u00e4 (Aalto University)<\/td><\/tr>
Streaming algorithms for Budgeted $k$-Submodular Maximization problem<\/td>Canh Pham (Phenikaa University), Dung Ha (University of Engineering and Technology), Quang Vu (People’s Security Academy) and Tai Nguyen (University of Engineering and Technology)<\/td><\/tr>
The Role of Information Organization and Knowledge Structuring in Combatting Misinformation: A Literary Analysis<\/td>Kevin Matthe Caramancion (University at Albany, SUNY)<\/td><\/tr>
Approximation algorithms for the lower bounded correlation clustering problem<\/td>Sai Ji (Academy of Mathematics and Systems Science, Chinese Academy of Sciences), Yinhong Dong (South-Central University for Nationalities), Donglei Du (University of New Brunswick) and Dachuan Xu ( Beijing University of Technology)<\/td><\/tr>
Community Detection using Semilocal Topological Features and Label Propagation Algorithm<\/td>Akrati Saxena (Eindhoven University of Technology), Ralucca Gera (Naval Postgraduate School) and Deepanshu Malhotra (Guru Gobind Singh Indraprastha University)<\/td><\/tr>
Incorporating Transformer Models for Sentiment Analysis and News Classification in Khmer<\/td>Md Rifatul Islam Rifat (Rajshahi University of Engineering & Technology) and Abdullah Al Imran (American International University-Bangladesh)<\/td><\/tr>
Twitter Analysis of Covid-19 Misinformation in Spain<\/td>Diego Saby, Olivier R. Philippe, Nataly Buslon, Javier del Valle, Oriol Puig (Barcelona Supercomputing Center), Ram\u00f3n Salaverr\u00eda (Universidad de Navarra) and Mar\u00eda Jos\u00e9 Rementeria (Barcelona Supercomputing Center)<\/td><\/tr>
Deep Bangla Authorship Attribution using Transformer Models<\/td>Abdullah Al Imran (American International University-Bangladesh) and Md Nur Amin (University Jean Monnet Saint Etienne)<\/td><\/tr>
Comparing Community-aware Centrality Measures in Online Social Networks<\/td>Stephany Rajeh, Marinette Savonnet, Eric Leclercq and Hocine Cherifi (University of Burgundy)<\/td><\/tr>
Social cohesion during stay-at-home phase during the first wave of COVID-19 in Poland<\/td>Andrzej Jarynowski (Interdisciplinary Research Institute in Wroclaw), Alexander Semenov (University of Florida), Monika W\u00f3jta-Kempa (Wroc\u0142aw Medical University) and Vitaly Belik (Freie Universit\u00e4t Berlin)<\/td><\/tr>
Power Grid Cascading Failure Prediction Based on Transformer<\/td>Tianxin Zhou, Xiang Li and Haibing Lu (Santa Clara University)<\/td><\/tr>
Two-Tier Cache-Aided Full-Duplex Content Delivery in Satellite-Terrestrial Networks<\/td>Quynh Ngo, Khoa Phan, Wei Xiang, Abdun Mahmood (La Trobe University) and Jill Slay (University of South Australia)<\/td><\/tr>
Machine Learning Technique for Fake News Detection Using Text-Based Word Vector Representation<\/td>Akshat Gaurav, B B Gupta (NIT Kurukshatra), Ching-Hsien Hsu (Asia University), Arcangelo Castiglione (University of Salerno) and Kwok Tai Chui (The Open University of Hong Kong)<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n

Short papers<\/h4>\n\n\n\n
Title<\/th>Authors<\/th><\/tr><\/thead>
Approximation Algorithm for Maximizing Nonnegative Weakly Monotonic Set Functions<\/td>Min Cui (Beijing University of Technology), Donglei Du (University of New Brunswick), Dachuan Xu ( Beijing University of Technology) and Ruiqi Yang (University of Chinese Academy Sciences)<\/td><\/tr>
Differentially Private Submodular Maximization over Integer Lattice<\/td>Jiaming Hu, Dachuan Xu (Beijing University of Technology), Donglei Du (University of New Brunswick) and Cuixia Miao (School of Mathematical Sciences, Qufu Normal University)<\/td><\/tr>
MIC Model for Cervical Cancer Risk Factors Deep Association Analysis<\/td>Tiehua Zhou, Yingxuan Tang (Northeast Electric Power University), Ling Gong (Beihua University), Hua Xie (Jilin Central General Hospital), Minglei Shan and Ling Wang (Northeast Electric Power University)<\/td><\/tr>
Maximizing the sum of a supermodular function and a monotone DR-submodular function subject to a knapsack constraint on the integer lattice<\/td>Jingjing Tan (Weifang University), Yicheng Xu, Dongmei Zhang (Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences) and Xiaoqing Zhang (Beijing University of Technology)<\/td><\/tr>
A Deep Learning Based Traffic Sign Detection for Intelligent Transportation Systems<\/td>Bao-Long Le, Gia-Huy Lam, Xuan-Vinh Nguyen, The-Manh Nguyen, Quoc-Loc Duong (Vietnam National University), Quang Dieu Tran (Ho Chi Minh National Academy of Politics), Trong-Hop Do (Vietnam National University) and Nhu-Ngoc Dao (Sejong University)<\/td><\/tr>
Detecting Hate Speech Contents Using Embedding Models<\/td>Phuc Duong (Ton Duc Thang University)<\/td><\/tr>
Understanding the Issues Surrounding COVID-19 Vaccine Roll Out Via User Tweets<\/td>Jose Esparza (Research Experience for Peruvian Undergraduates), Gissella Bejarano, Arti Ramesh and Anand Seetharam (SUNY Binghamton)<\/td><\/tr>
Minimize Travel Time with Traffic Flow Density Equilibrium on Road Network<\/td>Qinghua Tang, Demin Li, Shuang Zhou and Yue Fu (Donghua University)<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n

Extended abstracts<\/h4>\n\n\n\n
Title<\/th>Authors<\/th><\/tr><\/thead>
Social activity and decentralized applications in blockchain-based social networks<\/td>Cheick Tidiane Ba, Galdeman Alessia, Matteo Zignani and Sabrina Gaito (University of Milan)<\/td><\/tr>
Fake News Detection using LDA Topic Modelling and K-Nearest Neighbor Classifier<\/td>Francesco Colace (Universit\u00e0 degli studi di Salerno), Mario Casillo (University of Naples Federico II) and Domenico Santaniello (University of Salerno)<\/td><\/tr>
Transfer learning and loan default prediction<\/td>Tzvi Feinberg, Alexander Semenov, Yongpei Guan (University of Florida), Dmitry Grigoriev (Saint Petersburg State University) and Artem Prokhorov (University of Sydney)<\/td><\/tr>
When Manufacturer Builds the External Developer Network: Effects of Crowdsourcing Design<\/td>Ping Yan and Jun Pei (Hefei University of Technology)<\/td><\/tr>
Data-driven Integrated Production Planning and Scheduling in Supply Chain Network: New Paradigm and Two-stage Collaborative Algorithm<\/td>Ya Zhou and Jun Pei (Hefei University of Technology)<\/td><\/tr>
Vulnerabilities Assessment of Deep Learning-based Fake News Checker under Poisoning Attacks<\/td>Fiammetta Marulli, Lelio Campanile, Mauro Iacono, Michele Mastroianni (Universit\u00e0 degli Studi della Campania “l.Vanvitelli”) and Pasquale Cantiello (Istituto Nazionale di Geofisica e Vulcanologia)<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n

<\/p>\n","protected":false},"excerpt":{"rendered":"

Full papers Title Authors Social and Motivational Factors for the Spread of Physical Activities in a Health Social Network Nhathai Phan (New Jersey Institute of Technology), David Kil (HealthMantic Inc.), Brigitte Piniewski (PeaceHealth Laboratories) and Dejing Dou (University of Oregon) AdvEdge: Optimizing Adversarial Perturbations against Interpretable Deep Learning Eldor Abdukhamidov (Sungkyunkwan university), Mohammed Abuhamad (Loyola […]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_links_to":"","_links_to_target":""},"_links":{"self":[{"href":"http:\/\/localhost\/CSoNet\/index.php\/wp-json\/wp\/v2\/pages\/269"}],"collection":[{"href":"http:\/\/localhost\/CSoNet\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/localhost\/CSoNet\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/localhost\/CSoNet\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/localhost\/CSoNet\/index.php\/wp-json\/wp\/v2\/comments?post=269"}],"version-history":[{"count":22,"href":"http:\/\/localhost\/CSoNet\/index.php\/wp-json\/wp\/v2\/pages\/269\/revisions"}],"predecessor-version":[{"id":490,"href":"http:\/\/localhost\/CSoNet\/index.php\/wp-json\/wp\/v2\/pages\/269\/revisions\/490"}],"wp:attachment":[{"href":"http:\/\/localhost\/CSoNet\/index.php\/wp-json\/wp\/v2\/media?parent=269"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}