TY - JOUR AU - Shah, D. AU - Zaman, T. PY - 2011 DA - 2011// TI - Rumors in a network: who’s the culprit? JO - IEEE Trans. Inf. Theory. VL - 57 UR - https://doi.org/10.1109/TIT.2011.2158885 DO - 10.1109/TIT.2011.2158885 ID - Shah2011 ER - TY - CHAP AU - Shah, D. AU - Zaman, T. PY - 2012 DA - 2012// TI - Rumor centrality: a universal source detector BT - Proceedings of the 12th ACM SIGMETRICS/PERFORMANCE Joint International Conference on Measurement and Modeling of Computer Systems PB - ACM CY - New York ID - Shah2012 ER - TY - CHAP AU - Dong, W. AU - Zhang, W. AU - Tan, C. W. PY - 2013 DA - 2013// TI - Rooting out the rumor culprit from suspects BT - 2013 IEEE International Symposium on Information Theory PB - IEEE CY - New York ID - Dong2013 ER - TY - CHAP AU - Wang, Z. AU - Dong, W. AU - Zhang, W. AU - Tan, C. W. PY - 2014 DA - 2014// TI - Rumor source detection with multiple observations: fundamental limits and algorithms BT - Proceedings of the 2014 ACM International Conference on Measurement and Modeling of Computer Systems - SIGMETRICS ‘14 PB - ACM CY - New York ID - Wang2014 ER - TY - CHAP AU - Karamchandani, N. AU - Franceschetti, M. PY - 2013 DA - 2013// TI - Rumor source detection under probabilistic sampling BT - 2013 IEEE International Symposium on Information Theory PB - IEEE CY - New York ID - Karamchandani2013 ER - TY - JOUR AU - Luo, W. AU - Tay, W. P. AU - Leng, M. PY - 2013 DA - 2013// TI - Identifying infection sources and regions in large networks JO - IEEE Trans. Signal Process. VL - 61 UR - https://doi.org/10.1109/TSP.2013.2256902 DO - 10.1109/TSP.2013.2256902 ID - Luo2013 ER - TY - CHAP AU - Prakash, B. A. AU - Vreeken, J. AU - Faloutsos, C. PY - 2012 DA - 2012// TI - Spotting culprits in epidemics: how many and which ones? BT - 2012 IEEE 12th International Conference on Data Mining PB - IEEE CY - New York ID - Prakash2012 ER - TY - CHAP AU - Mannila, H. AU - Terzi, E. PY - 2009 DA - 2009// TI - Finding links and initiators: a graph-reconstruction problem BT - Proceedings of the 2009 SIAM International Conference on Data Mining - SDM’09 PB - SIAM CY - Philadelphia ID - Mannila2009 ER - TY - CHAP AU - Lappas, T. AU - Terzi, E. AU - Gunopulos, D. AU - Mannila, H. PY - 2010 DA - 2010// TI - Finding effectors in social networks BT - Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining - KDD ‘10 PB - ACM CY - New York ID - Lappas2010 ER - TY - CHAP AU - Kempe, D. AU - Kleinberg, J. AU - Tardos, E. PY - 2003 DA - 2003// TI - Maximizing the spread of influence through a social network BT - Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining - KDD ‘03 PB - ACM CY - New York ID - Kempe2003 ER - TY - JOUR AU - Valiant, L. G. PY - 1979 DA - 1979// TI - The complexity of enumeration and reliability problems JO - SIAM J. Comput. VL - 8 UR - https://doi.org/10.1137/0208032 DO - 10.1137/0208032 ID - Valiant1979 ER - TY - CHAP AU - Leskovec, J. AU - Huttenlocher, D. AU - Kleinberg, J. PY - 2010 DA - 2010// TI - Predicting positive and negative links in online social networks BT - Proceedings of the 19th International Conference on World Wide Web - WWW ‘10 PB - ACM CY - New York ID - Leskovec2010 ER - TY - STD TI - Leskovec, J, Huttenlocher, D, Kleinberg, J: Signed networks in social media. In: Proceedings of the 28th International Conference on Human Factors in Computing Systems - CHI ‘10, p. 1361, New York, NY, USA (2010). ID - ref13 ER -