In this paper, we focus on maximizing the influence of online social networks (OSNs). Particularly, we try to answer how to select proper information initiators such that information can propagate as widely as possible. We stress our attention on the susceptible-infected model, a type of epidemic models, to describe the process of information diffusion. In general, OSNs can be classified into two categories, Facebook-like OSNs and Twitter-like OSNs. The former ones require bidirectional connections, while the latter do not, so we use the undirected unweighted graph and directed unweighted graph to describe them, respectively. We also pay additional attention to the nonidentity of the link probability on information transmission and build the weight graph, which can also cover both the two types of OSNs. In order to determine values of weight graph's weights, we introduce a learning method to obtain useful factors from raw data for assessing the true link probability on information transmission. Based on spectral analysis within the three graphs, our investigations on the information diffusion show that the spectral radius of the graph adjacency matrix can reflect the capability of information propagation, according to which we could determine effective initiators. We conduct our simulations on real OSNs. Experimental results show that our approach could effectively discover the initiators that spread information widely.
Recently, security of cognitive radio (CR) is becoming a severe issue. There is one kind of threat, which we call greedy spectrum occupancy threat (GSOT) in this paper, has long been ignored in previous work. In GSOT, a secondary user may selfishly occupy the spectrum for a long time, which makes other users suffer additional waiting time in queue to access the spectrum and leads to congestion or breakdown. In this paper, a queueing model is established to describe the system with greedy secondary user (GSU). Based on this model, the impacts of GSU on the system are evaluated. Numerical results indicate that the steady-state performance of the system is influenced not only by average occupancy time, but also by the number of users as well as number of channels. Since a sudden change in average occupancy time of GSU will produce dramatic performance degradation, the greedy second user prefers to increase its occupancy time in a gradual manner in case it is detected easily. Once it reaches its targeted occupancy time, the system will be in steady state, and the performance will be degraded. In order to detect such a cunning behavior as quickly as possible, we propose a wavelet based detection approach. Simulation results are presented to demonstrate the effectiveness and quickness of the proposed approach.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.