2022
DOI: 10.1109/tkde.2020.3016293
|View full text |Cite
|
Sign up to set email alerts
|

Approximate Algorithms for Data-Driven Influence Limitation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
2

Relationship

2
5

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 52 publications
0
4
0
Order By: Relevance
“…Social media platforms such as Facebook, Instagram, and YouTube use complex algorithms to determine the content to show in a user's feed. The algorithms are designed to prioritize content that generates high engagement in the form of likes, comments, and shares since they drive user activities and increase revenues [74]. However, prioritizing sensational and controversial posts over accurate and reliable information that derives engagement can contribute to spreading fake news [75,76].…”
Section: Social Media Algorithms That Prioritize Engagement Over the ...mentioning
confidence: 99%
“…Social media platforms such as Facebook, Instagram, and YouTube use complex algorithms to determine the content to show in a user's feed. The algorithms are designed to prioritize content that generates high engagement in the form of likes, comments, and shares since they drive user activities and increase revenues [74]. However, prioritizing sensational and controversial posts over accurate and reliable information that derives engagement can contribute to spreading fake news [75,76].…”
Section: Social Media Algorithms That Prioritize Engagement Over the ...mentioning
confidence: 99%
“…In network design, the goal is to modify the network so that an objective function modeling a desirable property is optimized. Examples of such objective functions include optimizing shortest path distances (traffic and sustainability improvement) [11,23,27,28], increasing centrality of target nodes by adding a small set of edges [7,18,26], optimizing the 𝑘-core [24,39], manipulating node similarities [10], and boosting/containing influence on social networks [5,20,25].…”
Section: Related Workmentioning
confidence: 99%
“…These problems aim to optimize network properties or processes under network modifications. Examples include diameter [6], node centrality [5,19] shortest path [7,16,20,21], and influence spread [10,11,18,26] improvement. However, our objective is different from the ones considered by network design studies.…”
Section: Related Workmentioning
confidence: 99%