Accepted Papers

#TitleAuthors
1Maximum Channel Access Probability Based on Post-Disaster Ground Terminal Distribution DensityXingxing Hu (1,2), Demin Li (1,2), Chang Guo (1,2), Wei Hu (1,2), Lei Zhang (1,2) and Menglin Zhai (1,2)
(1) College of Information Science and Technology, Donghua University, Shanghai 201620, China
(2) Engineering Research Center of Digitized Textile and Apparel Technology, Ministry of Education, Shanghai 201620, China
2Design a management system for the influencer marketing campaign on social networkHien Nguyen (1,2), Kha Nguyen (3), Suong Hoang (3) and Tai Huynh (3,4)
(1) University of Information Technology, Ho Chi Minh city, Vietnam
(2) Vietnam National University, Ho Chi Minh city, Vietnam
(3) Kyanon Digital, Vietnam
(4) Ton Duc Thang University, Vietnam
3Privacy Attack and Defense in Network EmbeddingChao Kong, Baoxiang Chen, Shaoying Li, Yifan Chen, Jiahui Chen, Qi Zhou, Dongfang Wang and Liping Zhang
School of Computer and Information, Anhui Polytechnic University, Wuhu, China
4Behavioral Analysis to Detect Social Spammer in Online Social Networks (OSNs)Somya Ranjan Sahoo (1), Brij B Gupta (1), Chang Choi (2), Ching-Hsien Hsu (3) and John Chui Kwok Tai (4)
(1) National Institute of Technology Kurukshetra, India
(2) Gachon University, Republic of Korea
(3) Asia University, Taiwan and CS, Chung Hua University, Hsinchu, Taiwan
(4) Open University of Hong Kong, Kowloon, Hong Kong
5Classifying Malware Using Function Representations in a Static Call GraphThomas Dalton, Mauritius Schmidtler and Alireza Hadj Khodabakhshi
Webroot
6A Multi-Feature Bayesian Approach for Fake News DetectionMario Casillo (1), Francesco Colace (1), Dajana Conte (2), Massimo De Santo (1), Marco Lombardi (1), Serena Mottola (3) and Domenico Santaniello (1)
(1) DIIn, Universita degli Studi di Salerno, Fisciano (Salerno), Italy
(2) DIPMAT, Universita degli Studi di Salerno, Fisciano (Salerno), Italy
(3) Dipartimento di Studi Economici e Giuridici, Universita degli studi di Napoli Parthenope, Napoli, Italy
7An Adaptive Algorithm for Maximization of Non-Submodular Function with a Matroid ConstraintXin Sun (1), Dachuan Xu (1), Dongmei Zhang (2) and Yang Zhou (3)
(1) Department of Operations Research and Information Engineering, Beijing University of Technology, Beijing 100124, P.R. China
(2) School of Computer Science and Technology, Shandong Jianzhu University, Jinan 250101, P.R. China
(3) School of Mathematics and Statistics, Shandong Normal University, Jinan 250014, P.R. China
8COVID-19: What Are Arabic Tweeters Talking About?Btool Hamoui (1), Abdulaziz Alashaikh (2) and Eisa Alanazi (1)
(1) Center of Innovation and Development in Articial Intelligence, Umm Al-Qura University, Makkah, Saudi Arabia
(2) Computer and Networks Engineering Department, University of Jeddah, Jeddah, Saudi Arabia
9Using Large Cliques for Hierarchical Dense Subgraph DiscoveryMd Moniruzzaman Monir and A. Erdem Sarıyüce
University at Buffalo, Buffalo, NY 14260, USA
10SqueezeBioBERT: BioBERT Distillation for Healthcare Natural Language ProcessingHongbin George Du (1) and Yanke Hu (2)
(1) University of Texas at Austin, Austin TX 78712, USA
(2) Humana, Irving TX 75063, USA
11MIDMod-OSN: A Microscopic-level Information Diffusion Model for Online Social NetworksAbiola Osho, Colin Goodman and George Amariucai
Kansas State University, Manhattan KS 66506 USA
12A Network Analysis of the Cryptocurrency MarketKin Hon Ho (1), Wai Han Chiu (2) and Chin Li (3)
(1) Department of Computing, The Hang Seng University of Hong Kong
(2) Department of Supply Chain and Information Management, The Hang Seng University of Hong Kong
(3) Hong Kong – Shenzhen Finance Research Centre, The Chinese University of Hong Kong
13An Analysis of Users Engagement on Twitter During the COVID-19 Pandemic: Topical Trends and SentimentsSultan Alshamari (1), Ahmed Abusnaina (1), Mohammed Abuhamad (2), Anho Lee (3), Daehun Nyang (4) and David Mohaisen (1)
(1) University of Central Florida, Orlando, FL 32816, USA
(2) Loyola University Chicago, Chicago, IL 60660, USA
(3) Korea University, Seoul, South Korea
(4) Ewha Womans University, Incheon, South Korea
14Hierarchies in Inter-personal and Intergroup Communication in Social Networks: Case ‘Smart Voting’Alexander Kharlamov (1,2,3) and Maria Pilgun (4)
(1) Institute of Higher Nervous Activity and Neurophysiology, RAS, Moscow
(2) Moscow State Linguistic University, Moscow
(3) Higher School of Economics, Moscow
(4) Institute of Linguistics, RAS, Moscow
15Two-Stage Framework for Accurate and Differentially Private Network Information PublicationManeesh Adhikari (1), Vorapong Suppakitpaisarn (2), Arinjita Paul (1) and Chandrasekaran Pandurangan (1)
(1) Indian Institute of Technology Madras, Chennai, India.
(2) The University of Tokyo, Tokyo, Japan.
16A Fast Class Noise Detector with Multi-factor-based LearningZheng Wanwan and Mingzhe Jin
Doshisha University, Japan
17Efficient SDN-based Traffic Monitoring in IoT Networks with Double Deep Q-NetworkTri Nguyen (1), Trung Phan (2), Hoang Dinh (3), Tu Nguyen (4) and Chakchai So-In (5)
(1) Faculty of Information Technology, Duy Tan University, Danang 50206, Vietnam
(2) Chair of Communication Networks, Technische Universit¨at Chemnitz, 09126 Chemnitz, Germany
(3) School of Electrical and Data Engineering, University of Technology Sydney, NSW 2007, Australia
(4) Department of Computer Science, Purdue University Fort Wayne, Fort Wayne, IN 46805, U.S.A
(5) Department of Computer Science, Faculty of Science, Khon Kaen University, Khon Kaen 40002, Thailand
18Nonsubmodular Constrained profit maximization from increment perspectiveLiman Du, Shengminjie Chen, Suixiang Gao and Wenguo Yang
School of Mathematical Sciences, University of Chinese Academy of Science, Beijing 100049, China
19A Privacy-Preserving Blockchain-based Information Shared Scheme in Smart-CitiesYanping Wang (1), Xiaofen Wang (1), Pan Wen (1), Teng Hu (1,2) and Xiaosong Zhang (1)
(1) University of Electronic Science and Technology of China, Si Chuan, ChengDu, 611731, China
(2) Institute of Computer Application, China Academy of Engineering Physics, Si Chuan, MianYang 621900, China
20k-TruthScore: Fake News Mitigation in the Presence of Strong User BiasAkrati Saxena (1), Ralucca Gera (2) and Harsh Saxena (3)
(1) Department of Mathematics and Computer Science, Eindhoven University of Technology, Netherlands
(2) Department of CSE, KSVCEM Bijnor, India
(3) Department of Mathematics, Naval Postgraduate School, Monterey, CA, USA
21A Data Conversion Approach between GAMA and DIGIPLANT Simulating Rice Plant Growth Under Brown Planthopper InfestationHiep Huynh (1), Man Huynh (1), Hoa Tran (2) and Hai Nguyen (1)
(1) Can Tho University, Can Tho, Vietnam
(2) Thai Binh University, Thai Binh, Viet Nam
22Verifiable Blockchain Redacting Method for A Trusted Consortium with Distributed Chameleon Hash AuthorityWeilong Lv (1), Songjie Wei (1), Shasha Li (1) and Minghui Yu (2)
(1) Nanjing University of Science and Technology, School of Computer Science and Engineering, Nanjing, China
(2) Nanjing University of Science and Technology, School of Science, Nanjing, China
23Multidimensional analysis of fake news spreaders on TwitterManeet Singh (1), Rishemjit Kaur (2) and S.R.S. Iyengar (3)
(1) Indian Institute of Technology Ropar, India
(2) CSIR-Central Scientic Instruments Organization, Chandigarh, India
(3) Indian Institute of Technology Ropar, India
24Large Scale Graph Analytics for Communities using Graph Neural NetworksAsif Banka (1,2) and Roohie Naaz Mir (1)
(1) National Institute of Technology, Srinagar
(2) IUST Awantipora
25A New Metric to Evaluate Communities in Social Networks Using Geodesic DistanceSahar Bakhtar, Mohammad Saber Gholami and Hovhannes Harutyunyan
Concordia University, Montreal, Canada
26Network based Comparison of Indian Railways and AirwaysAmit Kumar Dhar, Shivam Sharma and Rishi Ranjan Singh
Department of Electrical Engineering and Computer Science Indian Institute of Technology, Bhilai Chhattisgarh, India.
27Identification of Satire and Fake Bangla NewsAbdullah Al Imran (1), Zaman Wahid (2) and Tanvir Ahmed (3)
(1) American International University-Bangladesh
(2) Daffodil International University
(3) University of Central Florida
28Graph-Based Supervised Clustering in Vector SpaceLily Schleider (1), Qipeng Zheng (1) and Eduardo Pasiliao (1)
(1) University of Central Florida, Orlando, FL 32816, USA
(2) Air Force Research Laboratory, Munitions Directorate, Eglin AFB, FL, 32542, USA
29Collective behavior of price changes of ERC-20 tokensHenri Heinonen (1), Alexander Semenov (2) and Vladimir Boginski (3)
(1) University of Jyvaskyla, Jyvaskyla, Finland
(2) University of Florida, Gainesville, FL, USA
(3) University of Central Florida, Orlando, FL, USA
30A Cutting Plane Method for Least Cost Inuence MaximizationCheng-Lung Chen (1), Eduardo L. Pasiliao (2) and Vladimir Boginski (1)
(1) University of Central Florida, Orlando, FL 32816, USA
(2) Air Force Research Laboratory, Eglin AFB, FL 32542, USA
31Double-Threshold Models for Network Influence PropagationAlexander Semenov (1), Alexander Veremyev (2), Eduardo L. Pasiliao (3) and Vladimir Boginski (2)
(1) University of Florida, Gainesville, FL, USA
(2) University of Central Florida, Orlando, FL, USA
(3) Air Force Research Laboratory, Eglin AFB, FL, USA
32Group Influence Maximization in Social NetworksYuting Zhong (1) and Longkun Guo (1,2)
(1) College of Mathematics and Computer Science, Fuzhou University, China
(2) School of Computer Science, Qilu University of Technology, China
33Detection of Sybil Attacks in Social NetworksAllan Lobo, Yukta Mandekar, Sonali Pundpal and Bidisha Roy
St. Francis Institute of Technology, University of Mumbai, Mumbai, India.
34Flexible Interval Intermittent Jamming against Eavesdropping in WAVE based Vehicular NetworksHao Li (1) and Xiaoshuang Xing (2)
(1) The George Washington Univeristy, Washington DC 20052, USA
(2) Department of Computer Science and Engineering, Changshu Institute of Technology, Changshu Jiangsu, China
35Protest perspective against COVID-19 risk mitigation strategies on the German InternetAndrzej Jarynowski (1,2), Alexander Semenov (3) and Vitaly Belik (2)
(1) Interdisciplinary Research Institute, Wroclaw, Poland
(2) System Modeling Group, Institute of Veterinary Epidemiology and Biostatistics, Freie Universität Berlin, Germany
(3) Herbert Wertheim College of Engineering, University of Florida, FL, USA
36Structuring Code-Switched Product Titles in Indonesian e-Commerce PlatformRicky Chandra (1), Rahmad Mahendra (1) and Brahmastro Kresnaraman (2)
(1) Faculty of Computer Science, University of Indonesia Depok, Indonesia
(2) Bukalapak Jakarta, Indonesia
37Anomaly Detection for Consortium Blockchains Based on Machine Learning Classification AlgorithmDongyan Huang (1), Bin Chen (1), Lang Li (1) and Yong Ding (2)
(1) Guangxi Key Laboratory of Wireless Wideband Communication and Signal Processing,Guilin University of Electronic Technology, Guilin Guangxi 541004, China
(2) Guangxi Key Laboratory of Cryptography and Information Security, Guilin Guangxi 541004, China
38Differential privacy approach to solve gradient leakage attack in federated machine learning environmentKrishna Yadav (1), B B Gupta (1), John Chui Kwok Tai (2) and Konstantinos Psannis (2)
(1) National Institute of Technology, Kurukshetra, India
(2) Open University of Hong Kong, Kowloon, Hongkong
(3) University of Macedonia, Greec
39A Novel Approach for Fake News detection in Vehicular ad-hoc network (VANET)Akshat Gaurav (1), B B Gupta (1), Arcangelo Castiglione (2), Kostas Psannis (3) and Chang Choi (4)
(1) National Institute of Technology, Kurushatra Haryana,India
(2) University of Salerno, Italy
(3) University of Macedonia, Greece
(4) Gachon University, Republic of Korea
40Metadata Security Measures for Protecting Confidential InformationMamta Na (1), B B Gupta (1), John Chui Kwok Tai (2) and Konstantinos Psannis (2)
(1) National Institute of Technology, Kurukshetra, India
(2) Open University of Hong Kong, Kowloon, Hong Kong
(3) University of Macedonia, Greece
41XSSPro: XSS Attack Detection Proxy to defend Social Networking PlatformsPooja Chaudhary (1), B B Gupta (1), Chang Choi (2) and John Chui Kwok Tai (3)
(1) National Institute of Technology Kurukshetra, India
(2) Gachon University, Republic of Korea
(3) Open University of Hong Kong, Kowloon, Hong Kong
42Graph neural network combined knowledge graph for recommendation systemĐồng Nguyễn Tiến and Hai Pham
Hanoi University of Science and Technology
43Propagation of Fake News Using Social Media: Mitigation and Research ChallengesSaqib Hakak (1), Wazir Zada Khan (2), Sweta Bhattacharya (3), G Thippa Reddy (3) and Kim-Kwang Raymond Choo (4)
(1) Faculty of Computer Science, Canadian Institute for Cybersecurity, University of New Brunswick, Fredericton,Canada
(2) Faculty of CS & IS, Jazan University, Saudi Arabia.
(3) School of Information Technology and Engineering, Vellore Institute of Technology, India.
(4) Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX 78249-0631, USA
44Perturbing Internal Opinions to Achieve Lower Polarization (Extended Abstract)Inzamam Rahaman and Patrick Hosein
The University of the West Indies, St. Augustine, Trinidad and Tobago
45A Bicriteria Streaming Algorithm to Balance Coverage and Cost with Cardinality Constraint (Extended Abstract)Yijing Wang (1), Dachuan Xu (1), Donglei Du (2) and Yanjun Jiang (3)
(1) Department of Operations Research and Information Engineering, Beijing University of Technology, Beijing 100124, P.R. China
(2) Faculty of Management, University of New Brunswick, Fredericton E3B 5A3, Canada
(3) School of Mathematics and Statistics Science, Ludong University, Yantai 264025, P.R. China
46Differentially private k-center problemFan Yuan (1), Dachuan Xu (1), Donglei Du (2) and Min Li (3)
(1) Department of Operations Research and Information Engineering, Beijing University of Technology, Beijing 100124, P.R. China
(2) Faculty of Management, University of New Brunswick, Fredericton E3B 5A3, Canada
(3) School of Mathematics and Statistics, Shandong Normal University, Jinan 250014, P.R. China.