JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2017, Vol. 52 ›› Issue (6): 99-104.doi: 10.6040/j.issn.1671-9352.2.2016.165
Previous Articles Next Articles
WANG Ya-qi, WANG Jing*
CLC Number:
[1] BHAVNANI R, FINDLEY M G, KUKLINSKI J H. Rumor dynamics in ethnic violence[J]. The Journal of Politics, 2009, 71(3): 876-892. [2] GALAM S. Modeling rumors: the no plane pentagon French hoax case[J]. Physica A, 2003, 320(15): 571-580. [3] KNAPP P H. A psychology of rumors[J]. Public Opinion Quarter, 1994, 8(1): 22-37. [4] SUDBURY A. The proportion of population never hearing a rumour[J]. Journal of applied probability, 1985, 22(2): 443-446. [5] DOROGOVTSEV S N, GOLTSEV A V, MENDES J F F. Critical phenomena in complex networks[J]. Reviews of Modern Physics, 2008, 80(4): 1275-1335. [6] PASTOR-SATORRAS R, VESPIGNANI A. Epidemic dynamics and endemic states in complex networks[J]. Physical Review E, 2001, 63(6): 066117. [7] 王亚奇,蒋国平.考虑网络流量的无标度网络病毒免疫策略研究[J]. 物理学报,2011, 60(6): 060202.1-060202.8. WANG Yaqi, JIANG Guoping. Epidemic immunization on scale-free networks with traffic flow[J]. Acta Physica Sinica, 2011, 60(6): 060202.1-060202.8. [8] LIU C, ZHANG Z K. Information spreading on dynamic social networks[J]. Communications in Nonlinear Science and Numerical Simulation, 2014, 19(4): 896-904. [9] KAWACHI K, SEKI M, YOSHIDA H, et al. A rumor transmission model with various contact interactions[J]. Journal of Theoretical Biology, 2008, 253(1): 55-60. [10] ZANETTE D H. Dynamics of rumor propagation on small-world networks[J]. Physical Review E, 2002, 65(4): 041908. [11] WANG J, WANG Y Q. SIR rumor spreading model with network medium in complex social networks[J]. Chinese Journal of Physics, 2015, 53(1): 1-21. [12] CLEMENTI, A, CRESCENZI P, DOERR C, et al. Rumor spreading in random evolving graphs[J]. Lecture Notes in Computer Science, 2013, 8125: 325-336. [13] ZHAO Z J, LIU Y M, WANG K X. An analysis of rumor propagation based on propagation force[J]. Physica A, 2016, 443: 263-271. [14] JIE R L, QIAO J, XU G J, et al. A study on the interaction between two rumors in homogeneous complex networks under symmetric conditions[J]. Physica A, 2016, 454: 129-142. [15] LUO W, TAY W P, LENG M. Infection spreading and source identification: a hide and seek game[J]. arXiv preprint arXiv:1504.04796, 2015. [16] CHEN P, GAO N. The simulation of rumors spreading and controlling in micro-blog users network[J]. Journal of Software Engineering and Applications, 2013, 6: 102-105. [17] ZHAO L, WANG J, HUANG R. Immunization against the spread of rumors in homogenous networks[J]. PLoS One, 2015, 10(5): e0124978. [18] WANG Y Q, YANG X Y, HAN Y L, et al. Rumor spreading model with trust mechanism in complex social networks[J]. Communications in Theoretical Physics, 2013, 59(4): 510-516. [19] ZHAO L, WANG J, CHEN Y, et al. SIHR rumor spreading model in social networks[J]. Physica A, 2012, 391(7): 2444-2453. [20] WANG Xiaoli, ZHAO Laijun. Rumor spreading model with skepticism mechanism in social networks[J]. J University of Shanghai for Science and Technology, 2012, 34(5): 424-428. [21] XIA L L, JIANG G P, SONG B, et al. Rumor spreading model considering hesitating mechanism in complex social networks[J]. Physica A, 2015, 437: 295-303. [22] WATTS D J, STROGATZ S H. Collective dynamics of ‘small-world’ networks[J]. Nature, 1998, 393(6684): 440-442. [23] BARABÁSI A L, ALBERT R. Emergence of scaling in random networks[J]. Science, 1999, 286(5439):509-512. [24] 王亚奇, 蒋国平. 复杂网络中考虑不完全免疫的病毒传播研究[J]. 物理学报, 2010, 59(10): 6733-6743. WANG Yaqi, JIANG Guoping. Virus spreading on complex networks with imperfect immunization[J]. Acta Physica Sinica, 2010, 59(10): 6733-6743. [25] NEKOVEE M, MORENO Y, BIANCONI G. Theory of rumour spreading in complex social networks[J]. Physica A, 2007, 374: 457-470. |
[1] | LI Yan-ping, QI Yan-jiao, ZHANG Kai, WEI Xu-guang. Multi-authority and revocable attribute-based encryption scheme [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 75-84. |
[2] | ZHANG Guang-zhi, CAI Shao-bin, MA Chun-hua, ZHANG Dong-qiu. Application of maximum distance separable codes in the error correction of the network coding [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 75-82. |
[3] | LI Yang, CHENG Xiong, TONG Yan, CHEN Wei, QIN Tao, ZHANG Jian, XU Ming-di. Method for threaten users mining based on traffic statistic characteristics [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 83-88. |
[4] | ZHAO Guang-yuan, QIN Feng-lin, GUO Xiao-dong. Design and implementation of P2P-based network measurement cloud platform [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(12): 104-110. |
[5] | HUANG Shu-qin, XU Yong, WANG Ping-shui. User similarity calculation method based on probabilistic matrix factorization and its recommendation application [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(11): 37-43. |
[6] | CHEN Guang-rui, CHEN Xing-shu, WANG Yi-tong, GE Long. A software update mechanism for virtual machines in IaaS multi-tenant environment [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 60-67. |
[7] | ZHUANG Zheng-mao, CHEN Xing-shu, SHAO Guo-lin, YE Xiao-ming. A time-relevant network traffic anomaly detection approach [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 68-73. |
[8] | SONG Yuan-zhang, LI Hong-yu, CHEN Yuan, WANG Jun-jie. P2P botnet detection method based on fractal and adaptive data fusion [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 74-81. |
[9] | ZHU Sheng, ZHOU Bin, ZHU Xiang. EIP: discovering influential bloggers by user similarity and topic timeliness [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 113-120. |
[10] | . An approach of detecting LDoS attacks based on the euclidean distance of available bandwidth in cloud computing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 92-100. |
[11] | LI Yu-xi, WANG Kai-xuan, LIN Mu-qing, ZHOU Fu-cai. A P2P network privacy protection system based on anonymous broadcast encryption scheme [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 84-91. |
[12] | SU Bin-ting, XU Li, FANG He, WANG Feng. Fast authentication mechanism based on Diffie-Hellman for wireless mesh networks [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 101-105. |
[13] | LIN Li. News event extraction based on kernel dependency graph [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 121-126. |
[14] | . Construction of expert relationship network based on random walk strategy [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(7): 30-34. |
[15] | ZHANG Wen-ya, SONG Da-wei, ZHANG Peng. An ontology-based readability model for vertical search [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(7): 23-29. |
|