We consider the problem of inferring the most likely social network given connectivity constraints imposed by observations of outbreaks within the network. Given a set of vertices ...
Ever more frequently, social and particularly group interactions, involve mediated communication. Yet we know very little about the factors determining the effectiveness of the in...
Maria Cristina Brugnoli, Federico Morabito, Richar...
Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake ident...
Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, ...
—Small talk is an important social lubricant that helps people, especially strangers, initiate conversations and make friends with each other in physical proximity. However, due ...
Zhimin Yang, Boying Zhang, Jiangpeng Dai, Adam C. ...
Abstract. As the popularity of social networks expands, the information users expose to the public has potentially dangerous implications for individual privacy. While social netwo...