- Complex Network Analysis Techniques
- Misinformation and Its Impacts
- Opinion Dynamics and Social Influence
- Advanced Text Analysis Techniques
- Sentiment Analysis and Opinion Mining
- Spam and Phishing Detection
- Artificial Intelligence in Healthcare and Education
- Academic integrity and plagiarism
- Web Data Mining and Analysis
- Wikis in Education and Collaboration
- Video Analysis and Summarization
- Composite Structure Analysis and Optimization
- Semantic Web and Ontologies
- Numerical methods in engineering
- Advanced Image and Video Retrieval Techniques
- Advanced Image Processing Techniques
- scientometrics and bibliometrics research
- Thermoelastic and Magnetoelastic Phenomena
- Quantum Mechanics and Applications
- Academic Publishing and Open Access
- Context-Aware Activity Recognition Systems
- Open Source Software Innovations
- Cloud Computing and Remote Desktop Technologies
- Image Retrieval and Classification Techniques
- Web visibility and informetrics
Sichuan University
2022
Hangzhou Dianzi University
2021
Thomson Reuters (United States)
2015-2020
Thomson Reuters (Canada)
2018
Indiana University Bloomington
2011-2015
Indiana University
2011
Tsinghua University
2007
We analyze the online response to preprint publication of a cohort 4,606 scientific articles submitted database arXiv.org between October 2010 and May 2011. study three forms responses these preprints: downloads on site, mentions social media site Twitter, early citations in scholarly record. perform two analyses. First, we delay time span article Twitter following submission, understand temporal configuration reactions whether one precedes or follows other. Second, run regression...
Twitter has become one of the most popular microblogging sites for people to broadcast (or "tweet") their thoughts world in 140 characters or less. Since these messages are available public consumption, may expect tweets not contain private incriminating information. Nevertheless we observe a large number users who unwittingly post sensitive information about themselves and other whom there be negative consequences. While some awareness exists such privacy issues on social networks as...
The widespread adoption of mobile devices that record the communications, social relations, and movements billions individuals in great detail presents unique opportunities for study structures human dynamics at very large scales. This is particularly case developing countries where economic data can be hard to obtain often too sparse real-time analytics. Here we leverage call log from Côte d'Ivoire analyze relations between its nation-wide communications network socio-economic regional...
During the past few decades, rate of publication retractions has increased dramatically in academia. In this study, we investigate from a quantitative perspective, aiming to answer two fundamental questions. One, how do influence scholarly impact retracted papers, authors, and institutions? Two, does propagate wider academic community through associations? Specifically, analyzed set articles indexed Thomson Reuters Web Science (WoS), ran multiple experiments compare changes against control...
This paper proposes a Topic-Level Opinion Influence Model (TOIM) that simultaneously incorporates topic factor, user opinions and social influence in unified probabilistic model with two stages learning processes. In the first stage, factor are integrated to generate users' influential relationship based on different topics; second historical messages interaction records leveraged by TOIM construct their neighbors' opinion through statistical process, which can be further utilized predict...
In addition to its broad popularity Wikipedia is also widely used for scholarly purposes. Many pages pertain academic papers, scholars and topics providing a rich ecology uses. Scholarly references mentions on may thus shape the "societal impact" of certain communication item, but it not clear whether they actual "academic impact". this paper we compare impact scholars, according two different measures, namely citations mentions. Our results show that are positively correlated. Papers,...
Social influence in social networks has been extensively researched. Most studies have focused on direct influence, while another interesting question can be raised as whether indirect exists between two users who’re not directly connected the network and what affects such influence. In addition, theory of complex contagion tells us that more spreaders will enhance users. The authors’ observation intensity propagated by n parallel quantified retweeting probability Twitter networks, shows is...
Users frequently express their information needs by means of short and general queries that are difficult for ranking algorithms to interpret correctly. However, users' social contexts can offer important additional about which be leveraged provide augmented, personalized results. Existing methods mostly rely on individual behavioral data such as clickstream log data, but a result suffer from sparsity privacy issues. Here, we propose Community Tweets Voting Model (CTVM) re-rank Google Yahoo...
The fragility and interconnectivity of the planet argue compellingly for a greater understanding how different communities make sense their world. One such critical demands relies on comparing Chinese rest world (e.g., Americans), where communities' ideological cultural backgrounds can be significantly different. While traditional studies aim to learn similarities differences between these via high-cost user studies, in this paper we propose much more efficient method compare by utilizing...
Most studies on social influence have focused direct influence, while another interesting question can be raised as whether indirect exists between two users who're not directly connected in the network and what affects such influence. In addition, theory of complex contagion tells us that more spreaders will enhance users. Our observation intensity propagated by n parallel quantified retweeting probability Twitter, shows is validated globally but violated locally. other words, increases...
Social influence in social networks has been extensively researched. Most studies have focused on direct influence, while another interesting question can be raised as whether indirect exists between two users who're not directly connected the network and what affects such influence. In addition, theory of complex contagion tells us that more spreaders will enhance users. Our observation intensity propagated by n parallel quantified retweeting probability Twitter networks, shows is validated...
It becomes more difficult to explain the social information transfer phenomena using classic models based merely on Shannon Information Theory (SIT) and Classic Probability (CPT), because process in world is rich of semantic highly contextualized. This paper aims use twitter data explore whether traditional can interpret networks, quantum-like be spotted networks. Our main contributions are: (1) SIT CPT fail occurring Twitter; (2) Quantum interference exists Twitter, (3) a mathematical model...
Text mining has been widely used in multiple types of user‐generated data to infer user opinion, but its application microblogging is difficult because text messages are short and noisy, providing limited information about opinion. Given that users communicate with each other form a social network, we hypothesize opinion influenced by neighbors the network. In this paper, on topic combining two factors: user's historical relevant topics influence from his/her neighbors. We thus build...
Over the past few decades, rate of publication retractions has increased dramatically in academia. In this study, we investigate from a quantitative perspective, aiming to answer two fundamental questions. One, how do influence scholarly impact retracted papers, authors, and institutions? Two, does propagate wider academic community through associations? Specifically, analyzed set articles indexed Thomson Reuters Web Science (WoS), ran multiple experiments compare changes against control...
Users frequently express their information needs by means of short and general queries that are difficult for ranking algorithms to interpret correctly. However, users' social contexts can offer important additional about which be leveraged provide augmented, personalized results. Existing methods mostly rely on individual behavioral data such as clickstream log data, but a result suffer from sparsity privacy issues. Here, we propose Community Tweets Voting Model (CTVM) re-rank Google Yahoo...
Most studies on social influence have focused direct influence, while another interesting question can be raised as whether indirect exists between two users who're not directly connected in the network and what affects such influence. In addition, theory of complex contagion tells us that more spreaders will enhance users. Our observation intensity propagated by n parallel quantified retweeting probability Twitter , shows is validated globally but violated locally. other words, increases...
Mining user opinion from Micro-Blogging has been extensively studied on the most popular social networking sites such as Twitter and Facebook in U.S., but few studies have done websites other countries (e.g. China). In this paper, we analyze influence Tencent, one of largest China, endeavoring to unveil behavior patterns Chinese users. This paper proposes a Topic-Level Opinion Influence Model (TOIM) that simultaneously incorporates topic factor direct unified probabilistic framework. Based...
Most studies on social influence have focused direct influence, while another interesting question can be raised as whether indirect exists between two users who're not directly connected in the network and what affects such influence. In addition, theory of \emph{complex contagion} tells us that more spreaders will enhance users. Our observation intensity propagated by $n$ parallel quantified retweeting probability Twitter, shows complex contagion is validated globally but violated locally....
In mobile environment, because of the handheld devices' capability limitation and diversity, content adaptation becomes an essential technology for web services. this paper, device 's access is studied. For solving JSP resource-wrapping problem, a document type definition (DTD) given independent page markup language (DIML)[1]. The problem collecting properties environment context devices solved by defining DTK! (Device logical traits modeling). Finally we describe adaptation- processing...
Twitter has become an important online source for real-time news dissemination. Especially, official accounts of local government and media outlets have provided newsworthy authoritative information, revealing trends breaking news. In this paper, we describe TipMaster automatically constructed knowledge base that are likely to report news, from agencies outlets. First, implement classifiers detecting these by integrating heterogeneous information the accounts' textual metadata, profile...