{"id":"https://openalex.org/W2344320841","doi":"https://doi.org/10.1109/tdsc.2016.2522436","title":"Rumor Source Identification in Social Networks with Time-Varying Topology","display_name":"Rumor Source Identification in Social Networks with Time-Varying Topology","publication_year":2016,"publication_date":"2016-01-27","ids":{"openalex":"https://openalex.org/W2344320841","doi":"https://doi.org/10.1109/tdsc.2016.2522436","mag":"2344320841"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2016.2522436","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2016.2522436","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://figshare.com/articles/journal_contribution/Rumor_source_identification_in_social_networks_with_time-varying_topology/20814292","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020474429","display_name":"Jiaojiao Jiang","orcid":"https://orcid.org/0000-0001-7307-8114"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Jiaojiao Jiang","raw_affiliation_strings":["School of Information Technology, Deakin University, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076576641","display_name":"Sheng Wen","orcid":"https://orcid.org/0000-0003-0655-666X"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Sheng Wen","raw_affiliation_strings":["School of Information Technology, Deakin University, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005228053","display_name":"Shui Yu","orcid":"https://orcid.org/0000-0003-4485-6743"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Shui Yu","raw_affiliation_strings":["School of Information Technology, Deakin University, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100666554","display_name":"Yang Xiang","orcid":"https://orcid.org/0000-0001-5252-0831"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yang Xiang","raw_affiliation_strings":["School of Information Technology, Deakin University, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051406984","display_name":"Wanlei Zhou","orcid":"https://orcid.org/0000-0002-1680-2521"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Wanlei Zhou","raw_affiliation_strings":["School of Information Technology, Deakin University, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5020474429"],"corresponding_institution_ids":["https://openalex.org/I149704539"],"apc_list":null,"apc_paid":null,"fwci":5.3026,"has_fulltext":false,"cited_by_count":109,"citation_normalized_percentile":{"value":0.96001528,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"15","issue":"1","first_page":"166","last_page":"179"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12592","display_name":"Opinion Dynamics and Social Influence","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/rumor","display_name":"Rumor","score":0.92469322681427},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7888261675834656},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.7616598606109619},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.7186663150787354},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6700122356414795},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4885040521621704},{"id":"https://openalex.org/keywords/social-network","display_name":"Social network (sociolinguistics)","score":0.46857500076293945},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.43097275495529175},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.41227224469184875},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.3929777443408966},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.36581283807754517},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3524557650089264},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.28407013416290283},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10104435682296753}],"concepts":[{"id":"https://openalex.org/C2780469804","wikidata":"https://www.wikidata.org/wiki/Q878352","display_name":"Rumor","level":2,"score":0.92469322681427},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7888261675834656},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.7616598606109619},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.7186663150787354},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6700122356414795},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4885040521621704},{"id":"https://openalex.org/C4727928","wikidata":"https://www.wikidata.org/wiki/Q17164759","display_name":"Social network (sociolinguistics)","level":3,"score":0.46857500076293945},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.43097275495529175},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.41227224469184875},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.3929777443408966},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.36581283807754517},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3524557650089264},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.28407013416290283},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10104435682296753},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1109/tdsc.2016.2522436","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2016.2522436","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},{"id":"pmh:oai:dro.deakin.edu.au:DU:30106144","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306402457","display_name":"Deakin Research Online (Deakin University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I149704539","host_organization_name":"Deakin University","host_organization_lineage":["https://openalex.org/I149704539"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"},{"id":"pmh:oai:figshare.com:article/20814292","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Rumor_source_identification_in_social_networks_with_time-varying_topology/20814292","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},{"id":"pmh:oai:opus.lib.uts.edu.au:10453/133131","is_oa":false,"landing_page_url":"http://hdl.handle.net/10453/133131","pdf_url":null,"source":{"id":"https://openalex.org/S4306401357","display_name":"UTS ePRESS (University of Technology Sydney)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I114017466","host_organization_name":"University of Technology Sydney","host_organization_lineage":["https://openalex.org/I114017466"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"},{"id":"pmh:oai:researchbank.swinburne.edu.au:43e7c02e-1793-492b-b621-9ccdb81059eb/1","is_oa":false,"landing_page_url":"http://hdl.handle.net/1959.3/444175","pdf_url":null,"source":{"id":"https://openalex.org/S4306401157","display_name":"Swinburne Research Bank (Swinburne University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I57093077","host_organization_name":"Swinburne University of Technology","host_organization_lineage":["https://openalex.org/I57093077"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing, Vol. 15, no. 1 (2018), pp. 166-179","raw_type":""}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/20814292","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Rumor_source_identification_in_social_networks_with_time-varying_topology/20814292","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[{"score":0.7099999785423279,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W175854469","https://openalex.org/W1626831364","https://openalex.org/W1778186794","https://openalex.org/W1963907682","https://openalex.org/W1966006953","https://openalex.org/W1976232622","https://openalex.org/W1980868027","https://openalex.org/W1991288592","https://openalex.org/W1995364830","https://openalex.org/W1999459259","https://openalex.org/W2007145989","https://openalex.org/W2013415579","https://openalex.org/W2018356076","https://openalex.org/W2040734156","https://openalex.org/W2042728064","https://openalex.org/W2054558630","https://openalex.org/W2067527464","https://openalex.org/W2085330768","https://openalex.org/W2095006675","https://openalex.org/W2095986976","https://openalex.org/W2099924198","https://openalex.org/W2100734403","https://openalex.org/W2110227539","https://openalex.org/W2111772797","https://openalex.org/W2112515575","https://openalex.org/W2121313492","https://openalex.org/W2130466555","https://openalex.org/W2143554828","https://openalex.org/W2145047775","https://openalex.org/W2150105124","https://openalex.org/W2153204928","https://openalex.org/W2165579348","https://openalex.org/W2169550297","https://openalex.org/W2479032158","https://openalex.org/W3023194939","https://openalex.org/W3105272691","https://openalex.org/W3106088197","https://openalex.org/W6607206061","https://openalex.org/W6637926174","https://openalex.org/W6641119868","https://openalex.org/W6721136173"],"related_works":["https://openalex.org/W2372853429","https://openalex.org/W2793319716","https://openalex.org/W3110636174","https://openalex.org/W4210503589","https://openalex.org/W2810386322","https://openalex.org/W2908713064","https://openalex.org/W2801267666","https://openalex.org/W4213140416","https://openalex.org/W2188429085","https://openalex.org/W2014074345"],"abstract_inverted_index":{"Identifying":[0],"rumor":[1,110,129,146,250],"sources":[2,251],"in":[3,10,28,48,92,203,252],"social":[4,32,180,206,254],"networks":[5,33,74,80,181],"plays":[6],"a":[7,62,76,83,97,103,143],"critical":[8],"role":[9],"limiting":[11],"the":[12,18,22,25,29,35,67,72,108,115,126,135,139,151,163,170,199,218,229,233,238,242],"damage":[13],"caused":[14],"by":[15,81],"them":[16],"through":[17],"timely":[19],"quarantine":[20],"of":[21,31,78,88,105,107,118,128,198,235],"sources.":[23],"However,":[24],"temporal":[26],"variation":[27],"topology":[30],"and":[34,60,122],"ongoing":[36],"dynamic":[37],"processes":[38],"challenge":[39],"our":[40,190,213,236],"traditional":[41,93],"source":[42,119,130,137,200],"identification":[43,120],"techniques":[44],"that":[45,189,212,244],"are":[46,175],"considered":[47,168],"static":[49,79],"networks.":[50,207,255],"In":[51],"this":[52],"paper,":[53],"we":[54,70,95,141],"borrow":[55],"an":[56,222],"idea":[57],"from":[58,138],"criminology":[59],"propose":[61],"novel":[63,144],"method":[64,191,214,240],"to":[65,75,101,133,149,228,248],"overcome":[66],"challenges.":[68],"First,":[69],"reduce":[71,193],"time-varying":[73,183,205,253],"series":[77],"introducing":[82],"time-integrating":[84],"window.":[85],"Second,":[86],"instead":[87],"inspecting":[89],"every":[90],"individual":[91,223],"techniques,":[94],"adopt":[96],"reverse":[98],"dissemination":[99],"strategy":[100],"specify":[102],"set":[104],"suspects":[106],"real":[109,136,171,179,219,230],"source.":[111,172,231],"This":[112],"process":[113],"addresses":[114],"scalability":[116],"issue":[117],"problems,":[121],"therefore":[123],"dramatically":[124],"promotes":[125],"efficiency":[127],"identification.":[131],"Third,":[132],"determine":[134],"suspects,":[140],"employ":[142],"microscopic":[145],"spreading":[147],"model":[148],"calculate":[150],"maximum":[152],"likelihood":[153],"(ML)":[154],"for":[155],"each":[156],"suspect.":[157],"The":[158,173,185,208],"one":[159],"who":[160,224],"can":[161,192,215,245],"provide":[162],"largest":[164],"ML":[165],"estimate":[166],"is":[167,225,241],"as":[169],"evaluations":[174],"carried":[176],"out":[177],"on":[178],"with":[182],"topology.":[184],"experiment":[186],"results":[187,209],"show":[188],"60":[194],"-":[195],"90":[196],"percent":[197],"seeking":[201],"area":[202],"various":[204],"further":[210],"indicate":[211],"accurately":[216],"identify":[217,249],"source,":[220],"or":[221],"very":[226],"close":[227],"To":[232],"best":[234],"knowledge,":[237],"proposed":[239],"first":[243],"be":[246],"used":[247]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":11},{"year":2024,"cited_by_count":14},{"year":2023,"cited_by_count":17},{"year":2022,"cited_by_count":13},{"year":2021,"cited_by_count":12},{"year":2020,"cited_by_count":17},{"year":2019,"cited_by_count":13},{"year":2018,"cited_by_count":7},{"year":2017,"cited_by_count":4}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
