wsGAT: weighted and signed graph attention networks for link prediction
M Grassia, G Mangioni - Complex Networks & Their Applications X …, 2022 - Springer
Abstract Graph Neural Networks (GNNs) have been widely used to learn representations on
graphs and tackle many real-world problems from a wide range of domains. In this paper we …
graphs and tackle many real-world problems from a wide range of domains. In this paper we …
An efficient real-time architecture for collecting IoT data
MP Loria, M Toja, V Carchiolo… - … conference on computer …, 2017 - ieeexplore.ieee.org
IoT applications has some characteristics that set it apart from other fields mainly due to the
multitude of different types of sensors producing data. In monitoring applications, data …
multitude of different types of sensors producing data. In monitoring applications, data …
Direct trust assignment using social reputation and aging
M Buzzanca, V Carchiolo, A Longheu… - Journal of Ambient …, 2017 - Springer
The exploitation of trust in virtual environments, on-line services, intelligent pervasive
environments and many other scenarios still deserve researchers' interest. In this work we …
environments and many other scenarios still deserve researchers' interest. In this work we …
Black hole metric: Overcoming the pagerank normalization problem
In network science, there is often the need to sort the graph nodes. While the sorting strategy
may be different, in general sorting is performed by exploiting the network structure. In …
may be different, in general sorting is performed by exploiting the network structure. In …
A trust-based news spreading model
Online social networks are overwhelmed with information spreading, phenomena whose
underlying mechanisms require deeper analysis. In this paper, we introduce the direct …
underlying mechanisms require deeper analysis. In this paper, we introduce the direct …
Terrorism and war: Twitter cascade analysis
Misinformation spreading over online social networks is becoming more and more critical
due to the huge amount of information sources whose reliability is hard to establish; …
due to the huge amount of information sources whose reliability is hard to establish; …
Dynamic evolution of government's public trust in online collective behaviour: a social computing approach
R Xiao, J Hou, J Li - International Journal of Bio-Inspired …, 2017 - inderscienceonline.com
There is a dearth of research on why public trust in government rises and falls over time
following online collective behaviours. For the problem of dynamic process and micro-macro …
following online collective behaviours. For the problem of dynamic process and micro-macro …
Long distance in-links for ranking enhancement
Ranking is a widely used technique to classify nodes in networks according to their
relevance. Increasing one's rank is a desiderable feature in almost any context; several …
relevance. Increasing one's rank is a desiderable feature in almost any context; several …
Cross-community shortcut detection based on network representation learning and structural features
R Hu, Y Du, J Hu, H Li - Intelligent Data Analysis, 2023 - content.iospress.com
As social networks continue to expand, an increasing number of people prefer to use social
networks to post their comments and express their feelings, and as a result, the information …
networks to post their comments and express their feelings, and as a result, the information …
Dealing with the best attachment problem via heuristics
M Buzzanca, V Carchiolo, A Longheu… - … Distributed Computing X …, 2017 - Springer
Ordering nodes by rank is a benchmark used in several contexts, from recommendation-
based trust networks to e-commerce, search engines and websites ranking. In these …
based trust networks to e-commerce, search engines and websites ranking. In these …