Int J Performability Eng ›› 2024, Vol. 20 ›› Issue (11): 658-667.doi: 10.23940/ijpe.24.11.p2.658667
Previous Articles Next Articles
Megh Singhal and Bhawna Saxena*
Submitted on
;
Revised on
;
Accepted on
Contact:
*E-mail address: bhawna.saxena@jiit.ac.in
Megh Singhal and Bhawna Saxena. BO-CBoost: A Machine Learning Based Framework for Predicting the Influence Potential of Nodes in Complex Networks [J]. Int J Performability Eng, 2024, 20(11): 658-667.
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
[1] Xi Y., and Cui X., 2023. Identifying influential nodes in complex networks based on information entropy and relationship strength. [2] Zhao G., Jia P., Huang C., Zhou A., and Fang Y., 2020. A machine learning based framework for identifying influential nodes in complex networks. [3] Kou J., Jia P., Liu J., Dai J., and Luo H., 2023. Identify influential nodes in social networks with graph multi-head attention regression model. [4] Saxena B., Saxena V., Anand N., Hassija V., Chamola V., and Hussain A., 2023. A Hurst‐based diffusion model using time series characteristics for influence maximization in social networks. [5] Alshahrani M., Fuxi Z., Sameh A., Mekouar S., and Huang S., 2020. Efficient algorithms based on centrality measures for identification of top-k influential users in social networks. [6] Wen T., and Deng Y., 2020. Identification of influencers in complex networks by local information dimensionality. [7] Saxena B., and Saxena V., 2020. Towards establishing the effect of self-similarity on influence maximization in online social networks. [8] Yu E.Y., Wang Y.P., Fu Y., Chen D.B., and Xie M., 2020. Identifying critical nodes in complex networks via graph convolutional networks. [9] Qiu J., Tang J., Ma H., Dong Y., Wang K., and Tang J., 2018, July. Deepinf: Social influence prediction with deep learning. InProceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 2110-2119. [10] Zhao G., Jia P., Zhou A., and Zhang B., 2020. InfGCN: Identifying influential nodes in complex networks with graph convolutional networks. [11] Saxena A., and Iyengar S., 2020. Centrality measures in complex networks: A survey. [12] Grando F., Noble D., and Lamb L.C., 2016. An analysis of centrality measures for complex and social networks. In2016 IEEE Global Communications Conference (GLOBECOM), pp. 1-6 [13] Sheng J., Dai J., Wang B., Duan G., Long J., Zhang J., Guan K., Hu S., Chen L., and Guan W., 2020. Identifying influential nodes in complex networks based on global and local structure. [14] Estrada E., and Rodriguez-Velazquez J.A., 2005. Subgraph centrality in complex networks. [15] Page L.,1998. The Pagerank Citation Ranking: Bringing order to the web. Technical report. [16] Ye F., Liu J., Chen C., Ling G., Zheng Z., and Zhou Y., 2018. Identifying influential individuals on large-scale social networks: A community based approach. [17] Dong J., Ye F., Chen W., and Wu J., 2018. Identifying influential nodes in complex networks via semi-local centrality. In2018 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1-5. [18] Li C., Wang L., Sun S., and Xia C., 2018. Identification of influential spreaders based on classified neighbors in real-world complex networks. [19] Pattanayak H.S., Saxena B., and Sinha A., 2024. Influence maximization in social networks using community-diversified seed selection. [20] Ahajjam S., and Badir H., 2018. Identification of influential spreaders in complex networks using HybridRank algorithm. [21] Liu J., and Zheng J., 2023. Identifying important nodes in complex networks based on extended degree and E-shell hierarchy decomposition. [22] Inuwa-Dutse I., Liptrott M., and Korkontzelos I., 2018. Detection of spam-posting accounts on Twitter. [23] Zheng X., Zeng Z., Chen Z., Yu Y., and Rong C., 2015. Detecting spammers on social networks. [24] Ramírez-de-la-Rosa, G., Villatoro-Tello, E., Jiménez-Salazar, H., and Sánchez-Sánchez, C., 2014. Towards automatic detection of user influence in twitter by means of stylistic and behavioral features. In Mexican International Conference on Artificial Intelligence, pp. 245-256. Cham: Springer International Publishing. [25] Jeyasudha J., and Usha G., 2022. An intelligent centrality measures for influential node detection in COVID-19 environment. [26] Wang Z., Huang R., Yang D., Peng Y., Zhou B., and Chen Z., 2024. Identifying influential nodes based on the disassortative and community structure of complex network. [27] Kempe D., Kleinberg J., and Tardos É., 2003, August. Maximizing the spread of influence through a social network. InProceedings of the ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 137-146. [28] Saxena B., and Kumar P., 2019. A node activity and connectivity-based model for influence maximization in social networks. [29] Hancock J.T., and Khoshgoftaar T.M., 2020. CatBoost for big data: an interdisciplinary review. [30] Wang X., Jin Y., Schmitt S., and Olhofer M., 2023. Recent advances in Bayesian optimization. [31] Panzarasa P., Opsahl T., and Carley K.M., 2009. Patterns and dynamics of users' behavior and interaction: Network analysis of an online community. [32] Kumar S., Spezzano F., Subrahmanian V.S., and Faloutsos C., 2016. Edge weight prediction in weighted signed networks. In2016 IEEE 16th International Conference on Data Mining (ICDM), pp. 221-230. [33] Kumar S., Hooi B., Makhija D., Kumar M., Faloutsos C., and Subrahmanian V.S., 2018. Rev2: Fraudulent user prediction in rating platforms. InProceedings of the Eleventh ACM International Conference on Web Search and Data Mining, pp. 333-341. [34] Paranjape A., Benson A.R., and Leskovec J., 2017. Motifs in temporal networks. InProceedings of the tenth ACM International Conference on Web Search and Data Mining, pp. 601-610. [35] Ke G., Meng Q., Finley T., Wang T., Chen W., Ma W., Ye Q., and Liu T.Y., 2017. Lightgbm: A highly efficient gradient boosting decision tree. [36] Chen T., and Guestrin C., 2016, August. Xgboost: A scalable tree boosting system. InProceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 785-794. [37] Lu Y., Ye T., and Zheng J., 2022. Decision tree algorithm in machine learning. In2022 IEEE International Conference on Advances in Electrical Engineering and Computer Applications (AEECA), pp. 1014-1017. [38] Hoc H.T., Silhavy R., Prokopova Z., and Silhavy P., 2022. Comparing multiple linear regression, deep learning and multiple perceptron for functional points estimation. |
[1] | Ashu Mehta, Navdeep Kaur, and Amandeep Kaur. A Review of Software Fault Prediction Techniques in Class Imbalance Scenarios [J]. Int J Performability Eng, 2025, 21(3): 123-130. |
[2] | Vikas, Charu Wahi, Bharat Bhushan Sagar, and Manisha Manjul. Trust Management in WSN using ML for Detection of DDoS Attacks [J]. Int J Performability Eng, 2025, 21(3): 157-167. |
[3] | Arpna Saxena and Sangeeta Mittal. CluSHAPify: Synergizing Clustering and SHAP Value Interpretations for Improved Reconnaissance Attack Detection in IIoT Networks [J]. Int J Performability Eng, 2025, 21(1): 36-47. |
[4] | Seema Kalonia and Amrita Upadhyay. Comparative Analysis of Machine Learning Model and PSO Optimized CNN-RNN for Software Fault Prediction [J]. Int J Performability Eng, 2025, 21(1): 48-55. |
[5] | Vikas Kumar, Charu Wahi, Bharat Bhushan Sagar, and Manisha Manjul. Ensemble Learning Based Intrusion Detection for Wireless Sensor Network Environment [J]. Int J Performability Eng, 2024, 20(9): 541-551. |
[6] | Kalyani H. Deshmukh, Gajendra R. Bamnote, and Pratik K Agrawal. A Novel Approach for Drought Monitoring and Evaluation using Time Series Analysis and Deep Learning [J]. Int J Performability Eng, 2024, 20(8): 498-509. |
[7] | Saurabh Saxena, and Chetna Gupta. Optimizing Bug Resolution: A Data-Driven Developer Recommendation System [J]. Int J Performability Eng, 2024, 20(8): 510-519. |
[8] | Lakshya Vaswani, Sai Sri Harsha, Subham Jaiswal, and Aju D. Unravelling Complexity: Investigating the Effectiveness of SHAP Algorithm for Improving Explainability in Network Intrusion System Across Machine and Deep Learning Models [J]. Int J Performability Eng, 2024, 20(7): 421-431. |
[9] | Meenakshi Chawla and Meenakshi Pareek. A Hybrid Deep Learning Perspective for Software Effort Estimation [J]. Int J Performability Eng, 2024, 20(7): 442-450. |
[10] | Ajeet Kumar Sharma and Rakesh Kumar. IoT Malware Detection and Dynamic Analysis of MQTT Simulated Network [J]. Int J Performability Eng, 2024, 20(7): 451-459. |
[11] | Abhishek Gupta and Jaspreet Singh. Data-Driven Security Framework for VANET using Firefly and ANN [J]. Int J Performability Eng, 2024, 20(6): 344-354. |
[12] | Vikas Verma, Arun Malik, and Isha Batra. Analyzing and Classifying Malware Types on Windows Platform using an Ensemble Machine Learning Approach [J]. Int J Performability Eng, 2024, 20(5): 312-318. |
[13] | Harshita Batra and Leema Nelson. ESD: E-mail Spam Detection using Cybersecurity-Driven Header Analysis and Machine Learning based Content Analysis [J]. Int J Performability Eng, 2024, 20(4): 205-213. |
[14] | Manu Jyoti Gupta and Parveen Sehgal. Optimizing Credit Card Fraud Detection: Classifier Performance and Feature Selection Empowered by Grasshopper Algorithm [J]. Int J Performability Eng, 2024, 20(3): 177-185. |
[15] | Aparna Shrivastava and P Raghu Vamsi. Improving Anomaly Classification using Combined Data Transformation and Machine Learning Methods [J]. Int J Performability Eng, 2024, 20(2): 68-80. |
|