User Guide
Why can I only view 3 results?
You can also view all results when you are connected from the network of member institutions only. For non-member institutions, we are opening a 1-month free trial version if institution officials apply.
So many results that aren't mine?
References in many bibliographies are sometimes referred to as "Surname, I", so the citations of academics whose Surname and initials are the same may occasionally interfere. This problem is often the case with citation indexes all over the world.
How can I see only citations to my article?
After searching the name of your article, you can see the references to the article you selected as soon as you click on the details section.
 Views 11
 Downloands 3
Aspect of Social Media Information Propagate in Online Social Network
2021
Journal:  
Turkish Online Journal of Qualitative Inquiry
Author:  
Abstract:

In online social networks, the cascading of sensitive data such as personal material and gossip is a serious problem. The dispersion of social network users is constrained by one technique to minimize cascade of sensible information. Nevertheless, the measures restricting diffusion restrict the transmission of sensitive information, which leads to the unpleasant experience of users. In order to address this problem, we examine the problem of minimising sensitive dissemination while preserving the distribution of non-sensitive information. This problem is defined as a restricted minimization problem, where the intention of preserving non-sensitive dissemination is characterised as a limitation. We examine the problem with the well-known network of all users and the semi-known network, in which partial users remain unaware of their dispersion ability. When modelling the delicate spread of information as a reward for a bandit, we use the bandit framework to create solutions with polynomial complexity in both cases together. Moreover, it is impossible to measure the information diffusion size of the algorithm design due to the unknown diffusion capacity of the semi-known network.. For this matter we propose to learn in real time the unaccounted capacity of diffusion of the diffusion process and then to adjust to the diffusion restrictions, using the bandit framework, based on the knowledge of diffusion abilities. Large studies in actual and simulated data sets show that our methods are able to successfully limit the dissemination of sensitive data, while losses of non-sensitive information are 40 percent less compared to four baseline techniques.

Keywords:

0
2021
Author:  
Citation Owners
Information: There is no ciation to this publication.
Similar Articles










Turkish Online Journal of Qualitative Inquiry

Field :   Eğitim Bilimleri

Journal Type :   Uluslararası

Metrics
Article : 4.283
Cite : 1.162
2023 Impact : 0.002
Turkish Online Journal of Qualitative Inquiry