{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:47:05Z","timestamp":1730227625848,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/icacci.2018.8554671","type":"proceedings-article","created":{"date-parts":[[2018,12,4]],"date-time":"2018-12-04T01:17:32Z","timestamp":1543886252000},"page":"2161-2168","source":"Crossref","is-referenced-by-count":1,"title":["Epidemic model based visibility estimation in Online Social Networks"],"prefix":"10.1109","author":[{"given":"Nemi Chandra","family":"Rathore","sequence":"first","affiliation":[]},{"given":"Somanath","family":"Tripathy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"A visibility-based model for link prediction in social media","author":"zhu","year":"2014","journal-title":"Proceedings of the ASEI\/IEEE Conference on Social Computing"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956769"},{"key":"ref12","first-page":"3147","article-title":"Scalable influence estimation in continuous-time diffusion networks","author":"du","year":"2013","journal-title":"Proceedings of the 26th International Conference on Neural Information Processing Systems"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1718487.1718518"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2010.22"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2503792.2503797"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2396761.2398634"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19548-3_9"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2487788.2488017"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2507824"},{"journal-title":"The 9 biggest privacy and security breaches that rocked 2013","year":"2013","author":"williams","key":"ref4"},{"journal-title":"Twitter Developers Documentation","year":"2017","key":"ref27"},{"journal-title":"15 worst internet privacy scandals of all time","year":"2012","author":"marsan","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139088510"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988739"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.26"},{"key":"ref7","first-page":"1","article-title":"Loose tweets: An analysis of privacy leaks on twitter","author":"mao","year":"2011","journal-title":"Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2010.5510913"},{"key":"ref9","volume":"abs 1308 2705","author":"hogg","year":"2013","journal-title":"Stochastic models predict user behavior in social media"},{"key":"ref1","first-page":"277","author":"zheleva","year":"2011","journal-title":"PRIVACY in SOCIAL NETWORKS A SURVEY"},{"key":"ref20","first-page":"419","author":"rathore","year":"2015","journal-title":"Predicting User Visibility in Online Social Networks Using Local Connectivity Properties"},{"key":"ref22","first-page":"1","article-title":"Loose tweets: An analysis of privacy leaks on twitter","author":"mao","year":"2011","journal-title":"Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2501654.2501661"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.111005"},{"journal-title":"Natural language processing toolkit","year":"2018","key":"ref23"},{"journal-title":"Tweepy","year":"2017","key":"ref26"},{"journal-title":"Python","year":"2018","key":"ref25"}],"event":{"name":"2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","start":{"date-parts":[[2018,9,19]]},"location":"Bangalore","end":{"date-parts":[[2018,9,22]]}},"container-title":["2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8536361\/8554361\/08554671.pdf?arnumber=8554671","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,9]],"date-time":"2019-01-09T01:52:14Z","timestamp":1546998734000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8554671\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/icacci.2018.8554671","relation":{},"subject":[],"published":{"date-parts":[[2018,9]]}}}