{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:09:29Z","timestamp":1775912969533,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,3]],"date-time":"2019-11-03T00:00:00Z","timestamp":1572739200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the Fundamental Research Funds for the Central Universities","award":["HUST: Grants No. 2019kfyXKJC021, 2019kfyXJJS091"],"award-info":[{"award-number":["HUST: Grants No. 2019kfyXKJC021, 2019kfyXJJS091"]}]},{"DOI":"10.13039\/501100012659","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902134, 61572215"],"award-info":[{"award-number":["61902134, 61572215"]}],"id":[{"id":"10.13039\/501100012659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,3]]},"DOI":"10.1145\/3357384.3357994","type":"proceedings-article","created":{"date-parts":[[2019,11,4]],"date-time":"2019-11-04T14:11:35Z","timestamp":1572876695000},"page":"569-578","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":92,"title":["Multiple Rumor Source Detection with Graph Convolutional Networks"],"prefix":"10.1145","author":[{"given":"Ming","family":"Dong","sequence":"first","affiliation":[{"name":"Huazhong University of Science and Technology, Wuhan, China"}]},{"given":"Bolong","family":"Zheng","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, Wuhan, China"}]},{"given":"Nguyen","family":"Quoc Viet Hung","sequence":"additional","affiliation":[{"name":"Griffith University, Gold Coast, Australia"}]},{"given":"Han","family":"Su","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"given":"Guohui","family":"Li","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, Wuhan, China"}]}],"member":"320","published-online":{"date-parts":[[2019,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"SIR, and SIS epidemic models. Mathematical biosciences","author":"Allen Linda JS","year":"1994"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","volume-title":"Infectious diseases of humans: dynamics and control","author":"Anderson Roy M","DOI":"10.1093\/oso\/9780198545996.001.0001"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-04503-6_4"},{"key":"e_1_3_2_1_4_1","unstructured":"Micha\u00eb l Defferrard Xavier Bresson and Pierre Vandergheynst. 2016. Convolutional Neural Networks on Graphs with Fast Localized Spectral Filtering. In NIPS . 3837--3845. Micha\u00eb l Defferrard Xavier Bresson and Pierre Vandergheynst. 2016. Convolutional Neural Networks on Graphs with Fast Localized Spectral Filtering. In NIPS . 3837--3845."},{"key":"e_1_3_2_1_5_1","volume-title":"Timothy Hirzel, Al\u00e1 n Aspuru-Guzik, and Ryan P. Adams.","author":"Duvenaud David K.","year":"2015"},{"key":"e_1_3_2_1_6_1","volume-title":"Kleinberg","author":"Easley David A.","year":"2010"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0219525903001067"},{"key":"e_1_3_2_1_8_1","volume-title":"Talk of the network: A complex systems look at the underlying process of word-of-mouth. Marketing letters","author":"Goldenberg Jacob","year":"2001"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2005.1555942"},{"key":"e_1_3_2_1_10_1","volume-title":"Threshold models of collective behavior. American journal of sociology","author":"Granovetter Mark","year":"1978"},{"key":"e_1_3_2_1_11_1","volume-title":"Wavelets on Graphs via Spectral Graph Theory. CoRR","author":"Hammond David K.","year":"2009"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2615098"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","volume-title":"Rumor source detection under probabilistic sampling","author":"Karamchandani Nikhil","DOI":"10.1109\/ISIT.2013.6620613"},{"key":"e_1_3_2_1_14_1","volume-title":"Kingma and Jimmy Ba","author":"Diederik","year":"2015"},{"key":"e_1_3_2_1_15_1","volume-title":"Kipf and Max Welling","author":"Thomas","year":"2017"},{"key":"e_1_3_2_1_16_1","volume-title":"Yvonne Anne Oswald, and Roger Wattenhofer","author":"Kostka Jan","year":"2008"},{"key":"e_1_3_2_1_17_1","volume-title":"Von Zuben","author":"Kurka David Burth","year":"2015"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Theodoros Lappas Evimaria Terzi Dimitrios Gunopulos and Heikki Mannila. 2010. Finding effectors in social networks. In KDD. ACM 1059--1068. Theodoros Lappas Evimaria Terzi Dimitrios Gunopulos and Heikki Mannila. 2010. Finding effectors in social networks. In KDD. ACM 1059--1068.","DOI":"10.1145\/1835804.1835937"},{"key":"e_1_3_2_1_19_1","volume-title":"Deeper Insights Into Graph Convolutional Networks for Semi-Supervised Learning","author":"Li Qimai"},{"key":"e_1_3_2_1_20_1","volume-title":"Orgun","author":"Liu Guanfeng","year":"2010"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2011.58"},{"key":"e_1_3_2_1_22_1","volume-title":"Early Detection of Fake News on Social Media Through Propagation Path Classification with Recurrent and Convolutional Networks","author":"Liu Yang"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00265-003-0651-y"},{"key":"e_1_3_2_1_24_1","volume-title":"Detecting Rumors from Microblogs with Recurrent Neural Networks","author":"Ma Jing"},{"key":"e_1_3_2_1_25_1","volume-title":"Bronstein","author":"Monti Federico","year":"2019"},{"key":"e_1_3_2_1_26_1","volume-title":"Spotting Culprits in Epidemics: How Many and Which Ones?","author":"Prakash B. Aditya"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2008.2005605"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Devavrat Shah and Tauhid Zaman. 2010. Detecting sources of computer viruses in networks: theory and experiment. In SIGMETRICS. ACM 203--214. Devavrat Shah and Tauhid Zaman. 2010. Detecting sources of computer viruses in networks: theory and experiment. In SIGMETRICS. ACM 203--214.","DOI":"10.1145\/1811099.1811063"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2158885"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Devavrat Shah and Tauhid Zaman. 2012. Rumor centrality: a universal source detector. In SIGMETRICS. ACM 199--210. Devavrat Shah and Tauhid Zaman. 2012. Rumor centrality: a universal source detector. In SIGMETRICS. ACM 199--210.","DOI":"10.1145\/2318857.2254782"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.93.032301"},{"key":"e_1_3_2_1_32_1","volume-title":"Nguyen Quoc Viet Hung, and Bela Stantic","author":"Tam Nguyen Thanh","year":"2019"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Zhaoxu Wang Wenxiang Dong Wenyi Zhang and Chee Wei Tan. 2014. Rumor source detection with multiple observations: fundamental limits and algorithms. In SIGMETRICS. ACM 1--13. Zhaoxu Wang Wenxiang Dong Wenyi Zhang and Chee Wei Tan. 2014. Rumor source detection with multiple observations: fundamental limits and algorithms. In SIGMETRICS. ACM 1--13.","DOI":"10.1145\/2637364.2591993"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","volume-title":"Multiple Source Detection without Knowing the Underlying Propagation Model","author":"Wang Zheng","DOI":"10.1609\/aaai.v31i1.10477"},{"key":"e_1_3_2_1_35_1","volume-title":"Collective dynamics of 'small-world'networks. nature","author":"Watts Duncan J","year":"1998"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1086\/jar.33.4.3629752"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jocs.2015.05.002"},{"key":"e_1_3_2_1_38_1","volume-title":"Jo a o Pedro Gomes, and Bruno Sinopoli","author":"Zejnilovic Sabina","year":"2013"},{"key":"e_1_3_2_1_39_1","volume-title":"Jason Weston, and Bernhard Sch\u00f6 lkopf.","author":"Zhou Dengyong","year":"2003"},{"key":"e_1_3_2_1_40_1","volume-title":"Catch'Em All: Locating Multiple Diffusion Sources in Networks with Partial Observations","author":"Zhu Kai"},{"key":"e_1_3_2_1_41_1","volume-title":"Information source detection in the SIR model: A sample path based approach","author":"Zhu Kai"},{"key":"e_1_3_2_1_42_1","volume-title":"A robust information source estimator with sparse observations","author":"Zhu Kai"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3161603"}],"event":{"name":"CIKM '19: The 28th ACM International Conference on Information and Knowledge Management","location":"Beijing China","acronym":"CIKM '19","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 28th ACM International Conference on Information and Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357384.3357994","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3357384.3357994","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:05Z","timestamp":1750202585000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357384.3357994"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,3]]},"references-count":43,"alternative-id":["10.1145\/3357384.3357994","10.1145\/3357384"],"URL":"https:\/\/doi.org\/10.1145\/3357384.3357994","relation":{},"subject":[],"published":{"date-parts":[[2019,11,3]]},"assertion":[{"value":"2019-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}