iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1002/QRE.2520
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T07:14:56Z","timestamp":1725952496662},"reference-count":63,"publisher":"Wiley","issue":"5","license":[{"start":{"date-parts":[[2020,7,18]],"date-time":"2020-07-18T00:00:00Z","timestamp":1595030400000},"content-version":"am","delay-in-days":383,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#am"},{"start":{"date-parts":[[2019,7,18]],"date-time":"2019-07-18T00:00:00Z","timestamp":1563408000000},"content-version":"vor","delay-in-days":17,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"funder":[{"DOI":"10.13039\/100000121","name":"Division of Mathematical Sciences","doi-asserted-by":"publisher","award":["DMS - 1830547"],"id":[{"id":"10.13039\/100000121","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Quality & Reliability Eng"],"published-print":{"date-parts":[[2019,7]]},"abstract":"Abstract<\/jats:title>In many applications, it is of interest to identify anomalous behavior within a dynamic interacting system. Such anomalous interactions are reflected by structural changes in the network representation of the system. We propose and investigate the use of the degree corrected stochastic block model (DCSBM) to model and monitor dynamic networks that undergo a significant structural change. We apply statistical process monitoring techniques to the estimated parameters of the DCSBM to identify significant structural changes in the network. We apply our surveillance strategy to a dynamic US Senate covoting network. We detect significant changes in the political network that reflect both times of cohesion and times of polarization among Republican and Democratic party members. Our analysis demonstrates that the DCSBM monitoring procedure effectively detects local and global structural changes in complex networks, providing useful insights into the modeled system. The DCSBM approach is an example of a general framework that combines parametric random graph models and statistical process monitoring techniques for network surveillance.<\/jats:p>","DOI":"10.1002\/qre.2520","type":"journal-article","created":{"date-parts":[[2019,7,18]],"date-time":"2019-07-18T09:14:16Z","timestamp":1563441256000},"page":"1363-1378","update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":35,"title":["Modeling and detecting change in temporal networks via the degree corrected stochastic block model"],"prefix":"10.1002","volume":"35","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-2354-935X","authenticated-orcid":false,"given":"James D.","family":"Wilson","sequence":"first","affiliation":[{"name":"Department of Mathematics and Statistics University of San Francisco San Francisco California"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-6149-5797","authenticated-orcid":false,"given":"Nathaniel T.","family":"Stevens","sequence":"additional","affiliation":[{"name":"Department of Statistics and Actuarial Sciences University of Waterloo Waterloo Ontario Canada"}]},{"given":"William H.","family":"Woodall","sequence":"additional","affiliation":[{"name":"Department of Statistics Virginia Tech Blacksburg Virginia"}]}],"member":"311","published-online":{"date-parts":[[2019,7,18]]},"reference":[{"key":"e_1_2_9_2_1","unstructured":"VargasJA.Spring awakening: how an Egyptian revolution began on Facebook. The New York Times Sunday Book Review;2012."},{"key":"e_1_2_9_3_1","doi-asserted-by":"crossref","unstructured":"ShettyJ AdibiJ.Discovering important nodes through graph entropy the case of Enron email database. In: Proceedings of the 3rd international workshop on link discovery ACM;2005;New York NY USA:74\u201081.","DOI":"10.1145\/1134271.1134282"},{"key":"e_1_2_9_4_1","doi-asserted-by":"crossref","unstructured":"AkogluL FaloutsosC.Anomaly event and fraud detection in large network datasets. In: WSDM '13 Proceedings of the sixth ACM international conference on Web search and data mining ACM;2013;New York NY USA:773\u2010774.","DOI":"10.1145\/2433396.2433496"},{"key":"e_1_2_9_5_1","first-page":"103","volume-title":"Detecting Fraudulent Personalities in Networks of Online Auctioneers","author":"Chau DH","year":"2006"},{"key":"e_1_2_9_6_1","doi-asserted-by":"crossref","unstructured":"PanditS ChauDH WangS FaloutsosC.Netprobe: a fast and scalable system for fraud detection in online auction networks. In: Proceedings of the 16th international conference on world wide web ACM;2007;Raleigh NC:201\u2010210.","DOI":"10.1145\/1242572.1242600"},{"issue":"3","key":"e_1_2_9_7_1","first-page":"43","article-title":"Mapping networks of terrorist cells","volume":"24","author":"Krebs VE","year":"2002","journal-title":"Connections"},{"key":"e_1_2_9_8_1","doi-asserted-by":"publisher","DOI":"10.1214\/11-AOAS513"},{"key":"e_1_2_9_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/11427995_35"},{"issue":"1","key":"e_1_2_9_10_1","first-page":"26","article-title":"Strangers intrusion detection\u2014detecting spammers and fake profiles in social networks based on topology anomalies","volume":"1","author":"Fire M","year":"2012","journal-title":"Human J"},{"key":"e_1_2_9_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2014.05.002"},{"key":"e_1_2_9_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.02.021"},{"key":"e_1_2_9_13_1","doi-asserted-by":"publisher","DOI":"10.1002\/asmb.2369"},{"key":"e_1_2_9_14_1","doi-asserted-by":"publisher","DOI":"10.1080\/0740817X.2016.1213468"},{"key":"e_1_2_9_15_1","doi-asserted-by":"publisher","DOI":"10.1080\/00224065.1999.11979944"},{"key":"e_1_2_9_16_1","doi-asserted-by":"publisher","DOI":"10.1080\/07474940903041605"},{"key":"e_1_2_9_17_1","doi-asserted-by":"publisher","DOI":"10.1080\/00224065.2014.11917955"},{"key":"e_1_2_9_18_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.83.016107"},{"key":"e_1_2_9_19_1","volume-title":"Introduction to Statistical Quality Control","author":"Montgomery DC","year":"2013"},{"key":"e_1_2_9_20_1","doi-asserted-by":"publisher","DOI":"10.1214\/09-EJS548"},{"key":"e_1_2_9_21_1","doi-asserted-by":"publisher","DOI":"10.1111\/rssb.12014"},{"key":"e_1_2_9_22_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.2014.988214"},{"key":"e_1_2_9_23_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcpp.12493"},{"key":"e_1_2_9_24_1","doi-asserted-by":"publisher","DOI":"10.1002\/wics.1217"},{"key":"e_1_2_9_25_1","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.2013.822830"},{"key":"e_1_2_9_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2012.2233712"},{"key":"e_1_2_9_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10588-005-5378-z"},{"key":"e_1_2_9_28_1","doi-asserted-by":"publisher","DOI":"10.1080\/00224065.2014.11917969"},{"key":"e_1_2_9_29_1","doi-asserted-by":"publisher","DOI":"10.1080\/00224065.2016.11918149"},{"key":"e_1_2_9_30_1","doi-asserted-by":"publisher","DOI":"10.1002\/qre.2364"},{"key":"e_1_2_9_31_1","doi-asserted-by":"publisher","DOI":"10.1080\/00224065.2015.11918140"},{"key":"e_1_2_9_32_1","unstructured":"SparksR WilsonJD.Monitoring communication outbreaks among an unknown team of actors in dynamic networks. arXiv preprint arXiv:1606.09308;2016."},{"key":"e_1_2_9_33_1","unstructured":"PeelL ClausetA.Detecting change points in the large\u2010scale structure of evolving networks. arXiv preprint arXiv:1403.0989;2014."},{"key":"e_1_2_9_34_1","doi-asserted-by":"publisher","DOI":"10.1214\/10-AOAS329"},{"key":"e_1_2_9_35_1","doi-asserted-by":"publisher","DOI":"10.1038\/srep18893"},{"key":"e_1_2_9_36_1","unstructured":"ZambonD AlippiC LiviL.Change point methods on a sequence of graphs. arXiv preprint arXiv:1805.07113;2018."},{"key":"e_1_2_9_37_1","unstructured":"ChenH.Sequential change\u2010point detection based on nearest neighbors. arXiv preprint arXiv:1604.03611;2016."},{"key":"e_1_2_9_38_1","doi-asserted-by":"publisher","DOI":"10.1111\/rssb.12205"},{"key":"e_1_2_9_39_1","unstructured":"KeshavarzH MichailidisG AtchadeY.Sequential change\u2010point detection in high\u2010dimensional Gaussian graphical models. arXiv preprint arXiv:1806.07870;2018."},{"key":"e_1_2_9_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2018.03.004"},{"key":"e_1_2_9_41_1","doi-asserted-by":"publisher","DOI":"10.1002\/qre.2267"},{"key":"e_1_2_9_42_1","doi-asserted-by":"publisher","DOI":"10.1080\/00224065.2019.1571343"},{"key":"e_1_2_9_43_1","doi-asserted-by":"publisher","DOI":"10.1002\/qre.2278"},{"key":"e_1_2_9_44_1","doi-asserted-by":"publisher","DOI":"10.1021\/acsinfecdis.5b00022"},{"key":"e_1_2_9_45_1","doi-asserted-by":"crossref","unstructured":"GreeneD DoyleD CunninghamP.Tracking the evolution of communities in dynamic social networks. In: ASONAM '10 Proceedings of the 2010 International Conference on Advances in Social Networks Analysis and Mining IEEE;2010:176\u2010183.","DOI":"10.1109\/ASONAM.2010.17"},{"issue":"9","key":"e_1_2_9_46_1","first-page":"1082","article-title":"Communities in networks","volume":"56","author":"Porter MA","year":"2009","journal-title":"Notices of the AMS"},{"key":"e_1_2_9_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.physrep.2009.11.002"},{"key":"e_1_2_9_48_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.286.5439.509"},{"key":"e_1_2_9_49_1","doi-asserted-by":"publisher","DOI":"10.1137\/070710111"},{"key":"e_1_2_9_50_1","doi-asserted-by":"publisher","DOI":"10.1038\/srep10448"},{"key":"e_1_2_9_51_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2014\/05\/P05007"},{"key":"e_1_2_9_52_1","doi-asserted-by":"publisher","DOI":"10.1017\/nws.2012.3"},{"key":"e_1_2_9_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-011-0183-2"},{"key":"e_1_2_9_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11222-007-9033-z"},{"key":"e_1_2_9_55_1","unstructured":"HanQ XuK AiroldiE.Consistent estimation of dynamic and multi\u2010layer block models. In: ICML'15 Proceedings of the 32nd International Conference on International Conference on Machine Learning;2015:1511\u20101520."},{"key":"e_1_2_9_56_1","first-page":"3120","article-title":"Regularized spectral clustering under the degree\u2010corrected stochastic blockmodel","author":"Qin T","year":"2013","journal-title":"Adv Neural Inf Proces Syst"},{"key":"e_1_2_9_57_1","doi-asserted-by":"publisher","DOI":"10.1080\/00224065.1989.11979164"},{"key":"e_1_2_9_58_1","volume-title":"The Decline and Fall of the Liberal Republicans: From 1952 to the Present","author":"Rae NC","year":"1989"},{"key":"e_1_2_9_59_1","volume-title":"On His Own Terms: A Life of Nelson Rockefeller","author":"Smith RN","year":"2014"},{"key":"e_1_2_9_60_1","doi-asserted-by":"publisher","DOI":"10.1080\/00224065.2015.11918120"},{"key":"e_1_2_9_61_1","unstructured":"AicherC JacobsAZ ClausetA.Adapting the stochastic block model to edge\u2010weighted networks. arXiv preprint arXiv:1305.5782;2013."},{"key":"e_1_2_9_62_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0030136"},{"key":"e_1_2_9_63_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2016.11.002"},{"key":"e_1_2_9_64_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-017-09896-6"}],"container-title":["Quality and Reliability Engineering International"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/qre.2520","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/qre.2520","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/am-pdf\/10.1002\/qre.2520","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/qre.2520","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,2]],"date-time":"2023-09-02T23:49:19Z","timestamp":1693698559000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/qre.2520"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7]]},"references-count":63,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,7]]}},"alternative-id":["10.1002\/qre.2520"],"URL":"https:\/\/doi.org\/10.1002\/qre.2520","archive":["Portico"],"relation":{},"ISSN":["0748-8017","1099-1638"],"issn-type":[{"value":"0748-8017","type":"print"},{"value":"1099-1638","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7]]},"assertion":[{"value":"2018-12-19","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-05-23","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-07-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}