Wei Chen

Orcid: 0000-0003-0065-3610

Affiliations:
  • Microsoft Research Asia, Beijing, China
  • Tsinghua University, Institute of Interdisciplinary Information Sciences, Beijing, China (former)
  • Chinese Academy of Sciences, Institute of Computing Technology, Beijing, China (former)
  • Oracle Corporation (former)
  • Cornell University, Department of Computer Science, Ithaca, NY, USA (PhD 2000)


According to our database1, Wei Chen authored at least 160 papers between 1997 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Uncovering milestone papers: A network diffusion and game theory approach.
J. Informetrics, 2024

Mechanism Design for LLM Fine-tuning with Multiple Reward Models.
CoRR, 2024

ALPINE: Unveiling the Planning Capability of Autoregressive Learning in Language Models.
CoRR, 2024

Query-Efficient Correlation Clustering with Noisy Oracle.
CoRR, 2024

2023
Popularity Ratio Maximization: Surpassing Competitors through Influence Propagation.
Proc. ACM Manag. Data, 2023

Mitigating Filter Bubbles Under a Competitive Diffusion Model.
Proc. ACM Manag. Data, 2023

L^2R: Lifelong Learning for First-stage Retrieval with Backward-Compatible Representations.
CoRR, 2023

Combinatorial Causal Bandits without Graph Skeleton.
CoRR, 2023

Scalable Adversarial Attack Algorithms on Influence Maximization.
Proceedings of the Sixteenth ACM International Conference on Web Search and Data Mining, 2023

Multi-Fidelity Multi-Armed Bandits Revisited.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Scalable Fair Influence Maximization.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Bandit Multi-linear DR-Submodular Maximization and Its Applications on Adversarial Submodular Bandits.
Proceedings of the International Conference on Machine Learning, 2023

Contextual Combinatorial Bandits with Probabilistically Triggered Arms.
Proceedings of the International Conference on Machine Learning, 2023

Combinatorial Pure Exploration of Causal Bandits.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

L2R: Lifelong Learning for First-stage Retrieval with Backward-Compatible Representations.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023

Combinatorial Causal Bandits.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
The pure exploration problem with general reward functions depending on full distributions.
Mach. Learn., 2022

Adaptive Greedy versus Non-adaptive Greedy for Influence Maximization.
J. Artif. Intell. Res., 2022

Higher order monotonicity and submodularity of influence in social networks: From local to global.
Inf. Comput., 2022

Pure Exploration of Causal Bandits.
CoRR, 2022

Batch-Size Independent Regret Bounds for Combinatorial Semi-Bandits with Probabilistically Triggered Arms or Independent Arms.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Branching Reinforcement Learning.
Proceedings of the International Conference on Machine Learning, 2022

Online Competitive Influence Maximization.
Proceedings of the International Conference on Artificial Intelligence and Statistics, 2022

Online Influence Maximization with Node-Level Feedback Using Standard Offline Oracles.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Follow the perturbed approximate leader for solving semi-bandit combinatorial optimization.
Frontiers Comput. Sci., 2021

Pure Exploration Bandit Problem with General Reward Functions Depending on Full Distributions.
CoRR, 2021

The Hardness Analysis of Thompson Sampling for Combinatorial Semi-bandits with Greedy Oracle.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

Combinatorial Pure Exploration with Bottleneck Reward Function.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

Network Inference and Influence Maximization from Samples.
Proceedings of the 38th International Conference on Machine Learning, 2021

Multi-layered Network Exploration via Random Walks: From Offline Optimization to Online Learning.
Proceedings of the 38th International Conference on Machine Learning, 2021

Causal Inference for Influence Propagation - Identifiability of the Independent Cascade Model.
Proceedings of the Computational Data and Social Networks - 10th International Conference, 2021

2020
Efficient approximation algorithms for adaptive influence maximization.
VLDB J., 2020

Scalable Lattice Influence Maximization.
IEEE Trans. Comput. Soc. Syst., 2020

A graph-theoretical basis of stochastic-cascading network influence: Characterizations of influence-based centrality.
Theor. Comput. Sci., 2020

Coreness of cooperative games with truncated submodular profit functions.
Theor. Comput. Sci., 2020

Maximizing Social Welfare in a Competitive Diffusion Model.
Proc. VLDB Endow., 2020

On the Equivalence Between High-Order Network-Influence Frameworks: General-Threshold, Hypergraph-Triggering, and Logic-Triggering Models.
CoRR, 2020

COVID-19 Plateau: A Phenomenon of Epidemic Development under Adaptive Prevention Strategies.
CoRR, 2020

Influence Maximization with Spontaneous User Adoption.
Proceedings of the WSDM '20: The Thirteenth ACM International Conference on Web Search and Data Mining, 2020

Online Influence Maximization under Linear Threshold Model.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

Optimization from Structured Samples for Coverage Functions.
Proceedings of the 37th International Conference on Machine Learning, 2020

Online Second Price Auction with Semi-Bandit Feedback under the Non-Stationary Setting.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

Gradient Method for Continuous Influence Maximization with Budget-Saving Considerations.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

Stochastic Online Learning with Probabilistic Graph Feedback.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Complete submodularity characterization in the comparative independent cascade model.
Theor. Comput. Sci., 2019

Self-Activation Influence Maximization.
CoRR, 2019

Cumulative activation in social networks.
Sci. China Inf. Sci., 2019

Maximizing Welfare in Social Networks under A Utility Driven Influence Diffusion model.
Proceedings of the 2019 International Conference on Management of Data, 2019

Stochastic One-Sided Full-Information Bandit.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2019

Adaptive Influence Maximization with Myopic Feedback.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019

Factorization Bandits for Online Influence Maximization.
Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2019

On Adaptivity Gaps of Influence Maximization Under the Independent Cascade Model with Full-Adoption Feedback.
Proceedings of the 30th International Symposium on Algorithms and Computation, 2019

Capturing Complementarity in Set Functions by Going Beyond Submodularity/Subadditivity.
Proceedings of the 10th Innovations in Theoretical Computer Science Conference, 2019

Improved Algorithm on Online Clustering of Bandits.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

2018
A Game Theoretic Model for the Formation of Navigable Small-World Networks - The Tradeoff between Distance and Reciprocity.
ACM Trans. Internet Techn., 2018

Boosting Information Spread: An Algorithmic Approach.
IEEE Trans. Comput. Soc. Syst., 2018

A Systematic Framework and Characterization of Influence-Based Network Centrality.
CoRR, 2018

EPIC: Welfare Maximization under Economically Postulated Independent Cascade Model.
CoRR, 2018

Combinatorial Pure Exploration with Continuous and Separable Reward Functions and Its Applications (Extended Version).
CoRR, 2018

Scalable Influence Maximization with General Marketing Strategies.
CoRR, 2018

Multi-Round Influence Maximization (Extended Version).
CoRR, 2018

Community Exploration: From Offline Optimization to Online Learning.
Proceedings of the Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, 2018

Multi-Round Influence Maximization.
Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018

Combinatorial Pure Exploration with Continuous and Separable Reward Functions and Its Applications.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Galaxy Network Embedding: A Hierarchical Community Structure Preserving Approach.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Thompson Sampling for Combinatorial Semi-Bandits.
Proceedings of the 35th International Conference on Machine Learning, 2018

An Issue in the Martingale Analysis of the Influence Maximization Algorithm IMM.
Proceedings of the Computational Data and Social Networks - 7th International Conference, 2018

2017
Scalable and parallelizable influence maximization with Random Walk Ranking and Rank Merge Pruning.
Inf. Sci., 2017

Tighter Regret Bounds for Influence Maximization and Other Combinatorial Semi-Bandits with Probabilistically Triggered Arms.
CoRR, 2017

Assessing Percolation Threshold Based on High-Order Non-Backtracking Matrices.
Proceedings of the 26th International Conference on World Wide Web, 2017

Interplay between Social Influence and Network Centrality: A Comparative Study on Shapley Centrality and Single-Node-Influence Centrality.
Proceedings of the 26th International Conference on World Wide Web, 2017

Improving Regret Bounds for Combinatorial Semi-Bandits with Probabilistically Triggered Arms and Its Applications.
Proceedings of the Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, 2017

Influence Maximization with ε-Almost Submodular Threshold Functions.
Proceedings of the Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, 2017

Partitioned Sampling of Public Opinions Based on Their Social Dynamics.
Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017

2016
Combinatorial Multi-Armed Bandit and Its Extension to Probabilistically Triggered Arms.
J. Mach. Learn. Res., 2016

Interplay between Social Influence and Network Centrality: Shapley Values and Scalable Algorithms.
CoRR, 2016

Combinatorial Multi-Armed Bandit with General Reward Functions.
Proceedings of the Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016, 2016

Robust Influence Maximization.
Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2016

Contextual Combinatorial Cascading Bandits.
Proceedings of the 33nd International Conference on Machine Learning, 2016

The Routing of Complex Contagion in Kleinberg's Small-World Networks.
Proceedings of the Computing and Combinatorics - 22nd International Conference, 2016

Learning Market Parameters Using Aggregate Demand Queries.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

2015
Diffusion of "Following" Links in Microblogging Networks.
IEEE Trans. Knowl. Data Eng., 2015

From Competition to Complementarity: Comparative Influence Diffusion and Maximization.
Proc. VLDB Endow., 2015

Voter Model on Signed Social Networks.
Internet Math., 2015

Partitioned Sampling of Public Opinions Based on Their Social Evolution.
CoRR, 2015

A Game Theoretic Model for the Formation of Navigable Small-World Networks.
Proceedings of the 24th International Conference on World Wide Web, 2015

Combining Traditional Marketing and Viral Marketing with Amphibious Influence Maximization.
Proceedings of the Sixteenth ACM Conference on Economics and Computation, 2015

Stochastic Online Greedy Learning with Semi-bandit Feedbacks.
Proceedings of the Advances in Neural Information Processing Systems 28: Annual Conference on Neural Information Processing Systems 2015, 2015

Real-Time Topic-Aware Influence Maximization Using Preprocessing.
Proceedings of the Computational Social Networks - 4th International Conference, 2015

The Impact of Heterogeneous Spreading Abilities of Network Ties on Information Spreading.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Introduction to special issue on computational aspects of social and information networks: Theory, methodologies, and applications (TKDD-CASIN).
ACM Trans. Knowl. Discov. Data, 2014

Combinatorial Multi-Armed Bandit and Its Extension to Probabilistically Triggered Arms.
CoRR, 2014

Efficient Topic-aware Influence Maximization Using Preprocessing.
CoRR, 2014

IMRank: influence maximization via finding self-consistent ranking.
Proceedings of the 37th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2014

Combinatorial Pure Exploration of Multi-Armed Bandits.
Proceedings of the Advances in Neural Information Processing Systems 27: Annual Conference on Neural Information Processing Systems 2014, 2014

Minimizing seed set selection with probabilistic coverage guarantee in a social network.
Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2014

Combinatorial Partial Monitoring Game with Linear Feedback and Its Applications.
Proceedings of the 31th International Conference on Machine Learning, 2014

Incentive mechanism and protocol design for crowdsourcing systems.
Proceedings of the 52nd Annual Allerton Conference on Communication, 2014

2013
Information and Influence Propagation in Social Networks
Synthesis Lectures on Data Management, Morgan & Claypool Publishers, ISBN: 978-3-031-01850-3, 2013

Verifying Linearizability via Optimized Refinement Checking.
IEEE Trans. Software Eng., 2013

On the power of breakable objects.
Theor. Comput. Sci., 2013

On the Hyperbolicity of Small-World and Treelike Random Graphs.
Internet Math., 2013

Maximizing Acceptance Probability for Active Friending in On-Line Social Networks
CoRR, 2013

Cumulative Effect in Information Diffusion: A Comprehensive Empirical Study on Microblogging Network.
CoRR, 2013

Influence diffusion dynamics and influence maximization in social networks with friend and foe relationships.
Proceedings of the Sixth ACM International Conference on Web Search and Data Mining, 2013

Aspects of Rumor Spreading on a Microblog Network.
Proceedings of the Social Informatics - 5th International Conference, 2013

Sybil-proof mechanisms in query incentive networks.
Proceedings of the fourteenth ACM Conference on Electronic Commerce, 2013

SAE: social analytic engine for large networks.
Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2013

Maximizing acceptance probability for active friending in online social networks.
Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2013

Combinatorial Multi-Armed Bandit: General Framework and Applications.
Proceedings of the 30th International Conference on Machine Learning, 2013

Prominent Features of Rumor Propagation in Online Social Media.
Proceedings of the 2013 IEEE 13th International Conference on Data Mining, 2013

2012
A compact routing scheme and approximate distance oracle for power-law graphs.
ACM Trans. Algorithms, 2012

Scalable influence maximization for independent cascade model in large-scale social networks.
Data Min. Knowl. Discov., 2012

Distributed Consensus Resilient to Both Crash Failures and Strategic Manipulations
CoRR, 2012

On the Hyperbolicity of Small-World Networks and Tree-Like Graphs
CoRR, 2012

Influence Blocking Maximization in Social Networks under the Competitive Linear Threshold Model.
Proceedings of the Twelfth SIAM International Conference on Data Mining, 2012

On the Hyperbolicity of Small-World and Tree-Like Random Graphs.
Proceedings of the Algorithms and Computation - 23rd International Symposium, 2012

IRIE: Scalable and Robust Influence Maximization in Social Networks.
Proceedings of the 12th IEEE International Conference on Data Mining, 2012

Time-Critical Influence Maximization in Social Networks with Time-Delayed Diffusion Process.
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012

2011
Protector: A Probabilistic Failure Detector for Cost-Effective Peer-to-Peer Storage.
IEEE Trans. Parallel Distributed Syst., 2011

Bounded budget betweenness centrality game for strategic network formations.
Theor. Comput. Sci., 2011

IRIE: A Scalable Influence Maximization Algorithm for Independent Cascade Model and Its Extensions
CoRR, 2011

Influence Blocking Maximization in Social Networks under the Competitive Linear Threshold Model Technical Report
CoRR, 2011

Optimal Pricing in Social Networks with Incomplete Information.
Proceedings of the Internet and Network Economics - 7th International Workshop, 2011

Influence Maximization in Social Networks When Negative Opinions May Emerge and Propagate.
Proceedings of the Eleventh SIAM International Conference on Data Mining, 2011

Relationship classification in large scale online social networks and its impact on information propagation.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Community Detection in Social Networks through Community Formation Games.
Proceedings of the IJCAI 2011, 2011

Participation Maximization Based on Social Influence in Online Discussion Forums.
Proceedings of the Fifth International Conference on Weblogs and Social Media, 2011

2010
A game-theoretic framework to identify overlapping communities in social networks.
Data Min. Knowl. Discov., 2010

Pricing in Social Networks: Equilibrium and Revenue Maximization
CoRR, 2010

Scalable influence maximization for prevalent viral marketing in large-scale social networks.
Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2010

Scalable Influence Maximization in Social Networks under the Linear Threshold Model.
Proceedings of the ICDM 2010, 2010

2009
The isolation game: A game of distances.
Theor. Comput. Sci., 2009

Implementing uniform reliable broadcast with binary consensus in systems with fair-lossy links.
Inf. Process. Lett., 2009

Bounded cost algorithms for multivalued consensus using binary consensus instances.
Inf. Process. Lett., 2009

Compact Routing in Power-Law Graphs.
Proceedings of the Distributed Computing, 23rd International Symposium, 2009

Formal Verification of Scalable NonZero Indicators.
Proceedings of the 21st International Conference on Software Engineering & Knowledge Engineering (SEKE'2009), 2009

Optimal Forwarder List Selection in Opportunistic Routing.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Efficient influence maximization in social networks.
Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28, 2009

Model Checking Linearizability via Refinement.
Proceedings of the FM 2009: Formal Methods, 2009

On the alpha-Sensitivity of Nash Equilibria in PageRank-Based Network Reputation Games.
Proceedings of the Frontiers in Algorithmics, Third International Workshop, 2009

2008
Probabilistic Failure Detection for Efficient Distributed Storage Maintenance.
Proceedings of the 27th IEEE Symposium on Reliable Distributed Systems (SRDS 2008), 2008

Ranking of Closeness Centrality for Large-Scale Social Networks.
Proceedings of the Frontiers in Algorithmics, Second Annual International Workshop, 2008

2007
BitVault: a highly reliable distributed data retention platform.
ACM SIGOPS Oper. Syst. Rev., 2007

Weakening Failure Detectors for <i>k</i> -Set Agreement Via the Partition Approach.
Proceedings of the Distributed Computing, 21st International Symposium, 2007

Decentralized, Connectivity-Preserving, and Cost-Effective Structured Overlay Maintenance.
Proceedings of the Stabilization, 2007

An Analytical Framework and Its Applications for Studying Brick Storage Reliability.
Proceedings of the 26th IEEE Symposium on Reliable Distributed Systems (SRDS 2007), 2007

Failure Detectors and Extended Paxos for k-Set Agreement.
Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 2007

Partition approach to failure detectors for k-set agreement.
Proceedings of the Twenty-Sixth Annual ACM Symposium on Principles of Distributed Computing, 2007

2006
Brief Announcement: Decentralized, Connectivity-Preserving, and Cost-Effective Structured Overlay Maintenance.
Proceedings of the Distributed Computing, 20th International Symposium, 2006

Enforcing Routing Consistency in Structured Peer-to-Peer Overlays: Should We and Could We?.
Proceedings of the 5th International workshop on Peer-To-Peer Systems, 2006

2005
Sigma: A Fault-Tolerant Mutual Exclusion Algorithm in Dynamic Distributed Systems Subject to Process Crashes and Memory Losses.
Proceedings of the 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 2005

Z-Ring: Fast Prefix Routing via a Low Maintenance Membership Protocol.
Proceedings of the 13th IEEE International Conference on Network Protocols (ICNP 2005), 2005

On the Impact of Replica Placement to the Reliability of Distributed Brick Storage Systems.
Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS 2005), 2005

2002
On the Quality of Service of Failure Detectors.
IEEE Trans. Computers, 2002

2000
On the Quality of Service of Failure Detectors.
PhD thesis, 2000

On Quiescent Reliable Communication.
SIAM J. Comput., 2000

Failure Detection and Consensus in the Crash-Recovery Model.
Distributed Comput., 2000

1999
Using the Heartbeat Failure Detector for Quiescent Reliable Communication and Consensus in Partitionable Networks.
Theor. Comput. Sci., 1999

1997
Heartbeat: A Timeout-Free Failure Detector for Quiescent Reliable Communication.
Proceedings of the Distributed Algorithms, 11th International Workshop, 1997


  Loading...