Cookies Policy
The website need some cookies and similar means to function. If you permit us, we will use those means to collect data on your visits for aggregated statistics to improve our service. Find out More
Accept Reject
  • Menu
Interest
Topics
Details

Details

  • Name

    Mariana Curado Malta
  • Role

    Senior Researcher
  • Since

    24th January 2024
Publications

2026

$PathSAGE$: Identifying Influential Spreaders in Temporal Networks With $GraphSAGE$

Authors
Sadhu, S; Mallick, D; Namtirtha, A; Malta, MC; Dutta, A;

Publication
IEEE Transactions on Emerging Topics in Computational Intelligence

Abstract

2025

LP-GRU Model: A Graph Analytics Approach to Detect Misinformation Infiltrators in Online Communities

Authors
Karmakar, D; Malta, MC; Maji, G; Dutta, A;

Publication
International Conference on Communication Systems and Networks, COMSNETS

Abstract
Fighting the propagation of misinformation within a social media group or community by focusing on identifying dishonest members who deliberately try to quash any constructive social movement is very challenging because such people use advanced tactics to create division and doubt by manipulating information. The present research aims to develop a hybrid heuristic model to identify those who intentionally spread misleading information on social media to jeopardize a social movement. We frame this issue under the heading of Graph Semi-supervised Learning (GSSL), and we propose a hybrid model that falls under the heuristic approach, called Label Propagation-Gated Recurrent Unit (LP-GRU). LP-GRU can effectively identify perpetrators of disinformation within social communities by fusing community structure from the Label Propagation algorithm with behavioral patterns identified by GRU. Compared to previous heuristic approaches, we achieve up to 76% accuracy when using the LP-GRU model on augmented semi-synthetic social network data. © 2025 IEEE.

2025

Aligning Frameworks: Identifying Compatible Pairs of Digital Transformation and Maturity Models

Authors
Couto, F; Curado Malta, M;

Publication
SN Computer Science

Abstract
Digital Transformation Models (DTM) and Digital Maturity Models (DMM) are two artefacts that guide the planning and implementation of Digital Transformation (DT) initiatives. When used in a combined approach, a DTM-DMM pairing could support DT managers and practitioners, as DTs are holistic and complex initiatives with high failure rates. However, no study has yet systematically addressed the compatibility amongst artefacts. This paper, therefore, aims to analyse the compatibility between academic DTMs and DMMs. Based on architectural compatibility and conceptual similarity, we provide a structured and replicable mixed methods approach to assessing artefact compatibility. To achieve this, we start with a systematic literature review to identify existing academic DTMs and DMMs, analyse the models and group them according to their scope. After, we employ quantitative similarity analysis techniques (Term Frequency-Inverse Document Frequency and Bidirectional Encoder Representations from Transformers combined with Cosine Similarity) and perform a qualitative compatibility analysis to establish ground truth. Based on this analysis, we apply the Receiver Operating Characteristic Curve technique to define threshold values for compatibility assessment. The threshold values were used to suggest compatible DTM-DMM pairings, resulting in nine DTM-DMM binomials for Small and Medium-sized Enterprises. The findings support managers and practitioners in selecting DTM-DMM pairs to guide DT initiatives while offering academics a mixed-methods approach based on the similarity analysis field to evaluate artefact compatibility systematically. © The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd. 2025.

2025

Community-based voting approach to enhance the spreading dynamics by identifying a group of influential spreaders in complex networks

Authors
Nandi, S; Malta, MC; Maji, G; Dutta, A;

Publication
JOURNAL OF COMPUTATIONAL SCIENCE

Abstract
Exploring a group of influential spreaders to acquire maximum influence has become an emerging area of research in complex network analysis. The main challenge of this research is to identify the group of important nodes that are scattered broadly, such that the propagation ability of information is maximum to a network. Researchers proposed many centrality-based approaches with certain limitations to identify the influential nodes (spreaders) considering different properties of the networks. To find a group of spreaders, the VoteRank (a voting mechanism) based method produces effective results with low time complexity, wherein each iteration, the node votes for its neighbors by its voting capability, and the node obtaining the maximum vote score is identified as an influential spreader. The major loophole of existing VoteRank methods is measuring the voting capability based on the degree, k-shell index, or contribution of neighbors methods, which does not efficiently identify the spreaders from the diverse regions based on their spreading ability. In this paper, we propose a novel Community-based VoteRank method (CVoteRank) to identify a group of influential spreaders from diverse network regions by which the diffusion process is enhanced. Firstly, we measure every node's spreading ability based on intra- and inter-connectivity structure in a community, which signifies the local and global importance of the node. To identify the seed nodes, we assign the spreading ability to that node's voting capability and iteratively calculate the voting score of anode based on its neighboring voting capability and its spreading ability. Then, the node acquiring the maximum voting score is identified as the influential spreader in each iteration. Finally, to solve the problem of influence overlapping, CVoteRank reduces the voting capability of the neighboring nodes of the identified spreader. The efficiency of CVoteRank is evaluated and compared with the different state-of-the-art methods on twelve real networks. Utilizing the stochastic susceptible-infected-recovered epidemic method, we calculate the infected scale, final infected scale, and the average shortest path length among the identified spreaders. The experimental results show that CVoteRank identifies the most efficient spreaders with the highest spreading ability within a short period and the maximum reachability, and the identified spreaders are situated at diverse portions of the networks.

2025

Collaborating with Algorithms: AI for Collaborative Supply Chain Management

Authors
Fabio Couto; Mariana Curado Malta; António Lucas Soares;

Publication
IFIP advances in information and communication technology

Abstract