Cookies
O website necessita de alguns cookies e outros recursos semelhantes para funcionar. Caso o permita, o INESC TEC irá utilizar cookies para recolher dados sobre as suas visitas, contribuindo, assim, para estatísticas agregadas que permitem melhorar o nosso serviço. Ver mais
Aceitar Rejeitar
  • Menu
Tópicos
de interesse
Detalhes

Detalhes

  • Nome

    Mariana Curado Malta
  • Cargo

    Investigador Sénior
  • Desde

    24 janeiro 2024
Publicações

2026

$PathSAGE$: Identifying Influential Spreaders in Temporal Networks With $GraphSAGE$

Autores
Sadhu, S; Mallick, D; Namtirtha, A; Malta, MC; Dutta, A;

Publicação
IEEE Transactions on Emerging Topics in Computational Intelligence

Abstract

2025

LP-GRU Model: A Graph Analytics Approach to Detect Misinformation Infiltrators in Online Communities

Autores
Karmakar, D; Malta, MC; Maji, G; Dutta, A;

Publicação
International Conference on Communication Systems and Networks, COMSNETS

Abstract
Fighting the propagation of misinformation within a social media group or community by focusing on identifying dishonest members who deliberately try to quash any constructive social movement is very challenging because such people use advanced tactics to create division and doubt by manipulating information. The present research aims to develop a hybrid heuristic model to identify those who intentionally spread misleading information on social media to jeopardize a social movement. We frame this issue under the heading of Graph Semi-supervised Learning (GSSL), and we propose a hybrid model that falls under the heuristic approach, called Label Propagation-Gated Recurrent Unit (LP-GRU). LP-GRU can effectively identify perpetrators of disinformation within social communities by fusing community structure from the Label Propagation algorithm with behavioral patterns identified by GRU. Compared to previous heuristic approaches, we achieve up to 76% accuracy when using the LP-GRU model on augmented semi-synthetic social network data. © 2025 IEEE.

2025

Aligning Frameworks: Identifying Compatible Pairs of Digital Transformation and Maturity Models

Autores
Couto, F; Curado Malta, M;

Publicação
SN Computer Science

Abstract
Digital Transformation Models (DTM) and Digital Maturity Models (DMM) are two artefacts that guide the planning and implementation of Digital Transformation (DT) initiatives. When used in a combined approach, a DTM-DMM pairing could support DT managers and practitioners, as DTs are holistic and complex initiatives with high failure rates. However, no study has yet systematically addressed the compatibility amongst artefacts. This paper, therefore, aims to analyse the compatibility between academic DTMs and DMMs. Based on architectural compatibility and conceptual similarity, we provide a structured and replicable mixed methods approach to assessing artefact compatibility. To achieve this, we start with a systematic literature review to identify existing academic DTMs and DMMs, analyse the models and group them according to their scope. After, we employ quantitative similarity analysis techniques (Term Frequency-Inverse Document Frequency and Bidirectional Encoder Representations from Transformers combined with Cosine Similarity) and perform a qualitative compatibility analysis to establish ground truth. Based on this analysis, we apply the Receiver Operating Characteristic Curve technique to define threshold values for compatibility assessment. The threshold values were used to suggest compatible DTM-DMM pairings, resulting in nine DTM-DMM binomials for Small and Medium-sized Enterprises. The findings support managers and practitioners in selecting DTM-DMM pairs to guide DT initiatives while offering academics a mixed-methods approach based on the similarity analysis field to evaluate artefact compatibility systematically. © The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd. 2025.

2025

Community-based voting approach to enhance the spreading dynamics by identifying a group of influential spreaders in complex networks

Autores
Nandi, S; Malta, MC; Maji, G; Dutta, A;

Publicação
JOURNAL OF COMPUTATIONAL SCIENCE

Abstract
Exploring a group of influential spreaders to acquire maximum influence has become an emerging area of research in complex network analysis. The main challenge of this research is to identify the group of important nodes that are scattered broadly, such that the propagation ability of information is maximum to a network. Researchers proposed many centrality-based approaches with certain limitations to identify the influential nodes (spreaders) considering different properties of the networks. To find a group of spreaders, the VoteRank (a voting mechanism) based method produces effective results with low time complexity, wherein each iteration, the node votes for its neighbors by its voting capability, and the node obtaining the maximum vote score is identified as an influential spreader. The major loophole of existing VoteRank methods is measuring the voting capability based on the degree, k-shell index, or contribution of neighbors methods, which does not efficiently identify the spreaders from the diverse regions based on their spreading ability. In this paper, we propose a novel Community-based VoteRank method (CVoteRank) to identify a group of influential spreaders from diverse network regions by which the diffusion process is enhanced. Firstly, we measure every node's spreading ability based on intra- and inter-connectivity structure in a community, which signifies the local and global importance of the node. To identify the seed nodes, we assign the spreading ability to that node's voting capability and iteratively calculate the voting score of anode based on its neighboring voting capability and its spreading ability. Then, the node acquiring the maximum voting score is identified as the influential spreader in each iteration. Finally, to solve the problem of influence overlapping, CVoteRank reduces the voting capability of the neighboring nodes of the identified spreader. The efficiency of CVoteRank is evaluated and compared with the different state-of-the-art methods on twelve real networks. Utilizing the stochastic susceptible-infected-recovered epidemic method, we calculate the infected scale, final infected scale, and the average shortest path length among the identified spreaders. The experimental results show that CVoteRank identifies the most efficient spreaders with the highest spreading ability within a short period and the maximum reachability, and the identified spreaders are situated at diverse portions of the networks.

2025

Collaborating with Algorithms: AI for Collaborative Supply Chain Management

Autores
Fabio Couto; Mariana Curado Malta; António Lucas Soares;

Publicação
IFIP advances in information and communication technology

Abstract