{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T01:06:05Z","timestamp":1742951165348,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030029210"},{"type":"electronic","value":"9783030029227"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-02922-7_10","type":"book-chapter","created":{"date-parts":[[2018,10,19]],"date-time":"2018-10-19T05:42:24Z","timestamp":1539927744000},"page":"145-160","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["CoRank: A Coupled Dual Networks Approach to Trust Evaluation on Twitter"],"prefix":"10.1007","author":[{"given":"Peiyao","family":"Li","sequence":"first","affiliation":[]},{"given":"Weiliang","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,20]]},"reference":[{"issue":"1","key":"10_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3155897","volume":"51","author":"Mohammed Ali Al-Garadi","year":"2018","unstructured":"Al-Garadi, M.A., Varathan, K.D., Ravana, S.D., Ahmed, E.: Analysis of online social network connections for identification of influential users: survey and open research issues. ACM Comput. Surv. 51(1), article 16 (2018)","journal-title":"ACM Computing Surveys"},{"key":"10_CR2","unstructured":"Aslam, S.: Twitter by the numbers: stats, demographics & fun facts. https:\/\/www.omnicoreagency.com\/twitter-statistics\/. Accessed 3 Apr 2018"},{"key":"10_CR3","first-page":"564","volume-title":"Proceedings 2004 VLDB Conference","author":"Andrey Balmin","year":"2004","unstructured":"Balmin, A., Hristidis, V., Papakonstantinou, Y.: Objectrank: authority-based key-word search in databases. In: VLDB, vol. 30, pp. 564\u2013575 (2004)"},{"key":"10_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-319-48743-4_5","volume-title":"Web Information Systems Engineering \u2013 WISE 2016","author":"M Bartoletti","year":"2016","unstructured":"Bartoletti, M., Lande, S., Massa, A.: Faderank: an incremental algorithm for ranking Twitter users. In: Cellary, W., Mokbel, M.F., Wang, J., Wang, H., Zhou, R., Zhang, Y. (eds.) WISE 2016, Part II. LNCS, vol. 10042, pp. 55\u201369. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-48743-4_5"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Cha, M., Haddai, H., Benevenuto, F., Gummadi, K.: Measuring user influence in Twitter: the million follower fallacy. In: AAAI on Weblogs and Social Media, pp. 10\u201317 (2010)","DOI":"10.1609\/icwsm.v4i1.14033"},{"key":"10_CR6","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1016\/j.eswa.2017.10.006","volume":"92","author":"AB Eliacik","year":"2018","unstructured":"Eliacik, A.B., Erdogan, N.: Sentiment analysis, influential user, social network analysis, microblogging service. Expert. Syst. Appl. 92, 403\u2013418 (2018)","journal-title":"Expert. Syst. Appl."},{"issue":"6","key":"10_CR7","doi-asserted-by":"publisher","first-page":"1250","DOI":"10.1016\/j.ipm.2013.06.003","volume":"49","author":"D Gayo-Avello","year":"2013","unstructured":"Gayo-Avello, D.: Nepotistic relationships in Twitter and their impact on rank prestige algorithms. Inf. Process. Manag. 49(6), 1250\u20131280 (2013)","journal-title":"Inf. Process. Manag."},{"key":"10_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1007\/978-3-319-13734-6_16","volume-title":"Social Informatics","author":"A Gupta","year":"2014","unstructured":"Gupta, A., Kumaraguru, P., Castillo, C., Meier, P.: TweetCred: real-time credibility assessment of content on Twitter. In: Aiello, L.M., McFarland, D. (eds.) SocInfo 2014. LNCS, vol. 8851, pp. 228\u2013243. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-13734-6_16"},{"issue":"6","key":"10_CR9","doi-asserted-by":"publisher","first-page":"1343","DOI":"10.1109\/TKDE.2017.2672749","volume":"29","author":"R Hong","year":"2017","unstructured":"Hong, R., He, C., Ge, Y., Wang, M., Wu, X.: User vitality ranking and prediction in social networking services: a dynamic network perspective. IEEE Trans. Knowl. Data Eng. 29(6), 1343\u20131356 (2017)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10_CR10","unstructured":"Huang, H., et al.: Tweet ranking based on heterogeneous networks. In: Proceedings of COLING, pp. 1239\u20131256 (2012)"},{"key":"10_CR11","doi-asserted-by":"publisher","first-page":"604","DOI":"10.1145\/324133.324140","volume":"46","author":"JM Kleinberg","year":"1999","unstructured":"Kleinberg, J.M.: Authoritative sources in a hyperlinked environment. J. ACM 46, 604\u2013632 (1999)","journal-title":"J. ACM"},{"key":"10_CR12","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/s11280-011-0114-8","volume":"14","author":"M Li","year":"2011","unstructured":"Li, M., Sun, X., Wang, H., Zhang, Y., Zhang, J.: Privacy-aware access control with trust management in web service. World Wide Web 14, 407\u2013430 (2011)","journal-title":"World Wide Web"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Nagmoti, R., Teredesai, A., Cock, D.M.: Ranking approaches for microblog search. In: International Conference on Web Intelligence and Intelligent Agent Technology, pp. 153\u2013157 (2010)","DOI":"10.1109\/WI-IAT.2010.170"},{"key":"10_CR14","unstructured":"Page, L., Brin, S., Motwani, R., Winograd., T.: The pagerank citation ranking: bringing order to the web. Technical report, Stanford Digital Library Technologies Project (1998)"},{"key":"10_CR15","unstructured":"Wang, G., Wang, H., Tao, X., Zhang, J.: A self-stabilizing algorithm for finding a minimal positive influence dominating set in social networks. In: Proceedings of ADC, pp. 93\u201399 (2013)"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Weng, J., Lim, E.P., Jiang, J., He, Q.: TwitterRank: finding topic-sensitive influential twitterers. In: ACM WSDM, pp. 261\u2013270 (2010)","DOI":"10.1145\/1718487.1718520"},{"key":"10_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1007\/978-3-642-17616-6_22","volume-title":"Web Information Systems Engineering \u2013 WISE 2010","author":"Y Yamaguchi","year":"2010","unstructured":"Yamaguchi, Y., Takahashi, T., Amagasa, T., Kitagawa, H.: TURank: Twitter user ranking based on user-tweet graph analysis. In: Chen, L., Triantafillou, P., Suel, T. (eds.) WISE 2010. LNCS, vol. 6488, pp. 240\u2013253. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-17616-6_22"},{"key":"10_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2015.08.001","volume":"76","author":"L Zhao","year":"2016","unstructured":"Zhao, L., Hua, T., Lu, C.T., Chen, I.R.: A topic-focused trust model for Twitter. Comput. Commun. 76, 1\u201311 (2016)","journal-title":"Comput. Commun."}],"container-title":["Lecture Notes in Computer Science","Web Information Systems Engineering \u2013 WISE 2018"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-02922-7_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T08:47:37Z","timestamp":1710233257000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-02922-7_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030029210","9783030029227"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-02922-7_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"20 October 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Web Information Systems Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dubai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wise2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/wise2018.connect.rs\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}