{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T12:00:56Z","timestamp":1726056056444},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030323875"},{"type":"electronic","value":"9783030323882"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-32388-2_8","type":"book-chapter","created":{"date-parts":[[2019,10,27]],"date-time":"2019-10-27T10:04:40Z","timestamp":1572170680000},"page":"84-97","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Improving Complex Network Controllability via Link Prediction"],"prefix":"10.1007","author":[{"given":"Ran","family":"Wei","sequence":"first","affiliation":[]},{"given":"Weiwei","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Donghai","family":"Guan","sequence":"additional","affiliation":[]},{"given":"Asad Masood","family":"Khattak","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Fahim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,28]]},"reference":[{"issue":"7346","key":"8_CR1","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1038\/nature10011","volume":"473","author":"Y-Y Liu","year":"2011","unstructured":"Liu, Y.-Y., Slotine, J.J., Barab\u00e1si, A.L.: Controllability of complex network. Nature 473(7346), 167\u2013173 (2011)","journal-title":"Nature"},{"unstructured":"Yuan, Z., Zhao, C., Di, Z., et al.: Exact controllability of complex networks. Nature Commun. 4, (2013). Conference 2016. LNCS, vol. 9999, pp. 1\u201313. Springer, Heidelberg (2016)","key":"8_CR2"},{"unstructured":"Rugh, W.J.: Linear System Theory. Prentice Hall, Upper Saddle River (1996)","key":"8_CR3"},{"doi-asserted-by":"crossref","unstructured":"Holme, P., Kim, B.J., Yoon, C.N., Han, S.K.: Attack vulnerability of complex networks. Phys. Rev. E (2002)","key":"8_CR4","DOI":"10.1103\/PhysRevE.65.056109"},{"key":"8_CR5","doi-asserted-by":"publisher","first-page":"128701","DOI":"10.1103\/PhysRevLett.88.128701","volume":"88","author":"J Davidsen","year":"2002","unstructured":"Davidsen, J., Ebel, H., Bornholdt, S.: Emergence of a small world from local interactions: modeling acquaintance networks. Phys. Rev. Lett. 88, 128701 (2002)","journal-title":"Phys. Rev. Lett."},{"key":"8_CR6","doi-asserted-by":"publisher","first-page":"025102","DOI":"10.1103\/PhysRevE.64.025102","volume":"64","author":"MEJ Newman","year":"2001","unstructured":"Newman, M.E.J.: Clustering and preferential attachment in growing networks. Phys. Rev. Lett. E 64, 025102 (2001)","journal-title":"Phys. Rev. Lett. E"},{"key":"8_CR7","volume-title":"Introduction to Modern Information Retrieval","author":"G Salton","year":"1983","unstructured":"Salton, G., McGill, M.J.: Introduction to Modern Information Retrieval. McGrawHill, New York (1983)"},{"issue":"3","key":"8_CR8","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/S0378-8733(03)00009-1","volume":"25","author":"LA Adamic","year":"2003","unstructured":"Adamic, L.A., Adar, E.: Friends and neighbors on the web. Soc. Netw. 25(3), 211\u2013230 (2003)","journal-title":"Soc. Netw."},{"key":"8_CR9","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/j.knosys.2014.04.013","volume":"66","author":"D Guan","year":"2014","unstructured":"Guan, D., Yuan, W., Ma, T., Lee, S.: Detecting potential labeling errors for bioinformatics by multiple voting. Knowl.-Based Syst. 66, 28\u201335 (2014)","journal-title":"Knowl.-Based Syst."},{"unstructured":"He, D., Xia, Y., Qin, T., Wang, L., Yu, N., Liu, T.: Dual learning for machine translation. In: Advances in Neural Information Processing Systems 29 (NIPS 2016) (2016)","key":"8_CR10"},{"unstructured":"John, G.H.: Robust decision trees: removing outliers from databases. In: Proceeding of International Conference on Knowledge Discovery and Data Mining, pp. 174\u2013179 (1995)","key":"8_CR11"},{"unstructured":"Wu, X., Zhu, X., Chen, Q.: Eliminating class noise in large datasets. In: Proceeding of International Conference on Machine Learning, pp. 920\u2013927 (2003)","key":"8_CR12"},{"key":"8_CR13","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/978-1-4419-8462-3_9","volume-title":"Social Network Data Analytics","author":"MA Hasan","year":"2011","unstructured":"Hasan, M.A., Zaki, M.J.: A survey of link prediction in social networks. In: Aggarwal, C. (ed.) Social Network Data Analytics, pp. 243\u2013275. Springer, Boston (2011). \n                    https:\/\/doi.org\/10.1007\/978-1-4419-8462-3_9"},{"doi-asserted-by":"crossref","unstructured":"Bianchin, G., Pasqualetti, F., Zampieri, S.: The role of diameter in the controllability of complex networks. In: CDC 2015, pp. 980\u2013985 (2015)","key":"8_CR14","DOI":"10.1109\/CDC.2015.7402000"},{"issue":"4","key":"8_CR15","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1093\/comnet\/cnu051","volume":"3","author":"PT Benavides","year":"2015","unstructured":"Benavides, P.T., Diwekar, U.M., Cabezas, H.: Controllability of complex networks for sustainable system dynamics. J. Complex Netw. 3(4), 566\u2013583 (2015)","journal-title":"J. Complex Netw."},{"unstructured":"Curiskis, S.A., Osborn, T.R., Kennedy, P.J.: Link prediction and topological feature importance in social networks. In: AusDM 2015, pp. 39\u201350 (2015)","key":"8_CR16"},{"doi-asserted-by":"crossref","unstructured":"Yu, Z., Kening, G., Feng, L., Ge, Y.: A new method for link prediction using various features in social networks. In: IEEE WISA 2014, pp. 144\u2013147 (2014)","key":"8_CR17","DOI":"10.1109\/WISA.2014.34"},{"key":"8_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/3-540-44938-8_32","volume-title":"Multiple Classifier Systems","author":"S Verbaeten","year":"2003","unstructured":"Verbaeten, S., Van Assche, A.: Ensemble methods for noise elimination in classification problems. In: Windeatt, T., Roli, F. (eds.) MCS 2003. LNCS, vol. 2709, pp. 317\u2013325. Springer, Heidelberg (2003). \n                    https:\/\/doi.org\/10.1007\/3-540-44938-8_32"},{"issue":"1","key":"8_CR19","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/TCNS.2014.2310254","volume":"1","author":"F Pasqualetti","year":"2014","unstructured":"Pasqualetti, F., Zampieri, S., Bullo, F.: Controllability metrics, limitations and algorithms for complex networks. IEEE Trans. Control. Netw. Syst. 1(1), 40\u201352 (2014)","journal-title":"IEEE Trans. Control. Netw. Syst."},{"key":"8_CR20","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.ins.2015.07.024","volume":"325","author":"PG Sun","year":"2015","unstructured":"Sun, P.G.: Controllability and modularity of complex networks. Inf. Sci. 325, 20\u201332 (2015)","journal-title":"Inf. Sci."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Machine Learning and Intelligent Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-32388-2_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,27]],"date-time":"2019-10-27T10:05:25Z","timestamp":1572170725000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-32388-2_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030323875","9783030323882"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-32388-2_8","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"28 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MLICOM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning and Intelligent Communications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mlicom2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/mlicom.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}