{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T03:07:47Z","timestamp":1743131267733,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030590154"},{"type":"electronic","value":"9783030590161"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-59016-1_3","type":"book-chapter","created":{"date-parts":[[2020,9,10]],"date-time":"2020-09-10T13:05:10Z","timestamp":1599743110000},"page":"28-39","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Maximizing the Expected Influence in Face of the Non-progressive Adversary"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8340-235X","authenticated-orcid":false,"given":"T.-H. Hubert","family":"Chan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3246-7057","authenticated-orcid":false,"given":"Li","family":"Ning","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8730-3711","authenticated-orcid":false,"given":"Yong","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,10]]},"reference":[{"issue":"6","key":"3_CR1","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/37.969135","volume":"21","author":"C Asavathiratham","year":"2001","unstructured":"Asavathiratham, C., Roy, S., Lesieutre, B., Verghese, G.: The influence model. IEEE Contr. Syst. Mag. 21(6), 52\u201364 (2001)","journal-title":"IEEE Contr. Syst. Mag."},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Bharathi, S., Kempe, D., Salek, M.: Competitive influence maximization in social networks. In: Proceedings of the 3rd International Conference on Internet and Network Economics. pp. 306\u2013311 (2007)","DOI":"10.1007\/978-3-540-77105-0_31"},{"issue":"6","key":"3_CR3","doi-asserted-by":"publisher","first-page":"1740","DOI":"10.1137\/080733991","volume":"40","author":"G C\u0103linescu","year":"2011","unstructured":"C\u0103linescu, G., Chekuri, C., P\u00e1l, M., Vondr\u00e1k, J.: Maximizing a monotone submodular function subject to a matroid constraint. SIAM J. Comput. 40(6), 1740\u20131766 (2011)","journal-title":"SIAM J. Comput."},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Carnes, T., Nagarajan, C., Wild, S.M., van Zuylen, A.: Maximizing influence in a competitive social network: a follower\u2019s perspective. In: Proceedings of the 9th International Conference on Electronic Commerce. pp. 351\u2013360 (2007)","DOI":"10.1145\/1282100.1282167"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Chan, T.H.H., Ning, L., Zhang, Y.: Influence maximization under the non-progressive linear threshold model. In: Proceedings of the 14th International Frontiers of Algorithmics Workshop (2020)","DOI":"10.1007\/978-3-030-59901-0_4"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Chen, W., et al.: Influence maximization in social networks when negative opinions may emerge and propagate. In: SDM. pp. 379\u2013390 (2011)","DOI":"10.1137\/1.9781611972818.33"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Chen, W., Yuan, Y., Zhang, L.: Scalable influence maximization in social networks under the linear threshold model. In: Proceedings of the 2010 IEEE International Conference on Data Mining. pp. 88\u201397 (2010)","DOI":"10.1109\/ICDM.2010.118"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Domingos, P., Richardson, M.: Mining the network value of customers. In: Proceedings of the 7th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. pp. 57\u201366 (2001)","DOI":"10.1145\/502512.502525"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Dubey, P., Garg, R., Meyer, B.D.: Competing for customers in a social network. Department of Economics Working Papers 06\u201301 (2006)","DOI":"10.1007\/11944874_16"},{"key":"3_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/978-3-540-77105-0_27","volume-title":"Internet and Network Economics","author":"E Even-Dar","year":"2007","unstructured":"Even-Dar, E., Shapira, A.: A note on maximizing the spread of influence in social networks. In: Deng, X., Graham, F.C. (eds.) WINE 2007. LNCS, vol. 4858, pp. 281\u2013286. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-77105-0_27"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Fisher, M.L., Nemhauser, G.L., Wolsey, L.A.: An analysis of approximations formaximizing submodular set functions. II. Math. Programming Stud. pp. 73\u201387(1978)","DOI":"10.1007\/BFb0121195"},{"key":"3_CR12","first-page":"1","volume":"3","author":"J Goldenberg","year":"2001","unstructured":"Goldenberg, J., Libai, B.: Muller: using complex systems analysis to advance marketing theory development. Acad. Mark. Sci. Rev. 3, 1\u201318 (2001)","journal-title":"Acad. Mark. Sci. Rev."},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"He, Z., Cai, Z., Wang, X.: Modeling propagation dynamics and developing optimized countermeasures for rumor spreading in online social networks. In: 2015 IEEE 35Th International Conference on Distributed Computing Systems. pp. 205\u2013214. IEEE (2015)","DOI":"10.1109\/ICDCS.2015.29"},{"issue":"3","key":"3_CR14","doi-asserted-by":"publisher","first-page":"2789","DOI":"10.1109\/TVT.2016.2585591","volume":"66","author":"Z He","year":"2016","unstructured":"He, Z., Cai, Z., Yu, J., Wang, X., Sun, Y., Li, Y.: Cost-efficient strategies for restraining rumor spreading in mobile social networks. IEEE Trans. Veh.Technol. 66(3), 2789\u20132800 (2016)","journal-title":"IEEE Trans. Veh.Technol."},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Kempe, D., Kleinberg, J., Tardos, E.: Influential nodes in a diffusion model for social networks. In: Proceedings of the 32nd International Colloquium on Automata, Languages and Programming. pp. 1127\u20131138 (2005)","DOI":"10.1007\/11523468_91"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Kempe, D., Kleinberg, J., Tardos, \u00c9.: Maximizing the spread of influence through a social network. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. pp. 137\u2013146. ACM (2003)","DOI":"10.1145\/956750.956769"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Mossel, E., Roch, S.: On the submodularity of influence in social networks. In: Proceedings of the 39th Annual ACM Symposium on Theory of Computing. pp. 128\u2013134 (2007)","DOI":"10.1145\/1250790.1250811"},{"issue":"1","key":"3_CR18","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/BF01588971","volume":"14","author":"GL Nemhauser","year":"1978","unstructured":"Nemhauser, G.L., Wolsey, L.A., Fisher, M.L.: An analysis of approximations for maximizing submodular set (functions i). Math. Program. 14(1), 265\u2013294 (1978)","journal-title":"Math. Program."},{"issue":"4","key":"3_CR19","doi-asserted-by":"publisher","first-page":"702","DOI":"10.1109\/TCSS.2019.2921422","volume":"6","author":"W Tang","year":"2019","unstructured":"Tang, W., Luo, G., Wu, Y., Tian, L., Zheng, X., Cai, Z.: A second-order diffusion model for influence maximization in social networks. IEEE Trans. Computat. Social Syst. 6(4), 702\u2013714 (2019)","journal-title":"IEEE Trans. Computat. Social Syst."}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-59016-1_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T10:04:26Z","timestamp":1619258666000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-59016-1_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030590154","9783030590161"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-59016-1_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"10 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WASA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Wireless Algorithms, Systems, and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Qingdao","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wasa2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/wasa-conference.org\/WASA2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"216","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"67","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6-7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}