{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T18:57:47Z","timestamp":1743015467440,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031366215"},{"type":"electronic","value":"9783031366222"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-36622-2_22","type":"book-chapter","created":{"date-parts":[[2023,7,7]],"date-time":"2023-07-07T12:02:36Z","timestamp":1688731356000},"page":"271-283","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Memetic Algorithm for\u00a0Solving the\u00a0Robust Influence Problem on\u00a0Directed Networks"],"prefix":"10.1007","author":[{"given":"Zhaoxi","family":"Ou","sequence":"first","affiliation":[]},{"given":"Shuai","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Shun","family":"Cai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,8]]},"reference":[{"issue":"1","key":"22_CR1","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1103\/RevModPhys.74.47","volume":"74","author":"R Albert","year":"2002","unstructured":"Albert, R., Barab\u00e1si, A.L.: Statistical mechanics of complex networks. Rev. Mod. Phys. 74(1), 47 (2002)","journal-title":"Rev. Mod. Phys."},{"issue":"5439","key":"22_CR2","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.286.5439.509","volume":"286","author":"AL Barab\u00e1si","year":"1999","unstructured":"Barab\u00e1si, A.L., Albert, R.: Emergence of scaling in random networks. Science 286(5439), 509\u2013512 (1999)","journal-title":"Science"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Chen, W., Lin, T., Tan, Z., Zhao, M., Zhou, X.: Robust influence maximization. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 795\u2013804 (2016)","DOI":"10.1145\/2939672.2939745"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Chen, W., Wang, Y., Yang, S.: Efficient influence maximization in social networks. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 199\u2013208 (2009)","DOI":"10.1145\/1557019.1557047"},{"issue":"1","key":"22_CR5","first-page":"211","volume":"193","author":"K Deep","year":"2007","unstructured":"Deep, K., Thakur, M.: A new mutation operator for real coded genetic algorithms. Appl. Math. Comput. 193(1), 211\u2013230 (2007)","journal-title":"Appl. Math. Comput."},{"issue":"1","key":"22_CR6","first-page":"17","volume":"5","author":"P Erd\u0151s","year":"1960","unstructured":"Erd\u0151s, P., R\u00e9nyi, A., et al.: On the evolution of random graphs. Publ. Math. Inst. Hung. Acad. Sci 5(1), 17\u201360 (1960)","journal-title":"Publ. Math. Inst. Hung. Acad. Sci"},{"key":"22_CR7","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1016\/j.ins.2016.07.012","volume":"367","author":"M Gong","year":"2016","unstructured":"Gong, M., Yan, J., Shen, B., Ma, L., Cai, Q.: Influence maximization in social networks based on discrete particle swarm optimization. Inf. Sci. 367, 600\u2013614 (2016)","journal-title":"Inf. Sci."},{"issue":"5","key":"22_CR8","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.65.056109","volume":"65","author":"P Holme","year":"2002","unstructured":"Holme, P., Kim, B.J., Yoon, C.N., Han, S.K.: Attack vulnerability of complex networks. Phys. Rev. E 65(5), 056109 (2002)","journal-title":"Phys. Rev. E"},{"issue":"6","key":"22_CR9","doi-asserted-by":"publisher","first-page":"2191","DOI":"10.3390\/s22062191","volume":"22","author":"D Huang","year":"2022","unstructured":"Huang, D., Tan, X., Chen, N., Fan, Z.: A memetic algorithm for solving the robust influence maximization problem on complex networks against structural failures. Sensors 22(6), 2191 (2022)","journal-title":"Sensors"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Kempe, D., Kleinberg, J., Tardos, \u00c9.: Maximizing the spread of influence through a social network. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 137\u2013146 (2003)","DOI":"10.1145\/956750.956769"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Lee, J.R., Chung, C.W.: A fast approximation for influence maximization in large social networks. In: Proceedings of the 23rd International Conference on World Wide Web, pp. 1157\u20131162 (2014)","DOI":"10.1145\/2567948.2580063"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Leskovec, J., Krause, A., Guestrin, C., Faloutsos, C., VanBriesen, J., Glance, N.: Cost-effective outbreak detection in networks. In: Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 420\u2013429 (2007)","DOI":"10.1145\/1281192.1281239"},{"issue":"1","key":"22_CR13","doi-asserted-by":"publisher","first-page":"9","DOI":"10.18178\/ijmlc.2017.7.1.611","volume":"7","author":"SM Lim","year":"2017","unstructured":"Lim, S.M., Sultan, A.B.M., Sulaiman, M.N., Mustapha, A., Leong, K.Y.: Crossover and mutation operators of genetic algorithms. Int. J. Mach. Learn. Comput. 7(1), 9\u201312 (2017)","journal-title":"Int. J. Mach. Learn. Comput."},{"issue":"5","key":"22_CR14","doi-asserted-by":"publisher","first-page":"1138","DOI":"10.1073\/pnas.1523412113","volume":"113","author":"X Liu","year":"2016","unstructured":"Liu, X., Stanley, H.E., Gao, J.: Breakdown of interdependent directed networks. Proc. Natl. Acad. Sci. 113(5), 1138\u20131143 (2016)","journal-title":"Proc. Natl. Acad. Sci."},{"issue":"7","key":"22_CR15","doi-asserted-by":"publisher","first-page":"568","DOI":"10.1038\/nphys2327","volume":"8","author":"T Nepusz","year":"2012","unstructured":"Nepusz, T., Vicsek, T.: Controlling edge dynamics in complex networks. Nat. Phys. 8(7), 568\u2013573 (2012)","journal-title":"Nat. Phys."},{"issue":"10","key":"22_CR16","doi-asserted-by":"publisher","first-page":"3838","DOI":"10.1073\/pnas.1009440108","volume":"108","author":"CM Schneider","year":"2011","unstructured":"Schneider, C.M., Moreira, A.A., Andrade, J.S., Jr., Havlin, S., Herrmann, H.J.: Mitigation of malicious attacks on networks. Proc. Natl. Acad. Sci. 108(10), 3838\u20133841 (2011)","journal-title":"Proc. Natl. Acad. Sci."},{"issue":"22","key":"22_CR17","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.103.228702","volume":"103","author":"SW Son","year":"2009","unstructured":"Son, S.W., Kim, B.J., Hong, H., Jeong, H.: Dynamics and directionality in complex networks. Phys. Rev. Lett. 103(22), 228702 (2009)","journal-title":"Phys. Rev. Lett."},{"key":"22_CR18","unstructured":"Umbarkar, A.J., Sheth, P.D.: Crossover operators in genetic algorithms: a review. ICTACT J. Soft Comput. 6(1) (2015)"},{"issue":"5","key":"22_CR19","doi-asserted-by":"publisher","first-page":"58003","DOI":"10.1209\/0295-5075\/101\/58003","volume":"101","author":"B Wang","year":"2013","unstructured":"Wang, B., Gao, L., Gao, Y., Deng, Y.: Maintain the structural controllability under malicious attacks on directed networks. Europhys. Lett. 101(5), 58003 (2013)","journal-title":"Europhys. Lett."},{"issue":"2","key":"22_CR20","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/TNSE.2017.2742522","volume":"5","author":"S Wang","year":"2017","unstructured":"Wang, S., Liu, J.: A multi-objective evolutionary algorithm for promoting the emergence of cooperation and controllable robustness on directed networks. IEEE Trans. Netw. Sci. Eng. 5(2), 92\u2013100 (2017)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"issue":"1","key":"22_CR21","doi-asserted-by":"publisher","first-page":"582","DOI":"10.1109\/JSYST.2018.2835642","volume":"13","author":"S Wang","year":"2018","unstructured":"Wang, S., Liu, J.: Constructing robust community structure against edge-based attacks. IEEE Syst. J. 13(1), 582\u2013592 (2018)","journal-title":"IEEE Syst. J."},{"issue":"6","key":"22_CR22","first-page":"1153","volume":"44","author":"S Wang","year":"2021","unstructured":"Wang, S., Liu, J.: A memetic algorithm for solving the robust influence maximization problem towards network structural perturbances. Chin. J. Comput. 44(6), 1153\u20131167 (2021)","journal-title":"Chin. J. Comput."},{"issue":"2","key":"22_CR23","doi-asserted-by":"publisher","first-page":"900","DOI":"10.1109\/TCYB.2019.2917059","volume":"51","author":"S Wang","year":"2019","unstructured":"Wang, S., Liu, J., Jin, Y.: Finding influential nodes in multiplex networks using a memetic algorithm. IEEE Trans. Cybern. 51(2), 900\u2013912 (2019)","journal-title":"IEEE Trans. Cybern."},{"key":"22_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.108697","volume":"246","author":"S Wang","year":"2022","unstructured":"Wang, S., Tan, X.: Determining seeds with robust influential ability from multi-layer networks: a multi-factorial evolutionary approach. Knowl.-Based Syst. 246, 108697 (2022)","journal-title":"Knowl.-Based Syst."},{"issue":"2","key":"22_CR25","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.85.026115","volume":"85","author":"WX Wang","year":"2012","unstructured":"Wang, W.X., Ni, X., Lai, Y.C., Grebogi, C.: Optimizing controllability of complex networks by minimum structural perturbations. Phys. Rev. E 85(2), 026115 (2012)","journal-title":"Phys. Rev. E"},{"issue":"6684","key":"22_CR26","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1038\/30918","volume":"393","author":"DJ Watts","year":"1998","unstructured":"Watts, D.J., Strogatz, S.H.: Collective dynamics of \u2018small-world\u2019 networks. Nature 393(6684), 440\u2013442 (1998)","journal-title":"Nature"},{"issue":"6","key":"22_CR27","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.85.066130","volume":"85","author":"A Zeng","year":"2012","unstructured":"Zeng, A., Liu, W.: Enhancing network robustness against malicious attacks. Phys. Rev. E 85(6), 066130 (2012)","journal-title":"Phys. Rev. E"}],"container-title":["Lecture Notes in Computer Science","Advances in Swarm Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-36622-2_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T16:18:03Z","timestamp":1710260283000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-36622-2_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031366215","9783031366222"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-36622-2_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"8 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICSI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Swarm Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shenzhen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"swarm2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"170","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"81","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.6","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}