{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T02:40:40Z","timestamp":1743043240815,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319487397"},{"type":"electronic","value":"9783319487403"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-48740-3_1","type":"book-chapter","created":{"date-parts":[[2016,11,1]],"date-time":"2016-11-01T10:32:20Z","timestamp":1477996340000},"page":"3-18","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Attribute-Based Influence Maximization in Social Networks"],"prefix":"10.1007","author":[{"given":"Jiuxin","family":"Cao","sequence":"first","affiliation":[]},{"given":"Tao","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Shuai","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Ziqing","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Zhuo","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,2]]},"reference":[{"issue":"18","key":"1_CR1","doi-asserted-by":"publisher","first-page":"3825","DOI":"10.1016\/j.comnet.2012.10.007","volume":"56","author":"S Brin","year":"2012","unstructured":"Brin, S., Page, L.: Reprint of: the anatomy of a large-scale hypertextual web search engine. Comput. Netw. 56(18), 3825\u20133833 (2012)","journal-title":"Comput. Netw."},{"issue":"2","key":"1_CR2","first-page":"238","volume":"38","author":"J-X Cao","year":"2015","unstructured":"Cao, J.-X., Dong, D., Xu, S., Zheng, X., Liu, B., Luo, J.-Z.: A k-core based algorithm for influence maximization in social networks. Chinese J. Comput. 38(2), 238\u2013248 (2015). (in Chinese)","journal-title":"Chinese J. Comput."},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Cao, T., Wu, X., Wang, S., Hu, X.: Oasnet: an optimal allocation approach to influence maximization in modular social networks. In: 2010 ACM Symposium on Applied Computing, pp. 1088\u20131094. ACM (2010)","DOI":"10.1145\/1774088.1774314"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Chen, W., Wang, Y., Yang, S.: Efficient influence maximization in social networks. In: 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 199\u2013208. ACM (2009)","DOI":"10.1145\/1557019.1557047"},{"key":"1_CR5","unstructured":"Christakis, N.A., Fowler, J.H.: Connected: The surprising power of our social networks and how they shape our lives. hachette digital (2009)"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Domingos, P., Richardson, M.: Mining the network value of customers. In: Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 57\u201366. ACM (2001)","DOI":"10.1145\/502512.502525"},{"issue":"3","key":"1_CR7","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/0378-8733(78)90021-7","volume":"1","author":"LC Freeman","year":"1978","unstructured":"Freeman, L.C.: Centrality in social networks conceptual clarification. Soc. Netw. 1(3), 215\u2013239 (1978)","journal-title":"Soc. Netw."},{"issue":"5","key":"1_CR8","doi-asserted-by":"publisher","first-page":"056102","DOI":"10.1103\/PhysRevE.79.056102","volume":"79","author":"A Galstyan","year":"2009","unstructured":"Galstyan, A., Musoyan, V., Cohen, P.: Maximizing influence propagation in networks with community structure. Phys. Rev. E. 79(5), 056102 (2009)","journal-title":"Phys. Rev. E."},{"issue":"3","key":"1_CR9","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1023\/A:1011122126881","volume":"12","author":"J Goldenberg","year":"2001","unstructured":"Goldenberg, J., Libai, B., Muller, E.: Talk of the network: a complex systems look at the underlying process of word-of-mouth. Mark. Lett. 12(3), 211\u2013223 (2001)","journal-title":"Mark. Lett."},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Jung, K., Heo, W., Chen, W.: Irie: scalable and robust influence maximization in social networks. In: 2012 IEEE 12th International Conference on Data Mining, pp. 918\u2013923. IEEE (2012)","DOI":"10.1109\/ICDM.2012.79"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Kempe, D., Kleinberg, J., Tardos, \u00c9.: Maximizing the spread of influence through a social network. In: Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 137\u2013146. ACM (2003)","DOI":"10.1145\/956750.956769"},{"issue":"11","key":"1_CR12","doi-asserted-by":"publisher","first-page":"888","DOI":"10.1038\/nphys1746","volume":"6","author":"M Kitsak","year":"2010","unstructured":"Kitsak, M., Gallos, L.K., Havlin, S., Liljeros, F., Muchnik, L., Stanley, H.E., Makse, H.A.: Identification of influential spreaders in complex networks. Nature Phys. 6(11), 888\u2013893 (2010)","journal-title":"Nature Phys."},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Leskovec, J., Krause, A., Guestrin, C., Faloutsos, C., VanBriesen, J., Glance, N.: Cost-effective outbreak detection in networks. In: 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 420\u2013429. ACM (2007)","DOI":"10.1145\/1281192.1281239"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Li, F.-H., Li, C.-T., Shan, M.-K.: Labeled influence maximization in social networks for target marketing. In: 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Inernational Conference on Social Computing, pp. 560\u2013563. IEEE (2011)","DOI":"10.1109\/PASSAT\/SocialCom.2011.152"},{"key":"1_CR15","unstructured":"Liu, S., Chen, L., Ni, L.M., Fan, J.: Cim: categorical influence maximization. In: 5th International Conference on Ubiquitous Information Management and Communication, p. 124. ACM (2011)"},{"key":"1_CR16","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1146\/annurev.soc.27.1.415","volume":"27","author":"M McPherson","year":"2001","unstructured":"McPherson, M., Smith-Lovin, L., Cook, J.M.: Birds of a feather: Homophily in social networks. Annu. Rev. Sociol. 27, 415\u2013444 (2001)","journal-title":"Annu. Rev. Sociol."},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Tang, J., Sun, J., Wang, C., Yang, Z.: Social influence analysis in large-scale networks. In: 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 807\u2013816. ACM (2009)","DOI":"10.1145\/1557019.1557108"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Wang, Y., Cong, G., Song, G., Xie, K.: Community-based greedy algorithm for mining top-k influential nodes in mobile social networks. In: 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1039\u20131048. ACM (2010)","DOI":"10.1145\/1835804.1835935"},{"issue":"9","key":"1_CR19","doi-asserted-by":"publisher","first-page":"5766","DOI":"10.1073\/pnas.082090499","volume":"99","author":"DJ Watts","year":"2002","unstructured":"Watts, D.J.: A simple model of global cascades on random networks. Proc. National Acad. Sci. 99(9), 5766\u20135771 (2002)","journal-title":"Proc. National Acad. Sci."},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Young, H.P.: The diffusion of innovations in social networks. The economy as an evolving complex system III: Current perspectives and future directions. 267 (2006)","DOI":"10.1093\/acprof:oso\/9780195162592.003.0011"}],"container-title":["Lecture Notes in Computer Science","Web Information Systems Engineering \u2013 WISE 2016"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48740-3_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,11]],"date-time":"2024-03-11T15:14:12Z","timestamp":1710170052000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-48740-3_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319487397","9783319487403"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48740-3_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"2 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Web Information Systems Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shanghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 November 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 November 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wise2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.wise-conferences.org\/2016\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}