{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T04:35:30Z","timestamp":1759638930383,"version":"3.40.3"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319623887"},{"type":"electronic","value":"9783319623894"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-62389-4_51","type":"book-chapter","created":{"date-parts":[[2017,6,30]],"date-time":"2017-06-30T15:07:46Z","timestamp":1498835266000},"page":"615-629","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Influence Spread in Social Networks with both Positive and Negative Influences"],"prefix":"10.1007","author":[{"given":"Jing","family":"He","sequence":"first","affiliation":[]},{"given":"Ying","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Tianyu","family":"Du","sequence":"additional","affiliation":[]},{"given":"Shouling","family":"Ji","sequence":"additional","affiliation":[]},{"given":"Zhao","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,1]]},"reference":[{"key":"51_CR1","doi-asserted-by":"crossref","unstructured":"Kempe, D., Kleinberg, J., Tardos, \u00c9.: Maximizing the spread of influence through a social network. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 137\u2013146. ACM (2003)","DOI":"10.1145\/956750.956769"},{"key":"51_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1007\/978-3-642-04747-3_24","volume-title":"Discovery Science","author":"K Saito","year":"2009","unstructured":"Saito, K., Kimura, M., Motoda, H.: Discovering influential nodes for sis models in social networks. In: Gama, J., Costa, V.S., Jorge, A.M., Brazdil, P.B. (eds.) DS 2009. LNCS, vol. 5808, pp. 302\u2013316. Springer, Heidelberg (2009). doi:10.1007\/978-3-642-04747-3_24"},{"key":"51_CR3","doi-asserted-by":"crossref","unstructured":"Li, Y., Chen, W., Wang, Y., Zhang, Z.-L.: Influence diffusion dynamics and influence maximization in social networks with friend and foe relationships. In: Proceedings of the sixth ACM International Conference on Web Search and Data Mining, pp. 657\u2013666. ACM (2013)","DOI":"10.1145\/2433396.2433478"},{"key":"51_CR4","unstructured":"Han, M., Yan, M., Cai, Z., Li, Y., Cai, X., Yu, J.: Influence maximization by probing partial communities in dynamic online social networks. Trans. Emerging Telecommun. Technol"},{"key":"51_CR5","doi-asserted-by":"crossref","unstructured":"He, X., Song, G., Chen, W., Jiang, Q.: Influence blocking maximization in social networks under the competitive linear threshold model. In: Proceedings of the 2012 SIAM International Conference on Data Mining, pp. 463\u2013474. SIAM (2012)","DOI":"10.1137\/1.9781611972825.40"},{"key":"51_CR6","doi-asserted-by":"crossref","unstructured":"Lu, W., Bonchi, F., Goyal, A., Lakshmanan, L.V.: The bang for the buck: fair competitive viral marketing from the host perspective. In: Proceedings of the 19th SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 928\u2013936. ACM (2013)","DOI":"10.1145\/2487575.2487649"},{"key":"51_CR7","unstructured":"Selcuk Uluagac, A., Beyah, R., Ji, S., He, J. (Selena), Li, Y.: Cell-based snapshot and continuous data collection in wireless sensor networks. ACM Trans. Sensor Networks (TOSN) 9(4)"},{"key":"51_CR8","unstructured":"He, J. (Selena), Ji, S., Li, Y.: Genetic-algorithm-based construction of load-balanced cdss in wireless sensor networks. MILCOM 9(4)"},{"key":"51_CR9","unstructured":"Albinali, H., Han, M., Wang, J., Gao, H., Li, Y.: The roles of social network mavens. In: The 12th International Conference on Mobile Ad-hoc and Sensor Networks"},{"key":"51_CR10","doi-asserted-by":"crossref","unstructured":"Goyal, A., Bonchi, F., Lakshmanan, L.V.: Learning influence probabilities in social networks. In: Proceedings of the third ACM International Conference on Web Search and Data Mining, pp. 241\u2013250. ACM (2010)","DOI":"10.1145\/1718487.1718518"},{"key":"51_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1007\/978-3-642-38768-5_68","volume-title":"Computing and Combinatorics","author":"M Han","year":"2013","unstructured":"Han, M., Yan, M., Li, J., Ji, S., Li, Y.: Generating uncertain networks based on historical network snapshots. In: Du, D.-Z., Zhang, G. (eds.) COCOON 2013. LNCS, vol. 7936, pp. 747\u2013758. Springer, Heidelberg (2013). doi:10.1007\/978-3-642-38768-5_68"},{"key":"51_CR12","doi-asserted-by":"crossref","unstructured":"Goyal, A., Lu, W., Lakshmanan, L.V.: Celf++: optimizing the greedy algorithm for influence maximization in social networks. In: Proceedings of the 20th International Conference Companion on World Wide Web, pp. 47\u201348. ACM (2011)","DOI":"10.1145\/1963192.1963217"},{"key":"51_CR13","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.jnca.2016.01.004","volume":"63","author":"M Han","year":"2016","unstructured":"Han, M., Yan, M., Cai, Z., Li, Y.: An exploration of broader influence maximization in timeliness networks with opportunistic selection. J. Netw. Comput. Appl. 63, 39\u201349 (2016)","journal-title":"J. Netw. Comput. Appl."},{"issue":"3","key":"51_CR14","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1007\/s10618-012-0262-1","volume":"25","author":"C Wang","year":"2012","unstructured":"Wang, C., Chen, W., Wang, Y.: Scalable influence maximization for independent cascade model in large-scale social networks. Data Mining Know. Discovery 25(3), 545 (2012)","journal-title":"Data Mining Know. Discovery"},{"key":"51_CR15","unstructured":"Han, M., Duan, Z., Ai, C., Lybarger, F.W., Li, Y., Bourgeois, A.G.: Time constraint influence maximization algorithm in the age of big data. Int. J. Comput. Sci. Eng"},{"key":"51_CR16","doi-asserted-by":"crossref","unstructured":"Tang, J., Wu, S., Sun, J.: Confluence: conformity influence in large social networks. In: Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 347\u2013355. ACM (2013)","DOI":"10.1145\/2487575.2487691"},{"key":"51_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-3-540-85567-5_9","volume-title":"Knowledge-Based Intelligent Information and Engineering Systems","author":"K Saito","year":"2008","unstructured":"Saito, K., Nakano, R., Kimura, M.: Prediction of information diffusion probabilities for independent cascade model. In: Lovrek, I., Howlett, R.J., Jain, L.C. (eds.) KES 2008. LNCS, vol. 5179, pp. 67\u201375. Springer, Heidelberg (2008). doi:10.1007\/978-3-540-85567-5_9"},{"key":"51_CR18","doi-asserted-by":"crossref","unstructured":"Tang, J., Sun, J., Wang, C., Yang, Z.: Social influence analysis in large-scale networks. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 807\u2013816. ACM (2009)","DOI":"10.1145\/1557019.1557108"},{"issue":"3","key":"51_CR19","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1007\/s10878-013-9684-y","volume":"28","author":"M Han","year":"2014","unstructured":"Han, M., Yan, M., Li, J., Ji, S., Li, Y.: Neighborhood-based uncertainty generation in social networks. J. Comb. Optim. 28(3), 561\u2013576 (2014)","journal-title":"J. Comb. Optim."},{"key":"51_CR20","doi-asserted-by":"crossref","unstructured":"Wang, C., Tang, J., Sun, J., Han, J.: Dynamic social influence analysis through time-dependent factor graphs. In: 2011 International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 239\u2013246. IEEE (2011)","DOI":"10.1109\/ASONAM.2011.116"},{"key":"51_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/978-3-642-02026-1_29","volume-title":"Combinatorial Optimization and Applications","author":"F Wang","year":"2009","unstructured":"Wang, F., Camacho, E., Xu, K.: Positive influence dominating set in online social networks. In: Du, D.-Z., Hu, X., Pardalos, P.M. (eds.) COCOA 2009. LNCS, vol. 5573, pp. 313\u2013321. Springer, Heidelberg (2009). doi:10.1007\/978-3-642-02026-1_29"},{"issue":"3","key":"51_CR22","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/j.tcs.2009.10.001","volume":"412","author":"F Wang","year":"2011","unstructured":"Wang, F., Du, H., Camacho, E., Xu, K., Lee, W., Shi, Y., Shan, S.: On positive influence dominating sets in social networks. Theoret. Comput. Sci. 412(3), 265\u2013269 (2011)","journal-title":"Theoret. Comput. Sci."},{"issue":"4","key":"51_CR23","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1007\/s10898-009-9511-2","volume":"48","author":"X Zhu","year":"2010","unstructured":"Zhu, X., Yu, J., Lee, W., Kim, D., Shan, S., Du, D.-Z.: New dominating sets in social networks. J. Global Optim. 48(4), 633\u2013642 (2010)","journal-title":"J. Global Optim."},{"key":"51_CR24","doi-asserted-by":"crossref","unstructured":"He, J.S., Ji, S., Beyah, R., Cai, Z.: Minimum-sized influential node set selection for social networks under the independent cascade model. In: Proceedings of the 15th ACM International Symposium on Mobile ad hoc Networking and Computing, pp. 93\u2013102. ACM (2014)","DOI":"10.1145\/2632951.2632975"},{"key":"51_CR25","doi-asserted-by":"crossref","unstructured":"Kaur, H., He, J.S.: Blocking negative influential node set in social networks: from host perspective. Trans. Emerg. Telecommun. Technol. (ETT) 28(4)","DOI":"10.1002\/ett.3007"},{"key":"51_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1127","DOI":"10.1007\/11523468_91","volume-title":"Automata, Languages and Programming","author":"D Kempe","year":"2005","unstructured":"Kempe, D., Kleinberg, J., Tardos, \u00c9.: Influential nodes in a diffusion model for social networks. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 1127\u20131138. Springer, Heidelberg (2005). doi:10.1007\/11523468_91"},{"key":"51_CR27","doi-asserted-by":"crossref","unstructured":"Leskovec, J., Krause, A., Guestrin, C., Faloutsos, C., VanBriesen, J., Glance, N.: Cost-effective outbreak detection in networks. In: Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 420\u2013429. ACM (2007)","DOI":"10.1145\/1281192.1281239"},{"key":"51_CR28","doi-asserted-by":"crossref","unstructured":"Chen, W., Yuan, Y., Zhang, L.: Scalable influence maximization in social networks under the linear threshold model. In: 2010 IEEE 10th International Conference on Data Mining (ICDM), pp. 88\u201397. IEEE (2010)","DOI":"10.1109\/ICDM.2010.118"},{"key":"51_CR29","first-page":"284","volume":"2016","author":"M Han","year":"2016","unstructured":"Han, M., Li, J., Cai, Z., Qilong, H.: Privacy reserved influence maximization in gps-enabled cyber-physical and online social networks. SocialCom 2016, 284\u2013292 (2016)","journal-title":"SocialCom"},{"key":"51_CR30","unstructured":"Han, M., Han, Q., Li, L., Li, J., Li, Y.: Maximizing influence in sensed heterogenous social network with privacy preservation. Int. J. Sens. Netw"},{"key":"51_CR31","volume-title":"Theory of Computational Complexity","author":"D-Z Du","year":"2011","unstructured":"Du, D.-Z., Ko, K.-I.: Theory of Computational Complexity, vol. 58. Wiley, Hoboken (2011)"},{"key":"51_CR32","unstructured":"Technical report. http:\/\/ksuweb.kennesaw.edu\/~jhe4\/Research\/MPINS"},{"key":"51_CR33","doi-asserted-by":"crossref","unstructured":"Leskovec, J., Adamic, L.A., Huberman, B.A.: The dynamics of viral marketing. ACM Trans. Web (TWEB) 1(1) (2007). 5","DOI":"10.1145\/1232722.1232727"},{"key":"51_CR34","doi-asserted-by":"crossref","unstructured":"Leskovec, J., Huttenlocher, D., Kleinberg, J.: Predicting positive and negative links in online social networks. In: Proceedings of the 19th International Conference on World Wide Web, pp. 641\u2013650. ACM (2010)","DOI":"10.1145\/1772690.1772756"},{"key":"51_CR35","doi-asserted-by":"crossref","unstructured":"Tang, J., Zhang, J., Yao, L., Li, J., Zhang, L., Su, Z.: Arnetminer: extraction and mining of academic social networks. In: Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 990\u2013998. ACM (2008)","DOI":"10.1145\/1401890.1402008"},{"key":"51_CR36","doi-asserted-by":"crossref","unstructured":"Hopcroft, J., Lou, T., Tang, J.: Who will follow you back?: reciprocal relationship prediction. In: Proceedings of the 20th ACM International Conference on Information and Knowledge Management, pp. 1137\u20131146. ACM (2011)","DOI":"10.1145\/2063576.2063740"},{"key":"51_CR37","doi-asserted-by":"crossref","unstructured":"Lou, T., Tang, J., Hopcroft, J., Fang, Z., Ding, X.: Learning to predict reciprocity and triadic closure in social networks. ACM Trans. Know. Discov. from Data (TKDD) 7(2) (2013). 5","DOI":"10.1145\/2499907.2499908"},{"key":"51_CR38","doi-asserted-by":"crossref","unstructured":"Wang, C., Chen, W., Wang, Y.: Scalable influence maximization for independent cascade model in large-scale social networks. Data Min. Know. Disc. 25(3)","DOI":"10.1007\/s10618-012-0262-1"}],"container-title":["Lecture Notes in Computer Science","Computing and Combinatorics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-62389-4_51","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T11:27:54Z","timestamp":1709810874000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-62389-4_51"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319623887","9783319623894"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-62389-4_51","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"1 July 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"COCOON","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Computing and Combinatorics Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hong Kong","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 August 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 August 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cocoon2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/cocoon2017.comp.polyu.edu.hk\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}