{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T20:43:02Z","timestamp":1725914582968},"publisher-location":"Singapore","reference-count":23,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811068041"},{"type":"electronic","value":"9789811068058"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-6805-8_7","type":"book-chapter","created":{"date-parts":[[2017,10,25]],"date-time":"2017-10-25T00:13:04Z","timestamp":1508890384000},"page":"77-88","source":"Crossref","is-referenced-by-count":3,"title":["A Markov Chain Monte Carlo Approach for Source Detection in Networks"],"prefix":"10.1007","author":[{"given":"Le","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Tianyuan","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Tong","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Biao","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Zhefeng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Enhong","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,26]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","first-page":"P10016","DOI":"10.1088\/1742-5468\/2014\/10\/P10016","volume":"2014","author":"F Altarelli","year":"2014","unstructured":"Altarelli, F., Braunstein, A., DallAsta, L., Ingrosso, A., Zecchina, R.: The patient-zero problem with noisy observations. J. Stat. Mech. 2014, P10016 (2014)","journal-title":"J. Stat. Mech."},{"key":"7_CR2","doi-asserted-by":"crossref","first-page":"118701","DOI":"10.1103\/PhysRevLett.112.118701","volume":"112","author":"F Altarelli","year":"2014","unstructured":"Altarelli, F., Braunstein, A., DallAsta, L., Lage-Castellanos, A., Zecchina, R.: Bayesian inference of epidemics on networks via belief propagation. Phys. Rev. Lett. 112, 118701 (2014)","journal-title":"Phys. Rev. Lett."},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Chang, B., Zhu, F., Chen, E., Liu, Q.: Information source detection via maximum a posteriori estimation. In: ICDM 2015, pp. 21\u201330. IEEE Press, Atlantic City (2015)","DOI":"10.1109\/ICDM.2015.116"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Dong, W., Zhang, W., Tan, C.W.: Rooting out the rumor culprit from suspects. In: ISIT 2013, pp. 2671\u20132675. IEEE Press, Turkey (2013)","DOI":"10.1109\/ISIT.2013.6620711"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Fanti, G., Kairouz, P., Oh, S., Viswanath, P.: Spy vs. spy: rumor source obfuscation. In: SIGMETRICS 2015, pp. 271\u2013284. ACM Press, Portland (2015)","DOI":"10.1145\/2745844.2745866"},{"key":"7_CR6","unstructured":"Fioriti, V., Chinnici, M.: Predicting the sources of an outbreak with a spectral technique. arXiv preprint arXiv:1211.2333 (2012)"},{"key":"7_CR7","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1007\/s13278-016-0373-6","volume":"6","author":"A Jain","year":"2016","unstructured":"Jain, A., Borkar, V., Garg, D.: Fast rumor source identification via random walks. Soc. Netw. Anal. Min. 6, 62 (2016)","journal-title":"Soc. Netw. Anal. Min."},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Kelner, J.A., Madry, A.: Faster generation of random spanning trees. In: 50th Annual IEEE Symposium on Foundations of Computer Science, pp. 13\u201321. IEEE Press, Washington (2009)","DOI":"10.1109\/FOCS.2009.75"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Kempe, D., Kleinberg, J., Tardos, \u00c9.: Maximizing the spread of influence through a social network. In: SIGKDD 2013, pp. 137\u2013146. ACM Press, Chicago (2003)","DOI":"10.1145\/956755.956769"},{"key":"7_CR10","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1098\/rspa.1932.0171","volume":"138","author":"WO Kermack","year":"1932","unstructured":"Kermack, W.O., McKendrick, A.G.: Contributions to the mathematical theory of epidemics. II. The problem of endemicity. Proc. Roy. Soc. London A Math. Phys. Eng. Sci. 138, 55\u201383 (1932)","journal-title":"Proc. Roy. Soc. London A Math. Phys. Eng. Sci."},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Lappas, T., Terzi, E., Gunopulos, D., Mannila, H.: Finding effectors in social networks. In: SIGKDD 2010, pp. 1059\u20131068. ACM Press, Washington (2010)","DOI":"10.1145\/1835804.1835937"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Leskovec, J., Huttenlocher, D., Kleinberg, J.: Predicting positive and negative links in online social networks. In: WWW 2010, pp. 641\u2013650. Raleigh (2010)","DOI":"10.1145\/1772690.1772756"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Nguyen, H.T., Ghosh, P., Mayo, M.L., Dinh, T.N.: Multiple infection sources identification with provable guarantees. In: CIKM 2016, pp. 1663\u20131672. ACM Press. Indianapolis (2016)","DOI":"10.1145\/2983323.2983817"},{"key":"7_CR14","doi-asserted-by":"crossref","first-page":"842","DOI":"10.1111\/cdev.12169","volume":"85","author":"R Schoot","year":"2014","unstructured":"Schoot, R., Kaplan, D., Denissen, J., Asendorpf, J.B., Neyer, F.J., Aken, M.A.: A gentle introduction to Bayesian analysis: applications to developmental research. Child Dev. 85, 842\u2013860 (2014)","journal-title":"Child Dev."},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Shah, D., Zaman, T.: Detecting sources of computer viruses in networks: theory and experiment. In: SIGMETRICS 2010, vol. 38, pp. 203\u2013214 (2010)","DOI":"10.1145\/1811039.1811063"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Shah, D., Zaman, T.: Rumor centrality: a universal source detector. In: SIGMETRICS 2012, pp. 199\u2013210. ACM Press, London (2012)","DOI":"10.1145\/2254756.2254782"},{"issue":"57","key":"7_CR17","first-page":"5163","volume":"2011","author":"D Shah","year":"2011","unstructured":"Shah, D., Zaman, T.: Rumors in a network: who\u2019s the culprit? TIT 2011(57), 5163\u20135181 (2011)","journal-title":"TIT"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Tong, G., Wu, W., Guo, L., Li, D., Liu, C., Liu, B., Du, D.-Z.: An Efficient Randomized Algorithm for Rumor Blocking in Online Social Networks. arXiv preprint arXiv:1701.02368 (2017)","DOI":"10.1109\/INFOCOM.2017.8056957"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Wang, Z., Dong, W., Zhang, W., Tan, C.W.: Rumor source detection with multiple observations: fundamental limits and algorithms. In: SIGMETRICS 2014, pp. 1\u201313. ACM Press, Austin (2014)","DOI":"10.1145\/2591971.2591993"},{"key":"7_CR20","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1186\/s40649-015-0017-4","volume":"2","author":"X Zhai","year":"2015","unstructured":"Zhai, X., Wu, W., Xu, W.: Cascade source inference in networks: a Markov chain Monte Carlo approach. Comput. Soc. Netw. 2, 17 (2015)","journal-title":"Comput. Soc. Netw."},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Yang, Y., Chen, E., Liu, Q., Xiang, B., Xu, T., Shad, S.A.: On approximation of real-world influence spread. In: ECML-PKDD 2012, pp. 548\u2013564. UK (2012)","DOI":"10.1007\/978-3-642-33486-3_35"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Xu, T., Zhong, H., Zhu, H., Xiong, H., Chen, E., Liu, G.: Exploring the impact of dynamic mutual influence on social event participation. In: SDM 2015, pp. 262\u2013270. Canada (2015)","DOI":"10.1137\/1.9781611974010.30"},{"key":"7_CR23","first-page":"81","volume":"70","author":"C Jordan","year":"1869","unstructured":"Jordan, C.: Sur les assemblages de lignes. J. Reine Angew. Math. 70, 81 (1869)","journal-title":"J. Reine Angew. Math."}],"container-title":["Communications in Computer and Information Science","Social Media Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-6805-8_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,4]],"date-time":"2019-10-04T23:33:58Z","timestamp":1570232038000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-6805-8_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811068041","9789811068058"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-6805-8_7","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2017]]}}}