{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T01:10:04Z","timestamp":1751850604198,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":9,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811322020"},{"type":"electronic","value":"9789811322037"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-13-2203-7_22","type":"book-chapter","created":{"date-parts":[[2018,9,8]],"date-time":"2018-09-08T10:33:22Z","timestamp":1536402802000},"page":"298-307","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Negative Influence Maximization in Social Networks"],"prefix":"10.1007","author":[{"given":"Jinghua","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Bochong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yuekai","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yaqiong","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,9]]},"reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Kempe, D., Kleinberg, J.M., Tardos, E.: Maximing the spread of influence through a social network. In: The 9th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, pp. 137\u2013146. ACM, Washington, DC (2003)","DOI":"10.1145\/956750.956769"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Anagnostopoulos, A., Kumar, R., Mahdian, M.: Influence and correlation in social networks. In: Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 7\u201315. ACM, Las Vegas (2008)","DOI":"10.1145\/1401890.1401897"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Tianyu, C., Xindong, W., Song, W., Xiaohua, H.: OASNET: an optimal allocation approach to influence maximization in modular social networks. In: SAC, pp. 1088\u20131094 (2010)","DOI":"10.1145\/1774088.1774314"},{"key":"22_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"860","DOI":"10.1007\/978-3-319-60033-8_73","volume-title":"Wireless Algorithms, Systems, and Applications","author":"J Zhu","year":"2017","unstructured":"Zhu, J., Yin, X., Wang, Y., Li, J., Zhong, Y., Li, Y.: Structural holes theory-based influence maximization in social network. In: Ma, L., Khreishah, A., Zhang, Y., Yan, M. (eds.) WASA 2017. LNCS, vol. 10251, pp. 860\u2013864. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-60033-8_73"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Leskovec, J., Krause, A., Guestrin, C.: Cost-effective outbreak detection in networks. In: The 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 420\u2013429. ACM, San Jose (2007)","DOI":"10.1145\/1281192.1281239"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Chen, W., Wang, Y., Yang, S.: Efficient influence maximization in social networks. In: Proceedings of the 15th ACM SIGKDD International Conference, pp. 199\u2013208. ACM, Paris (2009)","DOI":"10.1145\/1557019.1557047"},{"issue":"7","key":"22_CR7","first-page":"1","volume":"9","author":"D Li","year":"2014","unstructured":"Li, D., Xu, Z.-M., Chakraborty, N.: Polarity related influence maximization in signed social networks. PLoS One 9(7), 1\u201310 (2014)","journal-title":"PLoS One"},{"issue":"3","key":"22_CR8","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1023\/A:1011122126881","volume":"12","author":"J Goldenberg","year":"2001","unstructured":"Goldenberg, J., Libai, B., Muller, E.: Talk of the network: complex systems look at the underlying process of word-of-mouth. Mark. Lett. 12(3), 209\u2013211 (2001)","journal-title":"Mark. Lett."},{"issue":"6","key":"22_CR9","doi-asserted-by":"publisher","first-page":"1420","DOI":"10.1086\/226707","volume":"83","author":"M Granovetter","year":"1978","unstructured":"Granovetter, M.: Threshold models of collective behavior. Am. J. Sociol. 83(6), 1420\u20131443 (1978)","journal-title":"Am. J. Sociol."}],"container-title":["Communications in Computer and Information Science","Data Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-2203-7_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T00:44:29Z","timestamp":1751849069000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-13-2203-7_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9789811322020","9789811322037"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-2203-7_22","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"9 September 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICPCSEE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference of Pioneering Computer Scientists, Engineers and Educators","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Zhengzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ICPCSEE 2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}