{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,23]],"date-time":"2025-05-23T04:48:28Z","timestamp":1747975708459,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811625398"},{"type":"electronic","value":"9789811625404"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-16-2540-4_51","type":"book-chapter","created":{"date-parts":[[2021,5,6]],"date-time":"2021-05-06T18:04:30Z","timestamp":1620324270000},"page":"678-686","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Community-Based Propagation of\u00a0Important Nodes in the Blockchain Network"],"prefix":"10.1007","author":[{"given":"Xin","family":"Li","sequence":"first","affiliation":[]},{"given":"Weidong","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Liao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,7]]},"reference":[{"issue":"7","key":"51_CR1","first-page":"2092","volume":"29","author":"AD Liu","year":"2018","unstructured":"Liu, A.D., Du, X.H., Wang, N., et al.: Research progress of blockchain technology and its application in information security. J. Softw. 29(7), 2092\u20132115 (2018)","journal-title":"J. Softw."},{"issue":"11","key":"51_CR2","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/2994581","volume":"59","author":"S Underwood","year":"2016","unstructured":"Underwood, S.: Blockchain beyond bitcoin. Commun. ACM 59(11), 15\u201317 (2016)","journal-title":"Commun. ACM"},{"key":"51_CR3","unstructured":"He, P., Yu, G., Zhang, Y.F., et al.: Survey on blockchain technology and its application prospect. Comput. Sci. 44(04), 23\u201329 (2017)"},{"key":"51_CR4","unstructured":"Swan, M.: Blockchain: Blueprint for a New Economy. O\u2019Reilly Media, Inc. (2015)"},{"key":"51_CR5","doi-asserted-by":"crossref","unstructured":"Zheng, Z., Xie, S., Dai, H., et al.: An overview of blockchain technology: architecture, consensus, and future trends. In: 2017 IEEE International Congress on Big Data (BigData Congress), pp. 557\u2013564. IEEE (2017)","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"51_CR6","unstructured":"Liu, D.Y., Jin, D., He, D.X.: Community mining in complex networks. Comput. Res. Dev. 50(10), 2140\u20132154 (2013)"},{"issue":"1","key":"51_CR7","first-page":"57","volume":"08","author":"XQ Chen","year":"2011","unstructured":"Chen, X.Q., Shen, H.W.: Community structure of complex networks. Complex Syst. Complexity Sci. 08(1), 57\u201370 (2011)","journal-title":"Complex Syst. Complexity Sci."},{"key":"51_CR8","doi-asserted-by":"crossref","unstructured":"Girvan, M., Newman, M.E.J.: Community structure in social and biological networks. Proc. Natl. Acad. Sci. U.S.A. 99(12), 7821\u20137826 (2002)","DOI":"10.1073\/pnas.122653799"},{"key":"51_CR9","doi-asserted-by":"crossref","unstructured":"Nandini, R.U., R\u00e9ka, A., Soundar, K.: Near linear time algorithm to detect community structures in large-scale networks. Phys. Rev. E Stat. Nonlinear Soft Matter Phys. 76 (2007)","DOI":"10.1103\/PhysRevE.76.036106"},{"issue":"4","key":"51_CR10","doi-asserted-by":"publisher","first-page":"1118","DOI":"10.1073\/pnas.0706851105","volume":"105","author":"M Rosvall","year":"2008","unstructured":"Rosvall, M., Bergstrom, C.T.: Maps of random walks on complex networks reveal community structure. Proc. Natl. Acad. Sci. U.S.A. 105(4), 1118\u20131123 (2008)","journal-title":"Proc. Natl. Acad. Sci. U.S.A."},{"issue":"4","key":"51_CR11","first-page":"735","volume":"37","author":"W Xindong","year":"2014","unstructured":"Xindong, W., Yi, L., Lei, L.: Influence analysis of online social networks. J. Comput. 37(4), 735\u2013752 (2014)","journal-title":"J. Comput."},{"issue":"11","key":"51_CR12","doi-asserted-by":"publisher","first-page":"888","DOI":"10.1038\/nphys1746","volume":"6","author":"M Kitsak","year":"2010","unstructured":"Kitsak, M., Gallos, L.K., Havlin, S., et al.: Identification of influential spreaders in complex networks. Nat. Phys. 6(11), 888\u2013893 (2010)","journal-title":"Nat. Phys."},{"key":"51_CR13","doi-asserted-by":"crossref","unstructured":"Brin, S., Page, L.: The anatomy of a large-scale hypertextual web search engine (1998)","DOI":"10.1016\/S0169-7552(98)00110-X"},{"key":"51_CR14","unstructured":"Chen, W.: Research on influence diffusion in social networks. Big Data Res. 2015031"},{"issue":"5","key":"51_CR15","doi-asserted-by":"publisher","first-page":"604","DOI":"10.1145\/324133.324140","volume":"46","author":"JM Kleinberg","year":"1999","unstructured":"Kleinberg, J.M.: Authoritative sources in a hyperlinked environment. J. ACM (JACM) 46(5), 604\u2013632 (1999)","journal-title":"J. ACM (JACM)"},{"issue":"1\u20136","key":"51_CR16","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1016\/S1389-1286(00)00034-7","volume":"33","author":"R Lempel","year":"2000","unstructured":"Lempel, R., Moran, S.: The stochastic approach for link-structure analysis (SALSA) and the TKC effect. Comput. Netw. 33(1\u20136), 387\u2013401 (2000)","journal-title":"Comput. Netw."},{"key":"51_CR17","doi-asserted-by":"crossref","unstructured":"Rosvall, M., Bergstrom, C.T.: Multilevel compression of random walks on networks reveals hierarchical organization in large integrated systems. PloS One 6(4), e18209 (2011)","DOI":"10.1371\/journal.pone.0018209"},{"key":"51_CR18","doi-asserted-by":"crossref","unstructured":"Tang, Y., Shi, Y., Xiao, X.: Influence maximization in near-linear time: a martingale approach. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 1539\u20131554 (2015)","DOI":"10.1145\/2723372.2723734"},{"key":"51_CR19","doi-asserted-by":"crossref","unstructured":"Borgs, C., Brautbar, M., Chayes, J., et al.: Maximizing social influence in nearly optimal time. In: Proceedings of the Twenty-Fifth Annual ACM-SIAM Symposium on Discrete Algorithms. Society for Industrial and Applied Mathematics, pp. 946\u2013957 (2014)","DOI":"10.1137\/1.9781611973402.70"},{"issue":"7","key":"51_CR20","doi-asserted-by":"publisher","first-page":"1575","DOI":"10.1093\/nar\/30.7.1575","volume":"30","author":"AJ Enright","year":"2002","unstructured":"Enright, A.J., Van Dongen, S., Ouzounis, C.A.: An efficient algorithm for large-scale detection of protein families. Nucleic Acids Res. 30(7), 1575\u20131584 (2002)","journal-title":"Nucleic Acids Res."}],"container-title":["Communications in Computer and Information Science","Computer Supported Cooperative Work and Social Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-2540-4_51","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,6]],"date-time":"2021-05-06T18:13:36Z","timestamp":1620324816000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-2540-4_51"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789811625398","9789811625404"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-2540-4_51","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"7 May 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ChineseCSCW","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"CCF Conference on Computer Supported Cooperative Work  and Social Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shenzhen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"chinesecscw2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.scholat.com\/confweb\/CCSCW2020","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}