{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T11:11:35Z","timestamp":1742987495075,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":34,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819612413"},{"type":"electronic","value":"9789819612420"}],"license":[{"start":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T00:00:00Z","timestamp":1734048000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T00:00:00Z","timestamp":1734048000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-1242-0_29","type":"book-chapter","created":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T08:06:19Z","timestamp":1733990779000},"page":"389-402","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Mitigate the\u00a0Damage of\u00a0Rumor on\u00a0Susceptible Group"],"prefix":"10.1007","author":[{"given":"Yao","family":"Tang","sequence":"first","affiliation":[]},{"given":"Jinghao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Chen","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xiaoyang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Wenjie","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Ying","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,13]]},"reference":[{"issue":"5","key":"29_CR1","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1038\/scientificamerican1155-31","volume":"193","author":"SE Asch","year":"1955","unstructured":"Asch, S.E.: Opinions and social pressure. Sci. Am. 193(5), 31\u201335 (1955)","journal-title":"Sci. Am."},{"key":"29_CR2","doi-asserted-by":"crossref","unstructured":"Bharathi, S., Kempe, D., Salek, M.: Competitive influence maximization in social networks. In: Internet and Network Economics: Third International Workshop, WINE 2007, San Diego, CA, USA, 12\u201314 December 2007. Proceedings 3, pp. 306\u2013311. Springer (2007)","DOI":"10.1007\/978-3-540-77105-0_31"},{"key":"29_CR3","doi-asserted-by":"crossref","unstructured":"Borgs, C., Brautbar, M., Chayes, J., Lucier, B.: Maximizing social influence in nearly optimal time. In: Proceedings of the Twenty-Fifth Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 946\u2013957. SIAM (2014)","DOI":"10.1137\/1.9781611973402.70"},{"key":"29_CR4","doi-asserted-by":"crossref","unstructured":"Borodin, A., Filmus, Y., Oren, J.: Threshold models for competitive influence in social networks. In: Internet and Network Economics: 6th International Workshop, WINE 2010, Stanford, CA, USA, 13\u201317 December 2010. Proceedings 6, pp. 539\u2013550. Springer (2010)","DOI":"10.1007\/978-3-642-17572-5_48"},{"key":"29_CR5","doi-asserted-by":"crossref","unstructured":"Budak, C., Agrawal, D., El\u00a0Abbadi, A.: Limiting the spread of misinformation in social networks. In: Proceedings of the 20th International Conference on World Wide Web, pp. 665\u2013674 (2011)","DOI":"10.1145\/1963405.1963499"},{"key":"29_CR6","doi-asserted-by":"crossref","unstructured":"Domingos, P., Richardson, M.: Mining the network value of customers. In: Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 57\u201366 (2001)","DOI":"10.1145\/502512.502525"},{"issue":"2","key":"29_CR7","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1080\/13691180500146185","volume":"8","author":"C Haythornthwaite","year":"2005","unstructured":"Haythornthwaite, C.: Social Networks and Internet connectivity effects. Inf. Commun. Soc. 8(2), 125\u2013147 (2005)","journal-title":"Inf. Commun. Soc."},{"issue":"5","key":"29_CR8","doi-asserted-by":"publisher","first-page":"2244","DOI":"10.1109\/TCSS.2022.3188701","volume":"10","author":"Q He","year":"2022","unstructured":"He, Q., et al.: Graph convolutional network-based rumor blocking on social networks. IEEE Trans. Comput. Soc. Syst. 10(5), 2244\u20132253 (2022)","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"He, X., Song, G., Chen, W., Jiang, Q.: Influence blocking maximization in social networks under the competitive linear threshold model. In: Proceedings of the 2012 SIAM International Conference on Data Mining, pp. 463\u2013474. SIAM (2012)","DOI":"10.1137\/1.9781611972825.40"},{"issue":"7","key":"29_CR10","doi-asserted-by":"publisher","first-page":"5404","DOI":"10.3390\/ijerph20075404","volume":"20","author":"S Kemp","year":"2023","unstructured":"Kemp, S., Erades P\u00e9rez, N.: Consumer fraud against older adults in digital society: examining victimization and its impact. Int. J. Environ. Res. Public Health 20(7), 5404 (2023)","journal-title":"Int. J. Environ. Res. Public Health"},{"key":"29_CR11","doi-asserted-by":"crossref","unstructured":"Kempe, D., Kleinberg, J., Tardos, \u00c9.: Maximizing the spread of influence through a social network. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 137\u2013146 (2003)","DOI":"10.1145\/956750.956769"},{"issue":"6380","key":"29_CR12","doi-asserted-by":"publisher","first-page":"1094","DOI":"10.1126\/science.aao2998","volume":"359","author":"DM Lazer","year":"2018","unstructured":"Lazer, D.M., et al.: The science of fake news. Science 359(6380), 1094\u20131096 (2018)","journal-title":"Science"},{"key":"29_CR13","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1016\/j.knosys.2016.07.008","volume":"109","author":"W Liu","year":"2016","unstructured":"Liu, W., Yue, K., Wu, H., Li, J., Liu, D., Tang, D.: Containment of competitive influence spread in social networks. Knowl.-Based Syst. 109, 266\u2013275 (2016)","journal-title":"Knowl.-Based Syst."},{"issue":"2","key":"29_CR14","doi-asserted-by":"publisher","first-page":"60","DOI":"10.14778\/2850578.2850581","volume":"9","author":"W Lu","year":"2015","unstructured":"Lu, W., Chen, W., Lakshmanan, L.V.: From competition to complementarity: comparative influence diffusion and maximization. Proc. VLDB Endow. 9(2), 60\u201371 (2015)","journal-title":"Proc. VLDB Endow."},{"issue":"4","key":"29_CR15","first-page":"965","volume":"36","author":"D Na","year":"2013","unstructured":"Na, D., Yong-Xin, L., Jian-Xin, Z.: A review of influencing factors and motivation mechanisms of rumor spreading. J. Psychol. Sci. 36(4), 965 (2013)","journal-title":"J. Psychol. Sci."},{"issue":"11","key":"29_CR16","doi-asserted-by":"publisher","first-page":"4944","DOI":"10.1287\/mnsc.2019.3478","volume":"66","author":"G Pennycook","year":"2020","unstructured":"Pennycook, G., Bear, A., Collins, E.T., Rand, D.G.: The implied truth effect: attaching warnings to a subset of fake news headlines increases perceived accuracy of headlines without warnings. Manage. Sci. 66(11), 4944\u20134957 (2020)","journal-title":"Manage. Sci."},{"key":"29_CR17","doi-asserted-by":"crossref","unstructured":"Rajak, V.K., Kare, A.S.: A genetic algorithm-based heuristic for rumour minimization in social networks. In: International Conference on Distributed Computing and Intelligent Technology, pp. 249\u2013265. Springer (2024)","DOI":"10.1007\/978-3-031-50583-6_17"},{"issue":"10","key":"29_CR18","doi-asserted-by":"publisher","first-page":"2216","DOI":"10.14778\/3547305.3547324","volume":"15","author":"M Simpson","year":"2022","unstructured":"Simpson, M., Hashemi, F., Lakshmanan, L.V.: Misinformation mitigation under differential propagation rates and temporal penalties. Proc. VLDB Endow. 15(10), 2216\u20132229 (2022)","journal-title":"Proc. VLDB Endow."},{"key":"29_CR19","doi-asserted-by":"crossref","unstructured":"Tang, J., Tang, X., Xiao, X., Yuan, J.: Online processing algorithms for influence maximization. In: Proceedings of the 2018 International Conference on Management of Data, pp. 991\u20131005 (2018)","DOI":"10.1145\/3183713.3183749"},{"key":"29_CR20","doi-asserted-by":"crossref","unstructured":"Tang, Y., Shi, Y., Xiao, X.: Influence maximization in near-linear time: a martingale approach. In: Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, pp. 1539\u20131554 (2015)","DOI":"10.1145\/2723372.2723734"},{"key":"29_CR21","doi-asserted-by":"crossref","unstructured":"Tang, Z., Wang, J., Wu, Y., Wang, X., Qin, L., Zhang, Y.: Balanced hop-constrained path enumeration in signed directed graphs. In: Australasian Database Conference, pp. 315\u2013328. Springer (2023)","DOI":"10.1007\/978-3-031-47843-7_22"},{"key":"29_CR22","doi-asserted-by":"crossref","unstructured":"Tong, G., et al.: An efficient randomized algorithm for rumor blocking in online social networks. IEEE Trans. Netw. Sci. Eng. (2017)","DOI":"10.1109\/INFOCOM.2017.8056957"},{"key":"29_CR23","doi-asserted-by":"crossref","unstructured":"Wang, J., et al.: Efficient influence minimization via node blocking. arXiv preprint arXiv:2405.12871 (2024)","DOI":"10.14778\/3675034.3675042"},{"issue":"3","key":"29_CR24","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1109\/TKDE.2016.2633472","volume":"29","author":"X Wang","year":"2016","unstructured":"Wang, X., Zhang, Y., Zhang, W., Lin, X.: Efficient distance-aware influence maximization in geo-social networks. IEEE Trans. Knowl. Data Eng. 29(3), 599\u2013612 (2016)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"2","key":"29_CR25","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1109\/TKDE.2016.2624734","volume":"29","author":"X Wang","year":"2016","unstructured":"Wang, X., Zhang, Y., Zhang, W., Lin, X., Chen, C.: Bring order into the samples: a novel scalable method for influence maximization. IEEE Trans. Knowl. Data Eng. 29(2), 243\u2013256 (2016)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"29_CR26","doi-asserted-by":"crossref","unstructured":"Wu, Y., Wang, J., Sun, R., Chen, C., Wang, X., Zhang, Y.: Targeted filter bubbles mitigating via edges insertion. In: Companion Proceedings of the ACM on Web Conference 2024, pp. 734\u2013737 (2024)","DOI":"10.1145\/3589335.3651566"},{"issue":"1","key":"29_CR27","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1007\/s11280-024-01235-w","volume":"27","author":"F Xiang","year":"2024","unstructured":"Xiang, F., Wang, J., Wu, Y., Wang, X., Chen, C., Zhang, Y.: Rumor blocking with pertinence set in large graphs. World Wide Web 27(1), 6 (2024)","journal-title":"World Wide Web"},{"key":"29_CR28","doi-asserted-by":"publisher","first-page":"640","DOI":"10.1016\/j.physa.2018.02.128","volume":"503","author":"D Yang","year":"2018","unstructured":"Yang, D., Liao, X., Shen, H., Cheng, X., Chen, G.: Dynamic node immunization for restraint of harmful information diffusion in social networks. Phys. A 503, 640\u2013649 (2018)","journal-title":"Phys. A"},{"key":"29_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121847","volume":"238","author":"L Yang","year":"2024","unstructured":"Yang, L., Li, Z.: Deadline-aware misinformation prevention in social networks with time-decaying influence. Expert Syst. Appl. 238, 121847 (2024)","journal-title":"Expert Syst. Appl."},{"key":"29_CR30","doi-asserted-by":"crossref","unstructured":"Yang, L., Li, Z., Giua, A.: Rumor containment by spreading correct information in social networks. In: 2019 American Control Conference (ACC), pp. 5608\u20135613. IEEE (2019)","DOI":"10.23919\/ACC.2019.8814884"},{"key":"29_CR31","doi-asserted-by":"crossref","unstructured":"Yang, L., Ma, Z., Li, Z., Giua, A.: Rumor containment by blocking nodes in social networks. IEEE Trans. Syst. Man Cybern. Syst. (2023)","DOI":"10.1109\/TSMC.2023.3237933"},{"key":"29_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103094","volume":"186","author":"A Zareie","year":"2021","unstructured":"Zareie, A., Sakellariou, R.: Minimizing the spread of misinformation in online social networks: a survey. J. Netw. Comput. Appl. 186, 103094 (2021)","journal-title":"J. Netw. Comput. Appl."},{"key":"29_CR33","doi-asserted-by":"crossref","unstructured":"Zhang, H., Zhang, H., Li, X., Thai, M.T.: Limiting the spread of misinformation while effectively raising awareness in social networks. In: Computational Social Networks: 4th International Conference, CSoNet 2015, Beijing, China, 4\u20136 August 2015, Proceedings 4, pp. 35\u201347. Springer (2015)","DOI":"10.1007\/978-3-319-21786-4_4"},{"key":"29_CR34","doi-asserted-by":"crossref","unstructured":"Zhang, L., Wu, Y., Wang, J., Liu, S., Chen, C., Wang, X.: Efficient algorithm for maximizing betweenness centrality in large networks. In: 2023 IEEE International Conference on High Performance Computing & Communications, Data Science & Systems, Smart City & Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC\/DSS\/SmartCity\/DependSys), pp. 647\u2013654. IEEE (2023)","DOI":"10.1109\/HPCC-DSS-SmartCity-DependSys60770.2023.00093"}],"container-title":["Lecture Notes in Computer Science","Databases Theory and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-1242-0_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T20:06:26Z","timestamp":1736193986000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-1242-0_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,13]]},"ISBN":["9789819612413","9789819612420"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-1242-0_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,12,13]]},"assertion":[{"value":"13 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ADC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australasian Database Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gold Coast, QLD","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"35","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"adc2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/adc-conference.github.io\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}