{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T06:10:39Z","timestamp":1763705439878,"version":"3.41.0"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2018,6,5]],"date-time":"2018-06-05T00:00:00Z","timestamp":1528156800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61402055"],"award-info":[{"award-number":["61402055"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004735","name":"Natural Science Foundation of Hunan Province","doi-asserted-by":"publisher","award":["2016JJ3012"],"award-info":[{"award-number":["2016JJ3012"]}],"id":[{"id":"10.13039\/501100004735","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s00500-018-3283-x","type":"journal-article","created":{"date-parts":[[2018,6,5]],"date-time":"2018-06-05T14:23:18Z","timestamp":1528208598000},"page":"6267-6285","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["Social community detection and message propagation scheme based on personal willingness in social network"],"prefix":"10.1007","volume":"23","author":[{"given":"Ke","family":"Gu","sequence":"first","affiliation":[]},{"given":"Linyu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Yin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,5]]},"reference":[{"issue":"7307","key":"3283_CR1","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1038\/nature09182","volume":"466","author":"YY Ahn","year":"2010","unstructured":"Ahn YY, Bagrow JP, Lehmann S (2010) Link communities reveal multiscale complexity in networks. Nature 466(7307):761\u20134","journal-title":"Nature"},{"issue":"2","key":"3283_CR2","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1111\/coin.12074","volume":"33","author":"A Amelio","year":"2016","unstructured":"Amelio A, Pizzuti C (2016) Evolutionary clustering for mining and tracking dynamic multilayer networks. Comput Intell 33(2):181\u2013209","journal-title":"Comput Intell"},{"issue":"10","key":"3283_CR3","doi-asserted-by":"publisher","first-page":"P10-008","DOI":"10.1088\/1742-5468\/2008\/10\/P10008","volume":"2008","author":"VD Blondel","year":"2008","unstructured":"Blondel VD, Guillaume JL, Lambiotte R et al (2008) Fast unfolding of communities in large networks. J Stat Mech Theory Exp 2008(10):P10-008","journal-title":"J Stat Mech Theory Exp"},{"issue":"C","key":"3283_CR4","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1016\/j.ins.2015.08.046","volume":"328","author":"F Buccafurri","year":"2016","unstructured":"Buccafurri F, Fotia L, Saraswat V et al (2016) Analysis-preserving protection of user privacy against information leakage of social-network Likes. Inf Sci Int J 328(C):340\u2013358","journal-title":"Inf Sci Int J"},{"issue":"5996","key":"3283_CR5","doi-asserted-by":"publisher","first-page":"1194","DOI":"10.1126\/science.1185231","volume":"329","author":"D Centola","year":"2010","unstructured":"Centola D (2010) The spread of behavior in an online social network experiment. Science 329(5996):1194\u20131197","journal-title":"Science"},{"key":"3283_CR6","unstructured":"Dang T, Viennet E (2012) Community detection based on structural and attribute similarities. In: The sixth international conference on digital society (ICDS), pp 7\u201312. ISBN:978-1-61208-176-2"},{"key":"3283_CR7","first-page":"19","volume":"1","author":"W Deitrick","year":"2013","unstructured":"Deitrick W, Hu W (2013) Mutually enhancing community detection and sentiment analysis on twitter networks. J Data Anal Inf Process 1:19","journal-title":"J Data Anal Inf Process"},{"key":"3283_CR8","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1016\/j.procs.2016.06.082","volume":"89","author":"JC Devi","year":"2016","unstructured":"Devi JC, Poovammal E (2016) An analysis of overlapping community detection algorithms in social networks. Proc Comput Sci 89:349\u2013358","journal-title":"Proc Comput Sci"},{"issue":"99","key":"3283_CR9","first-page":"1-1","volume":"PP","author":"M Fang","year":"2018","unstructured":"Fang M, Shi P, Shang W et al (2018) Locating the source of asynchronous diffusion process in online social networks. IEEE Access PP(99):1-1","journal-title":"IEEE Access"},{"issue":"12","key":"3283_CR10","doi-asserted-by":"publisher","first-page":"7821","DOI":"10.1073\/pnas.122653799","volume":"99","author":"M Girvan","year":"2002","unstructured":"Girvan M, Newman MEJ (2002) Community structure in social and biological networks. Proc Nat Acad Sci 99(12):7821\u20137826","journal-title":"Proc Nat Acad Sci"},{"issue":"3","key":"3283_CR11","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1023\/A:1011122126881","volume":"12","author":"J Goldenberg","year":"2001","unstructured":"Goldenberg J, Libai B, Muller E (2001) Talk of the network: a complex systems look at the underlying process of word-of-mouth. Market Lett 12(3):211\u2013223","journal-title":"Market Lett"},{"key":"3283_CR12","doi-asserted-by":"crossref","unstructured":"Goyal A, Bonchi F, Lakshmanan LVS (2010 February) Learning influence probabilities in social networks. In: International conference on web search and web data mining, WSDM 2010, New York, NY, USA, pp 241\u2013250","DOI":"10.1145\/1718487.1718518"},{"key":"3283_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-32055-7","volume-title":"Behavior-based Twitter overlapping community detection [M] database systems for advanced applications","author":"L Guo","year":"2016","unstructured":"Guo L, Ding Z, Wang H (2016) Behavior-based Twitter overlapping community detection [M] database systems for advanced applications. Springer, Berlin"},{"key":"3283_CR14","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/j.neucom.2015.08.131","volume":"204","author":"C Guo","year":"2016","unstructured":"Guo C, Li B, Tian X (2016) Flickr group recommendation using rich social media information. Neurocomputing 204:8\u201316","journal-title":"Neurocomputing"},{"key":"3283_CR15","unstructured":"Hutair MB, Aghbari ZA, Kamel I (2017) Social community detection based on node distance and interest. In: IEEE\/ACM international conference on big data computing applications and technologies. IEEE, pp 274\u2013289"},{"key":"3283_CR16","unstructured":"Itakura KY, Sonehara N (2013) Using Twitter\u2019s mentions for efficient emergency message propagation. In: International conference on availability, reliability and security. IEEE Computer Society, pp. 530\u2013537"},{"key":"3283_CR17","doi-asserted-by":"crossref","unstructured":"Jaho E, Karaliopoulos M, Stavrakakis I (2011) ISCoDe: a framework for interest similarity-based community detection in social networks. In: Computer communications workshops. IEEE Xplore, pp 912\u2013917","DOI":"10.1109\/INFCOMW.2011.5928942"},{"key":"3283_CR18","unstructured":"Johnson R, Zhang T (2013) Accelerating stochastic gradient descent using predictive variance reduction. In: International conference on neural information processing systems. Curran Associates Inc., pp 315\u2013323"},{"key":"3283_CR19","doi-asserted-by":"crossref","unstructured":"Kempe D, Kleinberg J, Tardos (2003) Maximizing the spread of influence through a social network. In: ACM SIGKDD international conference on knowledge discovery and data mining. ACM, pp 137\u2013146","DOI":"10.1145\/956750.956769"},{"key":"3283_CR20","first-page":"231","volume-title":"Community detection in Twitter","author":"MN Kewalramani","year":"2011","unstructured":"Kewalramani MN (2011) Community detection in Twitter. University of Maryland, Baltimore, pp 231\u2013300"},{"key":"3283_CR21","unstructured":"Kim J, Yoo J (2012) Role of sentiment in message propagation: reply vs. retweet behavior in political communication. In: International conference on social informatics. IEEE computer society, pp 131\u2013136"},{"key":"3283_CR22","unstructured":"Lagnier C, Denoyer L, Gaussier E et al (2013) Predicting information diffusion in social networks using content and users profiles. In: European conference on information retrieval. Springer, Berlin, pp 74\u201385"},{"issue":"3","key":"3283_CR23","doi-asserted-by":"publisher","first-page":"033015","DOI":"10.1088\/1367-2630\/11\/3\/033015","volume":"11","author":"A Lancichinetti","year":"2009","unstructured":"Lancichinetti A, Fortunato S, Kertsz J (2009) detecting the overlapping and hierarchical community structure in complex networks. N J Phys 11(3):033015","journal-title":"N J Phys"},{"key":"3283_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2015.07.006","volume-title":"An empirical analysis of users\u2019 privacy disclosure behaviors on social network sites","author":"K Li","year":"2015","unstructured":"Li K, Lin Z, Wang X (2015) An empirical analysis of users\u2019 privacy disclosure behaviors on social network sites. Elsevier Science Publishers B.V, Amsterdam"},{"issue":"3","key":"3283_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1993077.1993081","volume":"5","author":"YR Lin","year":"2011","unstructured":"Lin YR, Sun J, Sundaram H et al (2011) Community discovery via metagraph factorization. ACM Trans Knowl Discov Data 5(3):1\u201344","journal-title":"ACM Trans Knowl Discov Data"},{"key":"3283_CR26","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/j.pmcj.2016.04.010","volume":"33","author":"G Liu","year":"2016","unstructured":"Liu G, Li Y (2016) Social-aware data dissemination service in mobile social network with controlled overhead. Pervasive Mobile Comput 33:127\u2013139","journal-title":"Pervasive Mobile Comput"},{"key":"3283_CR27","doi-asserted-by":"crossref","unstructured":"Liu L, Chen B, Qu B et al (2017) Data driven modeling of continuous time information diffusion in social networks. In: IEEE second international conference on data science in cyberspace. IEEE, pp 655\u2013660","DOI":"10.1109\/DSC.2017.103"},{"key":"3283_CR28","unstructured":"Newman MEJ, Clauset A (2015) Structure and inference in annotated networks. arXiv preprint arXiv:1507.04001"},{"issue":"5 Pt 2","key":"3283_CR29","doi-asserted-by":"publisher","first-page":"056131","DOI":"10.1103\/PhysRevE.70.056131","volume":"70","author":"MEJ Newman","year":"2004","unstructured":"Newman MEJ (2004) Analysis of weighted networks. Phys Rev E Stat Nonlinear Soft Matter Phys 70(5 Pt 2):056131","journal-title":"Phys Rev E Stat Nonlinear Soft Matter Phys"},{"issue":"2 Pt 2","key":"3283_CR30","doi-asserted-by":"publisher","first-page":"026113","DOI":"10.1103\/PhysRevE.69.026113","volume":"69","author":"ME Newman","year":"2004","unstructured":"Newman ME, Girvan M (2004) Finding and evaluating community structure in networks. Phys Rev E Stat Nonlinear Soft Matter Phys 69(2 Pt 2):026113\u2013026113","journal-title":"Phys Rev E Stat Nonlinear Soft Matter Phys"},{"key":"3283_CR31","doi-asserted-by":"crossref","unstructured":"Ouadrhiri AE, Kamili ME, Rahmouni I (2017) Messages propagation control in delay tolerant networks under epidemic routing protocol. In: International wireless communications and mobile computing conference, pp 1552\u20131557","DOI":"10.1109\/IWCMC.2017.7986515"},{"issue":"2","key":"3283_CR32","doi-asserted-by":"publisher","first-page":"191","DOI":"10.7155\/jgaa.00124","volume":"10","author":"P Pons","year":"2006","unstructured":"Pons P, Latapy M (2006) Computing communities in large networks using random walks. J Graph Algorithms Appl 10(2):191\u2013218","journal-title":"J Graph Algorithms Appl"},{"issue":"3","key":"3283_CR33","doi-asserted-by":"publisher","first-page":"036106","DOI":"10.1103\/PhysRevE.76.036106","volume":"76","author":"UN Raghavan","year":"2007","unstructured":"Raghavan UN, Albert R, Kumara S (2007) Near linear time algorithm to detect community structures in large-scale networks. Phys Rev E 76(3):036106","journal-title":"Phys Rev E"},{"issue":"C","key":"3283_CR34","first-page":"202","volume":"7","author":"CS Rao","year":"2016","unstructured":"Rao CS, Raju SV (2016) Similarity analysis between chromosomes of Homo sapiens and monkeys with correlation coefficient, rank correlation coefficient and cosine similarity measures. Genom Data 7(C):202\u2013209","journal-title":"Genom Data"},{"key":"3283_CR35","first-page":"2663","volume":"4","author":"NL Roux","year":"2013","unstructured":"Roux NL, Schmidt M, Bach F (2013) A stochastic gradient method with an exponential convergence rate for finite training sets. Adv Neural Inf Process Syst 4:2663\u20132671","journal-title":"Adv Neural Inf Process Syst"},{"key":"3283_CR36","doi-asserted-by":"crossref","unstructured":"Saito K, Ohara K, Ohara K et al (2009) Learning continuous-time information diffusion model for social behavioral data analysis. In: Asian conference on machine learning: advances in machine learning. Springer, pp 322\u2013337","DOI":"10.1007\/978-3-642-05224-8_25"},{"key":"3283_CR37","doi-asserted-by":"crossref","unstructured":"Saito K, Ohara K, Yamagishi Y et al (2011) Learning diffusion probability based on node attributes in social networks. In: International symposium on methodologies for intelligent systems. Springer, Berlin, pp 153\u2013162","DOI":"10.1007\/978-3-642-21916-0_18"},{"key":"3283_CR38","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.physa.2016.02.020","volume":"453","author":"R Shang","year":"2016","unstructured":"Shang R, Luo S, Zhang W et al (2016) A multiobjective evolutionary algorithm to find community structures based on affinity propagation. Phys Stat Mech Appl 453:203\u2013227","journal-title":"Phys Stat Mech Appl"},{"issue":"8","key":"3283_CR39","doi-asserted-by":"publisher","first-page":"1706","DOI":"10.1016\/j.physa.2008.12.021","volume":"388","author":"H Shen","year":"2009","unstructured":"Shen H, Cheng X, Cai K et al (2009) Detect overlapping and hierarchical community structure in networks. Phys Stat Mech Appl 388(8):1706\u20131712","journal-title":"Phys Stat Mech Appl"},{"key":"3283_CR40","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1016\/j.datak.2013.05.004","volume":"87","author":"C Shi","year":"2013","unstructured":"Shi C, Cai Y, Fu D et al (2013) A link clustering based overlapping community detection algorithm. Data Knowl Eng 87:394\u2013404","journal-title":"Data Knowl Eng"},{"key":"3283_CR41","unstructured":"Spiro E, Irvine C, DuBois C et al (2012) Waiting for a retweet: modeling waiting times in information propagation. In: 2012 NIPS workshop of social networks and social media conference. http:\/\/snap.stanford.edu\/social2012\/papers\/spiro-dubois-butts.pdf . Accessed 12"},{"issue":"5","key":"3283_CR42","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1016\/j.patrec.2009.11.001","volume":"31","author":"K Steinhaeuser","year":"2010","unstructured":"Steinhaeuser K, Chawla NV (2010) Identifying and evaluating community structure in complex networks. Pattern Recognit Lett 31(5):413\u2013421","journal-title":"Pattern Recognit Lett"},{"issue":"2","key":"3283_CR43","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1002\/asi.22740","volume":"64","author":"X Sun","year":"2013","unstructured":"Sun X, Lin H (2013) Topical community detection from mining user tagging behavior and interest. J Assoc Inf Sci Technol 64(2):321\u2013333","journal-title":"J Assoc Inf Sci Technol"},{"key":"3283_CR44","first-page":"1","volume":"3","author":"A Tagarelli","year":"2017","unstructured":"Tagarelli A, Amelio A, Gullo F (2017) Ensemble-based community detection in multilayer networks. Data Min Knowl Discov 3:1\u201338","journal-title":"Data Min Knowl Discov"},{"issue":"4","key":"3283_CR45","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/s11222-007-9033-z","volume":"17","author":"U Luxburg Von","year":"2007","unstructured":"Von Luxburg U (2007) A tutorial on spectral clustering. Stat Comput 17(4):395\u2013416","journal-title":"Stat Comput"},{"issue":"10","key":"3283_CR46","doi-asserted-by":"publisher","first-page":"2745","DOI":"10.1364\/JOSAA.15.002745","volume":"15","author":"MA Vorontsov","year":"1998","unstructured":"Vorontsov MA (1998) Stochastic parallel-gradient-descent technique for high-resolution wave-front phase-distortion correction. J Opt Soc Am A 15(10):2745\u20132758","journal-title":"J Opt Soc Am A"},{"key":"3283_CR47","doi-asserted-by":"crossref","unstructured":"Whang JJ, Gleich DF, Dhillon IS (2013) Overlapping community detection using seed set expansion. In: Proceedings of the 22nd ACM international conference on conference on information and knowledge management, ACM, pp 2099\u20132108","DOI":"10.1145\/2505515.2505535"},{"issue":"PB","key":"3283_CR48","doi-asserted-by":"publisher","first-page":"605","DOI":"10.1016\/j.neucom.2015.09.070","volume":"174","author":"K Xu","year":"2016","unstructured":"Xu K, Zou K, Huang Y et al (2016) Mining community and inferring friendship in mobile social networks. Neurocomputing 174(PB):605\u2013616","journal-title":"Neurocomputing"},{"key":"3283_CR49","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1609\/icwsm.v4i1.14039","volume":"10","author":"J Yang","year":"2010","unstructured":"Yang J, Counts S (2010) Predicting the speed, scale, and range of information diffusion in Twitter. ICWSM 10:355\u2013358","journal-title":"ICWSM"},{"key":"3283_CR50","unstructured":"Yang L, Zhang Y, Xing C et al (2011) A node interest similarity based P2P trust model. In: IEEE international conference on communication technology. IEEE, pp 572\u2013575"},{"issue":"10","key":"3283_CR51","first-page":"2363","volume":"52","author":"L Yao","year":"2015","unstructured":"Yao L, Xiaohui K, Hong G et al (2015) A community detecting method based on the node intimacy and degree in social network. J Comput Res Dev 52(10):2363\u20132372 (in Chinese)","journal-title":"J Comput Res Dev"},{"issue":"1","key":"3283_CR52","first-page":"2329","volume":"413","author":"HP Young","year":"2000","unstructured":"Young HP (2000) The diffusion of innovations in social networks. Gen Inf 413(1):2329\u20132334","journal-title":"Gen Inf"},{"key":"3283_CR53","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1016\/j.neucom.2015.11.125","volume":"210","author":"Y Zhao","year":"2016","unstructured":"Zhao Y, Li S, Jin F (2016) Identification of influential nodes in social networks with community structure based on label propagation. Neurocomputing 210:34\u201344","journal-title":"Neurocomputing"},{"issue":"1","key":"3283_CR54","first-page":"156","volume":"52","author":"D Zhou","year":"2015","unstructured":"Zhou D, Han W, Wang Y (2015) A fine-grained information diffusion model based on node attributes and content features. J Comput Res Dev 52(1):156\u2013166 (in Chinese)","journal-title":"J Comput Res Dev"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-018-3283-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-018-3283-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-018-3283-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T00:03:33Z","timestamp":1751673813000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-018-3283-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,5]]},"references-count":54,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["3283"],"URL":"https:\/\/doi.org\/10.1007\/s00500-018-3283-x","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"type":"print","value":"1432-7643"},{"type":"electronic","value":"1433-7479"}],"subject":[],"published":{"date-parts":[[2018,6,5]]},"assertion":[{"value":"5 June 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that there is no conflict of interest regarding the publication of this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}