{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T04:29:04Z","timestamp":1775017744164,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2024,3,21]],"date-time":"2024-03-21T00:00:00Z","timestamp":1710979200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,3,21]],"date-time":"2024-03-21T00:00:00Z","timestamp":1710979200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["NO.U1905211"],"award-info":[{"award-number":["NO.U1905211"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100017357","name":"Science and Technology Projects of Fujian Province","doi-asserted-by":"publisher","award":["2022G02003"],"award-info":[{"award-number":["2022G02003"]}],"id":[{"id":"10.13039\/100017357","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100017357","name":"Science and Technology Projects of Fujian Province","doi-asserted-by":"publisher","award":["2021L3032"],"award-info":[{"award-number":["2021L3032"]}],"id":[{"id":"10.13039\/100017357","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003410","name":"Department of Education, Fujian Province","doi-asserted-by":"publisher","award":["No.JAT220814"],"award-info":[{"award-number":["No.JAT220814"]}],"id":[{"id":"10.13039\/501100003410","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s00607-024-01276-z","type":"journal-article","created":{"date-parts":[[2024,3,21]],"date-time":"2024-03-21T19:02:28Z","timestamp":1711047748000},"page":"1913-1931","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Influence maximization in mobile social networks based on RWP-CELF"],"prefix":"10.1007","volume":"106","author":[{"given":"Zhenyu","family":"Xu","sequence":"first","affiliation":[]},{"given":"Xinxin","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Mingzhi","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Li","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,21]]},"reference":[{"issue":"3","key":"1276_CR1","doi-asserted-by":"publisher","first-page":"1557","DOI":"10.1109\/COMST.2014.2371813","volume":"17","author":"X Hu","year":"2015","unstructured":"Hu X, Chu THS, Leung VCM, Ngai CH, Philippe K, Chan HCB (2015) A survey on mobile social networks: applications, platforms, system architectures, and future research directions. IEEE Commun Surv Tutor 17(3):1557\u20131581","journal-title":"IEEE Commun Surv Tutor"},{"key":"1276_CR2","doi-asserted-by":"crossref","unstructured":"Chen W, Wang C, Wang Y (2010) Scalable influence maximization for prevalent viral marketing in large-scale social networks. In: Proceedings of the 16th ACM SIGKDD international conference on knowledge discovery and data mining, pp 1029\u20131038","DOI":"10.1145\/1835804.1835934"},{"key":"1276_CR3","doi-asserted-by":"crossref","unstructured":"Budak C, Agrawal D, Abbadi AE (2011) Limiting the spread of misinformation in social networks. In: Proceedings of the 20th international conference on World wide web, pp 665\u2013674","DOI":"10.1145\/1963405.1963499"},{"key":"1276_CR4","doi-asserted-by":"crossref","unstructured":"Domingos P, Richardson M (2001) Mining the network value of customers. In: Proceedings of the 7th ACM SIGKDD international conference on knowledge discovery and data mining, pp 57\u201366","DOI":"10.1145\/502512.502525"},{"issue":"4","key":"1276_CR5","doi-asserted-by":"publisher","first-page":"1799","DOI":"10.1007\/s11280-018-0623-9","volume":"22","author":"P Zhang","year":"2019","unstructured":"Zhang P, Bao Z, Niu Y, Zhang Y, Mo S, Geng F, Peng Z (2019) Proactive rumor control in online networks. World Wide Web 22(4):1799\u20131818","journal-title":"World Wide Web"},{"issue":"10","key":"1276_CR6","doi-asserted-by":"publisher","first-page":"1852","DOI":"10.1109\/TKDE.2018.2807843","volume":"30","author":"Y Li","year":"2018","unstructured":"Li Y, Wang Y, Tan KL (2018) Influence maximization on social graphs: a survey. IEEE Trans Knowl Data Eng 30(10):1852\u20131872","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1276_CR7","doi-asserted-by":"crossref","unstructured":"Kempe D, Kleinberg J, Tardos \u00c9 (2003) Maximizing the spread of influence through a social network. In: Proceedings of the 9th international conference on knowledge discovery and data mining, pp 137\u2013146","DOI":"10.1145\/956750.956769"},{"issue":"9","key":"1276_CR8","doi-asserted-by":"publisher","first-page":"3417","DOI":"10.1007\/s10115-020-01461-4","volume":"62","author":"S Banerjee","year":"2020","unstructured":"Banerjee S, Jenamani M, Pratihar DK (2020) A survey on influence maximization in a social network. Knowl Inf Syst 62(9):3417\u20133455","journal-title":"Knowl Inf Syst"},{"key":"1276_CR9","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1007\/s00607-021-00987-x","volume":"104","author":"S Banerjee","year":"2022","unstructured":"Banerjee S, Jenamani M, Pratihar DK (2022) An approximate marginal spread computation approach for the budgeted influence maximization with delay. Computing 104:657\u2013680","journal-title":"Computing"},{"key":"1276_CR10","unstructured":"Raghavan S, Zhang R R (2015) Weighted target set selection on social networks, Technical report, Working paper, University of Maryland"},{"key":"1276_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100393","volume":"40","author":"M Azaouzi","year":"2021","unstructured":"Azaouzi M, Mnasria W, Romdhane LB (2021) New trends in influence maximization models. Comput Sci Rev 40:100393","journal-title":"Comput Sci Rev"},{"key":"1276_CR12","first-page":"535","volume":"278","author":"T Zhu","year":"2014","unstructured":"Zhu T, Wang B, Wu B, Zhu C (2014) Maximizing the spread of influence ranking in social networks. Inform ci 278:535\u2013544","journal-title":"Inform ci"},{"key":"1276_CR13","doi-asserted-by":"crossref","unstructured":"Srivastava A, Chelmis C, Prasanna VK (2014) Influence in social networks: a unified model? In: Proceedings of the IEEE\/ACM international conference on advances in social networks analysis and mining, pp 451\u2013454","DOI":"10.1109\/ASONAM.2014.6921624"},{"key":"1276_CR14","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.engappai.2015.02.007","volume":"41","author":"R Mohamadi-Baghmolaei","year":"2015","unstructured":"Mohamadi-Baghmolaei R, Mozafari N, Hamzeh A (2015) Trust based latency aware influence maximization in social networks. Eng Appl Artif Intell 41:195\u2013206","journal-title":"Eng Appl Artif Intell"},{"key":"1276_CR15","doi-asserted-by":"crossref","unstructured":"Wang F, Wang G, Xie D (2016) Maximizing the spread of positive influence under LT-MLA model. In: Asia-Pacific services computing conference, pp 450\u2013463","DOI":"10.1007\/978-3-319-49178-3_34"},{"key":"1276_CR16","doi-asserted-by":"crossref","unstructured":"Leskovec J, Krause A, Guestrin C, Faloutsos C, Vanbriesen J, Glance N (2007) Cost-effective outbreak detection in networks. In: Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining, pp 420\u2013429","DOI":"10.1145\/1281192.1281239"},{"key":"1276_CR17","doi-asserted-by":"crossref","unstructured":"Goyal A, Lu W, Lakshmanan LVS (2011) CELF++: optimizing the greedy algorithm for influence maximization in social networks. In: Proceedings of the 20th international conference companion on World wide web, pp 47\u201348","DOI":"10.1145\/1963192.1963217"},{"key":"1276_CR18","doi-asserted-by":"crossref","unstructured":"Chen W, Wang Y, Yang S (2009) Efficient influence maximization in social networks. In: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, pp 199\u2013207","DOI":"10.1145\/1557019.1557047"},{"key":"1276_CR19","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.ins.2015.04.024","volume":"316","author":"S Kundu","year":"2015","unstructured":"Kundu S, Pal SK (2015) Deprecation based greedy strategy for set selection in large scale social networks. Inf Sci 316:107\u2013122","journal-title":"Inf Sci"},{"key":"1276_CR20","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.knosys.2016.09.029","volume":"117","author":"J Shang","year":"2017","unstructured":"Shang J, Zhou S, Li X, Liu L, Wu H (2017) CoFIM: a community-based framework for influence maximization on large-scale networks. Knowl-Based Syst 117:88\u2013100","journal-title":"Knowl-Based Syst"},{"key":"1276_CR21","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.jnca.2016.10.020","volume":"86","author":"F Lu","year":"2016","unstructured":"Lu F, Zhang W, Shao L, Jiang X, Xu P, Jin H (2016) Scalable influence maximization under independent cascade model. J Netw Comput Appl 86:15\u201323","journal-title":"J Netw Comput Appl"},{"issue":"3","key":"1276_CR22","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/0378-8733(78)90021-7","volume":"1","author":"LC Freeman","year":"1978","unstructured":"Freeman LC (1978) Centrality in social networks conceptual clarification. Soc Netw 1(3):215\u2013239","journal-title":"Soc Netw"},{"issue":"1","key":"1276_CR23","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.socnet.2004.11.009","volume":"27","author":"MJ Newman","year":"2005","unstructured":"Newman MJ (2005) A measure of betweenness centrality based on random walks. Soc Netw 27(1):39\u201354","journal-title":"Soc Netw"},{"key":"1276_CR24","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5677","author":"M Gao","year":"2020","unstructured":"Gao M, Xu L, Lin L, Huang Y, Zhang X (2020) Influence maximization based on activity degree in mobile social networks. Concurr Comput Pract Exp. https:\/\/doi.org\/10.1002\/cpe.5677","journal-title":"Concurr Comput Pract Exp"},{"key":"1276_CR25","doi-asserted-by":"crossref","unstructured":"Zhang X, Xu L, Gao M (2020) An efficient influence maximization algorithm based on social relationship priority in mobile social networks. In: International Symposium on Security and Privacy in Social Networks and Big Data. Springer, pp 164\u2013177","DOI":"10.1007\/978-981-15-9031-3_15"},{"key":"1276_CR26","doi-asserted-by":"crossref","unstructured":"Jiang Q, Song G, Cong G, Wang Y, Si W, Xie K (2011) Simulated annealing based influence maximization in social networks. In: Proceeding of the 25th AAAI conference on artificial intelligence, pp 127\u2013132","DOI":"10.1609\/aaai.v25i1.7838"},{"key":"1276_CR27","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/j.jnca.2017.12.003","volume":"103","author":"L Cui","year":"2018","unstructured":"Cui L, Hu H, Yu S, Yan Q, Ming Z, Wen Z, Lu N (2018) DDSE: a novel evolutionary algorithm based on degree-descending search strategy for influence maximization in social networks. J Netw Comput Appl 103:119\u2013130","journal-title":"J Netw Comput Appl"},{"issue":"C","key":"1276_CR28","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1016\/j.ins.2016.07.012","volume":"367\u2013368","author":"M Gong","year":"2016","unstructured":"Gong M, Yan J, Shen B, Ma L, Cai Q (2016) Influence maximization in social networks based on discrete particle swarm optimization. Inf Sci 367\u2013368(C):600\u2013614","journal-title":"Inf Sci"},{"key":"1276_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.07.004","volume":"187","author":"J Tang","year":"2020","unstructured":"Tang J, Zhang R, Wang P, Zhao Z, Fan L, Liu X (2020) A discrete shuffled frog-leaping algorithm to identify influential nodes for influence maximization in social networks. Knowl-Based Syst 187:104833","journal-title":"Knowl-Based Syst"},{"key":"1276_CR30","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.knosys.2013.01.017","volume":"42","author":"X Zhang","year":"2013","unstructured":"Zhang X, Zhu J, Wang Q, Zhao H (2013) Identifying influential nodes in complex networks with community structure. Knowl-Based Syst 42:74\u201384","journal-title":"Knowl-Based Syst"},{"key":"1276_CR31","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.knosys.2016.09.029","volume":"117","author":"J Shang","year":"2017","unstructured":"Shang J, Zhou S, Li X, Liu L, Wu H (2017) CoFIM: a community-based framework for influence maximization on large-scale networks. Knowl-Based Syst 117:88\u2013100","journal-title":"Knowl-Based Syst"},{"key":"1276_CR32","doi-asserted-by":"publisher","first-page":"1085","DOI":"10.1016\/j.physa.2018.08.045","volume":"512","author":"J Shang","year":"2018","unstructured":"Shang J, Wu H, Zhou S, Zhong J, Feng Y, Qiang B (2018) IMPC: influence maximization based on multi-neighbor potential in community networks. Physica A 512:1085\u20131103","journal-title":"Physica A"},{"key":"1276_CR33","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.neucom.2023.02.059","volume":"534","author":"F Kazemzadeh","year":"2023","unstructured":"Kazemzadeh F, Safaei AA, Mirzarezaee M, Afsharian S, Kosarirad H (2023) Determination of influential nodes based on the communities structure to maximize influence in social network. Neurocomputing 534:18\u201328","journal-title":"Neurocomputing"},{"key":"1276_CR34","unstructured":"Kim J, Kim SK, Yu H (2013) Scalable and parallelizable processing of influence maximization for large-scale social networks. In: Proceedings of the IEEE 29th international conference on data engineering, pp 266\u2013277"},{"issue":"8","key":"1276_CR35","doi-asserted-by":"publisher","first-page":"1904","DOI":"10.1109\/TKDE.2013.106","volume":"26","author":"B Liu","year":"2014","unstructured":"Liu B, Cong G, Zeng Y, Xu D, Chee YM (2014) Influence spreading path and its application to the time constrained social influence maximization problem and beyond. IEEE Trans Knowl Data Eng 26(8):1904\u20131917","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1276_CR36","volume-title":"Connected: the surprising power of our social networks and how they shape our lives","author":"NA Christakis","year":"2009","unstructured":"Christakis NA, Fowler JH (2009) Connected: the surprising power of our social networks and how they shape our lives. Little, Brown, Boston"},{"key":"1276_CR37","doi-asserted-by":"publisher","first-page":"5547","DOI":"10.1038\/srep05547","volume":"4","author":"S Pei","year":"2014","unstructured":"Pei S, Muchnik L, Andrade JS Jr, Zheng Z, Makse HA (2014) Searching for superspreaders of information in real-world social media. Sci Rep 4:5547","journal-title":"Sci Rep"},{"issue":"2","key":"1276_CR38","doi-asserted-by":"publisher","first-page":"286","DOI":"10.4304\/jsw.8.2.286-295","volume":"8","author":"X Fu","year":"2013","unstructured":"Fu X, Wang C, Wang Z, Ming Z (2013) Threshold random walks for community structure detection in complex networks. J Softw 8(2):286\u2013295","journal-title":"J Softw"},{"issue":"1","key":"1276_CR39","first-page":"89","volume":"43","author":"M Okuda","year":"2021","unstructured":"Okuda M, Satoh S, Sato Y, Kidawara Y (2021) Community detection using restrained random-walk similarity. IEEE Trans Pattern Anal Mach Intell 43(1):89\u2013103","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"1","key":"1276_CR40","doi-asserted-by":"publisher","first-page":"2-es","DOI":"10.1145\/1217299.1217301","volume":"1","author":"J Leskovec","year":"2007","unstructured":"Leskovec J, Kleinberg J, Faloutsos C (2007) Graph evolution: densification and shrinking diameters. ACM Trans Knowl Discov Data 1(1):2-es","journal-title":"ACM Trans Knowl Discov Data"},{"issue":"1","key":"1276_CR41","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1080\/15427951.2009.10129177","volume":"6","author":"J Leskovec","year":"2009","unstructured":"Leskovec J, Lang KJ, Dasgupta A, Mahoney MW (2009) Community structure in large networks: natural cluster sizes and the absence of large well-defined clusters. Internet Math 6(1):29\u2013123","journal-title":"Internet Math"},{"key":"1276_CR42","doi-asserted-by":"crossref","unstructured":"Richardson M (2003) Trust management for the semantic web. In: Proceeding of international semantic web conference, pp 351\u2013368","DOI":"10.1007\/978-3-540-39718-2_23"},{"key":"1276_CR43","doi-asserted-by":"crossref","unstructured":"Nguyen HT, Thai MT, Dinh TN (2016) Stop-and-stare: optimal sampling algorithms for viral marketing in billion-scale networks. In: Proceedings of the 2016 international conference on management of data, pp 695\u2013710","DOI":"10.1145\/2882903.2915207"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-024-01276-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00607-024-01276-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-024-01276-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,30]],"date-time":"2024-05-30T18:10:27Z","timestamp":1717092627000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00607-024-01276-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,21]]},"references-count":43,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["1276"],"URL":"https:\/\/doi.org\/10.1007\/s00607-024-01276-z","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3,21]]},"assertion":[{"value":"8 March 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 February 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 March 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}