{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T11:58:08Z","timestamp":1768737488425,"version":"3.49.0"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"14","license":[{"start":{"date-parts":[[2022,3,18]],"date-time":"2022-03-18T00:00:00Z","timestamp":1647561600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,3,18]],"date-time":"2022-03-18T00:00:00Z","timestamp":1647561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2022,11]]},"DOI":"10.1007\/s10489-022-03178-z","type":"journal-article","created":{"date-parts":[[2022,3,18]],"date-time":"2022-03-18T05:02:33Z","timestamp":1647579753000},"page":"15865-15882","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["An influence maximization algorithm based on low-dimensional representation learning"],"prefix":"10.1007","volume":"52","author":[{"given":"Yuening","family":"Liu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9184-2742","authenticated-orcid":false,"given":"Liqing","family":"Qiu","sequence":"additional","affiliation":[]},{"given":"Chengai","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,18]]},"reference":[{"key":"3178_CR1","doi-asserted-by":"publisher","first-page":"1832","DOI":"10.1109\/TSMC.2017.2779138","volume":"49","author":"J Cheng","year":"2019","unstructured":"Cheng J, Wu X, Zhou M, Gao S, Huang Z, Liu C (2019) A novel method for detecting new overlapping Community in Complex Evolving Networks. IEEE Transactions on Systems, Man, and Cybernetics: Systems 49:1832\u20131844","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics: Systems"},{"key":"3178_CR2","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/j.future.2018.05.071","volume":"89","author":"H Sun","year":"2018","unstructured":"Sun H, Jie W, Loo J, Wang L, Ma S, Han G, Wang Z, Wei X (2018) A parallel self-organizing overlapping community detection algorithm based on swarm intelligence for large scale complex networks. Futur Gener Comput Syst 89:265\u2013285","journal-title":"Futur Gener Comput Syst"},{"key":"3178_CR3","unstructured":"J. Olkhovskaya, G. Neu, G. Lugosi, Online Influence Maximization with Local Observations, (2018)"},{"key":"3178_CR4","doi-asserted-by":"crossref","unstructured":"Devarapalli RK, Biswas A (2021) Rumor Detection and Tracing its Source to Prevent Cyber\u3024rimes on Social Media, Intelligent Data Analytics for Terror Threat Prediction","DOI":"10.1002\/9781119711629.ch1"},{"key":"3178_CR5","doi-asserted-by":"publisher","first-page":"961","DOI":"10.1007\/s10796-018-9837-8","volume":"20","author":"T Mondal","year":"2018","unstructured":"Mondal T, Pramanik P, Bhattacharya I, Boral N, Ghosh S (2018) Analysis and early detection of rumors in a post disaster scenario. Inf Syst Front 20:961\u2013979","journal-title":"Inf Syst Front"},{"key":"3178_CR6","doi-asserted-by":"crossref","unstructured":"Santhoshkumar S, Babu L (2020) Earlier detection of rumors in online social networks using certainty-factor-based convolutional neural networks. Social Network Analysis and Mining 10","DOI":"10.1007\/s13278-020-00634-x"},{"key":"3178_CR7","doi-asserted-by":"crossref","unstructured":"Lin L, Chen Z , (2020) Social rumor detection based on multilayer transformer encoding blocks, Concurrency and Computation: Practice and Experience","DOI":"10.1002\/cpe.6083"},{"key":"3178_CR8","doi-asserted-by":"crossref","unstructured":"Mittal S, Sengupta D, Chakraborty T (2021) Hide and Seek: Outwitting Community Detection Algorithms. IEEE Transactions on Computational Social Systems","DOI":"10.1109\/TCSS.2021.3062711"},{"key":"3178_CR9","doi-asserted-by":"crossref","unstructured":"Ghasemian A, Hosseinmardi H, Clauset A (2018) Evaluating Overfit and Underfit in models of network community structure. IEEE Transactions on Knowledge & Data Engineering","DOI":"10.1109\/TKDE.2019.2911585"},{"key":"3178_CR10","doi-asserted-by":"crossref","unstructured":"Liu C, Kang Q, Kong H, Li W, Kang Y (2020) An iterated local search algorithm for community detection in complex networks. International Journal of Modern Physics B","DOI":"10.1142\/S0217979220500137"},{"key":"3178_CR11","unstructured":"G. Panagopoulos, F.D. Malliaros, M. Vazirgiannis, Influence Maximization via Representation Learning, (2019)"},{"key":"3178_CR12","doi-asserted-by":"crossref","unstructured":"G.D. A, #X, Angelo, L.S. B, Y.V. C (2019) Recommending links through influence maximization. Theoretical Computer Science 764:30\u201341","DOI":"10.1016\/j.tcs.2018.01.017"},{"key":"3178_CR13","doi-asserted-by":"publisher","unstructured":"Gao H, Kim J, Sakurai Y (2019) Influence maximization algorithm based on cross propagation in location-based social networks. Information Systems Research:27\u201342. https:\/\/doi.org\/10.1007\/978-3-319-32055-7","DOI":"10.1007\/978-3-319-32055-7"},{"key":"3178_CR14","first-page":"338","volume":"354","author":"Q He","year":"2019","unstructured":"He Q, Wang X, Lei Z, Huang M, Cai Y, Ma L (2019) TIFIM: a two-stage iterative framework for influence maximization in social networks. Appl Math Comput 354:338\u2013352","journal-title":"Appl Math Comput"},{"key":"3178_CR15","doi-asserted-by":"crossref","unstructured":"Vega-Oliveros DA, Costa L, Rodrigues FA (2020) Influence maximization by rumor spreading on correlated networks through community identification. Commun Nonlinear Sci Numer Simul 105094","DOI":"10.1016\/j.cnsns.2019.105094"},{"key":"3178_CR16","doi-asserted-by":"publisher","DOI":"10.1145\/2835776.2835817","volume-title":"Representation learning for information diffusion through social networks: an embedded cascade model, the ninth ACM international conference","author":"S Bourigault","year":"2016","unstructured":"S. Bourigault, S. Lamprier, P. Gallinari, Representation learning for information diffusion through social networks: an embedded cascade model, the ninth ACM international conference, 2016"},{"key":"3178_CR17","doi-asserted-by":"crossref","unstructured":"Aral S, Dhillon PS (2018) Social influence maximization under empirical influence models. Nature Human Behaviour","DOI":"10.1038\/s41562-018-0346-z"},{"key":"3178_CR18","doi-asserted-by":"crossref","unstructured":"Li Y, Fan J, Wang Y, Tan KL (2018) Influence maximization on social graphs: a survey. IEEE Transactions on Knowledge & Data Engineering:1\u20131","DOI":"10.1109\/TKDE.2018.2807843"},{"key":"3178_CR19","unstructured":"Yuezhi LI, Zhu Y, Zhong M, Computer SO, W. University (2018) k-core filtered influence maximization algorithms in social networks. Journal of Computer Applications"},{"key":"3178_CR20","doi-asserted-by":"publisher","first-page":"121536","DOI":"10.1016\/j.physa.2019.121536","volume":"534","author":"D Li","year":"2019","unstructured":"Li D, Wang W, Jin C, Ma J, Liu J (2019) User recommendation for promoting information diffusion in social networks. Physica A: Statistical Mechanics and its Applications 534:121536","journal-title":"Physica A: Statistical Mechanics and its Applications"},{"key":"3178_CR21","doi-asserted-by":"publisher","first-page":"941","DOI":"10.1109\/ICDE.2018.00089","volume-title":"2018 IEEE 34th International Conference on Data Engineering (ICDE)","author":"S Feng","year":"2018","unstructured":"Feng S, Cong G, Khan A, Li X, Liu Y, Chee YM (2018) Inf2vec: Latent representation model for social influence embedding. In: 2018 IEEE 34th International Conference on Data Engineering (ICDE). IEEE, pp 941\u2013952"},{"key":"3178_CR22","unstructured":"M. Heimann, H. Shen, T. Safavi, D. Koutra, Node Representation Learning for Multiple Networks: The Case of Graph Alignment, (2018)"},{"key":"3178_CR23","doi-asserted-by":"crossref","unstructured":"Chen W, Yuan Y, Zhang L (2010) Scalable influence maximization in social networks under the linear threshold model, ICDM 2010, the 10th IEEE international conference on data mining, Sydney, Australia, 14-17 December 2010, 2011","DOI":"10.1109\/ICDM.2010.118"},{"key":"3178_CR24","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2723734","volume-title":"Influence maximization in near-linear time:a martingale approach, the 2015 ACM SIGMOD international conference","author":"Y Tang","year":"2015","unstructured":"Y. Tang, Y. Shi, X. Xiao, Influence maximization in near-linear time:a martingale approach, the 2015 ACM SIGMOD international conference, 2015"},{"key":"3178_CR25","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/j.jnca.2017.12.003","volume":"103","author":"L Cui","year":"2018","unstructured":"Cui L, Hu H, Yu S, Yan Q, Ming Z, Wen Z, Lu N (2018) DDSE: a novel evolutionary algorithm based on degree-descending search strategy for influence maximization in social networks. Journal of Network & Computer Applications 103:119\u2013130","journal-title":"Journal of Network & Computer Applications"},{"key":"3178_CR26","doi-asserted-by":"publisher","first-page":"105554","DOI":"10.1016\/j.asoc.2019.105554","volume":"82","author":"SS Singh","year":"2019","unstructured":"Singh SS, Kumar A, Singh K, Biswas B (2019) LAPSO-IM: a learning-based influence maximization approach for social networks. Appl Soft Comput 82:105554","journal-title":"Appl Soft Comput"},{"key":"3178_CR27","doi-asserted-by":"publisher","first-page":"4318","DOI":"10.1109\/ACCESS.2019.2963100","volume":"8","author":"L Qiu","year":"2020","unstructured":"Qiu L, Tian X, Sai S, Gu C (2020) LGIM: a global selection algorithm based on local influence for influence maximization in social networks. IEEE Access 8:4318\u20134328","journal-title":"IEEE Access"},{"key":"3178_CR28","doi-asserted-by":"crossref","unstructured":"Qiu L, Tian X, Zhang J, Gu C, Sai S (2021) LIDDE: A differential evolution algorithm based on local-influence-descending search strategy for influence maximization in social networks. Journal of Network and Computer Applications","DOI":"10.1016\/j.jnca.2020.102973"},{"key":"3178_CR29","first-page":"1967","volume":"45","author":"X Lu","year":"2017","unstructured":"Lu X, Li X, Mou L (2017) Semi-supervised multitask learning for scene recognition. IEEE Transactions on Cybernetics 45:1967\u20131976","journal-title":"IEEE Transactions on Cybernetics"},{"key":"3178_CR30","doi-asserted-by":"crossref","unstructured":"J. Bhatta, D. Shrestha, S. Nepal, S. Pandey, S. Koirala, Efficient Estimation of Nepali Word Representations in Vector Space, (2020)","DOI":"10.3126\/jiee.v3i1.34327"},{"key":"3178_CR31","doi-asserted-by":"crossref","unstructured":"Miao, Zhongchen, Fang, Yi, Zhou, Chen, Kai, Zhang, Wenjun, Zha, Cost-Effective Online Trending Topic Detection and Popularity Prediction in Microblogging, ACM transactions on information systems, (2017)","DOI":"10.1145\/3001833"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-022-03178-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-022-03178-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-022-03178-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,9]],"date-time":"2022-11-09T19:17:33Z","timestamp":1668021453000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-022-03178-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,18]]},"references-count":31,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2022,11]]}},"alternative-id":["3178"],"URL":"https:\/\/doi.org\/10.1007\/s10489-022-03178-z","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,18]]},"assertion":[{"value":"1 January 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 March 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}