{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T06:59:36Z","timestamp":1760597976460,"version":"3.37.3"},"reference-count":65,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,6,3]],"date-time":"2020-06-03T00:00:00Z","timestamp":1591142400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,3]],"date-time":"2020-06-03T00:00:00Z","timestamp":1591142400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Data Min Knowl Disc"],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1007\/s10618-020-00688-7","type":"journal-article","created":{"date-parts":[[2020,6,3]],"date-time":"2020-06-03T19:03:43Z","timestamp":1591211023000},"page":"1136-1174","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["TEAGS: time-aware text embedding approach to generate subgraphs"],"prefix":"10.1007","volume":"34","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1956-6373","authenticated-orcid":false,"given":"Saeid","family":"Hosseini","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Saeed","family":"Najafipour","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ngai-Man","family":"Cheung","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hongzhi","family":"Yin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mohammad Reza","family":"Kangavari","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xiaofang","family":"Zhou","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,6,3]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Anderson RM, May RM, Anderson B (1992) Infectious diseases of humans: dynamics and control, vol\u00a028. Wiley Online Library","key":"688_CR1","DOI":"10.1093\/oso\/9780198545996.001.0001"},{"doi-asserted-by":"crossref","unstructured":"Babai L, Luks EM (1983) Canonical labeling of graphs. In: Proceedings of the fifteenth annual ACM symposium on Theory of computing, ACM, pp 171\u2013183","key":"688_CR2","DOI":"10.1145\/800061.808746"},{"issue":"23","key":"688_CR3","doi-asserted-by":"publisher","first-page":"10480","DOI":"10.1016\/j.apm.2016.07.019","volume":"40","author":"V Babishin","year":"2016","unstructured":"Babishin V, Taghipour S (2016) Optimal maintenance policy for multicomponent systems with periodic and opportunistic inspections and preventive replacements. Appl Math Model 40(23):10480\u201310505","journal-title":"Appl Math Model"},{"key":"688_CR4","first-page":"27","volume":"1050","author":"R Bamler","year":"2017","unstructured":"Bamler R, Mandt S (2017) Dynamic word embeddings via skip-gram filtering. Stat 1050:27","journal-title":"Stat"},{"key":"688_CR5","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1016\/j.energy.2017.07.104","volume":"138","author":"N Cauchi","year":"2017","unstructured":"Cauchi N, Macek K, Abate A (2017) Model-based predictive maintenance in building automation systems with user discomfort. Energy 138:306\u2013315","journal-title":"Energy"},{"issue":"1","key":"688_CR6","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/s00453-012-9632-8","volume":"66","author":"L Chang","year":"2013","unstructured":"Chang L, Yu JX, Qin L (2013a) Fast maximal cliques enumeration in sparse graphs. Algorithmica 66(1):173\u2013186","journal-title":"Algorithmica"},{"doi-asserted-by":"crossref","unstructured":"Chang L, Yu JX, Qin L, Lin X, Liu C, Liang W (2013b) Efficiently computing k-edge connected components via graph decomposition. In: Proceedings of the 2013 ACM SIGMOD international conference on management of data, ACM, pp 205\u2013216","key":"688_CR7","DOI":"10.1145\/2463676.2465323"},{"issue":"2","key":"688_CR8","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1109\/TKDE.2016.2618795","volume":"29","author":"L Chang","year":"2017","unstructured":"Chang L, Li W, Qin L, Zhang W, Yang S (2017) $${\\sf pSCAN}$$: fast and exact structural graph clustering. IEEE Trans Knowl Data Eng 29(2):387\u2013401","journal-title":"IEEE Trans Knowl Data Eng"},{"doi-asserted-by":"crossref","unstructured":"Chen C, Tong H, Prakash B, Tsourakakis C, Eliassi-Rad T, Faloutsos C, Chau D (2016) Node immunization on large graphs: theory and algorithms. IEEE Trans Knowl Data Eng, pp 1\u20131","key":"688_CR9","DOI":"10.1109\/TKDE.2015.2465378"},{"doi-asserted-by":"crossref","unstructured":"Cheng J, Ke Y, Fu AWC, Yu JX, Zhu L (2010) Finding maximal cliques in massive networks by h*-graph. In: Proceedings of the 2010 ACM SIGMOD international conference on management of data, ACM, pp 447\u2013458","key":"688_CR10","DOI":"10.1145\/1807167.1807217"},{"doi-asserted-by":"crossref","unstructured":"Cheng J, Ke Y, Chu S, \u00d6zsu MT (2011) Efficient core decomposition in massive networks. In: 2011 IEEE 27th international conference on data engineering, IEEE, pp 51\u201362","key":"688_CR11","DOI":"10.1109\/ICDE.2011.5767911"},{"issue":"24","key":"688_CR12","doi-asserted-by":"publisher","first-page":"247901","DOI":"10.1103\/PhysRevLett.91.247901","volume":"91","author":"R Cohen","year":"2003","unstructured":"Cohen R, Havlin S, Ben-Avraham D (2003) Efficient immunization strategies for computer networks and populations. Phys Rev Lett 91(24):247901","journal-title":"Phys Rev Lett"},{"issue":"6","key":"688_CR13","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1002\/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9","volume":"41","author":"S Deerwester","year":"1990","unstructured":"Deerwester S, Dumais ST, Furnas GW, Landauer TK, Harshman R (1990) Indexing by latent semantic analysis. J Am Soc Inf Sci 41(6):391\u2013407","journal-title":"J Am Soc Inf Sci"},{"doi-asserted-by":"crossref","unstructured":"Dubossarsky H, Weinshall D, Grossman E (2017) Outta control: laws of semantic change and inherent biases in word representation models. In: Proceedings of the 2017 conference on empirical methods in natural language processing, pp 1136\u20131145","key":"688_CR14","DOI":"10.18653\/v1\/D17-1118"},{"issue":"1","key":"688_CR15","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1002\/aris.1440380105","volume":"38","author":"ST Dumais","year":"2004","unstructured":"Dumais ST (2004) Latent semantic analysis. Annu Rev Inf Sci Technol 38(1):188\u2013230","journal-title":"Annu Rev Inf Sci Technol"},{"issue":"11","key":"688_CR16","doi-asserted-by":"publisher","first-page":"1454","DOI":"10.14778\/3236187.3236198","volume":"11","author":"M Ebraheem","year":"2018","unstructured":"Ebraheem M, Thirumuruganathan S, Joty S, Ouzzani M, Tang N (2018) Distributed representations of tuples for entity resolution. Proc VLDB Endow 11(11):1454\u20131467","journal-title":"Proc VLDB Endow"},{"doi-asserted-by":"crossref","unstructured":"Ganesh A, Massouli L, Towsley D (2005) The effect of network topology on the spread of epidemics. In: INFOCOM 2005. 24th annual joint conference of the IEEE computer and communications societies. Proceedings IEEE, IEEE, vol\u00a02, pp 1455\u20131466","key":"688_CR17","DOI":"10.1109\/INFCOM.2005.1498374"},{"key":"688_CR18","volume-title":"Finding a maximum density subgraph","author":"AV Goldberg","year":"1984","unstructured":"Goldberg AV (1984) Finding a maximum density subgraph. University of California, Berkeley"},{"doi-asserted-by":"crossref","unstructured":"Gomez\u00a0Rodriguez M, Leskovec J, Krause A (2010) Inferring networks of diffusion and influence. In: Proceedings of the 16th ACM SIGKDD international conference on knowledge discovery and data mining, ACM, pp 1019\u20131028","key":"688_CR19","DOI":"10.1145\/1835804.1835933"},{"doi-asserted-by":"crossref","unstructured":"Goyal A, Bonchi F, Lakshmanan LV (2010) Learning influence probabilities in social networks. In: Proceedings of the third ACM international conference on Web search and data mining, ACM, pp 241\u2013250","key":"688_CR20","DOI":"10.1145\/1718487.1718518"},{"key":"688_CR21","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1090\/conm\/479\/09345","volume":"479","author":"SG Hartke","year":"2009","unstructured":"Hartke SG, Radcliffe A (2009) Mckays canonical graph labeling algorithm. Commun Math 479:99\u2013111","journal-title":"Commun Math"},{"issue":"4","key":"688_CR22","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1137\/S0036144500371907","volume":"42","author":"HW Hethcote","year":"2000","unstructured":"Hethcote HW (2000) The mathematics of infectious diseases. SIAM Rev 42(4):599\u2013653","journal-title":"SIAM Rev"},{"unstructured":"Hosseini S (2017) Location inference and recommendation in social networks. Thesis","key":"688_CR23"},{"doi-asserted-by":"crossref","unstructured":"Hosseini S, Unankard S, Zhou X, Sadiq S (2014) Location oriented phrase detection in microblogs. In: International conference on database systems for advanced applications, Springer, Berlin, pp 495\u2013509","key":"688_CR24","DOI":"10.1007\/978-3-319-05810-8_33"},{"unstructured":"Hosseini S, Yin H, Zhou X, Sadiq S, Kangavari MR, Cheung NM (2017) Leveraging multi-aspect time-related influence in location recommendation. World Wide Web, pp 1\u201328","key":"688_CR25"},{"doi-asserted-by":"crossref","unstructured":"Hosseini S, Yin H, Cheung NM, Leng KP, Elovici Y, Zhou X (2018a) Exploiting reshaping subgraphs from bilateral propagation graphs. In: International conference on database systems for advanced applications. Springer, Berlin, pp 342\u2013351","key":"688_CR26","DOI":"10.1007\/978-3-319-91452-7_23"},{"doi-asserted-by":"crossref","unstructured":"Hosseini S, Yin H, Zhang M, Elovici Y, Zhou X (2018b) Mining subgraphs from propagation networks through temporal dynamic analysis. In: 2018 19th IEEE international conference on mobile data management (MDM), IEEE, pp 66\u201375","key":"688_CR27","DOI":"10.1109\/MDM.2018.00023"},{"doi-asserted-by":"crossref","unstructured":"Kempe D, Kleinberg J, Tardos E (2003) Maximizing the spread of influence through a social network. In: Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, pp 137\u2013146","key":"688_CR28","DOI":"10.1145\/956750.956769"},{"doi-asserted-by":"crossref","unstructured":"Khalil EB, Dilkina B, Song L (2014) Scalable diffusion-aware optimization of network topology. In: Proceedings of the 20th ACM SIGKDD international conference on knowledge discovery and data mining, ACM, pp 1226\u20131235","key":"688_CR29","DOI":"10.1145\/2623330.2623704"},{"unstructured":"Kloster K, Li Y (2016) Scalable and robust local community detection via adaptive subgraph extraction and diffusions. arXiv\u00a0preprint arXiv:1611.05152","key":"688_CR30"},{"key":"688_CR31","volume-title":"The graph isomorphism problem: its structural complexity","author":"J Kobler","year":"2012","unstructured":"Kobler J, Sch\u00f6ning U, Tor\u00e1n J (2012) The graph isomorphism problem: its structural complexity. Springer, Berlin"},{"doi-asserted-by":"crossref","unstructured":"Li Y, He K, Bindel D, Hopcroft JE (2015) Uncovering the small community structure in large networks: a local spectral approach. In: Proceedings of the 24th international conference on world wide web, international world wide web conferences steering committee, pp 658\u2013668","key":"688_CR32","DOI":"10.1145\/2736277.2741676"},{"doi-asserted-by":"crossref","unstructured":"Ling W, Dyer C, Black AW, Trancoso I (2015a) Two\/too simple adaptations of word2vec for syntax problems. In: Proceedings of the 2015 conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, pp 1299\u20131304","key":"688_CR33","DOI":"10.3115\/v1\/N15-1142"},{"doi-asserted-by":"crossref","unstructured":"Ling W, Tsvetkov Y, Amir S, Fermandez R, Dyer C, Black AW, Trancoso I, Lin CC (2015b) Not all contexts are created equal: better word representations with variable attention. In: Proceedings of the 2015 conference on empirical methods in natural language processing, pp 1367\u20131372","key":"688_CR34","DOI":"10.18653\/v1\/D15-1161"},{"issue":"9","key":"688_CR35","doi-asserted-by":"publisher","first-page":"2131","DOI":"10.1109\/TPAMI.2013.16","volume":"35","author":"H Liu","year":"2013","unstructured":"Liu H, Latecki LJ, Yan S (2013) Fast detection of dense subgraphs with iterative shrinking and expansion. IEEE Trans Pattern Anal Mach Intell 35(9):2131\u20132142","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"doi-asserted-by":"crossref","unstructured":"Liu X, Ge T, Wu Y (2019) Finding densest lasting subgraphs in dynamic graphs: a stochastic approach. In: 2019 IEEE 35th international conference on data engineering (ICDE), IEEE, pp 782\u2013793","key":"688_CR36","DOI":"10.1109\/ICDE.2019.00075"},{"key":"688_CR37","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809071","volume-title":"Introduction to information retrieval","author":"CD Manning","year":"2008","unstructured":"Manning CD, Raghavan P, Sch\u00fctze H (2008) Introduction to information retrieval. Cambridge University Press, Cambridge"},{"issue":"5948","key":"688_CR38","doi-asserted-by":"publisher","first-page":"1705","DOI":"10.1126\/science.1175570","volume":"325","author":"J Medlock","year":"2009","unstructured":"Medlock J, Galvani AP (2009) Optimizing influenza vaccine distribution. Science 325(5948):1705\u20131708","journal-title":"Science"},{"unstructured":"Mikolov T, Sutskever I, Chen K, Corrado G, Dean J (2013) Distributed representations of words and phrases and their compositionality. In: Advances in neural information processing systems 26 (NIPS 2013)","key":"688_CR39"},{"key":"688_CR40","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1162\/tacl_a_00140","volume":"3","author":"DQ Nguyen","year":"2015","unstructured":"Nguyen DQ, Billingsley R, Du L, Johnson M (2015) Improving topic models with latent feature word representations. Trans Assoc Comput Linguist 3:299\u2013313","journal-title":"Trans Assoc Comput Linguist"},{"doi-asserted-by":"crossref","unstructured":"Ni J, Cheng W, Zhang K, Song D, Yan T, Chen H, Zhang X (2017) Ranking causal anomalies by modeling local propagations on networked systems. In: 2017 IEEE international conference on data mining (ICDM), IEEE, pp 1003\u20131008","key":"688_CR41","DOI":"10.1109\/ICDM.2017.129"},{"issue":"1","key":"688_CR42","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1109\/TVCG.2017.2744478","volume":"24","author":"D Park","year":"2018","unstructured":"Park D, Kim S, Lee J, Choo J, Diakopoulos N, Elmqvist N (2018) Conceptvector: text visual analytics via interactive lexicon building using word embedding. IEEE Trans Visual Comput Graphics 24(1):361\u2013370","journal-title":"IEEE Trans Visual Comput Graphics"},{"issue":"1","key":"688_CR43","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1109\/TPAMI.2007.250608","volume":"29","author":"M Pavan","year":"2006","unstructured":"Pavan M, Pelillo M (2006) Dominant sets and pairwise clustering. IEEE Trans Pattern Anal Mach Intell 29(1):167\u2013172","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"unstructured":"Peng S, Wang G, Zhou Y, Wan C, Wang C, Yu S (2017) An immunization framework for social networks through big data based influence modeling. In: IEEE transactions on dependable and secure computing","key":"688_CR44"},{"doi-asserted-by":"publisher","unstructured":"Pennington J, Socher R, Manning C (2014) Glove: Global vectors for word representation. In: Proceedings of the 2014 conference on empirical methods in natural language processing (EMNLP), association for computational linguistics, https:\/\/doi.org\/10.3115\/v1\/d14-1162","key":"688_CR45","DOI":"10.3115\/v1\/d14-1162"},{"doi-asserted-by":"crossref","unstructured":"Prakash BA, Tong H, Valler N, Faloutsos M, Faloutsos C (2010) Virus propagation on time-varying networks: theory and immunization algorithms. In: Joint European conference on machine learning and knowledge discovery in databases, Springer, Berlin, pp 99\u2013114","key":"688_CR46","DOI":"10.1007\/978-3-642-15939-8_7"},{"doi-asserted-by":"crossref","unstructured":"Prakash BA, Beutel A, Rosenfeld R, Faloutsos C (2012) Winner takes all: competing viruses or ideas on fair-play networks. In: Proceedings of the 21st international conference on World Wide Web, ACM, pp 1037\u20131046","key":"688_CR47","DOI":"10.1145\/2187836.2187975"},{"doi-asserted-by":"crossref","unstructured":"Prakash BA, Adamic L, Iwashyna T, Tong H, Faloutsos C (2013) Fractional immunization in networks. In: Proceedings of the 2013 SIAM international conference on data mining, SIAM, pp 659\u2013667","key":"688_CR48","DOI":"10.1137\/1.9781611972832.73"},{"doi-asserted-by":"crossref","unstructured":"Rosin GD, Adar E, Radinsky K (2017) Learning word relatedness over time. arXiv\u00a0preprint arXiv:1707.08081","key":"688_CR49","DOI":"10.18653\/v1\/D17-1121"},{"doi-asserted-by":"crossref","unstructured":"Saha S, Adiga A, Prakash BA, Vullikanti AKS (2015) Approximation algorithms for reducing the spectral radius to control epidemic spread. In: Proceedings of the 2015 SIAM international conference on data mining, SIAM, pp 568\u2013576","key":"688_CR50","DOI":"10.1137\/1.9781611974010.64"},{"doi-asserted-by":"crossref","unstructured":"Sepehr A, Beigy H (2018) Viral cascade probability estimation and maximization in diffusion networks. IEEE Trans Knowl Data Eng","key":"688_CR51","DOI":"10.1109\/TKDE.2018.2840998"},{"key":"688_CR52","doi-asserted-by":"publisher","first-page":"1615","DOI":"10.3934\/mbe.2013.10.1615","volume":"10","author":"E Shim","year":"2013","unstructured":"Shim E (2013) Optimal strategies of social distancing and vaccination against seasonal influenza. Math Biosci Eng 10:1615\u20131634","journal-title":"Math Biosci Eng"},{"issue":"6","key":"688_CR53","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1038\/nmeth.1619","volume":"8","author":"EM Talley","year":"2011","unstructured":"Talley EM, Newman D, Mimno D, Herr BW II, Wallach HM, Burns GA, Leenders AM, McCallum A (2011) Database of nih grants using machine-learned categories and graphical clustering. Nat Methods 8(6):443","journal-title":"Nat Methods"},{"key":"688_CR54","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1146\/annurev-publhealth-031816-044528","volume":"38","author":"TW Valente","year":"2017","unstructured":"Valente TW, Pitts SR (2017) An appraisal of social network theory and analysis as applied to public health: challenges and opportunities. Annu Rev Public Health 38:103\u2013118","journal-title":"Annu Rev Public Health"},{"issue":"2","key":"688_CR55","doi-asserted-by":"publisher","first-page":"58","DOI":"10.14778\/1921071.1921073","volume":"4","author":"N Wang","year":"2010","unstructured":"Wang N, Zhang J, Tan KL, Tung AK (2010) On triangulation-based dense neighborhood graph discovery. Proc VLDB Endow 4(2):58\u201368","journal-title":"Proc VLDB Endow"},{"issue":"13","key":"688_CR56","doi-asserted-by":"publisher","first-page":"1508","DOI":"10.14778\/2733004.2733022","volume":"7","author":"Y Yan","year":"2014","unstructured":"Yan Y, Chen LJ, Zhang Z (2014) Error-bounded sampling for analytics on big sparse data. Proc VLDB Endow 7(13):1508\u20131519","journal-title":"Proc VLDB Endow"},{"doi-asserted-by":"crossref","unstructured":"Yang Y, Chu L, Zhang Y, Wang Z, Pei J, Chen E (2018) Mining density contrast subgraphs. In: 2018 IEEE 34th international conference on data engineering (ICDE), IEEE, pp 221\u2013232","key":"688_CR57","DOI":"10.1109\/ICDE.2018.00029"},{"doi-asserted-by":"crossref","unstructured":"Yoo J, Jo S, Kang U (2017) Supervised belief propagation: scalable supervised inference on attributed networks. In: Data mining (ICDM), 2017 IEEE international conference on, IEEE, pp 595\u2013604","key":"688_CR58","DOI":"10.1109\/ICDM.2017.69"},{"issue":"2","key":"688_CR59","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1145\/1242524.1242530","volume":"32","author":"Z Zeng","year":"2007","unstructured":"Zeng Z, Wang J, Zhou L, Karypis G (2007) Out-of-core coherent closed quasi-clique mining from large dense graph databases. ACM Trans Database Syst 32(2):13","journal-title":"ACM Trans Database Syst"},{"doi-asserted-by":"crossref","unstructured":"Zhang X, Su Y, Qu S, Xie S, Fang B, Yu P (2018) IAD: interaction-aware diffusion framework in social networks. IEEE Trans Knowl Data Eng","key":"688_CR60","DOI":"10.1109\/TKDE.2018.2857492"},{"doi-asserted-by":"crossref","unstructured":"Zhang Y, Parthasarathy S (2012) Extracting analyzing and visualizing triangle k-core motifs within networks. In: 2012 IEEE 28th international conference on data engineering, IEEE, pp 1049\u20131060","key":"688_CR61","DOI":"10.1109\/ICDE.2012.35"},{"doi-asserted-by":"crossref","unstructured":"Zhang Y, Adiga A, Vullikanti A, Prakash BA (2015) Controlling propagation at group scale on networks. In: 2015 IEEE international conference on data mining (ICDM), IEEE, pp 619\u2013628","key":"688_CR62","DOI":"10.1109\/ICDM.2015.59"},{"issue":"12","key":"688_CR63","doi-asserted-by":"publisher","first-page":"3339","DOI":"10.1109\/TKDE.2016.2605088","volume":"28","author":"Y Zhang","year":"2016","unstructured":"Zhang Y, Adiga A, Saha S, Vullikanti A, Prakash BA (2016) Near-optimal algorithms for controlling propagation at group scale on networks. IEEE Trans Knowl Data Eng 28(12):3339\u20133352","journal-title":"IEEE Trans Knowl Data Eng"},{"doi-asserted-by":"crossref","unstructured":"Zhang Y, Ramanathan A, Vullikanti A, Pullum L, Prakash BA (2017) Data-driven immunization. In: Data mining (ICDM), 2017 IEEE international conference on, IEEE, pp 615\u2013624","key":"688_CR64","DOI":"10.1109\/ICDM.2017.71"},{"key":"688_CR65","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/j.eswa.2018.02.011","volume":"101","author":"G Zhu","year":"2018","unstructured":"Zhu G, Iglesias CA (2018) Exploiting semantic similarity for named entity disambiguation in knowledge graphs. Expert Syst Appl 101:8\u201324","journal-title":"Expert Syst Appl"}],"container-title":["Data Mining and Knowledge Discovery"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10618-020-00688-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10618-020-00688-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10618-020-00688-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T22:17:23Z","timestamp":1722982643000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10618-020-00688-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,3]]},"references-count":65,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,7]]}},"alternative-id":["688"],"URL":"https:\/\/doi.org\/10.1007\/s10618-020-00688-7","relation":{},"ISSN":["1384-5810","1573-756X"],"issn-type":[{"type":"print","value":"1384-5810"},{"type":"electronic","value":"1573-756X"}],"subject":[],"published":{"date-parts":[[2020,6,3]]},"assertion":[{"value":"27 August 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 May 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 June 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}