{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T23:40:33Z","timestamp":1773704433937,"version":"3.50.1"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,10,4]],"date-time":"2021-10-04T00:00:00Z","timestamp":1633305600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,10,4]],"date-time":"2021-10-04T00:00:00Z","timestamp":1633305600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Fundamental Research Project of Yunnan Province","award":["202001BB050052"],"award-info":[{"award-number":["202001BB050052"]}]},{"DOI":"10.13039\/501100011002","name":"National Natural Science Foundation of China-Yunnan Joint Fund","doi-asserted-by":"publisher","award":["U1802271"],"award-info":[{"award-number":["U1802271"]}],"id":[{"id":"10.13039\/501100011002","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010909","name":"Young Scientists Fund","doi-asserted-by":"publisher","award":["62002311"],"award-info":[{"award-number":["62002311"]}],"id":[{"id":"10.13039\/501100010909","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science Foundation for Distinguished Young Scholars of Yunnan Province","award":["2019FJ011"],"award-info":[{"award-number":["2019FJ011"]}]},{"name":"Cultivation Project of Donglu Scholar of Yunnan University","award":["No."],"award-info":[{"award-number":["No."]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Data Min Knowl Disc"],"published-print":{"date-parts":[[2022,1]]},"DOI":"10.1007\/s10618-021-00800-5","type":"journal-article","created":{"date-parts":[[2021,10,5]],"date-time":"2021-10-05T04:19:20Z","timestamp":1633407560000},"page":"82-107","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Inferring range of information diffusion based on historical frequent items"],"prefix":"10.1007","volume":"36","author":[{"given":"Weiyi","family":"Liu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3641-1461","authenticated-orcid":false,"given":"Kun","family":"Yue","sequence":"additional","affiliation":[]},{"given":"Jianyu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zhijian","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,4]]},"reference":[{"key":"800_CR1","unstructured":"Agarwal R, Srikant R (1994) Fast algorithms for mining association rules. In: Proceedings of the 20th international conference on very large databases (VLDB), pp 487\u2013499"},{"key":"800_CR2","volume-title":"Online social networks: human cognitive constraints in Facebook and Twitter personal graphs","author":"V Arnaboldi","year":"2015","unstructured":"Arnaboldi V, Passarella A, Conti M et al (2015) Online social networks: human cognitive constraints in Facebook and Twitter personal graphs. Elsevier, Amsterdam"},{"key":"800_CR3","doi-asserted-by":"crossref","unstructured":"Chen W, Wang Y, Yang S (2009) Efficient influence maximization in social networks. In: Proceedings of the 15th ACMSIGKDD conference on knowledge discovery and data mining (SIGKDD), pp 199\u2013208","DOI":"10.1145\/1557019.1557047"},{"key":"800_CR4","doi-asserted-by":"publisher","first-page":"e12948, 09","DOI":"10.1371\/journal.pone.0012948","volume":"5","author":"Nicholas Christakis","year":"2010","unstructured":"Christakis Nicholas, Fowler James (2010) Social network sensors for early detection of contagious outbreaks. PLoS One 5:e12948, 09. https:\/\/doi.org\/10.1371\/journal.pone.0012948","journal-title":"PLoS One"},{"key":"800_CR5","doi-asserted-by":"crossref","unstructured":"Cui P, Jin S, Yu L et\u00a0al (2013) Cascading outbreak prediction in networks: a data-driven approach. In: Proceedings of the 19th ACM SIGKDD conference on knowledge discovery and data mining (SIGKDD), pp 901\u2013909","DOI":"10.1145\/2487575.2487639"},{"key":"800_CR6","volume-title":"Probability and statistics for engineering and the sciences","author":"J Devore","year":"2004","unstructured":"Devore J (2004) Probability and statistics for engineering and the sciences. Wadsworth Group, Davidson"},{"issue":"13","key":"800_CR7","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1016\/j.ipl.2013.03.018","volume":"113","author":"Yuval Filmus","year":"2013","unstructured":"Filmus Yuval (2013) Inequalities on submodular functions via term rewriting. Inf Process Lett 113(13):457\u2013464","journal-title":"Inf Process Lett"},{"key":"800_CR8","doi-asserted-by":"crossref","unstructured":"George D, Hawkins J (2005) A hierarchical Bayesian model of in variant pattern recognition in the visual cortex. In: Proceedings of 2005 IEEE international joint conference on neural networks (IJCNN), pp 1812\u20131817","DOI":"10.1109\/IJCNN.2005.1556155"},{"issue":"12","key":"800_CR9","doi-asserted-by":"publisher","first-page":"2934","DOI":"10.3724\/SP.J.1001.2011.03978","volume":"22","author":"C Ha","year":"2011","unstructured":"Ha C, Wu X, Hu X et al (2011) Computing and pruning method for frequent pattern interestingness based on Bayesian networks. J Softw 22(12):2934\u20132950","journal-title":"J Softw"},{"key":"800_CR10","volume-title":"Data mining: concepts and techniques","author":"J Han","year":"2001","unstructured":"Han J, Kamber M (2001) Data mining: concepts and techniques. Morgan Kaufmann Publishers, Burlington"},{"issue":"1","key":"800_CR11","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/s10618-006-0059-1","volume":"15","author":"J Han","year":"2007","unstructured":"Han J, Cheng H, Xin D et al (2007) Frequent pattern mining: current status and future directions. Data Min Knowl Discov 15(1):55\u201385","journal-title":"Data Min Knowl Discov"},{"key":"800_CR12","unstructured":"Hasan M (2016) Methods and applications of network sampling"},{"key":"800_CR13","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1016\/j.knosys.2015.12.018","volume":"97","author":"A Hernando","year":"2016","unstructured":"Hernando A, Bobadilla J, Ortega F (2016) A non negative matrix factorization for collaborative filtering recommender systems based on a Bayesian probabilistic model. Knowl-Based Syst 97:188\u2013202","journal-title":"Knowl-Based Syst"},{"key":"800_CR14","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1007\/s10618-018-00611-1","volume":"33","author":"S Hu","year":"2019","unstructured":"Hu S, Cautis B, Chen Z et al (2019) Model-free inference of diffusion networks using RKHS embeddings. Data Min Knowl Discov 33:499\u2013525","journal-title":"Data Min Knowl Discov"},{"key":"800_CR15","doi-asserted-by":"crossref","unstructured":"Kurant M, Gjoka M, Wang Y et\u00a0al (2012) Coarse-grained topology estimation via graph sampling. In: Proceedings of the ACM SIGCOMM 2012 conference on data communication, pp 25\u201330","DOI":"10.1145\/2342549.2342556"},{"key":"800_CR16","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1016\/j.knosys.2015.08.018","volume":"90","author":"G Lee","year":"2014","unstructured":"Lee G, Yun U, Ruang H (2014) An uncertainty-based approach: frequent itemset mining from uncertain data with different item importance. Knowl-Based Syst 90:239\u2013256","journal-title":"Knowl-Based Syst"},{"key":"800_CR17","doi-asserted-by":"crossref","unstructured":"Leskovec J, Faloutsos C (2006) Sampling from large graphs. In: Proceedings of the 12th ACMSIGKDD conference on knowledge discovery and data mining (SIGKDD), pp 631\u2013636","DOI":"10.1145\/1150402.1150479"},{"key":"800_CR18","doi-asserted-by":"crossref","unstructured":"Leskovec J, Backstrom L, Kleinberg J (2009) Meme-tracking and the dynamics of the news cycle. In: Proceedings of the 15th ACM SIGKDD international conference on knowledge discovery and data mining (KDD), pp 497\u2013506","DOI":"10.1145\/1557019.1557077"},{"issue":"2","key":"800_CR19","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/s11704-014-3173-z","volume":"8","author":"W Liu","year":"2014","unstructured":"Liu W, Yue K, Liu H et al (2014) Associative categorization of frequent patterns based on the probabilistic graphical model. Front Comput Sci 8(2):265\u2013278","journal-title":"Front Comput Sci"},{"issue":"8","key":"800_CR20","doi-asserted-by":"publisher","first-page":"2081","DOI":"10.1007\/s10489-017-1040-y","volume":"48","author":"W Liu","year":"2018","unstructured":"Liu W, Yue K, Wu H et al (2018) Markov-network based latent link analysis for community detection in social behavioral interactions. Appl Intell 48(8):2081\u20132096","journal-title":"Appl Intell"},{"key":"800_CR21","doi-asserted-by":"crossref","unstructured":"Maiya A, Berger-Wolf T (2010) Online sampling of high centrality individuals in social networks. In: Proceedings of the 14th Pacific-Asia knowledge discovery and data mining (PAKDD), pp 91\u201398","DOI":"10.1007\/978-3-642-13657-3_12"},{"key":"800_CR22","doi-asserted-by":"crossref","unstructured":"Menon A, Chitrapura K, Garg S et\u00a0al (2011) Response prediction using collaborative filtering with hierarchies and side-information. In: Proceedings of the 17th ACM SIGKDD conference on knowledge discovery and data mining (SIGKDD), pp 141\u2013149","DOI":"10.1145\/2020408.2020436"},{"key":"800_CR23","doi-asserted-by":"crossref","unstructured":"Myers S, Zhu C, Leskovec J (2012) Information diffusion and external influence in networks. In: Proceedings of the 18th ACM SIGKDD conference on knowledge discovery and data mining (SIGKDD), pp 33\u201341","DOI":"10.1145\/2339530.2339540"},{"key":"800_CR24","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/BF01588971","volume":"14","author":"G Nemhauser","year":"1978","unstructured":"Nemhauser G, Wolsey L, Fisher M (1978) An analysis of the approximations for maximizing submodular set functions. Math Program 14:265\u2013294","journal-title":"Math Program"},{"key":"800_CR25","volume-title":"Probabilistic reasoning in intelligent system: networks of plausible inference","author":"J Pearl","year":"1988","unstructured":"Pearl J (1988) Probabilistic reasoning in intelligent system: networks of plausible inference. Morgan Kaufmann Publishers, Burlington"},{"key":"800_CR26","doi-asserted-by":"crossref","unstructured":"Rodrigues T, Benevenuto F, Cha M et\u00a0al (2011) On word-of-mouth based discovery of the web. In: Proceedings of the ACM SIGCOMM on Internet measurement conference, pp 381\u2013396","DOI":"10.1145\/2068816.2068852"},{"key":"800_CR27","volume-title":"Artificial intelligence: a modern approach","author":"J Russell","year":"2011","unstructured":"Russell J, Norvig P (2011) Artificial intelligence: a modern approach, 3rd edn. Pearson, Hoboken","edition":"3"},{"key":"800_CR28","doi-asserted-by":"crossref","unstructured":"Smith S, Kao E, Shah D et\u00a0al (2018) Influence estimation on social media networks using causal inference. In: Proceedings of IEEE statistical signal processing (SSP) workshop","DOI":"10.1109\/SSP.2018.8450823"},{"key":"800_CR29","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.artint.2015.12.001","volume":"232","author":"J Vlasselaer","year":"2016","unstructured":"Vlasselaer J, Meert W, Broeck G et al (2016) Exploiting local and repeated structure in dynamic Bayesian networks. Artif Intell 232:43\u201353","journal-title":"Artif Intell"},{"key":"800_CR30","doi-asserted-by":"crossref","unstructured":"Yang C, Tang J, Sun M et\u00a0al (2019) Multi-scale information diffusion prediction with reinforced recurrent networks. In: Proceedings of the twenty-eighth international joint conference on artificial intelligence (IJCAI), pp 4033\u20134039","DOI":"10.24963\/ijcai.2019\/560"},{"key":"800_CR31","doi-asserted-by":"crossref","unstructured":"Yang J, Leskovec J (2011) Patterns of temporal variation in online media. In: Proceedings of the 11th conference on web search and data mining (WSDM), pp 177\u2013186","DOI":"10.1145\/1935826.1935863"},{"key":"800_CR32","doi-asserted-by":"crossref","unstructured":"Yin Z, Yue K, Wu H, Su Y (2018) Adaptive and parallel data acquisition from online big graphs. In: Proceedings of the 23rd international conference on database systems for advanced applications (DASFAA) (1), pp 323\u2013331","DOI":"10.1007\/978-3-319-91452-7_21"},{"key":"800_CR33","doi-asserted-by":"crossref","unstructured":"Yu K, Wu X, Ding W et\u00a0al (2011) Causal associative classification. In: Proceedings of the 11th IEEE international conference on data mining (ICDM), pp 914\u2013923","DOI":"10.1109\/ICDM.2011.30"},{"issue":"2","key":"800_CR34","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1007\/s10115-016-0955-7","volume":"50","author":"L Yu","year":"2017","unstructured":"Yu L, Cui P, Wang F et al (2017) Uncovering and predicting the dynamic process of information cascades with survival model. Knowl Inf Syst 50(2):633\u2013659","journal-title":"Knowl Inf Syst"},{"key":"800_CR35","doi-asserted-by":"crossref","unstructured":"Zhang Q, Gong Y, Wu J, et\u00a0al. (2016) Retweet prediction with attention-based deep neural network. In: Proceedings of the 25th ACM international on conference on information and knowledge management (CIKM), pp 75\u201384","DOI":"10.1145\/2983323.2983809"},{"key":"800_CR36","doi-asserted-by":"crossref","unstructured":"Zhong E, Fan W, Wang J et\u00a0al (2012) Comsoc: adaptive transfer of user behaviors over composite social network. In: Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), pp 696\u2013704","DOI":"10.1145\/2339530.2339641"}],"container-title":["Data Mining and Knowledge Discovery"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10618-021-00800-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10618-021-00800-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10618-021-00800-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,22]],"date-time":"2022-01-22T06:24:30Z","timestamp":1642832670000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10618-021-00800-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,4]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["800"],"URL":"https:\/\/doi.org\/10.1007\/s10618-021-00800-5","relation":{},"ISSN":["1384-5810","1573-756X"],"issn-type":[{"value":"1384-5810","type":"print"},{"value":"1573-756X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,4]]},"assertion":[{"value":"22 February 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 September 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 October 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}