{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:19:18Z","timestamp":1740122358001,"version":"3.37.3"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comb Optim"],"published-print":{"date-parts":[[2022,8]]},"DOI":"10.1007\/s10878-022-00852-3","type":"journal-article","created":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T18:02:46Z","timestamp":1646157766000},"page":"635-669","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Election control through social influence with voters\u2019 uncertainty"],"prefix":"10.1007","volume":"44","author":[{"given":"Mohammad","family":"Abouei Mehrizi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7321-3467","authenticated-orcid":false,"given":"Federico","family":"Cor\u00f2","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4744-5635","authenticated-orcid":false,"given":"Emilio","family":"Cruciani","sequence":"additional","affiliation":[]},{"given":"Gianlorenzo","family":"D\u2019Angelo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,1]]},"reference":[{"key":"852_CR1","doi-asserted-by":"publisher","unstructured":"Abouei\u00a0Mehrizi M, Cor\u00f2 F, Cruciani E, D\u2019Angelo G (2020) Election control through social influence with unknown preferences. In Computing and Combinatorics - 26th International Conference, COCOON 2020, pp 397\u2013410. https:\/\/doi.org\/10.1007\/978-3-030-58150-3_32","DOI":"10.1007\/978-3-030-58150-3_32"},{"key":"852_CR2","doi-asserted-by":"publisher","unstructured":"Abouei\u00a0Mehrizi M, D\u2019Angelo G (2020) Multi-winner election control via social influence. In Structural Information and Communication Complexity - 27th International Colloquium, SIROCCO 2020, pp 331\u2013348. https:\/\/doi.org\/10.1007\/978-3-030-54921-3_19","DOI":"10.1007\/978-3-030-54921-3_19"},{"issue":"10","key":"852_CR3","doi-asserted-by":"publisher","first-page":"251","DOI":"10.3390\/a13100251","volume":"13","author":"M Abouei Mehrizi","year":"2020","unstructured":"Abouei Mehrizi M, D\u2019Angelo G (2020) Multi-winner election control via social influence: hardness and algorithms for restricted cases. Algorithms 13(10):251. https:\/\/doi.org\/10.3390\/a13100251","journal-title":"Algorithms"},{"issue":"2","key":"852_CR4","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1257\/jep.31.2.211","volume":"31","author":"H Allcott","year":"2017","unstructured":"Allcott H, Gentzkow M (2017) Social media and fake news in the 2016 election. J Econ Perspect 31(2):211\u201336","journal-title":"J Econ Perspect"},{"issue":"3","key":"852_CR5","doi-asserted-by":"publisher","first-page":"225","DOI":"10.3233\/FI-2014-970","volume":"129","author":"KR Apt","year":"2014","unstructured":"Apt KR, Markakis E (2014) Social networks with competing products. Fundam Inform 129(3):225\u2013250. https:\/\/doi.org\/10.3233\/FI-2014-970","journal-title":"Fundam Inform"},{"issue":"10","key":"852_CR6","doi-asserted-by":"publisher","first-page":"4073","DOI":"10.1007\/s12652-019-01669-5","volume":"11","author":"V Auletta","year":"2020","unstructured":"Auletta V, Ferraioli D, Savarese V (2020) Manipulating an election in social networks through link addition. J Ambient Intell Humaniz Comput 11(10):4073\u20134088. https:\/\/doi.org\/10.1007\/s12652-019-01669-5","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"7415","key":"852_CR7","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1038\/nature11421","volume":"489","author":"RM Bond","year":"2012","unstructured":"Bond RM, Fariss CJ, Jones JJ, Kramer ADI, Marlow C, Settle JE, Fowler JH (2012) A 61-million-person experiment in social influence and political mobilization. Nature 489(7415):295\u2013298. https:\/\/doi.org\/10.1038\/nature11421","journal-title":"Nature"},{"key":"852_CR8","doi-asserted-by":"publisher","unstructured":"Bredereck R, Elkind E (2017) Manipulating opinion diffusion in social networks. In: Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, IJCAI 2017, Melbourne, Australia, August 19-25, 2017, pp 894\u2013900 . https:\/\/doi.org\/10.24963\/ijcai.2017\/124","DOI":"10.24963\/ijcai.2017\/124"},{"key":"852_CR9","unstructured":"Castiglioni M, Gatti N, Landriani G, Ferraioli D (2019) Election manipulation on social networks: Seeding, edge removal, edge addition. arXiv pp. arXiv\u20131911"},{"key":"852_CR10","unstructured":"Conover M, Ratkiewicz J, Francisco M, Gon\u00e7alves B, Menczer F, Flammini A (2011) Political polarization on twitter. In: AAAI"},{"key":"852_CR11","doi-asserted-by":"publisher","unstructured":"Cor\u00f2 F, Cruciani E, D\u2019Angelo G, Ponziani S (2019) Exploiting social influence to control elections based on scoring rules. In: Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, IJCAI 2019, Macao, China, August 10-16, 2019, pp 201\u2013207. https:\/\/doi.org\/10.24963\/ijcai.2019\/29","DOI":"10.24963\/ijcai.2019\/29"},{"key":"852_CR12","unstructured":"Cor\u00f2 F, Cruciani E, D\u2019Angelo G, Ponziani S (2019) Vote for me!: Election control via social influence in arbitrary scoring rule voting systems. In: Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, AAMAS \u201919, Montreal, QC, Canada, May 13-17, 2019, pp 1895\u20131897. http:\/\/dl.acm.org\/citation.cfm?id=3331955"},{"key":"852_CR13","doi-asserted-by":"publisher","unstructured":"Faliszewski P, Gonen R, Kouteck\u00fd M, Talmon N (2018) Opinion diffusion and campaigning on society graphs. In: Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, IJCAI 2018, July 13-19, 2018, Stockholm, Sweden, pp 219\u2013225. https:\/\/doi.org\/10.24963\/ijcai.2018\/30","DOI":"10.24963\/ijcai.2018\/30"},{"key":"852_CR14","doi-asserted-by":"publisher","unstructured":"Faliszewski P, Rothe J (2016) Control and bribery in voting. In: Handbook of computational social choice, pp 146\u2013168 . https:\/\/doi.org\/10.1017\/CBO9781107446984.008","DOI":"10.1017\/CBO9781107446984.008"},{"key":"852_CR15","doi-asserted-by":"crossref","unstructured":"Ferrara E (2017) Disinformation and social bot operations in the run up to the 2017 french presidential election. First Monday, vol 22(8) . https:\/\/firstmonday.org\/ojs\/index.php\/fm\/article\/view\/8005","DOI":"10.5210\/fm.v22i8.8005"},{"key":"852_CR16","doi-asserted-by":"publisher","unstructured":"Goyal A, Bonchi F, Lakshmanan LVS (2010) Learning influence probabilities in social networks. In: Davison BD, Suel T, Craswell N, Liu B (eds) Proceedings of the Third International Conference on Web Search and Web Data Mining, WSDM 2010, New York, NY, USA, February 4-6, 2010, ACM, pp 241\u2013250. https:\/\/doi.org\/10.1145\/1718487.1718518","DOI":"10.1145\/1718487.1718518"},{"key":"852_CR17","doi-asserted-by":"publisher","unstructured":"Goyal A, Lu W, Lakshmanan LVS (2011) SIMPATH: an efficient algorithm for influence maximization under the linear threshold model. In: Cook DJ, Pei J, Wang W, Za\u00efane OR, Wu X (eds) 11th IEEE International Conference on Data Mining, ICDM 2011, Vancouver, BC, Canada, December 11-14, 2011. IEEE Computer Society, pp 211\u2013220. https:\/\/doi.org\/10.1109\/ICDM.2011.132","DOI":"10.1109\/ICDM.2011.132"},{"key":"852_CR18","doi-asserted-by":"publisher","first-page":"105","DOI":"10.4086\/toc.2015.v011a004","volume":"11","author":"D Kempe","year":"2015","unstructured":"Kempe D, Kleinberg JM, Tardos \u00c9 (2015) Maximizing the spread of influence through a social network. Theory Comput. 11:105\u2013147. https:\/\/doi.org\/10.4086\/toc.2015.v011a004","journal-title":"Theory Comput."},{"issue":"8","key":"852_CR19","doi-asserted-by":"publisher","first-page":"1473","DOI":"10.1177\/1461444814562445","volume":"18","author":"D Kreiss","year":"2016","unstructured":"Kreiss D (2016) Seizing the moment: the presidential campaigns\u2019 use of twitter during the 2012 electoral cycle. New Media Soc 18(8):1473\u20131490. https:\/\/doi.org\/10.1177\/1461444814562445","journal-title":"New Media Soc"},{"issue":"10","key":"852_CR20","doi-asserted-by":"publisher","first-page":"1852","DOI":"10.1109\/TKDE.2018.2807843","volume":"30","author":"Y Li","year":"2018","unstructured":"Li Y, Fan J, Wang Y, Tan K (2018) Influence maximization on social graphs: a survey. IEEE Trans Knowl Data Eng 30(10):1852\u20131872. https:\/\/doi.org\/10.1109\/TKDE.2018.2807843","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"852_CR21","doi-asserted-by":"publisher","unstructured":"Manurangsi P (2017) Almost-polynomial ratio eth-hardness of approximating densest k-subgraph. In: Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing, STOC 2017, Montreal, QC, Canada, June 19-23, 2017, pp 954\u2013961 . https:\/\/doi.org\/10.1145\/3055399.3055412","DOI":"10.1145\/3055399.3055412"},{"key":"852_CR22","unstructured":"Matsa KE, Shearer E (2018) News use across social media platforms 2018. Pew Research Center . http:\/\/www.journalism.org\/2018\/09\/10\/news-use-across-social-media-platforms-2018\/. Accessed Feb, 9th, 2019"},{"issue":"1","key":"852_CR23","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/BF01588971","volume":"14","author":"GL Nemhauser","year":"1978","unstructured":"Nemhauser GL, Wolsey LA, Fisher ML (1978) An analysis of approximations for maximizing submodular set functions\u2013I. Math Program 14(1):265\u2013294. https:\/\/doi.org\/10.1007\/BF01588971","journal-title":"Math Program"},{"key":"852_CR24","doi-asserted-by":"publisher","unstructured":"Raghavendra P, Steurer D (2010) Graph expansion and the unique games conjecture. In: Proceedings of the 42nd ACM Symposium on Theory of Computing, STOC 2010, Cambridge, Massachusetts, USA, 5-8 June 2010, pp 755\u2013764 . https:\/\/doi.org\/10.1145\/1806689.1806792","DOI":"10.1145\/1806689.1806792"},{"issue":"3","key":"852_CR25","doi-asserted-by":"publisher","first-page":"1353","DOI":"10.1016\/j.eswa.2014.09.037","volume":"42","author":"K Rahimkhani","year":"2015","unstructured":"Rahimkhani K, AleAhmad A, Rahgozar M, Moeini A (2015) A fast algorithm for finding most influential people based on the linear threshold model. Expert Syst Appl 42(3):1353\u20131361. https:\/\/doi.org\/10.1016\/j.eswa.2014.09.037","journal-title":"Expert Syst Appl"},{"key":"852_CR26","doi-asserted-by":"crossref","unstructured":"Rossi RA, Ahmed NK (2015) The network data repository with interactive graph analytics and visualization. In: AAAI . http:\/\/networkrepository.com","DOI":"10.1609\/aaai.v29i1.9277"},{"issue":"1","key":"852_CR27","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1080\/10584609.2017.1334728","volume":"35","author":"S Stier","year":"2018","unstructured":"Stier S, Bleier A, Lietz H, Strohmaier M (2018) Election campaigning on social media: politicians, audiences, and the mediation of political communication on facebook and twitter. Political Commun 35(1):50\u201374. https:\/\/doi.org\/10.1080\/10584609.2017.1334728","journal-title":"Political Commun"},{"key":"852_CR28","unstructured":"Wilder B, Vorobeychik Y (2018) Controlling elections through social influence. In: Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, AAMAS 2018, Stockholm, Sweden, July 10-15, 2018, pp 265\u2013273 . http:\/\/dl.acm.org\/citation.cfm?id=3237428"},{"key":"852_CR29","doi-asserted-by":"publisher","unstructured":"Wilder B, Vorobeychik Y (2019) Defending elections against malicious spread of misinformation. In: The Thirty-Third AAAI Conference on Artificial Intelligence, AAAI 2019, The Thirty-First Innovative Applications of Artificial Intelligence Conference, IAAI 2019, The Ninth AAAI Symposium on Educational Advances in Artificial Intelligence, EAAI 2019, Honolulu, Hawaii, USA, January 27 - February 1, 2019, AAAI Press, pp 2213\u20132220. https:\/\/doi.org\/10.1609\/aaai.v33i01.33012213","DOI":"10.1609\/aaai.v33i01.33012213"}],"container-title":["Journal of Combinatorial Optimization"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10878-022-00852-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10878-022-00852-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10878-022-00852-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,29]],"date-time":"2022-07-29T07:33:39Z","timestamp":1659080019000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10878-022-00852-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,1]]},"references-count":29,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,8]]}},"alternative-id":["852"],"URL":"https:\/\/doi.org\/10.1007\/s10878-022-00852-3","relation":{},"ISSN":["1382-6905","1573-2886"],"issn-type":[{"type":"print","value":"1382-6905"},{"type":"electronic","value":"1573-2886"}],"subject":[],"published":{"date-parts":[[2022,3,1]]},"assertion":[{"value":"8 February 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have not disclosed any competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}