{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,10]],"date-time":"2025-04-10T04:21:31Z","timestamp":1744258891158,"version":"3.40.4"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2023,6,7]],"date-time":"2023-06-07T00:00:00Z","timestamp":1686096000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,7]],"date-time":"2023-06-07T00:00:00Z","timestamp":1686096000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"AFRL MMOI"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comb Optim"],"published-print":{"date-parts":[[2023,7]]},"DOI":"10.1007\/s10878-023-01023-8","type":"journal-article","created":{"date-parts":[[2023,6,7]],"date-time":"2023-06-07T06:02:13Z","timestamp":1686117733000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Target set selection in social networks with tiered influence and activation thresholds"],"prefix":"10.1007","volume":"45","author":[{"given":"Zhecheng","family":"Qiang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Eduardo L.","family":"Pasiliao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4597-3426","authenticated-orcid":false,"given":"Qipeng P.","family":"Zheng","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,6,7]]},"reference":[{"issue":"44\u201346","key":"1023_CR1","doi-asserted-by":"publisher","first-page":"4017","DOI":"10.1016\/j.tcs.2010.08.021","volume":"411","author":"E Ackerman","year":"2010","unstructured":"Ackerman E, Ben-Zwi O, Wolfovitz G (2010) Combinatorial model and bounds for target set selection. Theoret Comput Sci 411(44\u201346):4017\u20134022","journal-title":"Theoret Comput Sci"},{"key":"1023_CR2","doi-asserted-by":"crossref","unstructured":"Anshelevich E, Chakrabarty D, Hate A, Swamy C (2009) Approximation algorithms for the firefighter problem: cuts over time and submodularity. In: International symposium on algorithms and computation, pp. 974\u2013983. Springer","DOI":"10.1007\/978-3-642-10631-6_98"},{"issue":"5439","key":"1023_CR3","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.286.5439.509","volume":"286","author":"A-L Barab\u00e1si","year":"1999","unstructured":"Barab\u00e1si A-L, Albert R (1999) Emergence of scaling in random networks. Science 286(5439):509\u2013512","journal-title":"Science"},{"key":"1023_CR4","doi-asserted-by":"crossref","unstructured":"Bourigault S, Lamprier S, Gallinari P (2016) Representation learning for information diffusion through social networks: an embedded cascade model. In: Proceedings of the ninth ACM international conference on web search and data mining. WSDM \u201916, pp. 573\u2013582. ACM, New York, NY, USA","DOI":"10.1145\/2835776.2835817"},{"key":"1023_CR5","doi-asserted-by":"crossref","unstructured":"Budak C, Agrawal D, El\u00a0Abbadi A (2011) Limiting the spread of misinformation in social networks. In: Proceedings of the 20th international conference on world wide web, pp. 665\u2013674. ACM","DOI":"10.1145\/1963405.1963499"},{"key":"1023_CR6","doi-asserted-by":"crossref","unstructured":"Cha M, Mislove A, Gummadi KP (2009) A measurement-driven analysis of information propagation in the Flickr social network. In: Proceedings of the 18th international conference on world wide web, pp. 721\u2013730","DOI":"10.1145\/1526709.1526806"},{"key":"1023_CR7","doi-asserted-by":"crossref","unstructured":"Chen C-L, Pasiliao EL, Boginski V (2020) A cutting plane method for least cost influence maximization. In: International conference on computational data and social networks, pp. 499\u2013511. Springer","DOI":"10.1007\/978-3-030-66046-8_41"},{"issue":"3","key":"1023_CR8","doi-asserted-by":"publisher","first-page":"1400","DOI":"10.1137\/08073617X","volume":"23","author":"N Chen","year":"2009","unstructured":"Chen N (2009) On the approximability of influence in social networks. SIAM J Discrete Math 23(3):1400\u20131415","journal-title":"SIAM J Discrete Math"},{"key":"1023_CR9","first-page":"1088","volume":"26","author":"GH Chen","year":"2013","unstructured":"Chen GH, Nikolov S, Shah D (2013) A latent source model for nonparametric time series classification. Adv Neural Inf Process Syst 26:1088\u20131096","journal-title":"Adv Neural Inf Process Syst"},{"key":"1023_CR10","doi-asserted-by":"crossref","unstructured":"Chen M, Zheng QP, Boginski V, Pasiliao EL (2019) Reinforcement learning in information cascades based on dynamic user behavior. In: International conference on computational data and social networks, pp. 148\u2013154 Springer","DOI":"10.1007\/978-3-030-34980-6_17"},{"issue":"6","key":"1023_CR11","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.70.066111","volume":"70","author":"A Clauset","year":"2004","unstructured":"Clauset A, Newman ME, Moore C (2004) Finding community structure in very large networks. Phys Rev E 70(6):066111","journal-title":"Phys Rev E"},{"issue":"1","key":"1023_CR12","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/MIS.2005.16","volume":"20","author":"P Domingos","year":"2005","unstructured":"Domingos P (2005) Mining social networks for viral marketing. IEEE Intell Syst 20(1):80\u201382","journal-title":"IEEE Intell Syst"},{"issue":"6","key":"1023_CR13","doi-asserted-by":"publisher","first-page":"1420","DOI":"10.1086\/226707","volume":"83","author":"M Granovetter","year":"1978","unstructured":"Granovetter M (1978) Threshold models of collective behavior. Am J Sociol 83(6):1420\u20131443","journal-title":"Am J Sociol"},{"key":"1023_CR14","doi-asserted-by":"crossref","unstructured":"G\u00fcnne\u00e7 D, Raghavan S, Zhang R (2019) Least-cost influence maximization on social networks. INFORMS J Comput","DOI":"10.1287\/ijoc.2019.0886"},{"key":"1023_CR15","doi-asserted-by":"crossref","unstructured":"Kempe D, Kleinberg J, Tardos E (2003) Maximizing the spread of influence through a social network. In: Proceedings of the ninth ACM SIGKDD international conference on knowledge discovery and data mining. KDD \u201903, pp. 137\u2013146. ACM, New York, NY, USA","DOI":"10.1145\/956755.956769"},{"key":"1023_CR16","unstructured":"Leskovec J, Mcauley JJ (2012) Learning to discover social circles in ego networks. Adv Neural Inf Process Syst pp. 539\u2013547"},{"issue":"1","key":"1023_CR17","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/s41109-019-0215-3","volume":"4","author":"Z Qiang","year":"2019","unstructured":"Qiang Z, Pasiliao EL, Zheng QP (2019) Model-based learning of information diffusion in social media networks. Appl Netw Sci 4(1):111","journal-title":"Appl Netw Sci"},{"key":"1023_CR18","doi-asserted-by":"crossref","unstructured":"Qiang Z, Pasiliao EL, Zheng QP (2021) Target set selection in social networks with influence and activation thresholds. In: International conference on computational data and social networks, pp. 371\u2013380. Springer","DOI":"10.1007\/978-3-030-91434-9_32"},{"issue":"4","key":"1023_CR19","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1287\/ijoo.2019.0012","volume":"1","author":"S Raghavan","year":"2019","unstructured":"Raghavan S, Zhang R (2019) A branch-and-cut approach for the weighted target set selection problem on social networks. INFORMS J Optim 1(4):304\u2013322","journal-title":"INFORMS J Optim"},{"key":"1023_CR20","unstructured":"Rodriguez MG, Balduzzi D, Sch\u00f6lkopf B (2011) Uncovering the temporal dynamics of diffusion networks. arXiv preprint arXiv:1105.0697"},{"key":"1023_CR21","doi-asserted-by":"crossref","unstructured":"Rozemberczki B, Sarkar R (2020) Characteristic functions on graphs: birds of a feather, from statistical descriptors to parametric models","DOI":"10.1145\/3340531.3411866"},{"issue":"1","key":"1023_CR22","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1145\/1811099.1811063","volume":"38","author":"D Shah","year":"2010","unstructured":"Shah D, Zaman T (2010) Detecting sources of computer viruses in networks: theory and experiment. SIGMETRICS Perform Eval Rev 38(1):203\u2013214. https:\/\/doi.org\/10.1145\/1811099.1811063","journal-title":"SIGMETRICS Perform Eval Rev"},{"issue":"4","key":"1023_CR23","doi-asserted-by":"publisher","first-page":"1225","DOI":"10.1007\/s13278-013-0135-7","volume":"3","author":"P Shakarian","year":"2013","unstructured":"Shakarian P, Eyre S, Paulo D (2013) A scalable heuristic for viral marketing under the tipping model. Soc Netw Anal Min 3(4):1225\u20131248","journal-title":"Soc Netw Anal Min"},{"key":"1023_CR24","unstructured":"Spencer G, Howarth R (2013) Maximizing the spread of stable influence: Leveraging norm-driven moral-motivation for green behavior change in networks. arXiv preprint arXiv:1309.6455"},{"key":"1023_CR25","doi-asserted-by":"crossref","unstructured":"Tsur O, Rappoport A (2012) What\u2019s in a hashtag?: content based prediction of the spread of ideas in microblogging communities. In: Proceedings of the fifth ACM international conference on web search and data mining, pp. 643\u2013652. ACM","DOI":"10.1145\/2124295.2124320"},{"key":"1023_CR26","doi-asserted-by":"crossref","unstructured":"Ye S, Wu SF (2010) Measuring message propagation and social influence on twitter. com. In: International conference on social informatics, pp. 216\u2013231. Springer","DOI":"10.1007\/978-3-642-16567-2_16"},{"key":"1023_CR27","doi-asserted-by":"crossref","unstructured":"Yun G, Zheng QP, Boginski V, Pasiliao EL (2019) Information network cascading and network re-construction with bounded rational user behaviors. In: International conference on computational data and social networks, pp. 351\u2013362. Springer","DOI":"10.1007\/978-3-030-34980-6_37"},{"issue":"4","key":"1023_CR28","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1086\/jar.33.4.3629752","volume":"33","author":"WW Zachary","year":"1977","unstructured":"Zachary WW (1977) An information flow model for conflict and fission in small groups. J Anthropol Res 33(4):452\u2013473","journal-title":"J Anthropol Res"}],"container-title":["Journal of Combinatorial Optimization"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10878-023-01023-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10878-023-01023-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10878-023-01023-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T16:38:52Z","timestamp":1744216732000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10878-023-01023-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,7]]},"references-count":28,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,7]]}},"alternative-id":["1023"],"URL":"https:\/\/doi.org\/10.1007\/s10878-023-01023-8","relation":{},"ISSN":["1382-6905","1573-2886"],"issn-type":[{"type":"print","value":"1382-6905"},{"type":"electronic","value":"1573-2886"}],"subject":[],"published":{"date-parts":[[2023,6,7]]},"assertion":[{"value":"24 March 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 June 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"117"}}