{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:28:34Z","timestamp":1773246514530,"version":"3.50.1"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,8,2]],"date-time":"2021-08-02T00:00:00Z","timestamp":1627862400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,8,2]],"date-time":"2021-08-02T00:00:00Z","timestamp":1627862400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["World Wide Web"],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1007\/s11280-021-00933-z","type":"journal-article","created":{"date-parts":[[2021,8,2]],"date-time":"2021-08-02T12:03:20Z","timestamp":1627905800000},"page":"899-926","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Locating pivotal connections: the K-Truss minimization and maximization problems"],"prefix":"10.1007","volume":"25","author":[{"given":"Chen","family":"Chen","sequence":"first","affiliation":[]},{"given":"Mengqi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Renjie","family":"Sun","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3554-3219","authenticated-orcid":false,"given":"Xiaoyang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Weijie","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Xun","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,2]]},"reference":[{"issue":"3","key":"933_CR1","doi-asserted-by":"publisher","first-page":"1452","DOI":"10.1137\/14097032X","volume":"29","author":"K Bhawalkar","year":"2015","unstructured":"Bhawalkar, K., Kleinberg, J., Lewi, K., Roughgarden, T., Sharma, A.: Preventing unraveling in social networks: the anchored k-core problem. SIAM J. Discrete Math. 29(3), 1452\u20131475 (2015)","journal-title":"SIAM J. Discrete Math."},{"key":"933_CR2","doi-asserted-by":"crossref","unstructured":"Chen, C., Zhu, Q., Sun, R., Wang, X., Wu, Y.: Edge manipulation approaches for k-core minimization: Metrics and analytics TKDE (2021)","DOI":"10.1109\/TKDE.2021.3085570"},{"key":"933_CR3","doi-asserted-by":"crossref","unstructured":"Chen, P. L., Chou, C. K., Chen, M. S.: Distributed algorithms for k-truss decomposition. In: IEEE International Conference on Big Data (2014)","DOI":"10.1109\/BigData.2014.7004264"},{"key":"933_CR4","doi-asserted-by":"crossref","unstructured":"Cheng, D., Chen, C., Wang, X., Xiang, S.: Efficient top-k vulnerable nodes detection in uncertain graphs. TKDE (2021)","DOI":"10.1109\/TKDE.2021.3094549"},{"key":"933_CR5","doi-asserted-by":"crossref","unstructured":"Cheng, D., Wang, X., Zhang, Y., Zhang, L.: Risk guarantee prediction in networked-loans. In: IJCAI, pp. 4483\u20134489 (2020)","DOI":"10.24963\/ijcai.2020\/618"},{"key":"933_CR6","unstructured":"Cohen, J.: Trusses: Cohesive subgraphs for social network analysis. National Security Agency Technical Report (2008)"},{"key":"933_CR7","doi-asserted-by":"crossref","unstructured":"Cui, Y., Xiao, D., Loguinov, D.: On efficient external-memory triangle listing. TKDE (2018)","DOI":"10.1109\/TKDE.2018.2858820"},{"key":"933_CR8","doi-asserted-by":"crossref","unstructured":"Huang, X., Lakshmanan, L.V.S.: Attribute-driven community search. PVLDB (2017)","DOI":"10.14778\/3099622.3099626"},{"key":"933_CR9","doi-asserted-by":"crossref","unstructured":"Huang, X., Lu, W., Lakshmanan, L.V.: Truss decomposition of probabilistic graphs: Semantics and algorithms. In: SIGMOD (2016)","DOI":"10.1145\/2882903.2882913"},{"key":"933_CR10","doi-asserted-by":"crossref","unstructured":"Karp, R.M.: Reducibility among combinatorial problems. In: Complexity of Computer Computations, pp. 85\u2013103 (1972)","DOI":"10.1007\/978-1-4684-2001-2_9"},{"key":"933_CR11","doi-asserted-by":"crossref","unstructured":"Medya, S., Ma, T., Silva, A., Singh, A.: A game theoretic approach for core resilience. In: IJCAI (2020)","DOI":"10.24963\/ijcai.2020\/480"},{"key":"933_CR12","doi-asserted-by":"crossref","unstructured":"Medya, S., Silva, A., Singh, A., Basu, P., Swami, A.: Group centrality maximization via network design. In: ICDM (2018)","DOI":"10.1137\/1.9781611975321.14"},{"issue":"3","key":"933_CR13","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1016\/0378-8733(83)90028-X","volume":"5","author":"SB Seidman","year":"1983","unstructured":"Seidman, S.B.: Network structure and minimum degree. Soc. Netw. 5(3), 269\u2013287 (1983)","journal-title":"Soc. Netw."},{"key":"933_CR14","doi-asserted-by":"crossref","unstructured":"Soroush Ebadian, X.H.: Fast algorithm for k-truss discovery on public-private graphs. In: IJCAI, pp 2258\u20132264 (2019)","DOI":"10.24963\/ijcai.2019\/313"},{"key":"933_CR15","doi-asserted-by":"crossref","unstructured":"Sun, R., Chen, C., Wang, X., Zhang, Y., Wang, X.: Stable community detection in signed social networks. TKDE (2020)","DOI":"10.1109\/TKDE.2020.3047224"},{"key":"933_CR16","doi-asserted-by":"crossref","unstructured":"Sun, R., Zhu, Q., Chen, C., Wang, X., Zhang, Y., Wang, X.: Discovering cliques in signed networks based on balance theory. In: DASFAA, pp 666\u2013674 (2020)","DOI":"10.1007\/978-3-030-59416-9_43"},{"key":"933_CR17","doi-asserted-by":"crossref","unstructured":"Wang, J., Cheng, J.: Truss decomposition in massive networks. Proc VLDB Endow (2012)","DOI":"10.14778\/2311906.2311909"},{"issue":"2","key":"933_CR18","first-page":"243","volume":"29","author":"X Wang","year":"2016","unstructured":"Wang, X., Zhang, Y., Zhang, W., Lin, X., Chen, C.: Bring order into the samples: A novel scalable method for influence maximization. TKDE 29(2), 243\u2013256 (2016)","journal-title":"TKDE"},{"key":"933_CR19","doi-asserted-by":"crossref","unstructured":"Xiao, D., Cui, Y., Cline, D. B., Loguinov, D.: On asymptotic cost of triangle listing in random graphs. In: PODS (2017)","DOI":"10.1145\/3034786.3034790"},{"issue":"1s","key":"933_CR20","first-page":"1","volume":"17","author":"C Zhang","year":"2021","unstructured":"Zhang, C., Song, J., Zhu, X., Zhu, L., Zhang, S.: Hcmsl: Hybrid cross-modal similarity learning for cross-modal retrieval. TOMM 17(1s), 1\u201322 (2021)","journal-title":"TOMM"},{"issue":"1","key":"933_CR21","first-page":"78","volume":"32","author":"F Zhang","year":"2018","unstructured":"Zhang, F., Li, C., Zhang, Y., Qin, L., Zhang, W.: Finding critical users in social communities: The collapsed core and truss problems. TKDE 32 (1), 78\u201391 (2018)","journal-title":"TKDE"},{"issue":"6","key":"933_CR22","first-page":"649","volume":"10","author":"F Zhang","year":"2017","unstructured":"Zhang, F., Zhang, W., Zhang, Y., Qin, L., Lin, X.: Olak: an efficient algorithm to prevent unraveling in social networks. PVLDB 10 (6), 649\u2013660 (2017)","journal-title":"PVLDB"},{"key":"933_CR23","doi-asserted-by":"crossref","unstructured":"Zhao, J., Sun, R., Zhu, Q., Wang, X., Chen, C.: Community identification in signed networks: A k-truss based model. In: CIKM, pp 2321\u20132324 (2020)","DOI":"10.1145\/3340531.3412117"},{"issue":"1","key":"933_CR24","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/s00778-017-0487-0","volume":"27","author":"X Zhao","year":"2018","unstructured":"Zhao, X., Xiao, C., Lin, X., Zhang, W., Wang, Y.: Efficient structure similarity searches: a partition-based approach. VLDB J. 27(1), 53\u201378 (2018)","journal-title":"VLDB J."},{"issue":"4","key":"933_CR25","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1109\/MMUL.2020.3015764","volume":"27","author":"L Zhu","year":"2020","unstructured":"Zhu, L., Song, J., Zhu, X., Zhang, C., Zhang, S., Yuan, X.: Adversarial learning-based semantic correlation representation for cross-modal retrieval. IEEE MultiMedia 27(4), 79\u201390 (2020)","journal-title":"IEEE MultiMedia"},{"key":"933_CR26","doi-asserted-by":"crossref","unstructured":"Zhu, L., Zhang, C., Song, J., Liu, L., Zhang, S., Li, Y.: Multi-graph based hierarchical semantic fusion for cross-modal representation. In: ICME, pp. 1\u20136 (2021)","DOI":"10.1109\/ICME51207.2021.9428194"},{"key":"933_CR27","doi-asserted-by":"crossref","unstructured":"Zhu, Q., Zheng, J., Yang, H., Chen, C., Wang, X., Zhang, Y.: Hurricane in bipartite graphs: The lethal nodes of butterflies. In: SSDBM, pp. 1\u20134 (2020)","DOI":"10.1145\/3400903.3400916"},{"key":"933_CR28","doi-asserted-by":"crossref","unstructured":"Zhu, W., Chen, C., Wang, X., Lin, X.: K-core minimization: An edge manipulation approach. In: CIKM (2018)","DOI":"10.1145\/3269206.3269254"},{"key":"933_CR29","doi-asserted-by":"crossref","unstructured":"Zhu, W., Zhang, M., Chen, C., Wang, X., Zhang, F., Lin, X.: Pivotal relationship identification: The k-truss minimization problem. In: IJCAI, pp. 4874\u20134880 (2019)","DOI":"10.24963\/ijcai.2019\/677"}],"container-title":["World Wide Web"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-021-00933-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11280-021-00933-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-021-00933-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T11:17:55Z","timestamp":1646133475000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11280-021-00933-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,2]]},"references-count":29,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["933"],"URL":"https:\/\/doi.org\/10.1007\/s11280-021-00933-z","relation":{},"ISSN":["1386-145X","1573-1413"],"issn-type":[{"value":"1386-145X","type":"print"},{"value":"1573-1413","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8,2]]},"assertion":[{"value":"21 March 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 July 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 July 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 August 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}