{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T08:37:00Z","timestamp":1771576620476,"version":"3.50.1"},"reference-count":8,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,3,6]],"date-time":"2020-03-06T00:00:00Z","timestamp":1583452800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,3,6]],"date-time":"2020-03-06T00:00:00Z","timestamp":1583452800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1007\/s11432-017-9701-0","type":"journal-article","created":{"date-parts":[[2020,3,9]],"date-time":"2020-03-09T14:03:19Z","timestamp":1583762599000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Inferring explicit and implicit social ties simultaneously in mobile social networks"],"prefix":"10.1007","volume":"63","author":[{"given":"Guojie","family":"Song","sequence":"first","affiliation":[]},{"given":"Yuanhao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Junshan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Lun","family":"Du","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,6]]},"reference":[{"key":"9701_CR1","doi-asserted-by":"publisher","first-page":"15274","DOI":"10.1073\/pnas.0900282106","volume":"106","author":"N Eagle","year":"2009","unstructured":"Eagle N, Pentland A, Lazer D. From the cover: inferring friendship network structure by using mobile phone data. Proc Natl Acad Sci USA, 2009, 106: 15274\u201315278","journal-title":"Proc Natl Acad Sci USA"},{"key":"9701_CR2","doi-asserted-by":"crossref","unstructured":"Wang D S, Pedreschi D, Song C M, et al. Human mobility, social ties, and link prediction. In: Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2011. 1100\u20131108","DOI":"10.1145\/2020408.2020581"},{"key":"9701_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3201577","volume":"12","author":"T Qin","year":"2018","unstructured":"Qin T, Shangguan W F, Song G, et al. Spatio-temporal routine mining on mobile phone data. ACM Trans Knowl Discov Data, 2018, 12: 1\u201324","journal-title":"ACM Trans Knowl Discov Data"},{"key":"9701_CR4","doi-asserted-by":"crossref","unstructured":"Tang J, Lou T C, Kleinberg J. Inferring social ties across heterogenous networks. In: Proceedings of the 5th ACM International Conference on Web Search and Data Mining, 2012. 743\u2013752","DOI":"10.1145\/2124295.2124382"},{"key":"9701_CR5","doi-asserted-by":"crossref","unstructured":"Tang W B, Zhuang H L, Tang J. Learning to infer social ties in large networks. In: Proceedings of Joint European Conference on Machine Learning and Knowledge Discovery in Databases, Berlin, 2011. 381\u2013397","DOI":"10.1007\/978-3-642-23808-6_25"},{"key":"9701_CR6","doi-asserted-by":"publisher","first-page":"092105","DOI":"10.1007\/s11432-015-0899-6","volume":"60","author":"Y Qin","year":"2017","unstructured":"Qin Y, Yu Z T, Wang Y B, et al. Detecting micro-blog user interest communities through the integration of explicit user relationship and implicit topic relations. Sci China Inf Sci, 2017, 60: 092105","journal-title":"Sci China Inf Sci"},{"key":"9701_CR7","first-page":"43","volume":"24","author":"V E Krebs","year":"2002","unstructured":"Krebs V E. Mapping networks of terrorist cells. Connections, 2002, 24: 43\u201352","journal-title":"Connections"},{"key":"9701_CR8","doi-asserted-by":"crossref","unstructured":"Taheri S M, Mahyar H, Firouzi M, et al. Extracting implicit social relation for social recommendation techniques in user rating prediction. In: Proceedings of the 26th International Conference on World Wide Web Companion, 2017. 1343\u20131351","DOI":"10.1145\/3041021.3051153"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-017-9701-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11432-017-9701-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-017-9701-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,11]],"date-time":"2023-04-11T14:42:35Z","timestamp":1681224155000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11432-017-9701-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,6]]},"references-count":8,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,4]]}},"alternative-id":["9701"],"URL":"https:\/\/doi.org\/10.1007\/s11432-017-9701-0","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3,6]]},"assertion":[{"value":"12 February 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 June 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 October 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 March 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"149101"}}