{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T04:03:06Z","timestamp":1768449786448,"version":"3.49.0"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,4,13]],"date-time":"2021-04-13T00:00:00Z","timestamp":1618272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,4,13]],"date-time":"2021-04-13T00:00:00Z","timestamp":1618272000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Optim Lett"],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1007\/s11590-021-01733-0","type":"journal-article","created":{"date-parts":[[2021,4,13]],"date-time":"2021-04-13T03:43:46Z","timestamp":1618285426000},"page":"515-544","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Minimum budget for misinformation detection in online social networks with provable guarantees"],"prefix":"10.1007","volume":"16","author":[{"given":"Canh V.","family":"Pham","sequence":"first","affiliation":[]},{"given":"Dung V.","family":"Pham","sequence":"additional","affiliation":[]},{"given":"Bao Q.","family":"Bui","sequence":"additional","affiliation":[]},{"given":"Anh V.","family":"Nguyen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,13]]},"reference":[{"key":"1733_CR1","unstructured":"(2018) Misinformation on social media led to pune violence: Minister. In: https:\/\/www.ndtv.com\/mumbai-news\/misinformation-on-social-media-led-to-pune-violence-minister-1795562. Accessed 22 Nov 2020"},{"key":"1733_CR2","doi-asserted-by":"crossref","unstructured":"Aslay, \u00c7., Barbieri, N., Bonchi, F., Baeza-Yates, R.A.: Online topic-aware influence maximization queries. In: Proceedings of the 17th International Conference on Extending Database Technology, EDBT 2014, Athens, Greece, March 24\u201328, 2014, pp. 295\u2013306 (2014)","DOI":"10.1137\/1.9781611973440.7"},{"key":"1733_CR3","doi-asserted-by":"crossref","unstructured":"Borgs, C., Brautbar, M., Chayes, J.T., Lucier, B.: Maximizing social influence in nearly optimal time. In: Proceedings of the Twenty-Fifth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2014, Portland, Oregon, USA, January 5\u20137, 2014, pp. 946\u2013957 (2014)","DOI":"10.1137\/1.9781611973402.70"},{"key":"1733_CR4","doi-asserted-by":"crossref","unstructured":"Budak, C., Agrawal, D., El Abbadi, A.: Limiting the spread of misinformation in social networks. In: Proceedings of the 20th International Conference on World Wide Web, WWW 2011, Hyderabad, India, March 28\u2013April 1, 2011, pp. 665\u2013674 (2011)","DOI":"10.1145\/1963405.1963499"},{"key":"1733_CR5","doi-asserted-by":"crossref","unstructured":"Castillo, C., Mendoza, M., Poblete, B.: Information credibility on twitter. In: Proceedings of the 20th International Conference on World Wide Web, WWW 2011, Hyderabad, India, March 28\u2013April 1, 2011, pp. 675\u2013684 (2011)","DOI":"10.1145\/1963405.1963500"},{"key":"1733_CR6","doi-asserted-by":"crossref","unstructured":"Chen, T., Li, X., Yin, H., Zhang, J.: Call attention to rumors: Deep attention based recurrent neural networks for early rumor detection. In: Trends and Applications in Knowledge Discovery and Data Mining\u2014PAKDD 2018 Workshops, BDASC, BDM, ML4Cyber, PAISI, DaMEMO, Melbourne, VIC, Australia, June 3, 2018, Revised Selected Papers, pp. 40\u201352 (2018)","DOI":"10.1007\/978-3-030-04503-6_4"},{"key":"1733_CR7","doi-asserted-by":"crossref","unstructured":"Chen, W., Wang, C., Wang, Y.: Scalable influence maximization for prevalent viral marketing in large-scale social networks. In: Rao, B., Krishnapuram, B., Tomkins, A., Yang, Q. (eds) Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, July 25\u201328, 2010, ACM, pp. 1029\u20131038 (2010a)","DOI":"10.1145\/1835804.1835934"},{"key":"1733_CR8","doi-asserted-by":"crossref","unstructured":"Chen, W., Yuan, Y., Zhang, L.: Scalable influence maximization in social networks under the linear threshold model. In: ICDM 2010, The 10th IEEE International Conference on Data Mining, Sydney, Australia, 14\u201317 December 2010, pp. 88\u201397 (2010b)","DOI":"10.1109\/ICDM.2010.118"},{"key":"1733_CR9","doi-asserted-by":"crossref","unstructured":"Chen, W., Lu, W., Zhang, N.: Time-critical influence maximization in social networks with time-delayed diffusion process. In: Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, July 22\u201326: Toronto. Ontario, Canada (2012)","DOI":"10.1609\/aaai.v26i1.8204"},{"key":"1733_CR10","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1371\/journal.pone.0012948","volume":"5","author":"NA Christakis","year":"2010","unstructured":"Christakis, N.A., Fowler, J.H., Sporns, O.: Social network sensors for early detection of contagious outbreaks. PLoS ONE 5, 9 (2010)","journal-title":"PLoS ONE"},{"issue":"1","key":"1733_CR11","first-page":"79","volume":"3","author":"FRK Chung","year":"2006","unstructured":"Chung, F.R.K., Lu, L.: Survey: concentration inequalities and martingale inequalities\u2013a survey. Int. Math. 3(1), 79\u2013127 (2006)","journal-title":"Int. Math."},{"key":"1733_CR12","doi-asserted-by":"crossref","unstructured":"Cui, P., Jin, S., Yu, L., Wang, F., Zhu, W., Yang, S.: Cascading outbreak prediction in networks: a data-driven approach. In: The 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2013, Chicago, IL, USA, August 11\u201314, 2013, pp. 901\u2013909 (2013)","DOI":"10.1145\/2487575.2487639"},{"key":"1733_CR13","unstructured":"Domm, P.: False rumor of explosion at white house causes stocks to briefly plunge; ap confirms its twitter feed was hacked (2013). https:\/\/www.cnbc.com\/id\/100646197. Accessed 22 Nov 2020"},{"key":"1733_CR14","unstructured":"Du, N., Song, L., Gomez-Rodriguez, M., Zha, H.: Scalable influence estimation in continuous-time diffusion networks. In: Advances in Neural Information Processing Systems 26: 27th Annual Conference on Neural Information Processing Systems. Proceedings of a Meeting Held December 5\u20138, 2013, pp. 3147\u20133155. Lake Tahoe, Nevada, United States (2013)"},{"key":"1733_CR15","doi-asserted-by":"crossref","unstructured":"Fan, J., Qiu, J., Li, Y., Meng, Q., Zhang, D., Li, G., Tan, K., Du, X.: OCTOPUS: an online topic-aware influence analysis system for social networks. In: 34th IEEE International Conference on Data Engineering, ICDE 2018, Paris, France, April 16\u201319, 2018, pp. 1569\u20131572 (2018)","DOI":"10.1109\/ICDE.2018.00178"},{"issue":"4","key":"1733_CR16","doi-asserted-by":"publisher","first-page":"634","DOI":"10.1145\/285055.285059","volume":"45","author":"U Feige","year":"1998","unstructured":"Feige, U.: A threshold of ln n for approximating set cover. J. ACM 45(4), 634\u2013652 (1998)","journal-title":"J. ACM"},{"key":"1733_CR17","doi-asserted-by":"crossref","unstructured":"Gomez-Rodriguez, M., Song, L., Du, N., Zha, H., Sch\u00f6lkopf, B.: Influence estimation and maximization in continuous-time diffusion networks. ACM Trans. Inf. Syst. 34(2), 9:1-9:33 (2016)","DOI":"10.1145\/2824253"},{"issue":"2","key":"1733_CR18","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/s13278-012-0062-z","volume":"3","author":"A Goyal","year":"2013","unstructured":"Goyal, A., Bonchi, F., Lakshmanan, L.V.S., Venkatasubramanian, S.: On minimizing budget and time in influence propagation over social networks. Soc. Netw. Anal. Min. 3(2), 179\u2013192 (2013)","journal-title":"Soc. Netw. Anal. Min."},{"key":"1733_CR19","doi-asserted-by":"crossref","unstructured":"He, X., Song, G., Chen, W., Jiang, Q.: Influence blocking maximization in social networks under the competitive linear threshold model. In: Proceedings of the Twelfth SIAM International Conference on Data Mining, Anaheim, California, USA, April 26\u201328, 2012., pp. 463\u2013474 (2012)","DOI":"10.1137\/1.9781611972825.40"},{"key":"1733_CR20","doi-asserted-by":"crossref","unstructured":"Kempe, D., Kleinberg, J.M., Tardos, \u00c9.: Maximizing the spread of influence through a social network. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 24\u201327, 2003, pp. 137\u2013146 (2003)","DOI":"10.1145\/956750.956769"},{"key":"1733_CR21","doi-asserted-by":"crossref","unstructured":"Khalil, E.B., Dilkina, B.N., Song, L.: Scalable diffusion-aware optimization of network topology. In: The 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD\u201914, New York, NY, USA\u2014August 24\u201327, 2014, pp. 1226\u20131235 (2014)","DOI":"10.1145\/2623330.2623704"},{"issue":"8","key":"1733_CR22","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MC.2009.265","volume":"42","author":"A Krause","year":"2009","unstructured":"Krause, A., Guestrin, C.: Optimizing sensing: from water to the web. IEEE Comput. 42(8), 38\u201345 (2009)","journal-title":"IEEE Comput."},{"key":"1733_CR23","doi-asserted-by":"crossref","unstructured":"Kwon, S., Cha, M., Jung, K., Chen, W., Wang, Y.: Prominent features of rumor propagation in online social media. In: 2013 IEEE 13th International Conference on Data Mining, Dallas, TX, USA, December 7\u201310, 2013, pp. 1103\u20131108 (2013)","DOI":"10.1109\/ICDM.2013.61"},{"issue":"1","key":"1733_CR24","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1145\/1217299.1217301","volume":"1","author":"J Leskovec","year":"2007","unstructured":"Leskovec, J., Kleinberg, J.M., Faloutsos, C.: Graph evolution: densification and shrinking diameters. TKDD 1(1), 2 (2007a)","journal-title":"TKDD"},{"key":"1733_CR25","doi-asserted-by":"crossref","unstructured":"Leskovec, J., Krause, A., Guestrin, C., Faloutsos, C., VanBriesen, J.M., Glance, N.S.: Cost-effective outbreak detection in networks. In: Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Jose, California, USA, August 12\u201315, 2007, pp. 420\u2013429 (2007b)","DOI":"10.1145\/1281192.1281239"},{"key":"1733_CR26","doi-asserted-by":"crossref","unstructured":"Leskovec, J., Huttenlocher, D.P., Kleinberg, J.M.: Predicting positive and negative links in online social networks. In: Proceedings of the 19th International Conference on World Wide Web, WWW 2010, Raleigh, North Carolina, USA, April 26\u201330, 2010, pp. 641\u2013650 (2010a)","DOI":"10.1145\/1772690.1772756"},{"key":"1733_CR27","doi-asserted-by":"crossref","unstructured":"Leskovec, J., Huttenlocher, D.P., Kleinberg, J.M.: Signed networks in social media. In: Proceedings of the 28th International Conference on Human Factors in Computing Systems, CHI 2010, Atlanta, Georgia, USA, April 10\u201315, 2010, pp. 1361\u20131370 (2010b)","DOI":"10.1145\/1753326.1753532"},{"key":"1733_CR28","unstructured":"Li, G., Chen, S., Feng, J., lee Tan, K., WSL.: Efficient location-aware influence maximization. In: 34th IEEE International Conference on Data Engineering, ICDE 2018, Paris, France, April 16\u201319, 2018, pp. 1569\u20131572 (2018)"},{"issue":"10","key":"1733_CR29","first-page":"1070","volume":"8","author":"Y Li","year":"2015","unstructured":"Li, Y., Zhang, D., Tan, K.: Targeted influence maximization for online advertisements. PVLDB 8(10), 1070\u20131081 (2015)","journal-title":"PVLDB"},{"key":"1733_CR30","unstructured":"Luckerson, V.: Fear, misinformation, and social media complicate ebola fight (2014). http:\/\/time.com\/3479254\/ebola-social-media\/. Accessed 22 Nov 2020"},{"key":"1733_CR31","doi-asserted-by":"crossref","unstructured":"Ma, J., Gao, W., Wei, Z., Lu, Y., Wong, K.: Detect rumors using time series of social context information on microblogging websites. In: Proceedings of the 24th ACM International Conference on Information and Knowledge Management, CIKM 2015, Melbourne, VIC, Australia, October 19\u201323, 2015, pp. 1751\u20131754 (2015)","DOI":"10.1145\/2806416.2806607"},{"key":"1733_CR32","unstructured":"Ma, J., Gao, W., Mitra, P., Kwon, S., Jansen, B.J., Wong, K., Cha, M.: Detecting rumors from microblogs with recurrent neural networks. In: Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, IJCAI 2016, New York, NY, USA, 9\u201315 July 2016, pp. 3818\u20133824 (2016)"},{"key":"1733_CR33","doi-asserted-by":"crossref","unstructured":"Ma, J., Gao, W., Wong, K.: Detect rumors in microblog posts using propagation structure via kernel learning. In: Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics, ACL 2017, Vancouver, Canada, July 30\u2013August 4, Volume 1: Long Papers, pp. 708\u2013717 (2017)","DOI":"10.18653\/v1\/P17-1066"},{"key":"1733_CR34","doi-asserted-by":"crossref","unstructured":"Ma, J., Gao, W., Wong, K.: Detect rumor and stance jointly by neural multi-task learning. In: Companion of the The Web Conference 2018 on The Web Conference 2018, WWW 2018, Lyon , France, April 23\u201327, 2018, pp. 585\u2013593 (2018a)","DOI":"10.1145\/3184558.3188729"},{"key":"1733_CR35","doi-asserted-by":"crossref","unstructured":"Ma, J., Gao, W., Wong, K.: Rumor detection on twitter with tree-structured recursive neural networks. In: Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics, ACL 2018, Melbourne, Australia, July 15\u201320, 2018, Volume 1: Long Papers, pp. 1980\u20131989 (2018b)","DOI":"10.18653\/v1\/P18-1184"},{"key":"1733_CR36","doi-asserted-by":"crossref","unstructured":"Nguyen, H.T., Thai, M.T., Dinh, T.N.: Stop-and-stare: Optimal sampling algorithms for viral marketing in billion-scale networks. In: Proceedings of the 2016 International Conference on Management of Data, SIGMOD Conference 2016, San Francisco, CA, USA, June 26\u2013July 01, 2016, pp. 695\u2013710 (2016)","DOI":"10.1145\/2882903.2915207"},{"issue":"4","key":"1733_CR37","doi-asserted-by":"publisher","first-page":"2419","DOI":"10.1109\/TNET.2017.2691544","volume":"25","author":"HT Nguyen","year":"2017","unstructured":"Nguyen, H.T., Thai, M.T., Dinh, T.N.: A billion-scale approximation algorithm for maximizing benefit in viral marketing. IEEE\/ACM Trans. Netw. 25(4), 2419\u20132429 (2017)","journal-title":"IEEE\/ACM Trans. Netw."},{"issue":"7","key":"1733_CR38","doi-asserted-by":"publisher","first-page":"1263","DOI":"10.1109\/TKDE.2019.2904969","volume":"32","author":"HT Nguyen","year":"2020","unstructured":"Nguyen, H.T., Cano, A., Vu, T., Dinh, T.N.: Blocking self-avoiding walks stops cyber-epidemics: a scalable gpu-based approach. IEEE Trans. Knowl. Data Eng. 32(7), 1263\u20131275 (2020)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"10","key":"1733_CR39","doi-asserted-by":"publisher","first-page":"2133","DOI":"10.1016\/j.comnet.2013.04.002","volume":"57","author":"NP Nguyen","year":"2013","unstructured":"Nguyen, N.P., Yan, G., Thai, M.T.: Analysis of misinformation containment in online social networks. Comput. Netw. 57(10), 2133\u20132146 (2013)","journal-title":"Comput. Netw."},{"key":"1733_CR40","unstructured":"Page, L., Brin, S., Motwani, R., Winograd, T.: The pagerank citation ranking: Bringing order to the web. Technical Report 1999-66, Stanford InfoLab, http:\/\/ilpubs.stanford.edu:8090\/422\/, previous number = SIDL-WP-1999-0120 (1999)"},{"key":"1733_CR41","doi-asserted-by":"crossref","unstructured":"Pham, C.V., Dinh, H.M., Nguyen, H.D., Dang, H.T., Hoang, H.X.: Limiting the spread of epidemics within time constraint on online social networks. In: Proceedings of the Eighth International Symposium on Information and Communication Technology, Nha Trang City, Viet Nam, December 7\u20138, 2017, pp. 262\u2013269 (2017)","DOI":"10.1145\/3155133.3155157"},{"issue":"4","key":"1733_CR42","doi-asserted-by":"publisher","first-page":"1202","DOI":"10.1007\/s10878-018-0252-3","volume":"35","author":"CV Pham","year":"2018","unstructured":"Pham, C.V., Thai, M.T., Duong, H.V., Bui, B.Q., Hoang, H.X.: Maximizing misinformation restriction within time and budget constraints. J. Comb. Optim. 35(4), 1202\u20131240 (2018)","journal-title":"J. Comb. Optim."},{"key":"1733_CR43","first-page":"11","volume":"9","author":"CV Pham","year":"2019","unstructured":"Pham, C.V., Duong, H.V., Hoang, H.X., Thai, M.T.: Competitive influence maximization within time and budget constraints in online social networks: an algorithmic approach. Appl. Sci. 9, 11 (2019)","journal-title":"Appl. Sci."},{"key":"1733_CR44","unstructured":"Qazvinian, V., Rosengren, E., Radev, D.R., Mei, Q.: Rumor has it: Identifying misinformation in microblogs. In: Proceedings of the 2011 Conference on Empirical Methods in Natural Language Processing, EMNLP 2011, 27\u201331 July 2011, John McIntyre Conference Centre, Edinburgh, UK, A meeting of SIGDAT, a Special Interest Group of the ACL, pp. 1589\u20131599 (2011)"},{"key":"1733_CR45","unstructured":"Ruchansky, N., Seo, S., Liu, Y.: CSI: A hybrid deep model for fake news detection. In: Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, CIKM 2017, Singapore, November 06\u201310, 2017, pp. 797\u2013806 (2017)"},{"key":"1733_CR46","unstructured":"Smith, K.: Marketing: 115 amazing social media statistics and facts. In: https:\/\/www.brandwatch.com\/blog\/96-amazing-social-media-statistics-and-facts\/ (2018)"},{"key":"1733_CR47","doi-asserted-by":"crossref","unstructured":"Tang, J., Tang, X., Xiao, X., Yuan, J.: Online processing algorithms for influence maximization. In: Das G, Jermaine CM, Bernstein PA (eds) Proceedings of the 2018 International Conference on Management of Data, SIGMOD Conference 2018, Houston, TX, USA, June 10\u201315, 2018, ACM, pp. 991\u20131005 (2018)","DOI":"10.1145\/3183713.3183749"},{"key":"1733_CR48","doi-asserted-by":"crossref","unstructured":"Tang, Y., Xiao, X., Shi, Y.: Influence maximization: near-optimal time complexity meets practical efficiency. In: International Conference on Management of Data, SIGMOD 2014, Snowbird, UT, USA, June 22\u201327, 2014, pp. 75\u201386 (2014)","DOI":"10.1145\/2588555.2593670"},{"key":"1733_CR49","doi-asserted-by":"crossref","unstructured":"Tang, Y., Shi, Y., Xiao, X.: Influence maximization in near-linear time: A martingale approach. In: Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, Melbourne, Victoria, Australia, May 31\u2013June 4, 2015, pp. 1539\u20131554 (2015)","DOI":"10.1145\/2723372.2723734"},{"issue":"3","key":"1733_CR50","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1109\/TKDE.2016.2633472","volume":"29","author":"X Wang","year":"2017","unstructured":"Wang, X., Zhang, Y., Zhang, W., Lin, X.: Efficient distance-aware influence maximization in geo-social networks. IEEE Trans. Knowl. Data Eng. 29(3), 599\u2013612 (2017)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"1733_CR51","doi-asserted-by":"crossref","unstructured":"Yin, H., Benson, A.R., Leskovec, J., Gleich, D.F.: Local higher-order graph clustering. In: Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, August 13\u201317, 2017, pp. 555\u2013564 (2017)","DOI":"10.1145\/3097983.3098069"},{"key":"1733_CR52","doi-asserted-by":"crossref","unstructured":"Zhang, H., Alim, M.A., Thai, M.T., Nguyen, H.T.: Monitor placement to timely detect misinformation in online social networks. In: 2015 IEEE International Conference on Communications, ICC 2015, London, United Kingdom, June 8\u201312, 2015, pp. 1152\u20131157 (2015)","DOI":"10.1109\/ICC.2015.7248478"},{"key":"1733_CR53","doi-asserted-by":"crossref","unstructured":"Zhang, H., Alim, M.A., Li, X., Thai, M.T., Nguyen, H.T.: Misinformation in online social networks: detect them all with a limited budget. ACM Trans. Inf. Syst. 34(3), 18:1-18:24 (2016a)","DOI":"10.1145\/2885494"},{"key":"1733_CR54","doi-asserted-by":"crossref","unstructured":"Zhang, H., Kuhnle, A., Zhang, H., Thai, M.T.: Detecting misinformation in online social networks before it is too late. In: 2016 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2016, San Francisco, CA, USA, August 18\u201321, 2016, pp. 541\u2013548 (2016b)","DOI":"10.1109\/ASONAM.2016.7752288"},{"key":"1733_CR55","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Prakash, B.A.: Data-aware vaccine allocation over large networks. ACM Trans. Knowl. Discov. Data 10(2), 20:1-20:32 (2015)","DOI":"10.1145\/2803176"}],"container-title":["Optimization Letters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11590-021-01733-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11590-021-01733-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11590-021-01733-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,24]],"date-time":"2022-12-24T04:03:27Z","timestamp":1671854607000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11590-021-01733-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,13]]},"references-count":55,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["1733"],"URL":"https:\/\/doi.org\/10.1007\/s11590-021-01733-0","relation":{},"ISSN":["1862-4472","1862-4480"],"issn-type":[{"value":"1862-4472","type":"print"},{"value":"1862-4480","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,13]]},"assertion":[{"value":"20 October 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 April 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 April 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}