{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T19:16:53Z","timestamp":1774639013319,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2022,2,10]],"date-time":"2022-02-10T00:00:00Z","timestamp":1644451200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,2,10]],"date-time":"2022-02-10T00:00:00Z","timestamp":1644451200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Optim Lett"],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1007\/s11590-022-01853-1","type":"journal-article","created":{"date-parts":[[2022,2,10]],"date-time":"2022-02-10T03:03:48Z","timestamp":1644462228000},"page":"1563-1586","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["Modeling the spread of infectious diseases through influence maximization"],"prefix":"10.1007","volume":"16","author":[{"given":"Shunyu","family":"Yao","sequence":"first","affiliation":[]},{"given":"Neng","family":"Fan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6270-1510","authenticated-orcid":false,"given":"Jie","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,10]]},"reference":[{"key":"1853_CR1","first-page":"700","volume":"115.772","author":"WO Kermack","year":"1927","unstructured":"Kermack, W.O., McKendrick, A.G.: A contribution to the mathematical theory of epidemics. Proc. R. Soc. Lond. Ser. A Contain. Pap. Math. Phys. Character 115.772, 700\u2013721 (1927)","journal-title":"Proc. R. Soc. Lond. Ser. A Contain. Pap. Math. Phys. Character"},{"issue":"2","key":"1853_CR2","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1111\/j.1365-2664.2007.01439.x","volume":"45","author":"D Eisinger","year":"2008","unstructured":"Eisinger, D., Thulke, H.-H.: Spatial pattern formation facilitates eradication of infectious diseases. J. Appl. Ecol. 45(2), 415 (2008)","journal-title":"J. Appl. Ecol."},{"key":"1853_CR3","doi-asserted-by":"crossref","unstructured":"Adam, D.: Special report: the simulations driving the world\u2019s response to COVID-19. Nature 580(7803), 316 (2020)","DOI":"10.1038\/d41586-020-01003-6"},{"key":"1853_CR4","doi-asserted-by":"publisher","first-page":"109846","DOI":"10.1016\/j.chaos.2020.109846","volume":"135","author":"F Ndairou","year":"2020","unstructured":"Ndairou, F., Area, I., Nieto, J.J., Torres, D.F.: Mathematical modeling of COVID-19 transmission dynamics with a case study of Wuhan. Chaos Solitons Fractals 135, 109846 (2020)","journal-title":"Chaos Solitons Fractals"},{"key":"1853_CR5","doi-asserted-by":"publisher","first-page":"855","DOI":"10.1038\/s41591-020-0883-7","volume":"26","author":"G Giordano","year":"2020","unstructured":"Giordano, G., Blanchini, F., Bruno, R., Colaneri, P., Di Filippo, A., Di Matteo, A., Colaneri, M.: Modelling the COVID-19 epidemic and implementation of population-wide interventions in Italy. Nat. Med. 26, 855\u2013860 (2020)","journal-title":"Nat. Med."},{"key":"1853_CR6","doi-asserted-by":"publisher","first-page":"105303","DOI":"10.1016\/j.cnsns.2020.105303","volume":"88","author":"B Ivorra","year":"2020","unstructured":"Ivorra, B., Ferr\u00e1ndez, M.R., Vela-P\u00e9rez, M., Ramos, A.: Mathematical modeling of the spread of the coronavirus disease 2019 (COVID-19) taking into account the undetected infections. The case of China. Commun. Nonlinear Sci. Numer. Simul. 88, 105303 (2020)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"1853_CR7","doi-asserted-by":"publisher","first-page":"E168","DOI":"10.1017\/S0950268820001727","volume":"148","author":"X Ma","year":"2020","unstructured":"Ma, X., Ng, M., Xu, S., Xu, Z., Qiu, H., Liu, Y., Lyu, J., You, J., Zhao, P., Wang, S., et al.: Development and validation of prognosis model of mortality risk in patients with COVID-19. Epidemiol. Infect. 148, E168 (2020)","journal-title":"Epidemiol. Infect."},{"key":"1853_CR8","doi-asserted-by":"publisher","first-page":"E123","DOI":"10.1017\/S0950268820001405","volume":"148","author":"G Sousa","year":"2020","unstructured":"Sousa, G., Garces, T., Cestari, V., Florencio, R., Moreira, T., Pereira, M.: Mortality and survival of COVID-19. Epidemiol. Infect. 148, E123 (2020)","journal-title":"Epidemiol. Infect."},{"key":"1853_CR9","doi-asserted-by":"crossref","unstructured":"Kempe, D., Kleinberg, J., Tardos, \u00c9.: Maximizing the spread of influence through a social net-work. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 137\u2013146 (2003)","DOI":"10.1145\/956750.956769"},{"issue":"6","key":"1853_CR10","doi-asserted-by":"publisher","first-page":"1420","DOI":"10.1086\/226707","volume":"83","author":"M Granovetter","year":"1978","unstructured":"Granovetter, M.: Threshold models of collective behavior. Am. J. Sociol. 83(6), 1420\u20131443 (1978)","journal-title":"Am. J. Sociol."},{"key":"1853_CR11","volume-title":"Micromotives and Macrobehavior","author":"TC Schelling","year":"2006","unstructured":"Schelling, T.C.: Micromotives and Macrobehavior. WW Norton & Company, New York (2006)"},{"issue":"3","key":"1853_CR12","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1023\/A:1011122126881","volume":"12","author":"J Goldenberg","year":"2001","unstructured":"Goldenberg, J., Libai, B., Muller, E.: Talk of the network: a complex systems look at the underlying process of word-of-mouth. Mark. Lett. 12(3), 211\u2013223 (2001)","journal-title":"Mark. Lett."},{"key":"1853_CR13","unstructured":"Chen, W., Lu, W., Zhang, N.: Time-critical influence maximization in social networks with time-delayed diffusion process. In: Proceedings of the twenty-sixth AAAI conference on artificial intelligence. AAAI\u201912, pp. 592\u2013598. AAAI Press, Toronto, Ontario, Canada (2012)"},{"key":"1853_CR14","doi-asserted-by":"crossref","unstructured":"Liu, B., Cong, G., Xu, D., Zeng, Y.: Time constrained influence maximization in social networks. In: 2012 IEEE 12th International Conference on Data Mining, pp 439\u2013448. IEEE (2012)","DOI":"10.1109\/ICDM.2012.158"},{"issue":"4","key":"1853_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-031-01850-3","volume":"5","author":"W Chen","year":"2013","unstructured":"Chen, W., Lakshmanan, L.V., Castillo, C.: Information and influence propagation in social networks. Synth. Lect. Data Manag. 5(4), 1\u2013177 (2013)","journal-title":"Synth. Lect. Data Manag."},{"key":"1853_CR16","doi-asserted-by":"crossref","unstructured":"Leskovec, J., Krause, A., Guestrin, C., Faloutsos, C., VanBriesen, J., Glance, N.: Cost-effective outbreak detection in networks. In: Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 420\u2013429 (2007)","DOI":"10.1145\/1281192.1281239"},{"key":"1853_CR17","doi-asserted-by":"crossref","unstructured":"Budak, C., Agrawal, D., El Abbadi, A.: Limiting the spread of misinformation in social networks. In: Proceedings of the 20th International Conference on World Wide Web, pp. 665\u2013674 (2011)","DOI":"10.1145\/1963405.1963499"},{"key":"1853_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/s11590-021-01733-0","author":"CV Pham","year":"2021","unstructured":"Pham, C.V., Pham, D.V., Bui, B.Q., Nguyen, A.V.: Minimum budget for misinformation detection in online social networks with provable guarantees. Optim. Lett. (2021). https:\/\/doi.org\/10.1007\/s11590-021-01733-0","journal-title":"Optim. Lett."},{"key":"1853_CR19","doi-asserted-by":"crossref","unstructured":"Ye, M., Liu, X., Lee, W.-C.: Exploring social influence for recommendation: a generative model approach. In: Proceedings of the 35th International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 671\u2013680 (2012)","DOI":"10.1145\/2348283.2348373"},{"issue":"1","key":"1853_CR20","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/BF01588971","volume":"14","author":"GL Nemhauser","year":"1978","unstructured":"Nemhauser, G.L., Wolsey, L.A., Fisher, M.L.: An analysis of approximations for maximizing submodular set functions-I. Math. Program. 14(1), 265\u2013294 (1978)","journal-title":"Math. Program."},{"key":"1853_CR21","unstructured":"Sheldon, D., Dilkina, B., Elmachtoub, A. N., Finseth, R., Sabharwal, A., Conrad, J., Gomes, C., Shmoys, D., Allen, W., Amundsen, O., Vaughan, W.: Maximizing the spread of cascades using network design. In: Proceedings of the Twenty-Sixth Conference on Uncertainty in Artificial Intelligence. UAI\u201910, pp. 517\u2013526. AUAI Press, Catalina Island, CA (2010). ISBN: 9780974903965"},{"issue":"6","key":"1853_CR22","first-page":"3383","volume":"26","author":"ME Keskin","year":"2018","unstructured":"Keskin, M.E., G\u00fcler, M.G.: Influence maximization in social networks: an integer programming approach. Turk. J. Electr. Eng. Comput. Sci. 26(6), 3383\u20133396 (2018)","journal-title":"Turk. J. Electr. Eng. Comput. Sci."},{"key":"1853_CR23","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1016\/j.ins.2019.07.043","volume":"503","author":"E G\u00fcney","year":"2019","unstructured":"G\u00fcney, E.: An efficient linear programming based method for the influence maximization problem in social networks. Inf. Sci. 503, 589\u2013605 (2019)","journal-title":"Inf. Sci."},{"issue":"3","key":"1853_CR24","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1007\/s40998-019-00178-7","volume":"43","author":"FG Baghbani","year":"2019","unstructured":"Baghbani, F.G., Asadpour, M., Faili, H.: Integer linear programming for influence maximization. Iran. J. Sci. Technol. Trans. Electr. Eng. 43(3), 627\u2013634 (2019)","journal-title":"Iran. J. Sci. Technol. Trans. Electr. Eng."},{"issue":"4","key":"1853_CR25","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1002\/net.21761","volume":"71","author":"CP Gillen","year":"2018","unstructured":"Gillen, C.P., Veremyev, A., Prokopyev, O.A., Pasiliao, E.L.: Critical arcs detection in influence networks. Networks 71(4), 412\u2013431 (2018)","journal-title":"Networks"},{"issue":"10","key":"1853_CR26","doi-asserted-by":"publisher","first-page":"1852","DOI":"10.1109\/TKDE.2018.2807843","volume":"30","author":"Y Li","year":"2018","unstructured":"Li, Y., Fan, J., Wang, Y., Tan, K.-L.: Influence maximization on social graphs: a survey. IEEE Trans. Knowl. Data Eng. 30(10), 1852\u20131872 (2018)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"1853_CR27","doi-asserted-by":"publisher","first-page":"777","DOI":"10.1016\/j.future.2018.07.015","volume":"89","author":"N Sumith","year":"2018","unstructured":"Sumith, N., Annappa, B., Bhattacharya, S.: Influence maximization in large social networks: heuristics, models and parameters. Future Gener. Comput. Syst. 89, 777\u2013790 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"1853_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10115-020-01461-4","volume":"62","author":"S Banerjee","year":"2020","unstructured":"Banerjee, S., Jenamani, M., Pratihar, D.K.: A survey on influence maximization in a social network. Knowl. Inf. Syst. 62, 1\u201339 (2020)","journal-title":"Knowl. Inf. Syst."},{"issue":"2","key":"1853_CR29","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.aci.2017.11.001","volume":"15","author":"JS More","year":"2019","unstructured":"More, J.S., Lingam, C.: A SI model for social media influencer maximization. Appl. Comput. Inform. 15(2), 102\u2013108 (2019)","journal-title":"Appl. Comput. Inform."},{"key":"1853_CR30","doi-asserted-by":"crossref","unstructured":"Luo, W., Tay, W.P.: Identifying multiple infection sources in a network. In: 2012 Conference Record of the Forty Sixth Asilomar Conference on Signals, Systems and Computers (ASILOMAR), pp. 1483\u20131489. IEEE (2012)","DOI":"10.1109\/ACSSC.2012.6489274"},{"key":"1853_CR31","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1016\/j.jocs.2015.05.002","volume":"10","author":"W Zang","year":"2015","unstructured":"Zang, W., Zhang, P., Zhou, C., Guo, L.: Locating multiple sources in social networks under the SIR model: a divide-and-conquer approach. J. Comput. Sci. 10, 278\u2013287 (2015)","journal-title":"J. Comput. Sci."},{"issue":"1","key":"1853_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s12911-020-01281-0","volume":"20","author":"C-H Cheng","year":"2020","unstructured":"Cheng, C.-H., Kuo, Y.-H., Zhou, Z.: Outbreak minimization vs influence maximization: an optimization framework. BMC Med. Inform. Decis. Mak. 20(1), 1\u201313 (2020)","journal-title":"BMC Med. Inform. Decis. Mak."},{"issue":"3","key":"1853_CR33","doi-asserted-by":"publisher","first-page":"036104","DOI":"10.1103\/PhysRevE.65.036104","volume":"65","author":"R Pastor-Satorras","year":"2002","unstructured":"Pastor-Satorras, R., Vespignani, A.: Immunization of complex networks. Phys. Rev. E 65(3), 036104 (2002)","journal-title":"Phys. Rev. E"},{"issue":"24","key":"1853_CR34","doi-asserted-by":"publisher","first-page":"247901","DOI":"10.1103\/PhysRevLett.91.247901","volume":"91","author":"R Cohen","year":"2003","unstructured":"Cohen, R., Havlin, S., Ben-Avraham, D.: Efficient immunization strategies for computer networks and populations. Phys. Rev. Lett. 91(24), 247901 (2003)","journal-title":"Phys. Rev. Lett."},{"issue":"6","key":"1853_CR35","doi-asserted-by":"publisher","first-page":"1345","DOI":"10.1007\/s11590-018-1371-6","volume":"13","author":"M Lalou","year":"2019","unstructured":"Lalou, M., Kheddouci, H.: A polynomial-time algorithm for finding critical nodes in bipartite permutation graphs. Optim. Lett. 13(6), 1345\u20131364 (2019)","journal-title":"Optim. Lett."},{"issue":"11","key":"1853_CR36","doi-asserted-by":"publisher","first-page":"e112018","DOI":"10.1371\/journal.pone.0112018","volume":"9","author":"D Zhao","year":"2014","unstructured":"Zhao, D., Wang, L., Li, S., Wang, Z., Wang, L., Gao, B.: Immunization of epidemics in multiplex networks. PLoS ONE 9(11), e112018 (2014)","journal-title":"PLoS ONE"},{"key":"1853_CR37","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctvcm4gk0","volume-title":"Modeling Infectious Diseases in Humans and Animals","author":"MJ Keeling","year":"2011","unstructured":"Keeling, M.J., Rohani, P.: Modeling Infectious Diseases in Humans and Animals. Princeton University Press, Princeton (2011)"},{"key":"1853_CR38","doi-asserted-by":"crossref","unstructured":"Howard, J., Huang, A., Li, Z., Tufekci, Z., Zdimal, V., van der Westhuizen, H.-M., von Delft, A., Price, A., Fridman, L., Tang, L.-H. et al.: An evidence review of face masks against COVID-19. Proc. Natl. Acad. Sci. 118(4) (2021)","DOI":"10.1073\/pnas.2014564118"},{"issue":"10242","key":"1853_CR39","doi-asserted-by":"publisher","first-page":"1973","DOI":"10.1016\/S0140-6736(20)31142-9","volume":"395","author":"DK Chu","year":"2020","unstructured":"Chu, D.K., Akl, E.A., Duda, S., Solo, K., Yaacoub, S., Sch\u00fcnemann, H.J., El-harakeh, A., Bognanni, A., Lotfi, T., Loeb, M., et al.: Physical distancing, face masks, and eye protection to prevent person-to person transmission of SARS-CoV-2 and COVID-19: a systematic review and meta-analysis. Lancet 395(10242), 1973\u20131987 (2020)","journal-title":"Lancet"},{"issue":"10","key":"1853_CR40","doi-asserted-by":"publisher","first-page":"998","DOI":"10.1001\/jama.2021.1505","volume":"325","author":"JT Brooks","year":"2021","unstructured":"Brooks, J.T., Butler, J.C.: Effectiveness of mask wearing to control community spread of SARSCoV-2. JAMA 325(10), 998\u2013999 (2021)","journal-title":"JAMA"},{"issue":"5","key":"1853_CR41","doi-asserted-by":"publisher","first-page":"1205","DOI":"10.1016\/j.dsx.2020.07.004","volume":"14","author":"MP Barman","year":"2020","unstructured":"Barman, M.P., Rahman, T., Bora, K., Borgohain, C.: COVID-19 pandemic and its recovery time of patients in India: a pilot study. Diabetes Metab. Syndr. Clin. Res. Rev. 14(5), 1205\u20131211 (2020)","journal-title":"Diabetes Metab. Syndr. Clin. Res. Rev."}],"container-title":["Optimization Letters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11590-022-01853-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11590-022-01853-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11590-022-01853-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T11:43:52Z","timestamp":1744199032000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11590-022-01853-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,10]]},"references-count":41,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2022,6]]}},"alternative-id":["1853"],"URL":"https:\/\/doi.org\/10.1007\/s11590-022-01853-1","relation":{},"ISSN":["1862-4472","1862-4480"],"issn-type":[{"value":"1862-4472","type":"print"},{"value":"1862-4480","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,2,10]]},"assertion":[{"value":"6 May 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 January 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 February 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}