{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,13]],"date-time":"2026-05-13T03:45:05Z","timestamp":1778643905088,"version":"3.51.4"},"reference-count":110,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,12,28]],"date-time":"2024-12-28T00:00:00Z","timestamp":1735344000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,28]],"date-time":"2024-12-28T00:00:00Z","timestamp":1735344000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No.61876186"],"award-info":[{"award-number":["No.61876186"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Project of Xuzhou Science and Technology","award":["No.KC21300"],"award-info":[{"award-number":["No.KC21300"]}]},{"name":"Graduate Innovation Program of China University of Mining and Technology","award":["No. 2023WLKXJ177"],"award-info":[{"award-number":["No. 2023WLKXJ177"]}]},{"name":"Postgraduate Research & Practice Innovation Program of Jiangsu Province","award":["No. KYCX23_2726"],"award-info":[{"award-number":["No. KYCX23_2726"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Evolving Systems"],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s12530-024-09640-2","type":"journal-article","created":{"date-parts":[[2024,12,28]],"date-time":"2024-12-28T05:23:27Z","timestamp":1735363407000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Meta-heuristic algorithms for influence maximization: a survey"],"prefix":"10.1007","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1240-1314","authenticated-orcid":false,"given":"Chencheng","family":"Fan","sequence":"first","affiliation":[]},{"given":"Zhixiao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jiayu","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Xianfeng","family":"Meng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,28]]},"reference":[{"key":"9640_CR1","doi-asserted-by":"crossref","unstructured":"Aggarwal CC, Lin S, Yu PS (2012) On influential node discovery in dynamic social networks. In: Proceedings of the 2012 SIAM International Conference on data mining, pp 636\u2013647. SIAM","DOI":"10.1137\/1.9781611972825.55"},{"key":"9640_CR2","doi-asserted-by":"publisher","first-page":"2437","DOI":"10.1007\/s00607-021-00945-7","volume":"103","author":"Z Aghaee","year":"2021","unstructured":"Aghaee Z, Ghasemi MM, Beni HA, Bouyer A, Fatemi A (2021) A survey on meta-heuristic algorithms for the influence maximization problem in the social networks. Computing 103:2437\u20132477","journal-title":"Computing"},{"key":"9640_CR3","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.swevo.2011.08.001","volume":"2","author":"R Akbari","year":"2012","unstructured":"Akbari R, Hedayatzadeh R, Ziarati K, Hassanizadeh B (2012) A multi-objective artificial bee colony algorithm. Swarm Evol Comput 2:39\u201352","journal-title":"Swarm Evol Comput"},{"key":"9640_CR4","doi-asserted-by":"crossref","unstructured":"Arora A, Galhotra S, Ranu S (2017) Debunking the myths of influence maximization: an in-depth benchmarking study. In: Proceedings of the 2017 ACM International Conference on Management of Data, pp 651\u2013666","DOI":"10.1145\/3035918.3035924"},{"key":"9640_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.compstruc.2016.03.001","volume":"169","author":"A Askarzadeh","year":"2016","unstructured":"Askarzadeh A (2016) A novel metaheuristic method for solving constrained engineering optimization problems: crow search algorithm. Comput Struct 169:1\u201312","journal-title":"Comput Struct"},{"key":"9640_CR6","unstructured":"Aslay C, Barbieri N, Bonchi F, Baeza-Yates R (2014) Online topic-aware influence maximization queries. In: EDBT, pp 295\u2013306"},{"key":"9640_CR7","doi-asserted-by":"publisher","first-page":"3417","DOI":"10.1007\/s10115-020-01461-4","volume":"62","author":"S Banerjee","year":"2020","unstructured":"Banerjee S, Jenamani M, Pratihar DK (2020) A survey on influence maximization in a social network. Knowl Inf Syst 62:3417\u20133455","journal-title":"Knowl Inf Syst"},{"key":"9640_CR8","doi-asserted-by":"crossref","unstructured":"Bharathi S, Kempe D, Salek M (2007) Competitive influence maximization in social networks. In: Internet and Network Economics: Third International Workshop, WINE 2007, San Diego, CA, USA, December 12-14, 2007. Proceedings 3, pp 306\u2013311. Springer","DOI":"10.1007\/978-3-540-77105-0_31"},{"key":"9640_CR9","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.ins.2020.12.048","volume":"556","author":"TK Biswas","year":"2021","unstructured":"Biswas TK, Abbasi A, Chakrabortty RK (2021) An mcdm integrated adaptive simulated annealing approach for influence maximization in social networks. Inf Sci 556:27\u201348","journal-title":"Inf Sci"},{"key":"9640_CR10","doi-asserted-by":"crossref","unstructured":"Borodin A, Filmus Y, Oren J (2010) Threshold models for competitive influence in social networks. In: Internet and Network Economics: 6th International Workshop, WINE 2010, Stanford, CA, USA, December 13-17, 2010. Proceedings 6, pp 539\u2013550. Springer","DOI":"10.1007\/978-3-642-17572-5_48"},{"key":"9640_CR11","doi-asserted-by":"crossref","unstructured":"Bucur D, Iacca G, Marcelli A, Squillero G, Tonda A (2017) Multi-objective evolutionary algorithms for influence maximization in social networks. In: Applications of Evolutionary Computation: 20th European Conference, EvoApplications 2017, Amsterdam, The Netherlands, April 19-21, 2017, Proceedings, Part I 20, pp 221\u2013233. Springer","DOI":"10.1007\/978-3-319-55849-3_15"},{"key":"9640_CR12","doi-asserted-by":"crossref","unstructured":"Bucur D, Iacca G, Marcelli A, Squillero G, Tonda A (2018) Improving multi-objective evolutionary influence maximization in social networks. In: Applications of Evolutionary Computation: 21st International Conference, EvoApplications 2018, Parma, Italy, April 4-6, 2018, Proceedings 21, pp 117\u2013124. Springer","DOI":"10.1007\/978-3-319-77538-8_9"},{"key":"9640_CR13","doi-asserted-by":"crossref","unstructured":"Carnes T, Nagarajan C, Wild SM, van Zuylen A (2007) Maximizing influence in a competitive social network: a follower\u2019s perspective. In: Proceedings of the Ninth International Conference on Electronic Commerce, pp 351\u2013360","DOI":"10.1145\/1282100.1282167"},{"key":"9640_CR14","doi-asserted-by":"crossref","unstructured":"Chen W, Wang Y, Yang S (2009) Efficient influence maximization in social networks. In: Proceedings of the 15th ACM SIGKDD International Conference on knowledge discovery and data mining, pp 199\u2013208","DOI":"10.1145\/1557019.1557047"},{"key":"9640_CR15","doi-asserted-by":"crossref","unstructured":"Chen W, Yuan Y, Zhang L (2010) Scalable influence maximization in social networks under the linear threshold model. In: 2010 IEEE International Conference on Data Mining, pp 88\u201397. IEEE","DOI":"10.1109\/ICDM.2010.118"},{"issue":"4","key":"9640_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-031-01850-3","volume":"5","author":"W Chen","year":"2013","unstructured":"Chen W, Lakshmanan LV, Castillo C (2013) Information and influence propagation in social networks. Synth Lect Data Manag 5(4):1\u2013177","journal-title":"Synth Lect Data Manag"},{"issue":"1","key":"9640_CR17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s40649-016-0026-y","volume":"3","author":"W Chen","year":"2016","unstructured":"Chen W, Lin T, Yang C (2016) Real-time topic-aware influence maximization using preprocessing. Comput Sco Net 3(1):1\u201319","journal-title":"Comput Sco Netw"},{"key":"9640_CR18","volume-title":"Evolutionary algorithms for solving multi-objective problems","author":"CAC Coello","year":"2007","unstructured":"Coello CAC, Lamont GB, Van Veldhuizen DA (2007) Evolutionary algorithms for solving multi-objective problems, vol. 5, Springer"},{"issue":"16","key":"9640_CR19","doi-asserted-by":"publisher","first-page":"6374","DOI":"10.1016\/j.eswa.2013.05.041","volume":"40","author":"E Cuevas","year":"2013","unstructured":"Cuevas E, Cienfuegos M, Zald\u00edvar D, P\u00e9rez-Cisneros M (2013) A swarm optimization algorithm inspired in the behavior of the social-spider. Expert Syst Appl 40(16):6374\u20136384","journal-title":"Expert Syst Appl"},{"key":"9640_CR20","doi-asserted-by":"crossref","unstructured":"Da\u00a0Silva AR, Rodrigues RF, da Fonseca\u00a0Vieira V, Xavier CR (2018) Influence maximization in network by genetic algorithm on linear threshold model. In: Computational Science and Its Applications\u2013ICCSA 2018: 18th International Conference, Melbourne, VIC, Australia, July 2-5, 2018, Proceedings, Part I 18, pp 96\u2013109. Springer","DOI":"10.1007\/978-3-319-95162-1_7"},{"issue":"2","key":"9640_CR21","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1109\/4235.996017","volume":"6","author":"K Deb","year":"2002","unstructured":"Deb K, Pratap A, Agarwal S, Meyarivan T (2002) A fast and elitist multiobjective genetic algorithm: Nsga-ii. IEEE Trans Evol Comput 6(2):182\u2013197","journal-title":"IEEE Trans Evol Comput"},{"key":"9640_CR22","doi-asserted-by":"crossref","unstructured":"De A, Bhattacharya S, Bhattacharya P, Ganguly N, Chakrabarti S (2014) Learning a linear influence model from transient opinion dynamics. In: Proceedings of the 23rd ACM International Conference on Conference on information and knowledge management, pp 401\u2013410","DOI":"10.1145\/2661829.2662064"},{"key":"9640_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2019.106040","volume":"137","author":"T Dokeroglu","year":"2019","unstructured":"Dokeroglu T, Sevinc E, Kucukyilmaz T, Cosar A (2019) A survey on new generation metaheuristic algorithms. Comput Ind Eng 137:106040","journal-title":"Comput Ind Eng"},{"issue":"4","key":"9640_CR24","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MCI.2006.329691","volume":"1","author":"M Dorigo","year":"2006","unstructured":"Dorigo M, Birattari M, Stutzle T (2006) Ant colony optimization. IEEE Comput Intell Mag (4):28\u201339","journal-title":"IEEE Comput Intell Mag"},{"issue":"2","key":"9640_CR25","first-page":"3147","volume":"26","author":"N Du","year":"2013","unstructured":"Du N, Song L, Gomez Rodriguez M, Zha H (2013) Scalable influence estimation in continuous-time diffusion networks. Adv Neural Inf Process Syst 26(2):3147\u20133155","journal-title":"Adv Neural Inf Process Syst"},{"issue":"3","key":"9640_CR26","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1061\/(ASCE)0733-9496(2003)129:3(210)","volume":"129","author":"MM Eusuff","year":"2003","unstructured":"Eusuff MM, Lansey KE (2003) Optimization of water distribution network design using the shuffled frog leaping algorithm. J Water Resour Plan Manag 129(3):210\u2013225","journal-title":"J Water Resour Plan Manag"},{"key":"9640_CR27","doi-asserted-by":"crossref","unstructured":"Fan J, Qiu J, Li Y, Meng Q, Zhang D, Li G, Tan K-L, Du X (2018) Octopus: an online topic-aware influence analysis system for social networks. In: 2018 IEEE 34th International Conference on Data Engineering (ICDE), pp 1569\u20131572. IEEE","DOI":"10.1109\/ICDE.2018.00178"},{"issue":"4","key":"9640_CR28","doi-asserted-by":"publisher","first-page":"1847","DOI":"10.1007\/s12065-020-00465-x","volume":"14","author":"C Fan","year":"2021","unstructured":"Fan C, Zhou Y, Tang Z (2021) Neighborhood centroid opposite-based learning harris hawks optimization for training neural networks. Evol Intel 14(4):1847\u20131867","journal-title":"Evol Intel"},{"issue":"2","key":"9640_CR29","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/s00607-023-01207-4","volume":"106","author":"C Fan","year":"2024","unstructured":"Fan C, Wang Z, Zhang J, Zhao J, Rui X (2024) Influence maximization in social networks based on discrete Harris hawks optimization algorithm. Comput 106(2):327\u2013351","journal-title":"Computing"},{"issue":"7","key":"9640_CR30","doi-asserted-by":"publisher","first-page":"1397","DOI":"10.3390\/sym14071397","volume":"14","author":"B Fu","year":"2022","unstructured":"Fu B, Zhang J, Li W, Zhang M, He Y, Mao Q (2022) A differential evolutionary influence maximization algorithm based on network discreteness. Sym 14(7):1397","journal-title":"Symmetry"},{"issue":"102","key":"9640_CR31","first-page":"36","volume":"1989","author":"DE Golberg","year":"1989","unstructured":"Golberg DE (1989) Genetic algorithms in search, optimization, and machine learning. Addison Wesley, 102:36","journal-title":"Addison Wesley"},{"key":"9640_CR32","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1023\/A:1011122126881","volume":"12","author":"J Goldenberg","year":"2001","unstructured":"Goldenberg J, Libai B, Muller E (2001) Talk of the network: a complex systems look at the underlying process of word-of-mouth. Mark Lett, vol. 12, pp 211\u2013223","journal-title":"Mark Lett"},{"issue":"2","key":"9640_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2824253","volume":"34","author":"M Gomez-Rodriguez","year":"2016","unstructured":"Gomez-Rodriguez M, Song L, Du N, Zha H, Sch\u00f6lkopf B (2016) Influence estimation and maximization in continuous-time diffusion networks. ACM Trans Inform Syst (TOIS), vol. 34, No. 2, pp 1\u201333","journal-title":"ACM Trans Inform Syst (TOIS)"},{"key":"9640_CR34","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1016\/j.ins.2016.07.012","volume":"367","author":"M Gong","year":"2016","unstructured":"Gong M, Yan J, Shen B, Ma L, Cai Q (2016) Influence maximization in social networks based on discrete particle swarm optimization. Inf Sci 367:600\u2013614","journal-title":"Inf Sci"},{"key":"9640_CR35","doi-asserted-by":"crossref","unstructured":"Goyal A, Lu W, Lakshmanan LV (2011) Celf++ optimizing the greedy algorithm for influence maximization in social networks. In: Proceedings of the 20th International Conference Companion on World Wide Web, pp 47\u201348","DOI":"10.1145\/1963192.1963217"},{"key":"9640_CR36","doi-asserted-by":"crossref","unstructured":"Guille A, Hacid H (2012) A predictive model for the temporal dynamics of information diffusion in online social networks. In: Proceedings of the 21st International Conference on World Wide Web, pp 1145\u20131152","DOI":"10.1145\/2187980.2188254"},{"issue":"2","key":"9640_CR37","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1145\/2503792.2503797","volume":"42","author":"A Guille","year":"2013","unstructured":"Guille A, Hacid H, Favre C, Zighed DA (2013) Information diffusion in online social networks: a survey. ACM SIGMOD Rec 42(2):17\u201328","journal-title":"ACM SIGMOD Rec"},{"key":"9640_CR38","doi-asserted-by":"crossref","unstructured":"Guo J, Zhang P, Zhou C, Cao Y, Guo L (2013) Personalized influence maximization on social networks. In: Proceedings of the 22nd ACM International Conference on Information & Knowledge Management, pp 199\u2013208","DOI":"10.1145\/2505515.2505571"},{"issue":"3","key":"9640_CR39","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1109\/TKDE.2016.2621038","volume":"29","author":"L Guo","year":"2016","unstructured":"Guo L, Zhang D, Cong G, Wu W, Tan K-L (2016) Influence maximization in trajectory databases. IEEE Trans Knowl Data Eng 29(3):627\u2013641","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"9640_CR40","doi-asserted-by":"crossref","unstructured":"Guo J-b, Chen F-z, Li M-q (2019) A multi-objective optimization approach for influence maximization in social networks. In: Proceeding of the 24th International Conference on industrial engineering and engineering management 2018, pp 706\u2013715. Springer","DOI":"10.1007\/978-981-13-3402-3_74"},{"issue":"12","key":"9640_CR41","doi-asserted-by":"publisher","first-page":"6091","DOI":"10.1109\/TCYB.2020.2966593","volume":"51","author":"W Hong","year":"2020","unstructured":"Hong W, Qian C, Tang K (2020) Efficient minimum cost seed selection with theoretical guarantees for competitive influence maximization. IEEE Trans Cybern 51(12):6091\u20136104","journal-title":"IEEE Trans Cybern"},{"key":"9640_CR42","doi-asserted-by":"crossref","unstructured":"Jiang Q, Song G, Gao C, Yu W, Xie K (2011) Simulated annealing based influence maximization in social networks. In: Proceedings of the Twenty-Fifth AAAI Conference on Artificial Intelligence, AAAI 2011, San Francisco, California, USA, August 7-11, 2011","DOI":"10.1609\/aaai.v25i1.7838"},{"key":"9640_CR43","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1007\/s10898-007-9149-x","volume":"39","author":"D Karaboga","year":"2007","unstructured":"Karaboga D, Basturk B (2007) A powerful and efficient algorithm for numerical function optimization: artificial bee colony (abc) algorithm. J Global Optim 39:459\u2013471","journal-title":"J Global Optim"},{"issue":"1","key":"9640_CR44","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1177\/002200275800200106","volume":"2","author":"HC Kelman","year":"1958","unstructured":"Kelman HC (1958) Compliance, identification, and internalization three processes of attitude change. J Conflict Resolut  2(1):51\u201360","journal-title":"J Conflict Resolut"},{"key":"9640_CR45","doi-asserted-by":"crossref","unstructured":"Kempe D, Kleinberg J, Tardos \u00c9 (2003) Maximizing the spread of influence through a social network. In: Proceedings of the Ninth ACM SIGKDD International Conference on knowledge discovery and data mining, pp 137\u2013146","DOI":"10.1145\/956750.956769"},{"key":"9640_CR46","doi-asserted-by":"crossref","unstructured":"Kennedy J, Eberhart R (1995) Particle swarm optimization. In: Proceedings of ICNN\u201995-international Conference on Neural Networks, vol. 4, pp 1942\u20131948. IEEE","DOI":"10.1109\/ICNN.1995.488968"},{"key":"9640_CR47","unstructured":"Khavandi H, Moghadam BN, Abdollahi J, Branch A (2023) Maximizing the Impact on Social Networks using the Combination of PSO and GA Algorithms. Future Generation in Distributed Systems, vol. 5, pp 1-13"},{"key":"9640_CR48","doi-asserted-by":"crossref","unstructured":"Krmer P, Nowakov\u00e1 J (2017) Guided genetic algorithm for the influence maximization problem. In: International Computing and Combinatorics Conference","DOI":"10.1007\/978-3-319-62389-4_52"},{"key":"9640_CR49","doi-asserted-by":"publisher","first-page":"1617","DOI":"10.1016\/j.ins.2022.06.075","volume":"607","author":"S Kumar","year":"2022","unstructured":"Kumar S, Mallik A, Khetarpal A, Panda B (2022) Influence maximization in social networks using graph embedding and graph neural network. Inform Sci 607:1617\u20131636","journal-title":"Inform Sci"},{"key":"9640_CR50","doi-asserted-by":"crossref","unstructured":"Lei S, Maniu S, Mo L, Cheng R, Senellart P (2015) Online influence maximization. In: Proceedings of the 21th ACM SIGKDD International Conference on knowledge discovery and data mining, pp 645\u2013654","DOI":"10.1145\/2783258.2783271"},{"key":"9640_CR54","doi-asserted-by":"crossref","unstructured":"Li G, Chen S, Feng J, Tan K-l, Li W-s (2014) Efficient location-aware influence maximization. In: Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data, pp 87\u201398","DOI":"10.1145\/2588555.2588561"},{"key":"9640_CR58","doi-asserted-by":"crossref","unstructured":"Li Y, Zhang D, Tan K-L (2015a) Real-time targeted influence maximization for online advertisements. In: Proceedings of the VLDB Endowment, vol. 8, No. 10, pp 1070\u20131080","DOI":"10.14778\/2794367.2794376"},{"key":"9640_CR53","doi-asserted-by":"crossref","unstructured":"Li H, Bhowmick SS, Cui J, Gao Y, Ma J (2015b) Getreal: Towards realistic selection of influence maximization strategies in competitive networks. In: Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, pp 1525\u20131537","DOI":"10.1145\/2723372.2723710"},{"key":"9640_CR55","doi-asserted-by":"crossref","unstructured":"Li Y, Fan J, Zhang D, Tan K-L (2017) Discovering your selling points: Personalized social influential tags exploration. In: Proceedings of the 2017 ACM International Conference on management of data, pp 619\u2013634","DOI":"10.1145\/3035918.3035952"},{"issue":"10","key":"9640_CR51","doi-asserted-by":"publisher","first-page":"1852","DOI":"10.1109\/TKDE.2018.2807843","volume":"30","author":"Y Li","year":"2018","unstructured":"Li Y, Fan J, Wang Y, Tan K-L (2018) Influence maximization on social graphs: a survey. IEEE Trans Knowl Data Eng 30(10):1852\u20131872","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"9640_CR59","doi-asserted-by":"publisher","first-page":"7749","DOI":"10.1007\/s10489-021-02283-9","volume":"51","author":"H Li","year":"2021","unstructured":"Li H, Zhang R, Zhao Z, Liu X, Yuan Y (2021) Identification of top-k influential nodes based on discrete crow search algorithm optimization for influence maximization. Appl Intel 51:7749\u20137765","journal-title":"Appl Intel"},{"issue":"11","key":"9640_CR52","doi-asserted-by":"publisher","first-page":"12497","DOI":"10.1007\/s10489-021-03021-x","volume":"52","author":"H Li","year":"2022","unstructured":"Li H, Zhang R, Liu X (2022) An efficient discrete differential evolution algorithm based on community structure for influence maximization. Appl Intell 52(11):12497\u201312515","journal-title":"Appl Intell"},{"key":"9640_CR56","doi-asserted-by":"crossref","unstructured":"Lin SC, Lin SD, Chen MS (2015) A learning-based framework to handle multi-round multi-party influence maximization on social networks. ACM, pp 695\u2013704","DOI":"10.1145\/2783258.2783392"},{"issue":"8","key":"9640_CR57","doi-asserted-by":"publisher","first-page":"1904","DOI":"10.1109\/TKDE.2013.106","volume":"26","author":"B Liu","year":"2013","unstructured":"Liu B, Cong G, Zeng Y, Xu D, Chee YM (2013) Influence spreading path and its application to the time constrained social influence maximization problem and beyond. IEEE Trans Knowl Data Eng 26(8):1904\u20131917","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"9640_CR60","doi-asserted-by":"publisher","first-page":"126480","DOI":"10.1016\/j.physa.2021.126480","volume":"586","author":"JJ Lotf","year":"2022","unstructured":"Lotf JJ, Azgomi MA, Dishabi MRE (2022) An improved influence maximization method for social networks based on genetic algorithm. Physica A: Stat Mecha Appl 586:126480","journal-title":"Physica A: Stat Mecha Appl"},{"issue":"2","key":"9640_CR61","doi-asserted-by":"publisher","first-page":"60","DOI":"10.14778\/2850578.2850581","volume":"9","author":"W Lu","year":"2015","unstructured":"Lu W, Chen W, Lakshmanan LV (2015) From competition to complementarity: comparative influence diffusion and maximization. Proc VLDB Endow  9(2):60\u201371","journal-title":"Proc VLDB Endow"},{"key":"9640_CR62","doi-asserted-by":"publisher","DOI":"10.1016\/j.apenergy.2021.117446","volume":"301","author":"P Lu","year":"2021","unstructured":"Lu P, Ye L, Zhao Y, Dai B, Pei M, Tang Y (2021) Review of meta-heuristic algorithms for wind power prediction: Methodologies, applications and challenges. Appl Energy 301:117446","journal-title":"Appl Energy"},{"key":"9640_CR63","doi-asserted-by":"crossref","unstructured":"Lu Q, Bu Z, Wang Y (2020) A multiobjective evolutionary approach for influence maximization in multilayer networks. In: Proceedings of the 2020 6th International Conference on computing and artificial intelligence, pp 431\u2013438","DOI":"10.1145\/3404555.3404568"},{"key":"9640_CR64","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2019.105606","volume":"83","author":"L Ma","year":"2019","unstructured":"Ma L, Liu Y (2019) Maximizing three-hop influence spread in social networks using discrete comprehensive learning artificial bee colony optimizer. Appl Soft Comput 83:105606","journal-title":"Appl Soft Comput"},{"key":"9640_CR65","doi-asserted-by":"crossref","unstructured":"Mesgari I, Kermani MAMA, Hanneman R, Aliahmadi A (2015) Identifying key nodes in social networks using multi-criteria decision-making tools. In: Mathematical Technology of Networks: Bielefeld, December 2013, pp 137\u2013150. Springer","DOI":"10.1007\/978-3-319-16619-3_10"},{"key":"9640_CR66","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.advengsoft.2013.12.007","volume":"69","author":"S Mirjalili","year":"2014","unstructured":"Mirjalili S, Mirjalili SM, Lewis A (2014) Grey wolf optimizer. Adv Eng Softw 69:46\u201361","journal-title":"Adv Eng Softw"},{"key":"9640_CR67","doi-asserted-by":"publisher","first-page":"1","DOI":"10.61185\/SMIJ.2023.33103","volume":"3","author":"M Muthuswamy","year":"2023","unstructured":"Muthuswamy M, Ali AM (2023) Sustainable supply chain management in the age of machine intelligence: addressing challenges, capitalizing on opportunities, and shaping the future landscape. Sustain Mach Intell J 3:1\u201333103","journal-title":"Sustain Mach Intell J"},{"key":"9640_CR68","doi-asserted-by":"publisher","first-page":"1","DOI":"10.61185\/SMIJ.2023.22102","volume":"2","author":"N Nabeeh","year":"2023","unstructured":"Nabeeh N (2023) Assessment and contrast the sustainable growth of various road transport systems using intelligent neutrosophic multi-criteria decision-making model. Sustain Mach Intel J 2:1\u201312","journal-title":"Sustain Mach Intel J"},{"issue":"3","key":"9640_CR69","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1103\/PhysRevE.68.036122","volume":"68","author":"ME Newman","year":"2003","unstructured":"Newman ME, Park J (2003) Why social networks are different from other types of networks. Phys Rev E 68(3):36\u2013122","journal-title":"Phys Rev E"},{"key":"9640_CR70","doi-asserted-by":"crossref","unstructured":"Nguyen HT, Dinh TN, Thai MT (2016) Cost-aware targeted viral marketing in billion-scale networks. In: IEEE INFOCOM 2016-the 35th Annual IEEE International Conference on Computer Communications, pp 1\u20139. IEEE","DOI":"10.1109\/INFOCOM.2016.7524377"},{"key":"9640_CR71","doi-asserted-by":"crossref","unstructured":"Nguyen HT, Thai MT, Dinh TN (2016) Stop-and-stare: Optimal sampling algorithms for viral marketing in billion-scale networks. In: Proceedings of the 2016 International Conference on management of data, pp 695\u2013710","DOI":"10.1145\/2882903.2915207"},{"issue":"12","key":"9640_CR72","doi-asserted-by":"publisher","first-page":"1077","DOI":"10.14778\/2994509.2994525","volume":"9","author":"N Ohsaka","year":"2016","unstructured":"Ohsaka N, Akiba T, Yoshida Y, Kawarabayashi K-i (2016a) Dynamic influence analysis in evolving networks. Proc VLDB Endow 9(12):1077\u20131088","journal-title":"Proc VLDB Endow"},{"key":"9640_CR73","doi-asserted-by":"crossref","unstructured":"Ohsaka N, Yamaguchi Y, Kakimura N, Kawarabayashi K-i (2016b) Maximizing time-decaying influence in social networks. In: Machine Learning and Knowledge Discovery in Databases: European Conference, ECML PKDD 2016, Riva del Garda, Italy, September 19-23, 2016, Proceedings, Part I 16, pp 132\u2013147. Springer","DOI":"10.1007\/978-3-319-46128-1_9"},{"key":"9640_CR74","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1016\/j.tcs.2022.12.011","volume":"943","author":"C Qian","year":"2023","unstructured":"Qian C, Liu D-X, Feng C, Tang K (2023) Multi-objective evolutionary algorithms are generally good: maximizing monotone submodular functions over sequences. Theoret Comput Sci 943:241\u2013266","journal-title":"Theoret Comput Sci"},{"key":"9640_CR75","unstructured":"Rabadiya K, Makwana A, Jardosh S, Changa IC (2017) Performance analysis and a survey on influence maximization. In: International Conference on telecommunication, power analysis and computing techniques-2017. At Bharath University, Chennai"},{"issue":"10","key":"9640_CR76","doi-asserted-by":"publisher","first-page":"2319","DOI":"10.1140\/epjs\/s11734-021-00206-w","volume":"230","author":"N Saini","year":"2021","unstructured":"Saini N, Saha S (2021) Multi-objective optimization techniques: a survey of the state-of-the-art and applications: multi-objective optimization techniques. Eur Phys J Spec Top 230(10):2319\u20132335","journal-title":"Eur Phys J Spec Top"},{"key":"9640_CR77","doi-asserted-by":"crossref","unstructured":"Saito K, Nakano R, Kimura M (2008) Prediction of information diffusion probabilities for independent cascade model. In: Knowledge-Based Intelligent Information and Engineering Systems: 12th International Conference, KES 2008, Zagreb, Croatia, September 3-5, 2008, Proceedings, Part III 12, pp 67\u201375. Springer","DOI":"10.1007\/978-3-540-85567-5_9"},{"key":"9640_CR78","doi-asserted-by":"publisher","DOI":"10.1016\/j.swevo.2019.100614","volume":"51","author":"C Salavati","year":"2019","unstructured":"Salavati C, Abdollahpouri A (2019) Identifying influential nodes based on ant colony optimization to maximize profit in social networks. Swarm Evol Comput 51:100614","journal-title":"Swarm Evol Comput"},{"issue":"3","key":"9640_CR79","first-page":"1","volume":"2","author":"K Sallam","year":"2023","unstructured":"Sallam K, Mohamed M, Mohamed AW (2023) Internet of Things (IoT) in supply chain management: challenges, opportunities, and best practices. Sustain Mach IntelJ 2(3):1\u201332","journal-title":"Sustain Mach IntelJ"},{"key":"9640_CR80","doi-asserted-by":"crossref","unstructured":"Sardana N, Thakur T, Mehrotra M, Tejwani D (2022) Nature inspired algorithm towards influence maximization in social networks. In: 2022 1st International Conference on Informatics (ICI), pp 159\u2013164. IEEE","DOI":"10.1109\/ICI53355.2022.9786926"},{"issue":"1","key":"9640_CR81","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13278-019-0586-6","volume":"9","author":"B Saxena","year":"2019","unstructured":"Saxena B, Kumar P (2019) A node activity and connectivity-based model for influence maximization in social networks. Soc Netw Anal Min  9(1):1\u201316","journal-title":"Soc Netw Anal Min"},{"key":"9640_CR82","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106436","volume":"94","author":"A Sheikhahmadi","year":"2020","unstructured":"Sheikhahmadi A, Zareie A (2020) Identifying influential spreaders using multi-objective artificial bee colony optimization. Appl Soft Comput 94:106436","journal-title":"Appl Soft Comput"},{"key":"9640_CR83","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1016\/j.eswa.2018.07.038","volume":"114","author":"A \u015ei\u0307m\u015fek","year":"2018","unstructured":"\u015ei\u0307m\u015fek A, Resul K (2018) Using swarm intelligence algorithms to detect influential individuals for influence maximization in social networks. Expert Syst Appl 114:224\u2013236","journal-title":"Expert Syst Appl"},{"issue":"2","key":"9640_CR84","doi-asserted-by":"publisher","first-page":"5421","DOI":"10.1002\/cpe.5421","volume":"32","author":"SS Singh","year":"2020","unstructured":"Singh SS, Kumar A, Singh K, Biswas B (2020) Im-sso: maximizing influence in social networks using social spider optimization. Concurr Comput Pract Exp 32(2):5421","journal-title":"Concurr Comput Pract Exp"},{"issue":"9","key":"9640_CR85","doi-asserted-by":"publisher","first-page":"7570","DOI":"10.1016\/j.jksuci.2021.08.009","volume":"34","author":"SS Singh","year":"2022","unstructured":"Singh SS, Srivastva D, Verma M, Singh J (2022) Influence maximization frameworks, performance, challenges and directions on social network: a theoretical study. J King Saud Univ-Comput Inform Sci  34(9):7570\u20137603","journal-title":"J King Saud Univ-Comput Inform Sci"},{"key":"9640_CR86","doi-asserted-by":"crossref","unstructured":"Sinha N, Annappa B (2016) Cuckoo search for influence maximization in social networks. In: Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics: ICACNI 2015, Volume 2, pp 51\u201361. Springer","DOI":"10.1007\/978-81-322-2529-4_5"},{"key":"9640_CR87","doi-asserted-by":"crossref","unstructured":"Song C, Hsu W, Lee ML (2016) Targeted influence maximization in social networks. In: Proceedings of the 25th ACM International on Conference on information and knowledge management, pp 1683\u20131692","DOI":"10.1145\/2983323.2983724"},{"key":"9640_CR88","doi-asserted-by":"publisher","unstructured":"Sun J, Tang J (2011) A survey of models and algorithms for social influence analysis. In: Aggarwal C (ed) Social Network Data Analytics. vol. 7, pp 177\u2013214, Springer, Boston, MA. https:\/\/doi.org\/10.1007\/978-1-4419-8462-3_7","DOI":"10.1007\/978-1-4419-8462-3_7"},{"key":"9640_CR89","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.knosys.2018.06.013","volume":"160","author":"J Tang","year":"2018","unstructured":"Tang J, Zhang R, Yao Y, Zhao Z, Wang P, Li H, Yuan J (2018) Maximizing the spread of influence via the collective intelligence of discrete bat algorithm. Knowl-Based Syst 160:88\u2013103","journal-title":"Knowl-Based Syst"},{"issue":"06","key":"9640_CR90","doi-asserted-by":"publisher","first-page":"1950050","DOI":"10.1142\/S0129183119500505","volume":"30","author":"J Tang","year":"2019","unstructured":"Tang J, Zhang R, Yao Y, Zhao Z, Chai B, Li H (2019a) An adaptive discrete particle swarm optimization for influence maximization based on network community structure. Int J Mod Phys C 30(6):1950050","journal-title":"Int J Mod Phys C"},{"key":"9640_CR91","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1016\/j.physa.2018.09.040","volume":"513","author":"J Tang","year":"2019","unstructured":"Tang J, Zhang R, Yao Y, Yang F, Zhao Z, Hu R, Yuan Y (2019b) Identification of top-k influential nodes based on enhanced discrete particle swarm optimization for influence maximization. Phys A  513:477\u2013496","journal-title":"Phys A"},{"key":"9640_CR92","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.07.004","volume":"187","author":"J Tang","year":"2020","unstructured":"Tang J, Zhang R, Wang P, Zhao Z, Fan L, Liu X (2020) A discrete shuffled frog-leaping algorithm to identify influential nodes for influence maximization in social networks. Knowl-Based Syst 187:104833","journal-title":"Knowl-Based Syst"},{"key":"9640_CR93","doi-asserted-by":"crossref","unstructured":"Tejaswi V, Bindu P, Thilagam PS (2016) Diffusion models and approaches for influence maximization in social networks. In: 2016 International Conference on advances in computing, communications and informatics (ICACCI), pp 1345\u20131351. IEEE","DOI":"10.1109\/ICACCI.2016.7732235"},{"issue":"1","key":"9640_CR94","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1109\/TNET.2016.2563397","volume":"25","author":"G Tong","year":"2016","unstructured":"Tong G, Wu W, Tang S, Du D-Z (2016) Adaptive influence maximization in dynamic social networks. IEEE\/ACM Trans Netw 25(1):112\u2013125","journal-title":"IEEE\/ACM Trans Netw"},{"key":"9640_CR95","doi-asserted-by":"crossref","unstructured":"Tsai CW, Yang YC, Chiang MC (2016) A genetic newgreedy algorithm for influence maximization in social network. In: IEEE International Conference on Systems","DOI":"10.1109\/SMC.2015.446"},{"key":"9640_CR96","doi-asserted-by":"crossref","unstructured":"Van Laarhoven, Peter JM (1987) Simulated annealing. Springer Netherlands, pp 7\u201315","DOI":"10.1007\/978-94-015-7744-1_2"},{"issue":"8","key":"9640_CR97","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1016\/j.ijepes.2008.03.003","volume":"30","author":"M Varadarajan","year":"2008","unstructured":"Varadarajan M, Swamp KS (2008) Differential evolutionary algorithm for optimal reactive power dispatch. Int J Electric Power Energy Syst 30(8):435\u2013441","journal-title":"Int J Electric Power Energy Syst"},{"issue":"2","key":"9640_CR98","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1109\/TKDE.2016.2624734","volume":"29","author":"X Wang","year":"2016","unstructured":"Wang X, Zhang Y, Zhang W, Lin X, Chen C (2016a) Bring order into the samples: a novel scalable method for influence maximization. IEEE Trans Knowl Data Eng 29(2):243\u2013256","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"9640_CR99","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.physa.2016.05.020","volume":"461","author":"X Wang","year":"2016","unstructured":"Wang X, Su Y, Zhao C, Yi D (2016b) Effective identification of multiple influential spreaders by degreepunishment. Phys A 461:238\u2013247","journal-title":"Phys A"},{"issue":"3","key":"9640_CR100","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1109\/TKDE.2016.2633472","volume":"29","author":"X Wang","year":"2016","unstructured":"Wang X, Zhang Y, Zhang W, Lin X (2016c) Efficient distance-aware influence maximization in geo-social networks. IEEE Trans Knowl Data Eng 29(3):599\u2013612","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"9640_CR102","doi-asserted-by":"crossref","unstructured":"Wang X, Zhang Y, Zhang W, Lin X (2016d) Distance-aware influence maximization in geo-social network. In: ICDE, pp 1\u201312","DOI":"10.1109\/ICDE.2016.7498224"},{"issue":"7","key":"9640_CR101","doi-asserted-by":"publisher","first-page":"805","DOI":"10.14778\/3067421.3067429","volume":"10","author":"Y Wang","year":"2017","unstructured":"Wang Y, Fan Q, Li Y, Tan K-L (2017) Real-time influence maximization on dynamic social streams. Proc VLDB Endow 10(7):805\u2013816","journal-title":"Proc VLDB Endow"},{"key":"9640_CR103","doi-asserted-by":"crossref","unstructured":"Yang X-S, Deb S (2009) Cuckoo search via l\u00e9vy flights. In: 2009 World Congress on Nature & Biologically Inspired Computing (NaBIC), pp 210\u2013214. IEEE","DOI":"10.1109\/NABIC.2009.5393690"},{"issue":"5","key":"9640_CR104","doi-asserted-by":"publisher","first-page":"464","DOI":"10.1108\/02644401211235834","volume":"29","author":"X-S Yang","year":"2012","unstructured":"Yang X-S, Hossein Gandomi A (2012) Bat algorithm: a novel approach for global engineering optimization. Eng Comput 29(5):464\u2013483","journal-title":"Eng Comput"},{"key":"9640_CR105","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.112971","volume":"142","author":"A Zareie","year":"2020","unstructured":"Zareie A, Sheikhahmadi A, Jalili M (2020) Identification of influential users in social network using gray wolf optimization algorithm. Expert Syst Appl 142:112971","journal-title":"Expert Syst Appl"},{"key":"9640_CR106","unstructured":"Zareie A, Sakellariou R (2021) Influence maximization in social networks: a survey of behaviour-aware methods. arXiv preprint arXiv:2108.03438"},{"issue":"1.1","key":"9640_CR107","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1201\/b17231-3","volume":"37","author":"H Zhang","year":"2014","unstructured":"Zhang H, Mishra S, Thai MT, Wu J, Wang Y (2014) Recent advances in information diffusion and influence maximization in complex social networks. Opportunistic Mobile Soc Netw  37(1):1\u201337","journal-title":"Opportunistic Mobile Soc Netw"},{"key":"9640_CR108","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.physa.2017.02.067","volume":"478","author":"K Zhang","year":"2017","unstructured":"Zhang K, Du H, Feldman MW (2017) Maximizing influence in a social network: Improved results using a genetic algorithm. Phys A 478:20\u201330","journal-title":"Phys A"},{"key":"9640_CR109","doi-asserted-by":"crossref","unstructured":"Zhou T, Cao J, Liu B, Xu S, Zhu Z, Luo J (2015) Location-based influence maximization in social networks. In: Proceedings of the 24th ACM International on Conference on information and knowledge management, pp 1211\u20131220","DOI":"10.1145\/2806416.2806462"},{"key":"9640_CR110","doi-asserted-by":"crossref","unstructured":"Zhuang H, Sun Y, Tang J, Zhang J, Sun X (2013) Influence maximization in dynamic social networks. In: 2013 IEEE 13th International Conference on data mining, pp 1313\u20131318. IEEE","DOI":"10.1109\/ICDM.2013.145"}],"container-title":["Evolving Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12530-024-09640-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12530-024-09640-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12530-024-09640-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,3]],"date-time":"2025-04-03T08:47:35Z","timestamp":1743670055000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12530-024-09640-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,28]]},"references-count":110,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["9640"],"URL":"https:\/\/doi.org\/10.1007\/s12530-024-09640-2","relation":{},"ISSN":["1868-6478","1868-6486"],"issn-type":[{"value":"1868-6478","type":"print"},{"value":"1868-6486","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,28]]},"assertion":[{"value":"7 April 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 May 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 December 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"24"}}