{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T16:39:07Z","timestamp":1759941547899},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,11,15]],"date-time":"2014-11-15T00:00:00Z","timestamp":1416009600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soc. Netw. Anal. Min."],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1007\/s13278-014-0236-y","type":"journal-article","created":{"date-parts":[[2014,11,14]],"date-time":"2014-11-14T17:57:59Z","timestamp":1415987879000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Link injection for boosting information spread in social networks"],"prefix":"10.1007","volume":"4","author":[{"given":"Stefanos","family":"Antaris","sequence":"first","affiliation":[]},{"given":"Dimitrios","family":"Rafailidis","sequence":"additional","affiliation":[]},{"given":"Alexandros","family":"Nanopoulos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,15]]},"reference":[{"key":"236_CR1","doi-asserted-by":"crossref","unstructured":"Anagnostopoulos A, Kumar R, Mahdian M (2008) Influence and correlation in social networks. In: Proceedings of the 14th ACM SIGKDD international conference on knowledge discovery and data mining, KDD \u201908. ACM, New York, pp 7\u201315. doi: 10.1145\/1401890.1401897","DOI":"10.1145\/1401890.1401897"},{"issue":"1","key":"236_CR2","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1016\/j.csda.2006.11.006","volume":"52","author":"MW Berry","year":"2003","unstructured":"Berry MW, Browne M, Langville AN, Pauca VP, Plemmons RJ (2003) Algorithms and applications for approximate nonnegative matrix factorization. Comput Stat Data Anal 52(1):155\u2013173","journal-title":"Comput Stat Data Anal"},{"key":"236_CR3","doi-asserted-by":"crossref","unstructured":"Bhatt R, Chaoji V, Parekh R (2010) Predicting product adoption in large-scale social networks. In: Proceedings of the 19th ACM international conference on information and knowledge management, CIKM \u201910. ACM, New York, pp 1039\u20131048. doi: 10.1145\/1871437.1871569","DOI":"10.1145\/1871437.1871569"},{"issue":"4","key":"236_CR4","doi-asserted-by":"crossref","first-page":"829","DOI":"10.1007\/s13278-013-0096-x","volume":"3","author":"P Boldi","year":"2013","unstructured":"Boldi P, Rosa M, Vigna S (2013) Robustness of social and web graphs to node removal. Soc Netw Anal Min 3(4):829\u2013842","journal-title":"Soc Netw Anal Min"},{"issue":"3","key":"236_CR5","doi-asserted-by":"crossref","first-page":"22:1","DOI":"10.1145\/1961189.1961194","volume":"2","author":"F Bonchi","year":"2011","unstructured":"Bonchi F, Castillo C, Gionis A, Jaimes A (2011) Social network analysis and mining for business applications. ACM Trans Intell Syst Technol 2(3):22:1\u201322:37","journal-title":"ACM Trans Intell Syst Technol"},{"issue":"4","key":"236_CR6","doi-asserted-by":"crossref","first-page":"981","DOI":"10.1007\/s13278-013-0136-6","volume":"3","author":"Z Borbora","year":"2013","unstructured":"Borbora Z, Ahmad M, Oh J, Haigh K, Srivastava J, Wen Z (2013) Robust features of trust in social networks. Soc Netw Anal Min 3(4):981\u2013999","journal-title":"Soc Netw Anal Min"},{"key":"236_CR7","doi-asserted-by":"crossref","unstructured":"Chaoji V, Ranu S, Rastogi R, Bhatt R (2012) Recommendations to boost content spread in social networks. In: Proceedings of the 21st international conference on World Wide Web, WWW \u201912. ACM, New York, pp 529\u2013538","DOI":"10.1145\/2187836.2187908"},{"key":"236_CR8","doi-asserted-by":"crossref","unstructured":"Chen J, Geyer W, Dugan C, Muller M, Guy I (2009) Make new friends, but keep the old: recommending people on social networking sites. In: Proceedings of the SIGCHI conference on human factors in computing systems, CHI \u201909. ACM, New York, pp 201\u2013210","DOI":"10.1145\/1518701.1518735"},{"key":"236_CR9","doi-asserted-by":"crossref","unstructured":"Chen W, Wang Y, Yang S (2009) Efficient influence maximization in social networks. In: Proceedings of the 15th ACM SIGKDD international conference on knowledge discovery and data mining, KDD \u201909. ACM, New York, pp 199\u2013208","DOI":"10.1145\/1557019.1557047"},{"key":"236_CR10","doi-asserted-by":"crossref","unstructured":"Chen W, Yuan Y, Zhang L (2010) Scalable influence maximization in social networks under the linear threshold model. In: Proceedings of the 2010 IEEE international conference on data mining, ICDM \u201910. IEEE Computer Society, Washington DC, pp 88\u201397. doi: 10.1109\/ICDM.2010.118","DOI":"10.1109\/ICDM.2010.118"},{"key":"236_CR11","unstructured":"Chung F (2014) Spectral graph theory. No. 92 in CBMS Regional Conference Series. Conference Board of the Mathematical Sciences. http:\/\/books.google.gr\/books?id=YUc38_MCuhAC"},{"key":"236_CR12","volume-title":"Networks, crowds, and markets: reasoning about a highly connected world","author":"E David","year":"2010","unstructured":"David E, Jon K (2010) Networks, crowds, and markets: reasoning about a highly connected world. Cambridge University Press, New York"},{"issue":"2","key":"236_CR13","doi-asserted-by":"crossref","first-page":"29","DOI":"10.2753\/JEC1086-4415130202","volume":"13","author":"T Dinev","year":"2008","unstructured":"Dinev T, Hu Q, Yayla A (2008) Is there an on-line advertisers\u2019 dilemma? A study of click fraud in the pay-per-click model. Int J Electron Commer 13(2):29\u201360","journal-title":"Int J Electron Commer"},{"issue":"2","key":"236_CR14","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1007\/s13278-012-0062-z","volume":"3","author":"A Goyal","year":"2013","unstructured":"Goyal A, Bonchi F, Lakshmanan L, Venkatasubramanian S (2013) On minimizing budget and time in influence propagation over social networks. Soc Netw Anal Min 3(2):179\u2013192","journal-title":"Soc Netw Anal Min"},{"key":"236_CR15","doi-asserted-by":"crossref","unstructured":"Goyal A, Bonchi F, Lakshmanan LV (2010) Learning influence probabilities in social networks. In: Proceedings of the third ACM international conference on web search and data mining, WSDM \u201910. ACM, New York, pp 241\u2013250. doi: 10.1145\/1718487.1718518","DOI":"10.1145\/1718487.1718518"},{"key":"236_CR16","doi-asserted-by":"crossref","unstructured":"Guille A, Hacid H, Favre C, Zighed DA (2013) Information diffusion in online social networks: a survey. SIGMOD Rec 42(2):17\u201328. doi: 10.1145\/2503792.2503797","DOI":"10.1145\/2503792.2503797"},{"key":"236_CR17","doi-asserted-by":"crossref","unstructured":"Guy I, Ronen I, Wilcox E (2009) Do you know?: Recommending people to invite into your social network. In: Proceedings of the 14th international conference on intelligent user interfaces, IUI \u201909. ACM, New York, pp 77\u201386","DOI":"10.1145\/1502650.1502664"},{"key":"236_CR18","doi-asserted-by":"crossref","unstructured":"Hannon J, Bennett M, Smyth B (2010) Recommending twitter users to follow using content and collaborative filtering approaches. In: Proceedings of the fourth ACM conference on recommender systems, RecSys \u201910. ACM, New York, pp 199\u2013206","DOI":"10.1145\/1864708.1864746"},{"issue":"6","key":"236_CR19","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1509\/jm.10.0088","volume":"75","author":"O Hinz","year":"2011","unstructured":"Hinz O, Bernd S, Christian B, Becker JU (2011) Seeding strategies for viral marketing: an empirical comparison. J Mark 75(6):55\u201371","journal-title":"J Mark"},{"key":"236_CR20","doi-asserted-by":"crossref","unstructured":"Jackson MO (2011) An overview of social networks and economic applications. In: Benhabib J, Bisin A, Jackson MO (eds) Handbook of Social Economics, vol 1A, Elsevier, Amsterdam, pp 511\u2013585","DOI":"10.1016\/B978-0-444-53187-2.00012-7"},{"key":"236_CR21","doi-asserted-by":"crossref","unstructured":"Kempe D, Kleinberg J, Tardos E (2003) Maximizing the spread of influence through a social network. In: Proceedings of the ninth ACM SIGKDD international conference on knowledge discovery and data mining, KDD \u201903. ACM, New York, pp 137\u2013146","DOI":"10.1145\/956750.956769"},{"key":"236_CR22","doi-asserted-by":"crossref","unstructured":"Kempe D, Kleinberg J, Tardos E (2005) Influential nodes in a diffusion model for social networks. In: Proceedings of the 32nd international conference on automata, languages and programming, ICALP\u201905. Springer, Berlin, pp 1127\u20131138. doi: 10.1007\/11523468_91","DOI":"10.1007\/11523468_91"},{"key":"236_CR23","unstructured":"Kim YA, Srivastava J (2007) Impact of social influence in e-commerce decision making. In: Proceedings of the ninth international conference on electronic commerce, ICEC \u201907. ACM, New York, pp 293\u2013302"},{"key":"236_CR24","doi-asserted-by":"crossref","unstructured":"Kimura M, Saito K (2006) Tractable models for information diffusion in social networks. In: Proceedings of the 10th European conference on principle and practice of knowledge discovery in databases, PKDD\u201906. Springer, Berlin, pp 259\u2013271. doi: 10.1007\/11871637_27 .","DOI":"10.1007\/11871637_27"},{"issue":"1","key":"236_CR25","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1016\/j.dss.2008.06.007","volume":"46","author":"C Kiss","year":"2008","unstructured":"Kiss C, Bichler M (2008) Identification of influencers\u2014measuring influence in customer networks. Decis Support Syst 46(1):233\u2013253","journal-title":"Decis Support Syst"},{"key":"236_CR26","doi-asserted-by":"crossref","unstructured":"Lawton B, Gregor S (2003) Internet marketing communications: interactivity and integration. In: Seeking success in e-business. Kluwer Academic Publishers, Norwell, pp 239\u2013257","DOI":"10.1007\/978-0-387-35692-1_14"},{"key":"236_CR27","doi-asserted-by":"crossref","unstructured":"Leskovec J, Krause A, Guestrin C, Faloutsos C, VanBriesen J, Glance N (2007) Cost-effective outbreak detection in networks. In: Proceedings of the 13th ACM SIGKDD international conference on knowledge discovery and data mining, KDD \u201907. ACM, New York, pp 420\u2013429. doi: 10.1145\/1281192.1281239","DOI":"10.1145\/1281192.1281239"},{"issue":"1","key":"236_CR28","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1016\/j.dss.2012.02.012","volume":"54","author":"YM Li","year":"2012","unstructured":"Li YM, Shiu YL (2012) A diffusion mechanism for social advertising over microblogs. Decis Support Syst 54(1):9\u201322","journal-title":"Decis Support Syst"},{"key":"236_CR29","doi-asserted-by":"crossref","unstructured":"Liben-Nowell D, Kleinberg J (2003) The link prediction problem for social networks. In: Proceedings of the twelfth international conference on information and knowledge management, CIKM \u201903. ACM, New York, pp 556\u2013559","DOI":"10.1145\/956863.956972"},{"key":"236_CR30","doi-asserted-by":"crossref","unstructured":"Ling C, Huang J, Zhang H (2003) Auc: a better measure than accuracy in comparing learning algorithms. In: Xiang Y, Chaib-draa B (eds) Advances in artificial intelligence. Lecture notes in computer science, vol 2671. Springer, Berlin, pp 329\u2013341","DOI":"10.1007\/3-540-44886-1_25"},{"issue":"3","key":"236_CR31","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1007\/s10618-012-0265-y","volume":"26","author":"H Liu","year":"2013","unstructured":"Liu H, Li X, Zheng X (2013) Solving non-negative matrix factorization by alternating least squares with a modified strategy. Data Min Knowl Discov 26(3):435\u2013451","journal-title":"Data Min Knowl Discov"},{"key":"236_CR32","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1006\/jesp.1999.1414","volume":"36","author":"T Mussweiler","year":"2000","unstructured":"Mussweiler T, Strack F (2000) Numeric judgments under uncertainty: the role of knowledge in anchoring. J Exp Soc Psychol 36:495\u2013518","journal-title":"J Exp Soc Psychol"},{"issue":"1","key":"236_CR33","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1109\/TASE.2010.2052042","volume":"8","author":"R Narayanam","year":"2011","unstructured":"Narayanam R, Narahari Y (2011) A shapley value-based approach to discover influential nodes in social networks. IEEE Trans Autom Sci Eng 8(1):130\u2013147. doi: 10.1109\/TASE.2010.2052042","journal-title":"IEEE Trans Autom Sci Eng"},{"issue":"3","key":"236_CR34","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1007\/s10618-011-0224-z","volume":"24","author":"S Papadopoulos","year":"2012","unstructured":"Papadopoulos S, Kompatsiaris Y, Vakali A, Spyridonos P (2012) Community detection in social media. Data Min Knowl Discov 24(3):515\u2013554","journal-title":"Data Min Knowl Discov"},{"issue":"4","key":"236_CR35","doi-asserted-by":"crossref","first-page":"939","DOI":"10.1007\/s13278-013-0118-8","volume":"3","author":"M Piraveenan","year":"2013","unstructured":"Piraveenan M, Thedchanamoorthy G, Uddin S, Chung K (2013) Quantifying topological robustness of networks under sustained targeted attacks. Soc Netw Anal Min 3(4):939\u2013952","journal-title":"Soc Netw Anal Min"},{"key":"236_CR36","doi-asserted-by":"crossref","unstructured":"Saito K, Kimura M, Ohara K, Motoda H (2010) Selecting information diffusion models over social networks for behavioral analysis. In: Proceedings of the 2010 European conference on machine learning and knowledge discovery in databases: part III, ECML PKDD\u201910. Springer, Berlin, pp 180\u2013195. http:\/\/dl.acm.org\/citation.cfm?id=1889788.1889801","DOI":"10.1007\/978-3-642-15939-8_12"},{"key":"236_CR37","doi-asserted-by":"crossref","unstructured":"Schifanella R, Barrat A, Cattuto C, Markines B, Menczer F (2010) Folks in folksonomies: social link prediction from shared metadata. In: Proceedings of the third ACM international conference on web search and data mining, WSDM \u201910. ACM, New York, pp 271\u2013280","DOI":"10.1145\/1718487.1718521"},{"key":"236_CR38","doi-asserted-by":"crossref","unstructured":"Tang J, Sun J, Wang C, Yang Z (2009) Social influence analysis in large-scale networks. In: Proceedings of the 15th ACM SIGKDD international conference on knowledge discovery and data mining, KDD \u201909. ACM, New York, pp 807\u2013816. doi: 10.1145\/1557019.1557108","DOI":"10.1145\/1557019.1557108"},{"key":"236_CR39","unstructured":"Tang L, Wang X, Liu H (2009) Uncovering groups via heterogeneous interaction analysis. In: Proceedings of the 9th international conference on data mining, ICDM \u201909, pp 503\u2013512"},{"key":"236_CR40","doi-asserted-by":"crossref","unstructured":"Tong H, Prakash BA, Tsourakakis C, Eliassi-Rad T, Faloutsos C, Chau DH (2010) On the vulnerability of large graphs. In: Proceedings of the 2010 IEEE international conference on data mining, ICDM \u201910. IEEE Computer Society, Washington DC, pp 1091\u20131096","DOI":"10.1109\/ICDM.2010.54"}],"container-title":["Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-014-0236-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13278-014-0236-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-014-0236-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,22]],"date-time":"2022-04-22T09:00:22Z","timestamp":1650618022000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13278-014-0236-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,15]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["236"],"URL":"https:\/\/doi.org\/10.1007\/s13278-014-0236-y","relation":{},"ISSN":["1869-5450","1869-5469"],"issn-type":[{"value":"1869-5450","type":"print"},{"value":"1869-5469","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,11,15]]},"article-number":"236"}}