{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T21:49:19Z","timestamp":1774907359998,"version":"3.50.1"},"reference-count":128,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,4,25]],"date-time":"2023-04-25T00:00:00Z","timestamp":1682380800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,4,25]],"date-time":"2023-04-25T00:00:00Z","timestamp":1682380800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soc. Netw. Anal. Min."],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Social networks have become an increasingly common abstraction to capture the interactions of individual users in a number of everyday activities and applications. As a result, the analysis of such networks has attracted lots of attention in the literature. Among the topics of interest, a key problem relates to identifying so-called influential users for a number of applications, which need to spread messages. Several approaches have been proposed to estimate users\u2019 influence and identify sets of influential users in social networks. A common basis of these approaches is to consider links between users, that is, structural or topological properties of the network. To a lesser extent, some approaches take into account users\u2019 behaviours or attitudes. Although a number of surveys have reviewed approaches based on structural properties of social networks, there has been no comprehensive review of approaches that take into account users\u2019 behaviour. This paper attempts to cover this gap by reviewing and proposing a taxonomy of such behaviour-aware methods to identify influential users in social networks.\n<\/jats:p>","DOI":"10.1007\/s13278-023-01078-9","type":"journal-article","created":{"date-parts":[[2023,4,25]],"date-time":"2023-04-25T18:03:07Z","timestamp":1682445787000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["Influence maximization in social networks: a survey of behaviour-aware methods"],"prefix":"10.1007","volume":"13","author":[{"given":"Ahmad","family":"Zareie","sequence":"first","affiliation":[]},{"given":"Rizos","family":"Sakellariou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,25]]},"reference":[{"key":"1078_CR1","doi-asserted-by":"crossref","unstructured":"Ahmed S, Ezeife C (2013) Discovering influential nodes from trust network. In: Proceedings of the 28th annual ACM symposium on applied computing, pp 121\u2013128. ACM","DOI":"10.1145\/2480362.2480389"},{"issue":"1","key":"1078_CR2","first-page":"16","volume":"51","author":"MA Al-Garadi","year":"2018","unstructured":"Al-Garadi MA, Varathan KD, Ravana SD, Ahmed E, Mujtaba G, Khan MUS, Khan SU (2018) Analysis of online social network connections for identification of influential users: survey and open research issues. ACM Comput Surv (CSUR) 51(1):16","journal-title":"ACM Comput Surv (CSUR)"},{"issue":"6092","key":"1078_CR3","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1126\/science.1215842","volume":"337","author":"S Aral","year":"2012","unstructured":"Aral S, Walker D (2012) Identifying influential and susceptible members of social networks. Science 337(6092):337\u2013341","journal-title":"Science"},{"key":"1078_CR4","doi-asserted-by":"crossref","unstructured":"Arora A, Galhotra S, Ranu S (2017) Debunking the myths of influence maximization: an in-depth benchmarking study. In: Proceedings of the 2017 ACM international conference on management of data, pp 651\u2013666. ACM","DOI":"10.1145\/3035918.3035924"},{"key":"1078_CR5","unstructured":"Aslay C, Barbieri N, Bonchi F, Baeza-Yates RA (2014) Online topic-aware influence maximization queries. In: Proceedings of the 17th international conference on extending database technology (EDBT), pp 295\u2013306"},{"key":"1078_CR6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.eswa.2019.01.070","volume":"125","author":"S Banerjee","year":"2019","unstructured":"Banerjee S, Jenamani M, Pratihar DK (2019) Combim: a community-based solution approach for the budgeted influence maximization problem. Expert Syst Appl 125:1\u201313","journal-title":"Expert Syst Appl"},{"issue":"6","key":"1078_CR7","doi-asserted-by":"crossref","first-page":"2539","DOI":"10.1007\/s12652-019-01308-z","volume":"11","author":"S Banerjee","year":"2020","unstructured":"Banerjee S, Jenamani M, Pratihar DK (2020) Maximizing the earned benefit in an incentivized social networking environment: a community-based approach. J Ambient Intell Humaniz Comput 11(6):2539\u20132555","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"9","key":"1078_CR8","doi-asserted-by":"crossref","first-page":"3417","DOI":"10.1007\/s10115-020-01461-4","volume":"62","author":"S Banerjee","year":"2020","unstructured":"Banerjee S, Jenamani M, Pratihar DK (2020) A survey on influence maximization in a social network. Knowl Inf Syst 62(9):3417\u20133455","journal-title":"Knowl Inf Syst"},{"key":"1078_CR9","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2020.114346","volume":"169","author":"S Banerjee","year":"2021","unstructured":"Banerjee S, Jenamani M, Pratihar DK (2021) Earned benefit maximization in social networks under budget constraint. Expert Syst Appl 169:114346","journal-title":"Expert Syst Appl"},{"key":"1078_CR10","doi-asserted-by":"crossref","unstructured":"Banerjee S, Pal B, Jenamani M (2020) Budgeted influence maximization with tags in social networks. In: International conference on web information systems engineering, pp 141\u2013152. Springer","DOI":"10.1007\/978-3-030-62005-9_11"},{"issue":"3","key":"1078_CR11","doi-asserted-by":"crossref","first-page":"555","DOI":"10.1007\/s10115-013-0646-6","volume":"37","author":"N Barbieri","year":"2013","unstructured":"Barbieri N, Bonchi F, Manco G (2013) Topic-aware social influence propagation models. Knowl Inf Syst 37(3):555\u2013584","journal-title":"Knowl Inf Syst"},{"key":"1078_CR12","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/j.inffus.2015.08.005","volume":"28","author":"G Bello-Orgaz","year":"2016","unstructured":"Bello-Orgaz G, Jung JJ, Camacho D (2016) Social big data: recent achievements and new challenges. Inf Fusion 28:45\u201359","journal-title":"Inf Fusion"},{"issue":"1","key":"1078_CR13","first-page":"22","volume":"52","author":"R Bian","year":"2019","unstructured":"Bian R, Koh YS, Dobbie G, Divoli A (2019) Identifying top-k nodes in social networks: a survey. ACM Comput Surv (CSUR) 52(1):22","journal-title":"ACM Comput Surv (CSUR)"},{"key":"1078_CR14","doi-asserted-by":"crossref","unstructured":"Borgs C, Brautbar M, Chayes J, Lucier B (2014) Maximizing social influence in nearly optimal time. In: Proceedings of the 25th annual ACM-SIAM symposium on discrete algorithms, pp 946\u2013957. SIAM","DOI":"10.1137\/1.9781611973402.70"},{"key":"1078_CR15","unstructured":"Borgs C, Brautbar M, Chayes JT, Lucier B (2012) Influence maximization in social networks: towards an optimal algorithmic solution. arXiv preprint arXiv:1212.0884"},{"key":"1078_CR16","doi-asserted-by":"crossref","unstructured":"Borodin A, Filmus Y, Oren J (2010) Threshold models for competitive influence in social networks. In: International workshop on internet and network economics, pp 539\u2013550. Springer","DOI":"10.1007\/978-3-642-17572-5_48"},{"issue":"18","key":"1078_CR17","doi-asserted-by":"crossref","first-page":"3825","DOI":"10.1016\/j.comnet.2012.10.007","volume":"56","author":"S Brin","year":"2012","unstructured":"Brin S, Page L (2012) Reprint of: the anatomy of a large-scale hypertextual web search engine. Comput Netw 56(18):3825\u20133833","journal-title":"Comput Netw"},{"key":"1078_CR18","doi-asserted-by":"crossref","first-page":"1273","DOI":"10.1016\/j.ins.2020.08.093","volume":"546","author":"A Cali\u00f2","year":"2021","unstructured":"Cali\u00f2 A, Tagarelli A (2021) Attribute based diversification of seeds for targeted influence maximization. Inf Sci 546:1273\u20131305","journal-title":"Inf Sci"},{"issue":"12","key":"1078_CR19","doi-asserted-by":"crossref","first-page":"2421","DOI":"10.1109\/TKDE.2018.2820010","volume":"30","author":"A Calio","year":"2018","unstructured":"Calio A, Interdonato R, Pulice C, Tagarelli A (2018) Topology-driven diversity for targeted influence maximization with application to user engagement in social networks. IEEE Trans Knowl Data Eng 30(12):2421\u20132434","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1078_CR20","doi-asserted-by":"crossref","unstructured":"Carnes T, Nagarajan C, Wild SM, Van\u00a0Zuylen A (2007) Maximizing influence in a competitive social network: a follower\u2019s perspective. In: Proceedings of the 9th international conference on electronic commerce, pp 351\u2013360. ACM","DOI":"10.1145\/1282100.1282167"},{"issue":"6","key":"1078_CR21","doi-asserted-by":"crossref","first-page":"666","DOI":"10.14778\/2735703.2735706","volume":"8","author":"S Chen","year":"2015","unstructured":"Chen S, Fan J, Li G, Feng J, Kl Tan, Tang J (2015) Online topic-aware influence maximization. Proc VLDB Endow 8(6):666\u2013677","journal-title":"Proc VLDB Endow"},{"key":"1078_CR22","doi-asserted-by":"crossref","unstructured":"Chen S, He K (2015) Influence maximization on signed social networks with integrated pagerank. In: 2015 IEEE international conference on smart City\/SocialCom\/SustainCom, pp. 289\u2013292. IEEE","DOI":"10.1109\/SmartCity.2015.86"},{"key":"1078_CR23","doi-asserted-by":"crossref","unstructured":"Chen W, Collins A, Cummings R, Ke T, Liu Z, Rincon D, Sun X, Wang Y, Wei W, Yuan Y (2011) Influence maximization in social networks when negative opinions may emerge and propagate. In: Proceedings of the 2011 SIAM international conference on data mining, pp 379\u2013390. SIAM","DOI":"10.1137\/1.9781611972818.33"},{"issue":"4","key":"1078_CR24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-031-01850-3","volume":"5","author":"W Chen","year":"2013","unstructured":"Chen W, Lakshmanan LV, Castillo C (2013) Information and influence propagation in social networks. Synth Lect Data Manag 5(4):1\u2013177","journal-title":"Synth Lect Data Manag"},{"issue":"1","key":"1078_CR25","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1186\/s40649-016-0033-z","volume":"3","author":"W Chen","year":"2016","unstructured":"Chen W, Lin T, Yang C (2016) Real-time topic-aware influence maximization using preprocessing. Comput Soc Netw 3(1):8","journal-title":"Comput Soc Netw"},{"key":"1078_CR26","doi-asserted-by":"crossref","unstructured":"Chen W, Wang C, Wang Y (2010) Scalable influence maximization for prevalent viral marketing in large-scale social networks. In: Proceedings of the 16th ACM SIGKDD international conference on knowledge discovery and data mining, pp 1029\u20131038. ACM","DOI":"10.1145\/1835804.1835934"},{"key":"1078_CR27","doi-asserted-by":"crossref","unstructured":"Chen W, Wang Y, Yang S (2009) Efficient influence maximization in social networks. In: Proceedings of the 15th ACM SIGKDD international conference on knowledge discovery and data mining, pp 199\u2013208. ACM","DOI":"10.1145\/1557019.1557047"},{"issue":"6","key":"1078_CR28","doi-asserted-by":"crossref","first-page":"1903","DOI":"10.1007\/s11280-021-00935-x","volume":"24","author":"X Chen","year":"2021","unstructured":"Chen X, Deng L, Zhao Y, Zhou X, Zheng K (2021) Community-based influence maximization in location-based social network. World Wide Web 24(6):1903\u20131928","journal-title":"World Wide Web"},{"key":"1078_CR29","unstructured":"Chiesse R, Figueiredo DR, Antonio AdA, Ziviani A, Niter\u00f3i R, Petr\u00f3polis R (2014) Evaluation of epidemic seeding strategies under variable node costs. In: WPerformance 2014 Workshop, XXXIV Congresso Nacional da Sociedade Brasileira de Computa\u00e7\u00e3o (CSBC), Brazil"},{"issue":"15","key":"1078_CR30","doi-asserted-by":"crossref","DOI":"10.1002\/cpe.4527","volume":"30","author":"S Cuomo","year":"2018","unstructured":"Cuomo S, Maiorano F (2018) Social network data analysis and mining applications for the internet of data. Concurr Comput Pract Exp 30(15):e4527","journal-title":"Concurr Comput Pract Exp"},{"issue":"1","key":"1078_CR31","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/s13278-018-0493-2","volume":"8","author":"K Das","year":"2018","unstructured":"Das K, Samanta S, Pal M (2018) Study on centrality measures in social networks: a survey. Soc Netw Anal Min 8(1):13","journal-title":"Soc Netw Anal Min"},{"issue":"3","key":"1078_CR32","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3441447","volume":"15","author":"A De Salve","year":"2021","unstructured":"De Salve A, Mori P, Guidi B, Ricci L, Pietro RD (2021) Predicting influential users in online social network groups. ACM Trans Knowl Discov Data 15(3):1","journal-title":"ACM Trans Knowl Discov Data"},{"key":"1078_CR98","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1016\/j.ins.2019.11.029","volume":"514","author":"R de Souza","year":"2020","unstructured":"de Souza R, Figueiredo D, Rocha AdA, Ziviani A (2020) Efficient network seeding under variable node cost and limited budget for social networks. Inf Sci 514:369\u2013384","journal-title":"Inf Sci"},{"key":"1078_CR33","doi-asserted-by":"crossref","unstructured":"Domingos P, Richardson M (2001) Mining the network value of customers. In: Proceedings of the 7th ACM SIGKDD international conference on knowledge discovery and data mining, pp 57\u201366. ACM","DOI":"10.1145\/502512.502525"},{"key":"1078_CR34","unstructured":"Du N, Liang Y, Balcan MF, Song L (2013) Budgeted influence maximization for multiple products. arXiv preprint arXiv:1312.2164"},{"key":"1078_CR35","unstructured":"Eberhart R, Kennedy J (1995) A new optimizer using particle swarm theory. In: MHS\u201995. In: Proceedings of the 6th international symposium on micro machine and human science, pp 39\u201343. Ieee"},{"issue":"1","key":"1078_CR36","doi-asserted-by":"crossref","first-page":"35","DOI":"10.2307\/3033543","volume":"40","author":"LC Freeman","year":"1977","unstructured":"Freeman LC (1977) A set of measures of centrality based on betweenness. Sociometry 40(1):35\u201341","journal-title":"Sociometry"},{"issue":"3","key":"1078_CR37","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/0378-8733(78)90021-7","volume":"1","author":"LC Freeman","year":"1978","unstructured":"Freeman LC (1978) Centrality in social networks conceptual clarification. Soc Netw 1(3):215\u2013239","journal-title":"Soc Netw"},{"key":"1078_CR38","doi-asserted-by":"crossref","unstructured":"Gionis A, Terzi E, Tsaparas P (2013) Opinion maximization in social networks. In: Proceedings of the 2013 SIAM international conference on data mining, pp 387\u2013395. SIAM","DOI":"10.1137\/1.9781611972832.43"},{"key":"1078_CR39","doi-asserted-by":"crossref","unstructured":"Golbeck J, Robles C, Edmondson M, Turner K (2011a) Predicting personality from twitter. In: 2011 IEEE 3rd international conference on privacy, security, risk and trust and 2011 IEEE third international conference on social computing, pp 149\u2013156. IEEE","DOI":"10.1109\/PASSAT\/SocialCom.2011.33"},{"key":"1078_CR40","doi-asserted-by":"crossref","unstructured":"Golbeck J, Robles C, Turner K (2011b) Predicting personality with social media. In: CHI\u201911 extended abstracts on human factors in computing systems, pp 253\u2013262. ACM","DOI":"10.1145\/1979742.1979614"},{"issue":"3","key":"1078_CR41","first-page":"1","volume":"9","author":"J Goldenberg","year":"2001","unstructured":"Goldenberg J, Libai B, Muller E (2001) Using complex systems analysis to advance marketing theory development: modeling heterogeneity effects on new product growth through stochastic cellular automata. Acad Mark Sci Rev 9(3):1\u201318","journal-title":"Acad Mark Sci Rev"},{"issue":"2","key":"1078_CR42","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3409108","volume":"15","author":"Q Gong","year":"2021","unstructured":"Gong Q, Chen Y, He X, Xiao Y, Hui P, Wang X, Fu X (2021) Cross-site prediction on social influence for cold-start users in online social networks. ACM Trans Web 15(2):1","journal-title":"ACM Trans Web"},{"issue":"6","key":"1078_CR43","doi-asserted-by":"crossref","first-page":"1420","DOI":"10.1086\/226707","volume":"83","author":"M Granovetter","year":"1978","unstructured":"Granovetter M (1978) Threshold models of collective behavior. Am J Sociol 83(6):1420\u20131443","journal-title":"Am J Sociol"},{"key":"1078_CR44","doi-asserted-by":"crossref","unstructured":"Gu Y, Yao X, Liang G, Gu C, Huang H (2021) Efficient budget-distance-aware influence maximization in geo-social network. In: International conference on wireless algorithms, systems, and applications, pp 282\u2013290. Springer","DOI":"10.1007\/978-3-030-86137-7_31"},{"issue":"2","key":"1078_CR45","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1145\/2503792.2503797","volume":"42","author":"A Guille","year":"2013","unstructured":"Guille A, Hacid H, Favre C, Zighed DA (2013) Information diffusion in online social networks: a survey. ACM SIGMOD Rec 42(2):17\u201328","journal-title":"ACM SIGMOD Rec"},{"issue":"3","key":"1078_CR46","doi-asserted-by":"crossref","first-page":"817","DOI":"10.1007\/s12351-017-0305-x","volume":"19","author":"E G\u00fcney","year":"2019","unstructured":"G\u00fcney E (2019) On the optimal solution of budgeted influence maximization problem in social networks. Oper Res Int J 19(3):817\u2013831","journal-title":"Oper Res Int J"},{"key":"1078_CR47","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2020.113642","volume":"159","author":"N Hafiene","year":"2020","unstructured":"Hafiene N, Karoui W, Ben Romdhane L (2020) Influential nodes detection in dynamic social networks: a survey. Expert Syst Appl 159:113642","journal-title":"Expert Syst Appl"},{"key":"1078_CR48","doi-asserted-by":"crossref","unstructured":"Han K, Wu B, Tang J, Cui S, Aslay C, Lakshmanan LV (2021) Efficient and effective algorithms for revenue maximization in social advertising, p 671-684. Association for computing machinery, New York, NY, USA","DOI":"10.1145\/3448016.3459243"},{"key":"1078_CR49","doi-asserted-by":"crossref","unstructured":"Han S, Zhuang F, He Q, Shi Z (2014) Balanced seed selection for budgeted influence maximization in social networks. In: Pacific-Asia conference on knowledge discovery and data mining, pp 65\u201377. Springer","DOI":"10.1007\/978-3-319-06608-0_6"},{"key":"1078_CR50","doi-asserted-by":"crossref","unstructured":"He JS, Kaur H, Talluri M (2016) Positive opinion influential node set selection for social networks: considering both positive and negative relationships. In: Wireless communications, networking and applications, pp 935\u2013948. Springer","DOI":"10.1007\/978-81-322-2580-5_85"},{"issue":"1","key":"1078_CR51","first-page":"350","volume":"35","author":"Q He","year":"2023","unstructured":"He Q, Fang H, Zhang J, Wang X (2023) Dynamic opinion maximization in social networks. IEEE Trans Knowl Data Eng 35(1):350\u2013361","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1078_CR52","doi-asserted-by":"publisher","DOI":"10.1109\/TCDS.2022.3141952","author":"Q He","year":"2022","unstructured":"He Q, Lv Y, Wang X, Li J, Huang M, Ma L, Cai Y (2022) Reinforcement learning based dynamic opinion maximization framework in signed social networks. IEEE Trans Cognit Dev Syst. https:\/\/doi.org\/10.1109\/TCDS.2022.3141952","journal-title":"IEEE Trans Cognit Dev Syst"},{"key":"1078_CR53","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1016\/j.ins.2020.12.091","volume":"558","author":"Q He","year":"2021","unstructured":"He Q, Sun L, Wang X, Wang Z, Huang M, Yi B, Wang Y, Ma L (2021) Positive opinion maximization in signed social networks. Inf Sci 558:34\u201349","journal-title":"Inf Sci"},{"issue":"19","key":"1078_CR54","doi-asserted-by":"crossref","first-page":"12367","DOI":"10.1007\/s00521-021-05840-y","volume":"33","author":"Q He","year":"2021","unstructured":"He Q, Wang X, Huang M, Yi B (2021) Multi-stage opinion maximization in social networks. Neural Comput Appl 33(19):12367\u201312380","journal-title":"Neural Comput Appl"},{"issue":"1","key":"1078_CR55","doi-asserted-by":"crossref","first-page":"199","DOI":"10.3233\/IDA-150801","volume":"20","author":"M Hosseini-Pozveh","year":"2016","unstructured":"Hosseini-Pozveh M, Zamanifar K, Naghsh-Nilchi AR, Dolog P (2016) Maximizing the spread of positive influence in signed social networks. Intell Data Anal 20(1):199\u2013218","journal-title":"Intell Data Anal"},{"key":"1078_CR56","doi-asserted-by":"crossref","first-page":"304","DOI":"10.1016\/j.future.2019.06.024","volume":"101","author":"M Hosseinpour","year":"2019","unstructured":"Hosseinpour M, Malek MR, Claramunt C (2019) Socio-spatial influence maximization in location-based social networks. Futur Gener Comput Syst 101:304\u2013314","journal-title":"Futur Gener Comput Syst"},{"issue":"5","key":"1078_CR57","first-page":"665","volume":"5","author":"M Jalili","year":"2017","unstructured":"Jalili M, Perc M (2017) Information cascades in complex networks. J Complex Netw 5(5):665\u2013693","journal-title":"J Complex Netw"},{"key":"1078_CR58","doi-asserted-by":"crossref","unstructured":"Jaouadi M, Ben\u00a0Romdhane L (2019) Influence maximization problem in social networks: an overview. In: 2019 IEEE\/ACS 16th international conference on computer systems and applications (AICCSA), pp 1\u20138","DOI":"10.1109\/AICCSA47632.2019.9035366"},{"key":"1078_CR59","doi-asserted-by":"crossref","first-page":"1571","DOI":"10.1016\/j.ins.2019.10.061","volume":"512","author":"W Ju","year":"2020","unstructured":"Ju W, Chen L, Li B, Liu W, Sheng J, Wang Y (2020) A new algorithm for positive influence maximization in signed networks. Inf Sci 512:1571\u20131591","journal-title":"Inf Sci"},{"key":"1078_CR60","doi-asserted-by":"crossref","unstructured":"Ke X, Khan A, Cong G (2018) Finding seeds and relevant tags jointly: for targeted influence maximization in social networks. In: Proceedings of the 2018 international conference on management of data, p 1097-1111. Association for computing machinery","DOI":"10.1145\/3183713.3199670"},{"key":"1078_CR61","doi-asserted-by":"crossref","unstructured":"Kempe D, Kleinberg J, Tardos \u00c9 (2003) Maximizing the spread of influence through a social network. In: Proceedings of the 9th ACM SIGKDD international conference on knowledge discovery and data mining, pp 137\u2013146. ACM","DOI":"10.1145\/956750.956769"},{"issue":"11","key":"1078_CR62","doi-asserted-by":"crossref","first-page":"888","DOI":"10.1038\/nphys1746","volume":"6","author":"M Kitsak","year":"2010","unstructured":"Kitsak M, Gallos LK, Havlin S, Liljeros F, Muchnik L, Stanley HE, Makse HA (2010) Identification of influential spreaders in complex networks. Nat Phys 6(11):888","journal-title":"Nat Phys"},{"key":"1078_CR63","doi-asserted-by":"crossref","unstructured":"Lei W, Yang Q, Wang H (2016) Positive influence maximization algorithm based on three degrees of influence. In: International conference on intelligent data engineering and automated learning, pp 503\u2013514. Springer","DOI":"10.1007\/978-3-319-46257-8_54"},{"key":"1078_CR64","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1016\/j.neucom.2017.03.003","volume":"260","author":"D Li","year":"2017","unstructured":"Li D, Wang C, Zhang S, Zhou G, Chu D, Wu C (2017) Positive influence maximization in signed social networks based on simulated annealing. Neurocomputing 260:69\u201378","journal-title":"Neurocomputing"},{"issue":"7","key":"1078_CR65","volume":"9","author":"D Li","year":"2014","unstructured":"Li D, Xu ZM, Chakraborty N, Gupta A, Sycara K, Li S (2014) Polarity related influence maximization in signed social networks. PLoS ONE 9(7):e102199","journal-title":"PLoS ONE"},{"key":"1078_CR66","doi-asserted-by":"crossref","unstructured":"Li FH, Li CT, Shan MK (2011) Labeled influence maximization in social networks for target marketing. In: 2011 IEEE international conference on privacy, security, risk and trust and IEEE international conference on social computing, pp 560\u2013563. IEEE","DOI":"10.1109\/PASSAT\/SocialCom.2011.152"},{"key":"1078_CR67","doi-asserted-by":"crossref","unstructured":"Li G, Chen S, Feng J, Tan Kl, Li Ws (2014) Efficient location-aware influence maximization. In: Proceedings of the 2014 ACM SIGMOD international conference on management of data, pp 87\u201398. ACM","DOI":"10.1145\/2588555.2588561"},{"key":"1078_CR68","doi-asserted-by":"crossref","unstructured":"Li J, Cai T, Mian A, Li RH, Sellis T, Yu JX (2018) Holistic influence maximization for targeted advertisements in spatial social networks. In: 2018 IEEE 34th international conference on data engineering (ICDE), pp 1340\u20131343. IEEE","DOI":"10.1109\/ICDE.2018.00145"},{"key":"1078_CR69","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.ins.2020.01.040","volume":"519","author":"L Li","year":"2020","unstructured":"Li L, Liu Y, Zhou Q, Yang W, Yuan J (2020) Targeted influence maximization under a multifactor-based information propagation model. Inf Sci 519:124\u2013140","journal-title":"Inf Sci"},{"key":"1078_CR70","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2022.3227805","author":"M Li","year":"2022","unstructured":"Li M, Wang Z, Han QL, Taylor SJE, Li K, Liao X, Liu X (2022) Influence maximization in multiagent systems by a graph embedding method: dealing with probabilistically unstable links. IEEE Trans Cybern. https:\/\/doi.org\/10.1109\/TCYB.2022.3227805","journal-title":"IEEE Trans Cybern"},{"key":"1078_CR71","doi-asserted-by":"crossref","unstructured":"Li S, Han K, Zhang J (2018) Exploring influence maximization in location-based social networks. In: International conference on collaborative computing: networking, applications and worksharing, pp 92\u2013111. Springer","DOI":"10.1007\/978-3-030-12981-1_6"},{"key":"1078_CR72","doi-asserted-by":"crossref","first-page":"1601","DOI":"10.1016\/j.neucom.2017.10.007","volume":"275","author":"X Li","year":"2018","unstructured":"Li X, Cheng X, Su S, Sun C (2018) Community-based seeds selection algorithm for location aware influence maximization. Neurocomputing 275:1601\u20131613","journal-title":"Neurocomputing"},{"key":"1078_CR73","doi-asserted-by":"crossref","unstructured":"Li Y, Chen W, Wang Y, Zhang ZL (2013) Influence diffusion dynamics and influence maximization in social networks with friend and foe relationships. In: Proceedings of the 6th ACM international conference on web search and data mining, pp 657\u2013666. ACM","DOI":"10.1145\/2433396.2433478"},{"issue":"10","key":"1078_CR74","doi-asserted-by":"crossref","first-page":"1852","DOI":"10.1109\/TKDE.2018.2807843","volume":"30","author":"Y Li","year":"2018","unstructured":"Li Y, Fan J, Wang Y, Tan KL (2018) Influence maximization on social graphs: a survey. IEEE Trans Knowl Data Eng 30(10):1852\u20131872","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1078_CR75","doi-asserted-by":"crossref","unstructured":"Li Y, Gan X, Fu L, Tian X, Qin Z, Zhou Y (2018) Conformity-aware influence maximization with user profiles. In: 2018 10th international conference on wireless communications and signal processing (WCSP), pp 1\u20136","DOI":"10.1109\/WCSP.2018.8555685"},{"issue":"10","key":"1078_CR76","doi-asserted-by":"crossref","first-page":"1070","DOI":"10.14778\/2794367.2794376","volume":"8","author":"Y Li","year":"2015","unstructured":"Li Y, Zhang D, Tan KL (2015) Real-time targeted influence maximization for online advertisements. Proc VLDB Endow 8(10):1070\u20131081","journal-title":"Proc VLDB Endow"},{"issue":"2019","key":"1078_CR77","doi-asserted-by":"crossref","first-page":"68837","DOI":"10.1109\/ACCESS.2019.2918810","volume":"7","author":"W Liang","year":"2019","unstructured":"Liang W, Shen C, Li X, Nishide R, Piumarta I, Takada H (2019) Influence maximization in signed social networks with opinion formation. IEEE Access 7(2019):68837\u201368852","journal-title":"IEEE Access"},{"key":"1078_CR78","doi-asserted-by":"crossref","first-page":"68837","DOI":"10.1109\/ACCESS.2019.2918810","volume":"7","author":"W Liang","year":"2019","unstructured":"Liang W, Shen C, Li X, Nishide R, Piumarta I, Takada H (2019) Influence maximization in signed social networks with opinion formation. IEEE Access 7:68837\u201368852","journal-title":"IEEE Access"},{"key":"1078_CR79","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1016\/j.ins.2015.01.034","volume":"306","author":"S Liu","year":"2015","unstructured":"Liu S, Jiang C, Lin Z, Ding Y, Duan R, Xu Z (2015) Identifying effective influencers based on trust for electronic word-of-mouth marketing: a domain-aware approach. Inf Sci 306:34\u201352","journal-title":"Inf Sci"},{"key":"1078_CR80","doi-asserted-by":"crossref","unstructured":"Lohia P, Kannan K, Rai K, Bedathur S (2020) Ranking marginal influencers in a target-labeled network. In: Proceedings of the 7th ACM IKDD CoDS and 25th COMAD, p 254-260. Association for Computing Machinery","DOI":"10.1145\/3371158.3371197"},{"key":"1078_CR81","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.physrep.2016.06.007","volume":"650","author":"L L\u00fc","year":"2016","unstructured":"L\u00fc L, Chen D, Ren XL, Zhang QM, Zhang YC, Zhou T (2016) Vital nodes identification in complex networks. Phys Rep 650:1\u201363","journal-title":"Phys Rep"},{"key":"1078_CR82","doi-asserted-by":"crossref","first-page":"10168","DOI":"10.1038\/ncomms10168","volume":"7","author":"L L\u00fc","year":"2016","unstructured":"L\u00fc L, Zhou T, Zhang QM, Stanley HE (2016) The h-index of a network node and its relation to degree and coreness. Nat Commun 7:10168","journal-title":"Nat Commun"},{"key":"1078_CR83","doi-asserted-by":"crossref","unstructured":"Lu W, Lakshmanan LV (2012) Profit maximization over social networks. In: 2012 IEEE 12th international conference on data mining, pp. 479\u2013488. IEEE","DOI":"10.1109\/ICDM.2012.145"},{"key":"1078_CR84","first-page":"460","volume":"2","author":"L Manovich","year":"2011","unstructured":"Manovich L (2011) Trending: the promises and the challenges of big social data. Debates Digit Humanit 2:460\u2013475","journal-title":"Debates Digit Humanit"},{"issue":"4","key":"1078_CR85","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1016\/j.elerap.2014.06.002","volume":"13","author":"A Mochalova","year":"2014","unstructured":"Mochalova A, Nanopoulos A (2014) A targeted approach to viral marketing. Electron Commer Res Appl 13(4):283\u2013294","journal-title":"Electron Commer Res Appl"},{"key":"1078_CR86","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1016\/j.engappai.2015.02.007","volume":"41","author":"R Mohamadi-Baghmolaei","year":"2015","unstructured":"Mohamadi-Baghmolaei R, Mozafari N, Hamzeh A (2015) Trust based latency aware influence maximization in social networks. Eng Appl Artif Intell 41:195\u2013206","journal-title":"Eng Appl Artif Intell"},{"key":"1078_CR87","doi-asserted-by":"crossref","unstructured":"Nazemian A, Taghiyareh F (2012) Influence maximization in independent cascade model with positive and negative word of mouth. In: 6th international symposium on telecommunications (IST), pp 854\u2013860. IEEE","DOI":"10.1109\/ISTEL.2012.6483105"},{"issue":"6","key":"1078_CR88","doi-asserted-by":"crossref","first-page":"1084","DOI":"10.1109\/JSAC.2013.130610","volume":"31","author":"H Nguyen","year":"2013","unstructured":"Nguyen H, Zheng R (2013) On budgeted influence maximization in social networks. IEEE J Sel Areas Commun 31(6):1084\u20131094","journal-title":"IEEE J Sel Areas Commun"},{"key":"1078_CR89","doi-asserted-by":"crossref","unstructured":"Nguyen HT, Dinh TN, Thai MT (2016) Cost-aware targeted viral marketing in billion-scale networks. In: IEEE INFOCOM 2016-The 35th annual IEEE international conference on computer communications, pp 1\u20139. IEEE","DOI":"10.1109\/INFOCOM.2016.7524377"},{"key":"1078_CR90","doi-asserted-by":"crossref","unstructured":"Padmanabhan MR, Somisetty N, Basu S, Pavan A (2018) Influence maximization in social networks with non-target constraints. In: 2018 IEEE international conference on big data, pp 771\u2013780","DOI":"10.1109\/BigData.2018.8621973"},{"key":"1078_CR91","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.jnca.2018.01.005","volume":"106","author":"S Peng","year":"2018","unstructured":"Peng S, Zhou Y, Cao L, Yu S, Niu J, Jia W (2018) Influence analysis in social networks: a survey. J Netw Comput Appl 106:17\u201332","journal-title":"J Netw Comput Appl"},{"key":"1078_CR92","doi-asserted-by":"crossref","unstructured":"Richardson M, Domingos P (2002) Mining knowledge-sharing sites for viral marketing. In: Proceedings of the 8th ACM SIGKDD international conference on knowledge discovery and data mining, pp 61\u201370. ACM","DOI":"10.1145\/775047.775057"},{"issue":"4","key":"1078_CR93","doi-asserted-by":"crossref","first-page":"581","DOI":"10.1007\/BF02289527","volume":"31","author":"G Sabidussi","year":"1966","unstructured":"Sabidussi G (1966) The centrality index of a graph. Psychometrika 31(4):581\u2013603","journal-title":"Psychometrika"},{"issue":"3\u20134","key":"1078_CR94","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/s00354-014-0404-7","volume":"32","author":"M Shafaei","year":"2014","unstructured":"Shafaei M, Jalili M (2014) Community structure and information cascade in signed networks. N Gener Comput 32(3\u20134):257\u2013269","journal-title":"N Gener Comput"},{"key":"1078_CR95","doi-asserted-by":"crossref","first-page":"796","DOI":"10.1016\/j.physa.2018.09.142","volume":"514","author":"SS Singh","year":"2019","unstructured":"Singh SS, Kumar A, Singh K, Biswas B (2019) C2im: community based context-aware influence maximization in social networks. Physica A 514:796\u2013818","journal-title":"Physica A"},{"key":"1078_CR96","doi-asserted-by":"crossref","unstructured":"Singh SS, Singh K, Kumar A, Shakya HK, Biswas B (2018) A survey on information diffusion models in social networks. In: International conference on advanced informatics for computing research, pp 426\u2013439. Springer","DOI":"10.1007\/978-981-13-3143-5_35"},{"key":"1078_CR97","doi-asserted-by":"crossref","unstructured":"Song C, Hsu W, Lee ML (2016) Targeted influence maximization in social networks. In: Proceedings of the 25th ACM international conference on information and knowledge management, pp 1683\u20131692. ACM","DOI":"10.1145\/2983323.2983724"},{"key":"1078_CR99","doi-asserted-by":"crossref","unstructured":"Srinivasan BV, Anandhavelu N, Dalal A, Yenugula M, Srikanthan P, Layek A (2014) Topic-based targeted influence maximization. In: 2014 6th international conference on communication systems and networks (COMSNETS), pp 1\u20136. IEEE","DOI":"10.1109\/COMSNETS.2014.6734935"},{"key":"1078_CR100","doi-asserted-by":"crossref","unstructured":"Srivastava A, Chelmis C, Prasanna VK (2015) Social influence computation and maximization in signed networks with competing cascades. In: 2015 IEEE\/ACM international conference on advances in social networks analysis and mining (ASONAM), pp 41\u201348. IEEE","DOI":"10.1145\/2808797.2809304"},{"issue":"2","key":"1078_CR101","first-page":"229","volume":"69","author":"S Su","year":"2018","unstructured":"Su S, Li X, Cheng X, Sun C (2018) Location-aware targeted influence maximization in social networks. J Am Soc Inf Sci 69(2):229\u2013241","journal-title":"J Am Soc Inf Sci"},{"issue":"6","key":"1078_CR102","doi-asserted-by":"crossref","first-page":"1095","DOI":"10.1109\/TKDE.2017.2787757","volume":"30","author":"J Tang","year":"2017","unstructured":"Tang J, Tang X, Yuan J (2017) Profit maximization for viral marketing in online social networks: algorithms and analysis. IEEE Trans Knowl Data Eng 30(6):1095\u20131108","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1078_CR103","doi-asserted-by":"crossref","unstructured":"Tang Y, Xiao X, Shi Y (2014) Influence maximization: Near-optimal time complexity meets practical efficiency. In: Proceedings of the 2014 ACM SIGMOD international conference on management of data, pp 75\u201386. ACM","DOI":"10.1145\/2588555.2593670"},{"key":"1078_CR104","doi-asserted-by":"crossref","unstructured":"Tejaswi V, Bindu P, Thilagam PS (2016) Diffusion models and approaches for influence maximization in social networks. In: 2016 international conference on advances in computing, communications and informatics (ICACCI), pp 1345\u20131351. IEEE","DOI":"10.1109\/ICACCI.2016.7732235"},{"key":"1078_CR105","doi-asserted-by":"crossref","unstructured":"Tejaswi V, Bindu P, Thilagam PS (2017) Target specific influence maximization: an approach to maximize adoption in labeled social networks. In: 2017 9th international conference on communication systems and networks (COMSNETS), pp 542\u2013547. IEEE","DOI":"10.1109\/COMSNETS.2017.7945450"},{"issue":"1","key":"1078_CR106","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s41019-020-00117-1","volume":"5","author":"S Tian","year":"2020","unstructured":"Tian S, Mo S, Wang L, Peng Z (2020) Deep reinforcement learning-based approach to tackle topic-aware influence maximization. Data Sci Eng 5(1):1\u201311","journal-title":"Data Sci Eng"},{"key":"1078_CR107","doi-asserted-by":"crossref","first-page":"1491","DOI":"10.1016\/j.future.2017.05.050","volume":"86","author":"F Wang","year":"2018","unstructured":"Wang F, Jiang W, Li X, Wang G (2018) Maximizing positive influence spread in online social networks via fluid dynamics. Futur Gener Comput Syst 86:1491\u20131502","journal-title":"Futur Gener Comput Syst"},{"key":"1078_CR108","doi-asserted-by":"crossref","unstructured":"Wang F, Wang G, Xie D (2016) Maximizing the spread of positive influence under lt-mla model. In: Asia-Pacific services computing conference, pp 450\u2013463. Springer","DOI":"10.1007\/978-3-319-49178-3_34"},{"key":"1078_CR109","doi-asserted-by":"crossref","unstructured":"Wang H, Yang Q, Fang L, Lei W (2015) Maximizing positive influence in signed social networks. In: International conference on cloud computing and security, pp 356\u2013367. Springer","DOI":"10.1007\/978-3-319-27051-7_30"},{"key":"1078_CR110","unstructured":"Wang L, Yu Z, Xiong F, Yang D, Pan S, Yan Z (2019) Influence spread in geo-social networks: a multiobjective optimization perspective. IEEE Trans Cybern"},{"key":"1078_CR111","doi-asserted-by":"crossref","unstructured":"Wang X, Zhang Y, Zhang W, Lin X (2016a) Distance-aware influence maximization in geo-social network. In: ICDE, pp 1\u201312","DOI":"10.1109\/ICDE.2016.7498224"},{"issue":"3","key":"1078_CR112","doi-asserted-by":"crossref","first-page":"599","DOI":"10.1109\/TKDE.2016.2633472","volume":"29","author":"X Wang","year":"2016","unstructured":"Wang X, Zhang Y, Zhang W, Lin X (2016b) Efficient distance-aware influence maximization in geo-social networks. IEEE Trans Knowl Data Eng 29(3):599\u2013612","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"4","key":"1078_CR113","doi-asserted-by":"crossref","first-page":"2279","DOI":"10.1109\/JSYST.2014.2369526","volume":"11","author":"Y Wang","year":"2015","unstructured":"Wang Y, Vasilakos AV, Jin Q, Ma J (2015) Pprank: economically selecting initial users for influence maximization in social networks. IEEE Syst J 11(4):2279\u20132290","journal-title":"IEEE Syst J"},{"key":"1078_CR114","doi-asserted-by":"crossref","unstructured":"Wen YT, Peng WC, Shuai HH (2018) Maximizing social influence on target users. In: Pacific-Asia conference on knowledge discovery and data mining, pp 701\u2013712. Springer","DOI":"10.1007\/978-3-319-93040-4_55"},{"key":"1078_CR115","doi-asserted-by":"crossref","unstructured":"White S, Smyth P (2003) Algorithms for estimating relative importance in networks. In: Proceedings of the 9th ACM SIGKDD international conference on knowledge discovery and data mining, pp 266\u2013275. ACM","DOI":"10.1145\/956750.956782"},{"issue":"3","key":"1078_CR116","first-page":"1045","volume":"33","author":"Y Yang","year":"2019","unstructured":"Yang Y, Pei J (2019) Influence analysis in evolving networks: a survey. IEEE Trans Knowl Data Eng 33(3):1045\u201363","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1078_CR117","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1016\/j.ins.2018.03.048","volume":"450","author":"Y Yang","year":"2018","unstructured":"Yang Y, Xu Y, Wang E, Lou K, Luan D (2018) Exploring influence maximization in online and offline double-layer propagation scheme. Inf Sci 450:182\u2013199","journal-title":"Inf Sci"},{"key":"1078_CR118","doi-asserted-by":"crossref","first-page":"14367","DOI":"10.1109\/ACCESS.2018.2809547","volume":"6","author":"Q Yu","year":"2018","unstructured":"Yu Q, Li H, Liao Y, Cui S (2018) Fast budgeted influence maximization over multi-action event logs. IEEE Access 6:14367\u201314378","journal-title":"IEEE Access"},{"key":"1078_CR119","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1016\/j.physa.2018.09.064","volume":"514","author":"A Zareie","year":"2019","unstructured":"Zareie A, Sheikhahmadi A (2019) Ehc: extended h-index centrality measure for identification of users\u2019 spreading influence in complex networks. Physica A 514:141\u2013155","journal-title":"Physica A"},{"key":"1078_CR120","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1016\/j.chaos.2017.09.010","volume":"104","author":"A Zareie","year":"2017","unstructured":"Zareie A, Sheikhahmadi A, Fatemi A (2017) Influential nodes ranking in complex networks: an entropy-based approach. Chaos Solitons Fractals 104:485\u2013494","journal-title":"Chaos Solitons Fractals"},{"key":"1078_CR121","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1016\/j.ins.2019.04.033","volume":"493","author":"A Zareie","year":"2019","unstructured":"Zareie A, Sheikhahmadi A, Jalili M (2019) Identification of influential users in social networks based on users\u2019 interest. Inf Sci 493:217\u2013231","journal-title":"Inf Sci"},{"key":"1078_CR122","doi-asserted-by":"crossref","unstructured":"Zhang H, Dinh TN, Thai MT (2013) Maximizing the spread of positive influence in online social networks. In: 2013 IEEE 33rd international conference on distributed computing systems, pp 317\u2013326. IEEE","DOI":"10.1109\/ICDCS.2013.37"},{"key":"1078_CR123","doi-asserted-by":"crossref","unstructured":"Zhang H, Zhang H, Kuhnle A, Thai MT (2016) Profit maximization for multiple products in online social networks. In: IEEE INFOCOM 2016-The 35th annual IEEE international conference on computer communications, pp 1\u20139. IEEE","DOI":"10.1109\/INFOCOM.2016.7524470"},{"key":"1078_CR124","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2023.3234437","author":"Y Zhang","year":"2023","unstructured":"Zhang Y, Guo J, Yang W, Wu W (2023) Supplementary influence maximization problem in social networks. IEEE Trans Comput Soc Syst. https:\/\/doi.org\/10.1109\/TCSS.2023.3234437","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"1078_CR125","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1016\/j.future.2012.06.011","volume":"31","author":"J Zhou","year":"2014","unstructured":"Zhou J, Zhang Y, Cheng J (2014) Preference-based mining of top-k influential nodes in social networks. Futur Gener Comput Syst 31:40\u201347","journal-title":"Futur Gener Comput Syst"},{"key":"1078_CR126","doi-asserted-by":"crossref","unstructured":"Zhou T, Cao J, Liu B, Xu S, Zhu Z, Luo J (2015) Location-based influence maximization in social networks. In: Proceedings of the 24th ACM international conference on information and knowledge management, pp 1211\u20131220. ACM","DOI":"10.1145\/2806416.2806462"},{"key":"1078_CR127","doi-asserted-by":"crossref","unstructured":"Zhu J, Ghosh S, Wu W, Gao C (2019) Profit maximization under group influence model in social networks. In: International conference on computational data and social networks, pp 108\u2013119. Springer","DOI":"10.1007\/978-3-030-34980-6_13"},{"key":"1078_CR128","doi-asserted-by":"crossref","unstructured":"Zhu WY, Peng WC, Chen LJ, Zheng K, Zhou X (2015) Modeling user mobility for location promotion in location-based social networks. In: Proceedings of the 21st ACM SIGKDD international conference on knowledge discovery and data mining, pp 1573\u20131582. ACM","DOI":"10.1145\/2783258.2783331"}],"container-title":["Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-023-01078-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13278-023-01078-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-023-01078-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,14]],"date-time":"2023-12-14T21:37:19Z","timestamp":1702589839000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13278-023-01078-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,25]]},"references-count":128,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,12]]}},"alternative-id":["1078"],"URL":"https:\/\/doi.org\/10.1007\/s13278-023-01078-9","relation":{},"ISSN":["1869-5469"],"issn-type":[{"value":"1869-5469","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,25]]},"assertion":[{"value":"23 May 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 March 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 March 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 April 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"78"}}