{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T19:28:19Z","timestamp":1749929299660},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,10,29]],"date-time":"2023-10-29T00:00:00Z","timestamp":1698537600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,10,29]],"date-time":"2023-10-29T00:00:00Z","timestamp":1698537600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soc. Netw. Anal. Min."],"DOI":"10.1007\/s13278-023-01123-7","type":"journal-article","created":{"date-parts":[[2023,10,29]],"date-time":"2023-10-29T09:01:42Z","timestamp":1698570102000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Influence blocking maximization under refutation"],"prefix":"10.1007","volume":"13","author":[{"given":"Qi","family":"Luo","sequence":"first","affiliation":[]},{"given":"Dongxiao","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Dongbiao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yafei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yanwei","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Zhipeng","family":"Cai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,29]]},"reference":[{"issue":"6144","key":"1123_CR1","doi-asserted-by":"publisher","first-page":"1236498","DOI":"10.1126\/science.1236498","volume":"341","author":"A Banerjee","year":"2013","unstructured":"Banerjee A, Chandrasekhar AG, Duflo E, Jackson MO (2013) The diffusion of microfinance. Science 341(6144):1236498","journal-title":"Science"},{"key":"1123_CR2","doi-asserted-by":"crossref","unstructured":"Borgs C, Brautbar M, Chayes J, Lucier B (2014) Maximizing social influence in nearly optimal time. In: Proceedings of the twenty-fifth annual ACM-SIAM symposium on discrete algorithms","DOI":"10.1137\/1.9781611973402.70"},{"key":"1123_CR3","doi-asserted-by":"crossref","unstructured":"Borodin A, Filmus Y, Oren J (2010) Threshold models for competitive influence in social networks. In: Internet and network economics - 6th international workshop, WINE. Lecture Notes in Computer Science, 6484: 539\u2013550","DOI":"10.1007\/978-3-642-17572-5_48"},{"issue":"1","key":"1123_CR4","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1038\/s41467-018-07761-2","volume":"10","author":"A Bovet","year":"2019","unstructured":"Bovet A, Makse HA (2019) Influence of fake news in Twitter during the 2016 US presidential election. Nat Commun 10(1):7","journal-title":"Nat Commun"},{"issue":"44","key":"1123_CR5","doi-asserted-by":"publisher","first-page":"12368","DOI":"10.1073\/pnas.1605083113","volume":"113","author":"A Braunstein","year":"2016","unstructured":"Braunstein A, Dall\u2019Asta L, Semerjian G, Zdeborov\u00e1 L (2016) Network dismantling. Proc Natl Acad Sci 113(44):12368\u201312373","journal-title":"Proc Natl Acad Sci"},{"key":"1123_CR6","doi-asserted-by":"crossref","unstructured":"Budak C, Agrawal D, El\u00a0Abbadi A (2011) Limiting the spread of misinformation in social networks. In: Proceedings of the 20th international conference on world wide web","DOI":"10.1145\/1963405.1963499"},{"key":"1123_CR7","doi-asserted-by":"crossref","unstructured":"Chen W (2018) An issue in the martingale analysis of the influence maximization algorithm imm. In: Computational data and social networks","DOI":"10.1007\/978-3-030-04648-4_24"},{"key":"1123_CR8","doi-asserted-by":"crossref","unstructured":"Chen W, Wang Y, Yang S (2009) Efficient influence maximization in social networks. In: Proceedings of the 15th ACM SIGKDD international conference on knowledge discovery and data mining, pp. 199\u2013208","DOI":"10.1145\/1557019.1557047"},{"issue":"4","key":"1123_CR9","doi-asserted-by":"publisher","first-page":"1777","DOI":"10.1016\/j.physa.2011.09.017","volume":"391","author":"D Chen","year":"2012","unstructured":"Chen D, L\u00fc L, Shang M-S, Zhang Y-C, Zhou T (2012) Identifying influential nodes in complex networks. Physica A Statist Mech Appl 391(4):1777\u20131787","journal-title":"Physica A Statist Mech Appl"},{"key":"1123_CR10","volume-title":"Inform Influ Propagation Soc Netw","author":"W Chen","year":"2013","unstructured":"Chen W, Lakshmanan LVS, Castillo C (2013) Inform Influ Propagation Soc Netw. Synthesis Lectures on Data Management. Morgan & Claypool Publishers, California, United States"},{"key":"1123_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.physrep.2022.05.003","volume":"976","author":"B-L Chen","year":"2022","unstructured":"Chen B-L, Jiang W-X, Chen Y-X, Chen L, Wang R-J, Han S, Lin J-H, Zhang Y-C (2022) Influence blocking maximization on networks: Models, methods and applications. Phys Rep 976:1\u201354","journal-title":"Phys Rep"},{"issue":"3","key":"1123_CR12","doi-asserted-by":"publisher","first-page":"554","DOI":"10.1073\/pnas.1517441113","volume":"113","author":"M Del Vicario","year":"2016","unstructured":"Del Vicario M, Bessi A, Zollo F, Petroni F, Scala A, Caldarelli G, Stanley HE, Quattrociocchi W (2016) The spreading of misinformation online. Proc Natl Acad Sci 113(3):554\u2013559","journal-title":"Proc Natl Acad Sci"},{"key":"1123_CR13","doi-asserted-by":"crossref","unstructured":"Domingos P, Richardson M (2001) Mining the network value of customers. In: Proceedings of the 7th ACM SIGKDD international conference on knowledge discovery and data mining, pp 57\u201366","DOI":"10.1145\/502512.502525"},{"issue":"6","key":"1123_CR14","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1038\/s42256-020-0177-2","volume":"2","author":"C Fan","year":"2020","unstructured":"Fan C, Zeng L, Sun Y, Liu Y-Y (2020) Finding key players in complex networks through deep reinforcement learning. Nat Mach Intell 2(6):317\u2013324","journal-title":"Nat Mach Intell"},{"key":"1123_CR15","doi-asserted-by":"crossref","unstructured":"He X, Song G, Chen W, Jiang Q (2012) Influence blocking maximization in social networks under the competitive linear threshold model. In: SDM","DOI":"10.1137\/1.9781611972825.40"},{"issue":"44","key":"1123_CR16","doi-asserted-by":"publisher","first-page":"11663","DOI":"10.1073\/pnas.1708518114","volume":"114","author":"NM Jones","year":"2017","unstructured":"Jones NM, Thompson RR, Schetter CD, Silver RC (2017) Distress and rumor exposure on social media during a campus lockdown. Proc Natl Acad Sci 114(44):11663\u201311668","journal-title":"Proc Natl Acad Sci"},{"key":"1123_CR17","doi-asserted-by":"crossref","unstructured":"Kempe D, Kleinberg J, Tardos E (2003) Maximizing the spread of influence through a social network. In: Proceedings of the ninth ACM SIGKDD international conference on knowledge discovery and data mining","DOI":"10.1145\/956750.956769"},{"key":"1123_CR18","unstructured":"Kimura, Masahiro, Saito, Kazumi, Motoda, Hiroshi (2008) Minimizing the spread of contamination by blocking links in a network. In: Proceedings of the 23rd national conference on artificial intelligence - vol 2"},{"issue":"11","key":"1123_CR19","doi-asserted-by":"publisher","first-page":"888","DOI":"10.1038\/nphys1746","volume":"6","author":"M Kitsak","year":"2010","unstructured":"Kitsak M, Gallos LK, Havlin S, Liljeros F, Muchnik L, Stanley HE, Makse HA (2010) Identification of influential spreaders in complex networks. Nat Phys 6(11):888\u2013893","journal-title":"Nat Phys"},{"key":"1123_CR20","doi-asserted-by":"crossref","unstructured":"Lu W, Chen W, Lakshmanan LVS (2015) From competition to complementarity: comparative influence diffusion and maximization","DOI":"10.14778\/2850578.2850581"},{"issue":"2","key":"1123_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1514888.1514892","volume":"3","author":"Kimura Masahiro","year":"2009","unstructured":"Masahiro Kimura, Kazumi Saito, Hiroshi Motoda (2009) Blocking links to minimize contamination spread in a social network. ACM Trans Knowl Discov Data 3(2):1\u201323","journal-title":"ACM Trans Knowl Discov Data"},{"issue":"6","key":"1123_CR22","first-page":"2641","volume":"34","author":"S Medya","year":"2020","unstructured":"Medya S, da Silva AL, Singh AK (2020) Approximate algorithms for data-driven influence limitation. IEEE Trans Know Data Eng 34(6):2641\u20132652","journal-title":"IEEE Trans Know Data Eng"},{"issue":"7563","key":"1123_CR23","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1038\/nature14604","volume":"524","author":"F Morone","year":"2015","unstructured":"Morone F, Makse HA (2015) Influence maximization in complex networks through optimal percolation. Nature 524(7563):65\u201368","journal-title":"Nature"},{"key":"1123_CR24","doi-asserted-by":"publisher","first-page":"012305","DOI":"10.1103\/PhysRevE.94.012305","volume":"94","author":"S Mugisha","year":"2016","unstructured":"Mugisha S, Zhou H-J (2016) Identifying optimal targets of network attack by belief propagation. Phys Rev E 94:012305","journal-title":"Phys Rev E"},{"issue":"3","key":"1123_CR25","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1073\/pnas.1514483113","volume":"113","author":"EL Paluck","year":"2016","unstructured":"Paluck EL, Shepherd H, Aronow PM (2016) Changing climates of conflict: a social network experiment in 56 schools. Proc Natl Acad Sci 113(3):566\u2013571","journal-title":"Proc Natl Acad Sci"},{"issue":"14","key":"1123_CR26","doi-asserted-by":"publisher","first-page":"6554","DOI":"10.1073\/pnas.1806108116","volume":"116","author":"X-L Ren","year":"2019","unstructured":"Ren X-L, Gleinig N, Helbing D, Antulov-Fantulin N (2019) Generalized network dismantling. Proc Nat Acad Sci 116(14):6554\u20136559","journal-title":"Proc Nat Acad Sci"},{"key":"1123_CR27","doi-asserted-by":"publisher","first-page":"4787","DOI":"10.1038\/s41467-018-06930-7","volume":"9","author":"C Shao","year":"2018","unstructured":"Shao C, Ciampaglia GL, Varol O, Yang K-C, Flammini A, Menczer F (2018) The spread of low-credibility content by social bots. Nat Commun 9:4787","journal-title":"Nat Commun"},{"key":"1123_CR28","doi-asserted-by":"crossref","unstructured":"Tang Y, Shi Y, Xiao X (2015) Influence maximization in near-linear time: a martingale approach. In: Proceedings of the 2015 ACM SIGMOD international conference on management of data","DOI":"10.1145\/2723372.2723734"},{"key":"1123_CR29","doi-asserted-by":"crossref","unstructured":"Tong G, Du DZ (2019) Beyond uniform reverse sampling: a hybrid sampling technique for misinformation prevention","DOI":"10.1109\/INFOCOM.2019.8737485"},{"issue":"2","key":"1123_CR30","doi-asserted-by":"publisher","first-page":"468","DOI":"10.1109\/TCSS.2018.2818661","volume":"5","author":"G Tong","year":"2018","unstructured":"Tong G, Wu W, Du D (2018) Distributed rumor blocking with multiple positive cascades. IEEE Trans Comput Soc Syst 5(2):468\u2013480","journal-title":"IEEE Trans Comput Soc Syst"},{"issue":"6380","key":"1123_CR31","doi-asserted-by":"publisher","first-page":"1146","DOI":"10.1126\/science.aap9559","volume":"359","author":"S Vosoughi","year":"2018","unstructured":"Vosoughi S, Roy D, Aral S (2018) The spread of true and false news online. Science 359(6380):1146\u20131151","journal-title":"Science"},{"key":"1123_CR32","doi-asserted-by":"crossref","unstructured":"Wang B, Chen G, Fu L, Song L, Wang X (2017) Drimux: dynamic rumor influence minimization with user experience in social networks. IEEE transactions on knowledge and data engineering","DOI":"10.1609\/aaai.v30i1.10063"},{"key":"1123_CR33","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1016\/j.comnet.2017.05.004","volume":"123","author":"P Wu","year":"2017","unstructured":"Wu P, Pan L (2017) Scalable influence blocking maximization in social networks under competitive independent cascade models. Comput Netw 123:38\u201350","journal-title":"Comput Netw"},{"key":"1123_CR34","doi-asserted-by":"crossref","unstructured":"Yan R, Li D, Wu W, Du DZ (2018) Minimizing influence of rumors by blockers on social networks. In: CSoNet","DOI":"10.1007\/978-3-030-04648-4_1"},{"key":"1123_CR35","doi-asserted-by":"crossref","unstructured":"Yan R, Li D, Wu W, Du DZ, Wang Y (2020) Minimizing influence of rumors by blockers on social networks: algorithms and analysis. IEEE transactions on network science and engineering","DOI":"10.1109\/TNSE.2019.2903272"},{"key":"1123_CR36","doi-asserted-by":"crossref","unstructured":"Yao Q, Guo L (2015) Minimizing the social influence from a topic modeling perspective. In: ICDS","DOI":"10.1007\/978-3-319-24474-7_2"},{"key":"1123_CR37","doi-asserted-by":"crossref","unstructured":"Yao Q, Zhou C, Xiang L, Cao Y, Guo L (2014) Minimizing the negative influence by blocking links in social networks. In: ISCTCS","DOI":"10.1007\/978-3-662-47401-3_9"},{"key":"1123_CR38","doi-asserted-by":"crossref","unstructured":"Yao Q, Shi R, Zhou C, Wang P, Guo L (2015) Topic-aware social influence minimization. Proceedings of the 24th international conference on world wide web","DOI":"10.1145\/2740908.2742767"},{"key":"1123_CR39","doi-asserted-by":"crossref","unstructured":"Zhang H, Zhang H, Li X, Thai MT (2015) Limiting the spread of misinformation while effectively raising awareness in social networks. In: Computational social networks - 4th international conference, CSoNet, 9197: 35\u201347","DOI":"10.1007\/978-3-319-21786-4_4"},{"issue":"4","key":"1123_CR40","doi-asserted-by":"publisher","first-page":"897","DOI":"10.1109\/TCSS.2020.2997188","volume":"7","author":"J Zhu","year":"2020","unstructured":"Zhu J, Ni P, Wang G (2020) Activity minimization of misinformation influence in online social networks. IEEE Transact Comput Soc Syst 7(4):897\u2013906","journal-title":"IEEE Transact Comput Soc Syst"}],"container-title":["Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-023-01123-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13278-023-01123-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-023-01123-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,14]],"date-time":"2023-12-14T21:14:40Z","timestamp":1702588480000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13278-023-01123-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,29]]},"references-count":40,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,12]]}},"alternative-id":["1123"],"URL":"https:\/\/doi.org\/10.1007\/s13278-023-01123-7","relation":{},"ISSN":["1869-5469"],"issn-type":[{"value":"1869-5469","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,29]]},"assertion":[{"value":"27 July 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 August 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 August 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 October 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We declare that the authors have no known competing interests or personal relationships that might be perceived to influence the discussion reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"143"}}