{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:05:26Z","timestamp":1775912726444,"version":"3.50.1"},"reference-count":80,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soc. Netw. Anal. Min."],"DOI":"10.1007\/s13278-025-01459-2","type":"journal-article","created":{"date-parts":[[2025,4,21]],"date-time":"2025-04-21T23:29:41Z","timestamp":1745278181000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["A survey on information diffusion and competitive influence maximization in social networks"],"prefix":"10.1007","volume":"15","author":[{"given":"Shano","family":"Solanki","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mukesh","family":"Kumar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rakesh","family":"Kumar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,4,22]]},"reference":[{"key":"1459_CR1","unstructured":"\u201cAmazon co-purchasing network with ground truth communities.\u201d https:\/\/snap.stanford.edu\/data\/com-Amazon.html (Accessed 10 May 2022)."},{"key":"1459_CR2","doi-asserted-by":"publisher","first-page":"123590","DOI":"10.1016\/j.physa.2019.123590","volume":"545","author":"A Ahmad","year":"2020","unstructured":"Ahmad A, Ahmad T, Bhatt A (2020) HWSMCB: a community-based hybrid approach for identifying influential nodes in the social network. Physica A: Statistical Mech Appl 545:123590. https:\/\/doi.org\/10.1016\/j.physa.2019.123590","journal-title":"Physica A: Statistical Mech Appl"},{"key":"1459_CR3","unstructured":"Alavi M, Manavi F, Ansari A, and Hamzeh A, \u201cLBCIM\u202f: loyalty based competitive influence maximization with\u202f? -greedy MCTS strategy,\u201d pp. 1\u201313, 2021."},{"key":"1459_CR4","doi-asserted-by":"publisher","unstructured":"Alkhamees N and Fasli M, \u201cEvent detection from social network streams using frequent pattern mining with dynamic support values,\u201d In: 2016 IEEE international conference on big data (Big Data), pp. 1670\u20131679, 2016, https:\/\/doi.org\/10.1109\/BigData.2016.7840781.","DOI":"10.1109\/BigData.2016.7840781"},{"key":"1459_CR5","doi-asserted-by":"publisher","first-page":"1821","DOI":"10.1016\/j.procs.2020.03.201","volume":"167","author":"MZ Ansari","year":"2020","unstructured":"Ansari MZ, Aziz MB, Siddiqui MO, Mehra H, Singh KP (2020) Analysis of political sentiment orientations on twitter. Procedia Comput Sci 167:1821\u20131828. https:\/\/doi.org\/10.1016\/j.procs.2020.03.201","journal-title":"Procedia Comput Sci"},{"key":"1459_CR6","unstructured":"Ansari A, Dadgar M, Hamzeh A, Schl\u00f6tterer J, and Granitzer M, \u201cCompetitive influence maximization: integrating budget allocation and seed selection,\u201d arXiv, no. Ic, pp. 1\u201317, 2019."},{"key":"1459_CR7","doi-asserted-by":"publisher","unstructured":"Arrami S, Oueslati W, and Akaichi J, (2018) \u201cDetection of opinion leader in social networks: a survey,\u201d Intelligent interactive multimedia systems and services 2017, 76, 362\u2013370, https:\/\/doi.org\/10.1007\/978-3-319-59480-4.","DOI":"10.1007\/978-3-319-59480-4"},{"key":"1459_CR8","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1016\/j.eswa.2018.07.069","volume":"115","author":"SMH Bamakan","year":"2019","unstructured":"Bamakan SMH, Nurgaliev I, Qu Q (2019) Opinion leader detection: a methodological review. Expert Syst Appl 115:200\u2013222. https:\/\/doi.org\/10.1016\/j.eswa.2018.07.069","journal-title":"Expert Syst Appl"},{"issue":"9","key":"1459_CR9","doi-asserted-by":"publisher","first-page":"3417","DOI":"10.1007\/s10115-020-01461-4","volume":"62","author":"S Banerjee","year":"2020","unstructured":"Banerjee S, Jenamani M, Pratihar DK (2020) A survey on influence maximization in a social network. Knowl Inf Syst 62(9):3417\u20133455. https:\/\/doi.org\/10.1007\/s10115-020-01461-4","journal-title":"Knowl Inf Syst"},{"key":"1459_CR10","doi-asserted-by":"crossref","unstructured":"Bharathi S, Kempe D, and Salek M (2007) \u201cCompetitive influence maximization in social networks,\u201d pp. 306\u2013311","DOI":"10.1007\/978-3-540-77105-0_31"},{"issue":"1","key":"1459_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3301286","volume":"52","author":"R Bian","year":"2019","unstructured":"Bian R, Koh YS, Dobbie G, Divoli A (2019) Identifying top-k nodes in social networks: a survey. ACM Comput Surv 52(1):1\u201333. https:\/\/doi.org\/10.1145\/3301286","journal-title":"ACM Comput Surv"},{"key":"1459_CR12","doi-asserted-by":"publisher","unstructured":"Borodin A, Filmus Y, and Oren J, (2010) \u201cThreshold models for competitive influence in social networks,\u201d In: International workshop on internet and network economics, pp. 539\u2013550. https:\/\/doi.org\/10.1007\/978-3-642-17572-5_48.","DOI":"10.1007\/978-3-642-17572-5_48"},{"key":"1459_CR13","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.knosys.2017.07.029","volume":"134","author":"A Bozorgi","year":"2017","unstructured":"Bozorgi A, Samet S, Kwisthout J, Wareham T (2017) Community-based influence maximization in social networks under a competitive linear threshold model. Knowledge-Based Syst 134:149\u2013158. https:\/\/doi.org\/10.1016\/j.knosys.2017.07.029","journal-title":"Knowledge-Based Syst"},{"key":"1459_CR14","doi-asserted-by":"publisher","unstructured":"Carnes T, Nagarajan C, Wild SM, and van Zuylen A, \u201cMaximizing influence in a competitive social network,\u201d In: Proceedings of the ninth international conference on Electronic commerce, pp. 351\u2013360, 2007, https:\/\/doi.org\/10.1145\/1282100.1282167.","DOI":"10.1145\/1282100.1282167"},{"issue":"1","key":"1459_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40649-016-0033-z","volume":"3","author":"W Chen","year":"2016","unstructured":"Chen W, Lin T, Yang C (2016) Real-time topic-aware influence maximization using preprocessing. Comput Soc Netw 3(1):1\u201319. https:\/\/doi.org\/10.1186\/s40649-016-0033-z","journal-title":"Comput Soc Netw"},{"key":"1459_CR16","doi-asserted-by":"publisher","unstructured":"Chen W and Wang Y, (2009) \u201cEfficient influence maximization in social networks categories and subject descriptors,\u201d In: Proceedings of the 15th ACM SIGKDD international conference on knowledge discovery and data mining, pp. 199\u2013207, https:\/\/doi.org\/10.1145\/1557019.1557047.","DOI":"10.1145\/1557019.1557047"},{"key":"1459_CR17","doi-asserted-by":"publisher","unstructured":"Dai Y, (2018) \u201cGroup-based Competitive Influence Maximization,\u201d In: 2018 IEEE smart world, ubiquitous intelligence & computing, advanced & trusted computing, scalable computing & communications, cloud & big data computing, internet of people and smart city innovation, no. 2, pp. 999\u20131006, https:\/\/doi.org\/10.1109\/SmartWorld.2018.00176.","DOI":"10.1109\/SmartWorld.2018.00176"},{"key":"1459_CR18","unstructured":"\u201cDBLP collaboration network and ground-truth communities.\u201d https:\/\/snap.stanford.edu\/data\/com-DBLP.html (Accessed 10 May 2022)."},{"issue":"1","key":"1459_CR19","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1109\/TCSS.2017.2786545","volume":"5","author":"R Dong","year":"2018","unstructured":"Dong R, Li L, Zhang Q, Cai G (2018) Information diffusion on social media during natural disasters. IEEE Trans Comput Soc Syst 5(1):265\u2013276. https:\/\/doi.org\/10.1109\/TCSS.2017.2786545","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"1459_CR20","unstructured":"\u201cFlixster online social network.\u201d http:\/\/konect.cc\/networks\/flixster\/ (Accessed 10 May 2022)."},{"issue":"9","key":"1459_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.7717\/peerj-cs.26","volume":"2015","author":"E Ferrara","year":"2015","unstructured":"Ferrara E, Yang Z (2015) Quantifying the effect of sentiment on information diffusion in social media. PeerJ Comput Sci 2015(9):1\u201315. https:\/\/doi.org\/10.7717\/peerj-cs.26","journal-title":"PeerJ Comput Sci"},{"key":"1459_CR22","unstructured":"\u201cGraph and network repository.\u201d https:\/\/networkrepository.com\/soc.php (Accessed 01 Apr 2024)."},{"key":"1459_CR23","unstructured":"\u201cGeneral relativity and quantum cosmology collaboration network.\u201d https:\/\/snap.stanford.edu\/data\/ca-GrQc.html (Accessed 22 May 2022)."},{"issue":"4","key":"1459_CR24","doi-asserted-by":"publisher","first-page":"2528","DOI":"10.1109\/TNSE.2020.2997021","volume":"7","author":"S Gao","year":"2020","unstructured":"Gao S, Zhang Z, Su S, Wen J, Sun L (2020) Fair-aware competitive event influence maximization in social networks. IEEE Trans Netw Sci Eng 7(4):2528\u20132540. https:\/\/doi.org\/10.1109\/TNSE.2020.2997021","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"1459_CR25","doi-asserted-by":"publisher","unstructured":"Goyal A, Bonchi F, and LVS Lakshmanan, (2010) \u201cLearning influence probabilities in social networks,\u201d In: Proceedings of the third ACM international conference on web search and data mining, p. 241, https:\/\/doi.org\/10.1145\/1718487.1718518.","DOI":"10.1145\/1718487.1718518"},{"issue":"6","key":"1459_CR26","doi-asserted-by":"publisher","first-page":"1360","DOI":"10.1086\/225469","volume":"78","author":"MS Granovetter","year":"1973","unstructured":"Granovetter MS (1973) The strength of weak ties. Am. J. Sociol. 78(6):1360\u20131380. https:\/\/doi.org\/10.1086\/225469","journal-title":"Am. J. Sociol."},{"issue":"4","key":"1459_CR27","doi-asserted-by":"publisher","first-page":"3819","DOI":"10.1007\/s11071-021-06784-7","volume":"105","author":"H Guo","year":"2021","unstructured":"Guo H, Yin Q, Xia C, Dehmer M (2021) Impact of information diffusion on epidemic spreading in partially mapping two-layered time-varying networks. Nonlinear Dyn 105(4):3819\u20133833. https:\/\/doi.org\/10.1007\/s11071-021-06784-7","journal-title":"Nonlinear Dyn"},{"issue":"3","key":"1459_CR28","doi-asserted-by":"publisher","first-page":"201","DOI":"10.3934\/mfc.2018010","volume":"1","author":"M Han","year":"2018","unstructured":"Han M, Li Y (2018) Influence analysis: a survey of the state-of-the-art. Math Found Comput 1(3):201\u2013253. https:\/\/doi.org\/10.3934\/mfc.2018010","journal-title":"Math Found Comput"},{"key":"1459_CR29","doi-asserted-by":"crossref","unstructured":"He X, Song G, Chen W, and Jiang Q, \u201cInfluence blocking maximization in social networks under the competitive linear threshold model,\u201d pp. 463\u2013474, 2012.","DOI":"10.1137\/1.9781611972825.40"},{"key":"1459_CR30","doi-asserted-by":"publisher","first-page":"106600","DOI":"10.1016\/j.knosys.2020.106600","volume":"213","author":"H Huang","year":"2021","unstructured":"Huang H, Meng Z, Shen H (2021) Competitive and complementary influence maximization in social network: a follower\u2019s perspective. Knowl Based Syst 213:106600. https:\/\/doi.org\/10.1016\/j.knosys.2020.106600","journal-title":"Knowl Based Syst"},{"issue":"29","key":"1459_CR31","doi-asserted-by":"publisher","first-page":"10","DOI":"10.17485\/ijst\/2015\/v8i29\/86272","volume":"8","author":"H Jayamangala","year":"2015","unstructured":"Jayamangala H, Sheshasaayee A (2015) A review on models and algorithms to achieve influence maximization in social networks. Indian J Sci Technol 8(29):10\u201313. https:\/\/doi.org\/10.17485\/ijst\/2015\/v8i29\/86272","journal-title":"Indian J Sci Technol"},{"key":"1459_CR32","unstructured":"\u201cKaggle social networks datasets.\u201d https:\/\/www.kaggle.com\/datasets?tags=16502-Social+Networks&page=2 (Accessed 01 Apr 2024)."},{"key":"1459_CR33","unstructured":"Kempe D, \u201cCompetitive Influence Maximization in Social Networks,\u201d In: International workshop on web and internet economics."},{"issue":"1","key":"1459_CR34","doi-asserted-by":"publisher","first-page":"57","DOI":"10.24193\/subbi.2024.1.04","volume":"69","author":"A Kopacz","year":"2024","unstructured":"Kopacz A (2024) Competitive influence maximization in trust-based social networks with deep Q-learning. Stud Univ Babe\u0219-Bolyai Inform 69(1):57\u201369. https:\/\/doi.org\/10.24193\/subbi.2024.1.04","journal-title":"Stud Univ Babe\u0219-Bolyai Inform"},{"issue":"1","key":"1459_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13278-020-00719-7","volume":"11","author":"P Kumar","year":"2021","unstructured":"Kumar P, Sinha A (2021) Information diffusion modeling and analysis for socially interacting networks. Soc Netw Anal Min 11(1):1\u201318. https:\/\/doi.org\/10.1007\/s13278-020-00719-7","journal-title":"Soc Netw Anal Min"},{"key":"1459_CR36","doi-asserted-by":"publisher","unstructured":"Lagnier C, Denoyer L, Gaussier E, and Gallinari P, (2013) \u201cPredicting information diffusion in social networks using content and user\u2019s profiles,\u201d pp. 74\u201385, https:\/\/doi.org\/10.1007\/978-3-642-36973-5_7.","DOI":"10.1007\/978-3-642-36973-5_7"},{"issue":"4","key":"1459_CR37","doi-asserted-by":"publisher","first-page":"118","DOI":"10.3390\/info8040118","volume":"8","author":"M Li","year":"2017","unstructured":"Li M, Wang X, Gao K, Zhang S (2017) A survey on information diffusion in online social networks: models and methods. Information 8(4):118. https:\/\/doi.org\/10.3390\/info8040118","journal-title":"Information"},{"issue":"10","key":"1459_CR38","doi-asserted-by":"publisher","first-page":"1852","DOI":"10.1109\/TKDE.2018.2807843","volume":"30","author":"Y Li","year":"2018","unstructured":"Li Y, Fan J, Wang Y, Tan KL (2018a) Influence maximization on social graphs: a survey. IEEE Trans Knowl Data Eng 30(10):1852\u20131872. https:\/\/doi.org\/10.1109\/TKDE.2018.2807843","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1459_CR39","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1016\/j.jocs.2017.10.015","volume":"28","author":"H Li","year":"2018","unstructured":"Li H, Pan L, Wu P (2018b) Dominated competitive influence maximization with time-critical and time-delayed diffusion in social networks. J Comput Sci 28:318\u2013327. https:\/\/doi.org\/10.1016\/j.jocs.2017.10.015","journal-title":"J Comput Sci"},{"issue":"9","key":"1459_CR40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3604559","volume":"17","author":"Y Li","year":"2023","unstructured":"Li Y, Gao H, Gao Y, Guo J, Weili W (2023) A survey on influence maximization: from an ML-based combinatorial optimization. ACM Trans Knowl Discov Data 17(9):1\u201350. https:\/\/doi.org\/10.1145\/3604559","journal-title":"ACM Trans Knowl Discov Data"},{"key":"1459_CR41","doi-asserted-by":"publisher","unstructured":"Li FH, Te Li C, and Shan MK, \u201cLabeled influence maximization in social networks for target marketing,\u201d In: 2011 IEEE third international conference on privacy, security, risk and trust and 2011 IEEE third international conference on social computing, pp. 560\u2013563, 2011, https:\/\/doi.org\/10.1109\/PASSAT\/SocialCom.2011.152.","DOI":"10.1109\/PASSAT\/SocialCom.2011.152"},{"key":"1459_CR42","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1016\/j.ins.2022.11.041","volume":"619","author":"Z Liang","year":"2023","unstructured":"Liang Z, He Q, Du H, Xu W (2023) Targeted influence maximization in competitive social networks. Inf Sci (Ny) 619:390\u2013405. https:\/\/doi.org\/10.1016\/j.ins.2022.11.041","journal-title":"Inf Sci (Ny)"},{"key":"1459_CR43","first-page":"21350","volume":"202","author":"C Ling","year":"2023","unstructured":"Ling C et al (2023) Deep graph representation learning and optimization for influence maximization. Proc Mach Learn Res 202:21350\u201321361","journal-title":"Proc Mach Learn Res"},{"key":"1459_CR44","doi-asserted-by":"publisher","first-page":"114813","DOI":"10.1016\/j.tcs.2024.114813","volume":"1018","author":"J Liu","year":"2024","unstructured":"Liu J, You Z, Liang Z, Du H (2024) User-driven competitive influence maximization in social networks. Theor. Comput. Sci. 1018:114813. https:\/\/doi.org\/10.1016\/j.tcs.2024.114813","journal-title":"Theor. Comput. Sci."},{"key":"1459_CR45","doi-asserted-by":"publisher","unstructured":"Lu W and Bonchi F, (2013) \u201cThe bang for the buck: fair competitive viral marketing from the host perspective,\u201d In: Proceedings of the 19th ACM SIGKDD international conference on knowledge discovery and data mining, pp. 928\u2013936, https:\/\/doi.org\/10.1145\/2487575.2487649.","DOI":"10.1145\/2487575.2487649"},{"key":"1459_CR46","doi-asserted-by":"publisher","unstructured":"Masucci AM, Silva A (2014) Strategic resource allocation for competitive influence in social networks. In: 2014 52nd annual allerton conference on communication, control, and computing (Allerton)\u00a0, pp. 951\u2013958, https:\/\/doi.org\/10.1109\/ALLERTON.2014.7028557","DOI":"10.1109\/ALLERTON.2014.7028557"},{"key":"1459_CR47","doi-asserted-by":"publisher","unstructured":"Musia\u0142 K and Juszczyszyn K, (2009) \u201cProperties of bridge nodes in social networks,\u201d Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 5796 LNAI, pp. 357\u2013364, https:\/\/doi.org\/10.1007\/978-3-642-04441-0_31","DOI":"10.1007\/978-3-642-04441-0_31"},{"key":"1459_CR48","doi-asserted-by":"publisher","unstructured":"Musia\u0142 P, Katarzyna K and Br\u00f3dka P, (2009) \u201cUser position measures in social networks,\u201d In: Proceedings of the 3rd workshop on social network mining and analysis, pp. 1\u20139. https:\/\/doi.org\/10.1145\/1731011.1731017.","DOI":"10.1145\/1731011.1731017"},{"key":"1459_CR49","unstructured":"\u201cNetworks repository.\u201d https:\/\/networkrepository.com\/ca-netscience.php (Accessed 22 May 2022)."},{"issue":"April","key":"1459_CR50","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1016\/j.tcs.2020.08.030","volume":"840","author":"Q Ni","year":"2020","unstructured":"Ni Q, Guo J, Huang C, Wu W (2020) Community-based rumor blocking maximization in social networks: algorithms and analysis. Theor Comput Sci 840(April):257\u2013269. https:\/\/doi.org\/10.1016\/j.tcs.2020.08.030","journal-title":"Theor Comput Sci"},{"key":"1459_CR51","doi-asserted-by":"publisher","unstructured":"Panagiotou N, Katakis I, and Gunopulos D, \u201cDetecting events in online social networks: Definitions, trends and challenges,\u201d Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 9580, pp. 42\u201384, 2016, https:\/\/doi.org\/10.1007\/978-3-319-41706-6_2.","DOI":"10.1007\/978-3-319-41706-6_2"},{"key":"1459_CR52","doi-asserted-by":"publisher","unstructured":"Parau P, Lemnaru C, Dinsoreanu M, (2017) and R. Potolea, Opinion leader detection, no. 1. Elsevier Inc., https:\/\/doi.org\/10.1016\/B978-0-12-804412-4.00010-3.","DOI":"10.1016\/B978-0-12-804412-4.00010-3"},{"key":"1459_CR53","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.jnca.2018.01.005","volume":"106","author":"S Peng","year":"2018","unstructured":"Peng S, Zhou Y, Cao L, Yu S, Niu J, Jia W (2018) Influence analysis in social networks: a survey. J Netw Comput Appl 106:17\u201332. https:\/\/doi.org\/10.1016\/j.jnca.2018.01.005","journal-title":"J Netw Comput Appl"},{"issue":"11","key":"1459_CR54","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/app9112274","volume":"9","author":"CV Pham","year":"2019","unstructured":"Pham CV, Duong HV, Hoang HX, Thai MT (2019b) Competitive influence maximization within time and budget constraints in online social networks: an algorithmic approach. Appl Sci 9(11):1\u201329. https:\/\/doi.org\/10.3390\/app9112274","journal-title":"Appl Sci"},{"key":"1459_CR55","doi-asserted-by":"publisher","unstructured":"Pham CV, Nguyen NV, Le TX, and Hoang HX, (2019) \u201cCompetitive influence maximization on online social networks: A deterministic modeling approach,\u201d In: 2019 IEEE-RIVF international conference on computing and communication technologies (RIVF), pp. 1\u20136, https:\/\/doi.org\/10.1109\/RIVF.2019.8713676.","DOI":"10.1109\/RIVF.2019.8713676"},{"key":"1459_CR56","unstructured":"\u201cStanford large network dataset collection - epinions social network.\u201d https:\/\/snap.stanford.edu\/data\/soc-Epinions1.html (Accessed 07 May 2022)."},{"key":"1459_CR57","unstructured":"\u201cSocial circles: facebook.\u201d https:\/\/snap.stanford.edu\/data\/ego-Facebook.html (Accessed 10 May 2022)."},{"key":"1459_CR58","unstructured":"\u201cStanford large network dataset collection\u2013Ca-HepPh.\u201d https:\/\/snap.stanford.edu\/data\/ca-HepPh.html (Accessed 07 May 2022)."},{"key":"1459_CR59","unstructured":"\u201cStanford large network dataset collection- Arxiv HEP-TH.\u201d https:\/\/snap.stanford.edu\/data\/cit-HepTh.html (Accessed 07 May 2022)."},{"key":"1459_CR60","unstructured":"\u201cSlashdot social network.\u201d https:\/\/snap.stanford.edu\/data\/soc-Slashdot0902.html (Accessed 10 May 2022)."},{"key":"1459_CR61","doi-asserted-by":"publisher","unstructured":"Salem S, Banitaan S, Aljarah I, Brewer JE, and Alroobi R, (2011) \u201cDiscovering communities in social networks using topology and attributes,\u201d In: 2011 10th international conference on machine learning and applications and workshops, vol. 1, pp. 40\u201343, https:\/\/doi.org\/10.1109\/ICMLA.2011.57.","DOI":"10.1109\/ICMLA.2011.57"},{"key":"1459_CR62","unstructured":"\u201cStanford Large Network Dataset Collection.\u201d https:\/\/snap.stanford.edu\/data\/ (Accessed 03 Dec 2021)."},{"issue":"9","key":"1459_CR63","doi-asserted-by":"publisher","first-page":"7570","DOI":"10.1016\/j.jksuci.2021.08.009","volume":"34","author":"SS Singh","year":"2022","unstructured":"Singh SS, Srivastva D, Verma M, Singh J (2022) Influence maximization frameworks, performance, challenges and directions on social network: a theoretical study. J. King Saud Univ-Comput Inf Sci 34(9):7570\u20137603. https:\/\/doi.org\/10.1016\/j.jksuci.2021.08.009","journal-title":"J. King Saud Univ-Comput Inf Sci"},{"key":"1459_CR64","doi-asserted-by":"publisher","unstructured":"Srinivas A and Velusamy RL, \u201cIdentification of influential nodes from social networks based on enhanced degree centrality measure,\u201d In: 2015 IEEE international advance computing conference (IACC), pp. 1179\u20131184, 2015, https:\/\/doi.org\/10.1109\/IADCC.2015.7154889","DOI":"10.1109\/IADCC.2015.7154889"},{"key":"1459_CR65","doi-asserted-by":"publisher","unstructured":"Sun J and Tang J, 2011 \u201cA survey of models and algorithms for social influence analysis,\u201d Social network data analytics, pp. 177\u2013214, https:\/\/doi.org\/10.1007\/978-1-4419-8462-3_7.","DOI":"10.1007\/978-1-4419-8462-3_7"},{"key":"1459_CR66","doi-asserted-by":"crossref","unstructured":"Tejaswi V, Bindu PV, and Thilagam PS, \u201cDiffusion models and approaches for influence maximization in social networks,\u201d In: Proceedings of IEEE international conference on advances in computing, communications and informatics, 2016, pp. 1345\u20131351.","DOI":"10.1109\/ICACCI.2016.7732235"},{"issue":"1","key":"1459_CR67","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1109\/TNET.2016.2563397","volume":"25","author":"G Tong","year":"2017","unstructured":"Tong G, Weili W, Tang S, Ding-Zhu D (2017) Adaptive influence maximization in dynamic social networks. IEEE\/ACM Trans Netw 25(1):112\u2013125. https:\/\/doi.org\/10.1109\/TNET.2016.2563397","journal-title":"IEEE\/ACM Trans Netw"},{"key":"1459_CR68","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1016\/j.knosys.2017.07.003","volume":"133","author":"D Varshney","year":"2017","unstructured":"Varshney D, Kumar S, Gupta V (2017) Predicting information diffusion probabilities in social networks: a Bayesian networks based approach. Knowl Based Syst 133:66\u201376. https:\/\/doi.org\/10.1016\/j.knosys.2017.07.003","journal-title":"Knowl Based Syst"},{"key":"1459_CR69","unstructured":"\u201cWikipedia vote network.\u201d https:\/\/snap.stanford.edu\/data\/wiki-Vote.html (Accessed 10 May 2022)."},{"issue":"1","key":"1459_CR70","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1103\/PhysRevResearch.3.013157","volume":"3","author":"X Wang","year":"2021","unstructured":"Wang X, Zhu X, Tao X, Xiao J, Wang W, Lai YC (2021) Anomalous role of information diffusion in epidemic spreading. Phys Rev Res 3(1):1\u201314. https:\/\/doi.org\/10.1103\/PhysRevResearch.3.013157","journal-title":"Phys Rev Res"},{"key":"1459_CR71","doi-asserted-by":"publisher","first-page":"107497","DOI":"10.1016\/j.knosys.2021.107497","volume":"233","author":"X Xie","year":"2021","unstructured":"Xie X, Li J, Sheng Y, Wang W, Yang W (2021) Competitive influence maximization considering inactive nodes and community homophily. Knowl Based Syst 233:107497. https:\/\/doi.org\/10.1016\/j.knosys.2021.107497","journal-title":"Knowl Based Syst"},{"key":"1459_CR72","doi-asserted-by":"publisher","unstructured":"Yang J, McAuley J, and Leskovec J, (2013) \u201cCommunity detection in networks with node attributes (extended),\u201d In: 2013 IEEE 13th international conference on data mining, pp. 1151\u20131156, https:\/\/doi.org\/10.1109\/ICDM.2013.167.","DOI":"10.1109\/ICDM.2013.167"},{"issue":"6","key":"1459_CR73","doi-asserted-by":"publisher","first-page":"6503","DOI":"10.1007\/s10489-021-02729-0","volume":"52","author":"J Yang","year":"2022","unstructured":"Yang J, Wu Y (2022) An approach of Bursty event detection in social networks based on topological features. Appl Intell 52(6):6503\u20136521. https:\/\/doi.org\/10.1007\/s10489-021-02729-0","journal-title":"Appl Intell"},{"key":"1459_CR74","doi-asserted-by":"publisher","first-page":"100264","DOI":"10.1016\/j.array.2022.100264","volume":"16","author":"Y Ye","year":"2022","unstructured":"Ye Y, Chen Y, Han W (2022) Influence maximization in social networks: theories, methods and challenges. Array 16:100264. https:\/\/doi.org\/10.1016\/j.array.2022.100264","journal-title":"Array"},{"key":"1459_CR75","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1016\/j.amc.2018.03.050","volume":"332","author":"XX Zhan","year":"2018","unstructured":"Zhan XX et al (2018) Coupling dynamics of epidemic spreading and information diffusion on complex networks. Appl Math Comput 332:437\u2013448. https:\/\/doi.org\/10.1016\/j.amc.2018.03.050","journal-title":"Appl Math Comput"},{"key":"1459_CR76","doi-asserted-by":"publisher","unstructured":"Zhang H, Zhang H, Li X, and Thai MT, \u201cLimiting the spread of misinformation while effectively raising awareness in social networks,\u201d Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 9197, pp. 35\u201347, 2015, https:\/\/doi.org\/10.1007\/978-3-319-21786-4_4.","DOI":"10.1007\/978-3-319-21786-4_4"},{"key":"1459_CR77","unstructured":"Zheng Y, (2018) \u201cA survey\u202f: models, techniques and applications of influence maximization problem,\u201d In: International conference on innovative computing and communications."},{"key":"1459_CR78","doi-asserted-by":"publisher","first-page":"2034","DOI":"10.1016\/j.physa.2017.11.121","volume":"492","author":"H Zhu","year":"2018","unstructured":"Zhu H, Kong Y, Wei J, Ma J (2018) Effect of users\u2019 opinion evolution on information diffusion in online social networks. Phys A Stat Mech Its Appl 492:2034\u20132045. https:\/\/doi.org\/10.1016\/j.physa.2017.11.121","journal-title":"Phys A Stat Mech Its Appl"},{"key":"1459_CR79","doi-asserted-by":"publisher","unstructured":"Zhu Y and Li D, (2018) \u201cHost profit maximization for competitive viral marketing in billion-scale networks,\u201d In: IEEE INFOCOM 2018-IEEE conference on computer communications, pp. 1160\u20131168, https:\/\/doi.org\/10.1109\/INFOCOM.2018.8485904.","DOI":"10.1109\/INFOCOM.2018.8485904"},{"key":"1459_CR80","doi-asserted-by":"publisher","unstructured":"Zhuang H, Sun Y, Tang J, Zhang J, and Sun X, \u201cInfluence maximization in dynamic social networks.,\u201d. In: 2013 IEEE 13th international conference on data mining pp. 1313\u20131318, 2013, https:\/\/doi.org\/10.1109\/ICDM.2013.145.","DOI":"10.1109\/ICDM.2013.145"}],"container-title":["Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-025-01459-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13278-025-01459-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-025-01459-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,17]],"date-time":"2025-12-17T08:29:18Z","timestamp":1765960158000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13278-025-01459-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,22]]},"references-count":80,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["1459"],"URL":"https:\/\/doi.org\/10.1007\/s13278-025-01459-2","relation":{},"ISSN":["1869-5469"],"issn-type":[{"value":"1869-5469","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,22]]},"assertion":[{"value":"26 August 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 February 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 March 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 April 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"41"}}