{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:51:34Z","timestamp":1760709094483,"version":"3.37.3"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,6,27]],"date-time":"2016-06-27T00:00:00Z","timestamp":1466985600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"NUS-Tsinghua Extreme Search (NExT) project","award":["R-252-300-001-490"],"award-info":[{"award-number":["R-252-300-001-490"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Multimed Info Retr"],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1007\/s13735-016-0102-y","type":"journal-article","created":{"date-parts":[[2016,6,27]],"date-time":"2016-06-27T12:25:49Z","timestamp":1467030349000},"page":"137-149","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Learning content\u2013social influential features for influence analysis"],"prefix":"10.1007","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2329-7014","authenticated-orcid":false,"given":"Na","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Hanwang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Meng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Richang","family":"Hong","sequence":"additional","affiliation":[]},{"given":"Tat-Seng","family":"Chua","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,27]]},"reference":[{"key":"102_CR1","doi-asserted-by":"crossref","unstructured":"Bakshy E, Hofman JM, Mason WA, Watts DJ (2011) Everyone\u2019s an influencer: quantifying influence on twitter. In: Proceedings of the 4th ACM international conference on Web search and data mining. ACM, pp 65\u201374","DOI":"10.1145\/1935826.1935845"},{"key":"102_CR2","doi-asserted-by":"crossref","unstructured":"Barbieri N, Bonchi F, Manco G (2012) Topic-aware social influence propagation models. In: Proceedings of the 12th IEEE international conference on data mining. IEEE, pp 81\u201390","DOI":"10.1109\/ICDM.2012.122"},{"issue":"1","key":"102_CR3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1561\/2200000006","volume":"2","author":"Y Bengio","year":"2009","unstructured":"Bengio Y (2009) Learning deep architectures for AI. Found Trends Mach Learn 2(1):1\u2013127","journal-title":"Found Trends Mach Learn"},{"key":"102_CR4","doi-asserted-by":"crossref","unstructured":"Bian J, Yang Y, Chua TS (2014) Predicting trending messages and diffusion participants in microblogging network. In: Proceedings of the 37th international ACM SIGIR conference on Research & development in information retrieval. ACM, pp 537\u2013546","DOI":"10.1145\/2600428.2609616"},{"key":"102_CR5","doi-asserted-by":"crossref","unstructured":"Bordes A, Weston J, Collobert R, Bengio Y et al (2011) Learning structured embeddings of knowledge bases. In: Conference on artificial intelligence","DOI":"10.1609\/aaai.v25i1.7917"},{"key":"102_CR6","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1609\/icwsm.v4i1.14033","volume":"10","author":"M Cha","year":"2010","unstructured":"Cha M, Haddadi H, Benevenuto F, Gummadi PK (2010) Measuring user influence in twitter: the million follower fallacy. ICWSM 10:10\u201317","journal-title":"ICWSM"},{"key":"102_CR7","doi-asserted-by":"crossref","unstructured":"Domingos P, Richardson M (2001) Mining the network value of customers. In: Proceedings of the 7th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, pp 57\u201366","DOI":"10.1145\/502512.502525"},{"key":"102_CR8","doi-asserted-by":"crossref","unstructured":"Dong W, Pentland A (2007) Modeling influence between experts. In: Artifical intelligence for human computing. Springer, Berlin, pp 170\u2013189","DOI":"10.1007\/978-3-540-72348-6_9"},{"key":"102_CR9","unstructured":"Du N, Song L, Yuan M, Smola AJ (2012) Learning networks of heterogeneous influence. In: Advances in neural information processing systems"},{"key":"102_CR10","volume-title":"The development of social network analysis: a study in the sociology of science","author":"LC Freeman","year":"2004","unstructured":"Freeman LC (2004) The development of social network analysis: a study in the sociology of science, vol 1. Empirical Press, Vancouver"},{"issue":"3","key":"102_CR11","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1023\/A:1011122126881","volume":"12","author":"J Goldenberg","year":"2001","unstructured":"Goldenberg J, Libai B, Muller E (2001) Talk of the network: a complex systems look at the underlying process of word-of-mouth. Mark Lett 12(3):211\u2013223","journal-title":"Mark Lett"},{"key":"102_CR12","doi-asserted-by":"crossref","unstructured":"Gomez Rodriguez M, Leskovec J, Krause A (2010) Inferring networks of diffusion and influence. In: Proceedings of the 16th ACM SIGKDD international conference on knowledge discovery and data mining","DOI":"10.1145\/1835804.1835933"},{"key":"102_CR13","doi-asserted-by":"crossref","unstructured":"Goyal A, Bonchi F, Lakshmanan LV (2010) Learning influence probabilities in social networks. In: Proceedings of the 3rd ACM international conference on Web search and data mining. ACM, pp 241\u2013250","DOI":"10.1145\/1718487.1718518"},{"key":"102_CR14","doi-asserted-by":"crossref","unstructured":"Goyal A, Lu W, Lakshmanan LV (2011) Celf++: optimizing the greedy algorithm for influence maximization in social networks. In: Proceedings of the 20th international conference companion on World wide web. ACM, pp 47\u201348","DOI":"10.1145\/1963192.1963217"},{"key":"102_CR15","doi-asserted-by":"crossref","unstructured":"Haveliwala TH (2002) Topic-sensitive pagerank. In: Proceedings of the 11th international conference on World Wide Web. ACM, pp 517\u2013526","DOI":"10.1145\/511446.511513"},{"key":"102_CR16","unstructured":"Heidemann J, Klier M, Probst F. Identifying key users in online social networks: a pagerank based approach. In: Proceedings of 31st international conference on information systems (ICIS)"},{"key":"102_CR17","doi-asserted-by":"crossref","unstructured":"Kempe D, Kleinberg J, Tardos \u00c9 (2003) Maximizing the spread of influence through a social network. In: Proceedings of the 9th ACM SIGKDD international conference on knowledge discovery and data mining. ACM, pp 137\u2013146","DOI":"10.1145\/956750.956769"},{"key":"102_CR18","doi-asserted-by":"crossref","unstructured":"Kwak H, Lee C, Park H, Moon S (2010) What is twitter, a social network or a news media? In: Proceedings of the 19th international conference on World wide web. ACM, pp 591\u2013600","DOI":"10.1145\/1772690.1772751"},{"key":"102_CR19","doi-asserted-by":"crossref","unstructured":"Li N, Gillet D (2013) Identifying influential scholars in academic social media platforms. In: Proceedings of the 2013 IEEE\/ACM international conference on advances in social networks analysis and mining. ACM, pp 608\u2013614","DOI":"10.1145\/2492517.2492614"},{"issue":"8","key":"102_CR20","doi-asserted-by":"crossref","first-page":"1904","DOI":"10.1109\/TKDE.2013.106","volume":"26","author":"B Liu","year":"2014","unstructured":"Liu B, Cong G, Zeng Y, Xu D, Chee YM (2014) Influence spreading path and its application to the time constrained social influence maximization problem and beyond. IEEE Trans Knowl Data Eng 26(8):1904\u20131917","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"102_CR21","doi-asserted-by":"crossref","unstructured":"Liu L, Tang J, Han J, Jiang M, Yang S (2010) Mining topic-level influence in heterogeneous networks. In: Proceedings of the 19th ACM international conference on Information and knowledge management. ACM, pp 199\u2013208","DOI":"10.1145\/1871437.1871467"},{"key":"102_CR22","unstructured":"Mikolov T, Sutskever I, Chen K, Corrado GS, Dean J (2013) Distributed representations of words and phrases and their compositionality. In: Advances in neural information processing systems, pp 3111\u20133119"},{"key":"102_CR23","unstructured":"Morin F, Bengio Y (2005) Hierarchical probabilistic neural network language model. In: AISTATS, vol\u00a05. Citeseer, pp 246\u2013252"},{"key":"102_CR24","doi-asserted-by":"crossref","unstructured":"Perozzi B, Al-Rfou R, Skiena S (2014) Deepwalk: online learning of social representations. In: Proceedings of the 20th ACM SIGKDD international conference on knowledge discovery and data mining","DOI":"10.1145\/2623330.2623732"},{"issue":"1","key":"102_CR25","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1016\/S0893-6080(98)00116-6","volume":"12","author":"N Qian","year":"1999","unstructured":"Qian N (1999) On the momentum term in gradient descent learning algorithms. Neural Netw 12(1):145\u2013151","journal-title":"Neural Netw"},{"key":"102_CR26","first-page":"562","volume":"9","author":"L Rashotte","year":"2007","unstructured":"Rashotte L (2007) Social influence. Blackwell Encycl Soc Psychol 9:562\u2013563","journal-title":"Blackwell Encycl Soc Psychol"},{"key":"102_CR27","doi-asserted-by":"crossref","unstructured":"Richardson M, Domingos P (2002) Mining knowledge-sharing sites for viral marketing. In: Proceedings of the 8th ACM SIGKDD international conference on knowledge discovery and data mining. ACM, pp 61\u201370","DOI":"10.1145\/775047.775057"},{"key":"102_CR28","unstructured":"Rodriguez MG, Balduzzi D, Sch\u00f6lkopf B (2011) Uncovering the temporal dynamics of diffusion networks. arXiv preprint arXiv:1105.0697"},{"key":"102_CR29","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1016\/j.chb.2015.01.005","volume":"46","author":"A Rudat","year":"2015","unstructured":"Rudat A, Buder J (2015) Making retweeting social: the influence of content and context information on sharing news in twitter. Comput Hum Behav 46:75\u201384","journal-title":"Comput Hum Behav"},{"key":"102_CR30","doi-asserted-by":"crossref","unstructured":"Tang J, Sun J, Wang C, Yang Z (2009) Social influence analysis in large-scale networks. In: Proceedings of the 15th ACM SIGKDD international conference on knowledge discovery and data mining. ACM, pp 807\u2013816","DOI":"10.1145\/1557019.1557108"},{"key":"102_CR31","doi-asserted-by":"crossref","unstructured":"Tang L, Liu H (2009) Relational learning via latent social dimensions. In: Proceedings of the 15th ACM SIGKDD international conference on knowledge discovery and data mining. ACM, pp 817\u2013826","DOI":"10.1145\/1557019.1557109"},{"key":"102_CR32","doi-asserted-by":"crossref","unstructured":"Wang S, Hu X, Yu PS, Li Z (2014) Mmrate: inferring multi-aspect diffusion networks with multi-pattern cascades. In: Proceedings of the 20th ACM SIGKDD international conference on knowledge discovery and data mining","DOI":"10.1145\/2623330.2623728"},{"key":"102_CR33","doi-asserted-by":"crossref","unstructured":"Weng J, Lim EP, Jiang J, He Q (2010) Twitterrank: finding topic-sensitive influential twitterers. In: Proceedings of the 3rd ACM international conference on Web search and data mining. ACM, pp 261\u2013270","DOI":"10.1145\/1718487.1718520"},{"issue":"11","key":"102_CR34","first-page":"2649","volume":"8","author":"C Xiao","year":"2013","unstructured":"Xiao C, Zhang Y, Zeng X, Wu Y (2013) Predicting user influence in social media. J Netw 8(11):2649\u20132655","journal-title":"J Netw"},{"key":"102_CR35","unstructured":"Zhang J, Liu B, Tang J, Chen T, Li J (2013) Social influence locality for modeling retweeting behaviors. In: Proceedings of the 23rd international joint conference on artificial intelligence. AAAI Press, pp 2761\u20132767"},{"key":"102_CR36","unstructured":"Zhang M, Sun C, Liu W. Identifying influential users of micro-blogging services: a dynamic action-based network approach. In: Proceedings of PACIS"},{"key":"102_CR37","doi-asserted-by":"crossref","unstructured":"Zhou C, Zhang P, Zang W, Guo L (2015) On the upper bounds of spread for greedy algorithms in social network influence maximization. IEEE Trans Knowl Data Eng 1904\u20131917","DOI":"10.1109\/TKDE.2015.2419659"}],"container-title":["International Journal of Multimedia Information Retrieval"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13735-016-0102-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13735-016-0102-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13735-016-0102-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,19]],"date-time":"2023-08-19T01:20:39Z","timestamp":1692408039000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13735-016-0102-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,27]]},"references-count":37,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,9]]}},"alternative-id":["102"],"URL":"https:\/\/doi.org\/10.1007\/s13735-016-0102-y","relation":{},"ISSN":["2192-6611","2192-662X"],"issn-type":[{"type":"print","value":"2192-6611"},{"type":"electronic","value":"2192-662X"}],"subject":[],"published":{"date-parts":[[2016,6,27]]}}}