{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,14]],"date-time":"2026-05-14T09:41:49Z","timestamp":1778751709390,"version":"3.51.4"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,4,10]],"date-time":"2018-04-10T00:00:00Z","timestamp":1523318400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Netw Sci"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1007\/s41109-018-0062-7","type":"journal-article","created":{"date-parts":[[2018,4,10]],"date-time":"2018-04-10T14:52:49Z","timestamp":1523371969000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":45,"title":["Modeling and maximizing influence diffusion in social networks for viral marketing"],"prefix":"10.1007","volume":"3","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1987-1119","authenticated-orcid":false,"given":"Wenjun","family":"Wang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"W. Nick","family":"Street","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2018,4,10]]},"reference":[{"issue":"2","key":"62_CR1","first-page":"637","volume":"7","author":"L AlSumaidan","year":"2016","unstructured":"AlSumaidan, L, Ykhlef M (2016) Toward information diffusion model for viral marketing in business. Int J Adv Comput Sci Appl 7(2):637\u2013646.","journal-title":"Int J Adv Comput Sci Appl"},{"key":"62_CR2","doi-asserted-by":"crossref","first-page":"603","DOI":"10.1145\/2124295.2124368","volume-title":"5 t h ACM International Conference on Web Search and Data Mining","author":"S Bhagat","year":"2012","unstructured":"Bhagat, S, Goyal A, Lakshmanan L (2012) Maximizing product adoption in social networks In: 5 t h ACM International Conference on Web Search and Data Mining, 603\u2013612.. ACM, New York."},{"key":"62_CR3","doi-asserted-by":"publisher","first-page":"056122","DOI":"10.1103\/PhysRevE.70.056122","volume":"70","author":"M Boguna","year":"2004","unstructured":"Boguna, M, Pastor-Satorras R, Diaz-Guilera A, Arenas A (2004) Models of social networks based on social distance attachment. Phys Rev E 70:056122.","journal-title":"Phys Rev E"},{"key":"62_CR4","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1038\/nature11421","volume":"489","author":"RM Bond","year":"2012","unstructured":"Bond, RM, Fariss CJ, Jones JJ, Kramer ADI, Marlow C, Settle JE, Fowler JH (2012) A 61-million-person experiment in social influence and political mobilization. Nature 489:295\u2013298.","journal-title":"Nature"},{"key":"62_CR5","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1007\/978-3-642-17572-5_48","volume-title":"6 t h International Workshop on Internet and Network Economics","author":"A Borodin","year":"2010","unstructured":"Borodin, A, Eilmus Y, Oren J (2010) Threshold models for competitive influence in social networks In: 6 t h International Workshop on Internet and Network Economics, 539\u2013550.. Springer, Berlin."},{"issue":"3","key":"62_CR6","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1086\/209118","volume":"14","author":"J Brown","year":"1987","unstructured":"Brown, J, Reinegen P (1987) Social ties and word-of-mouth referral behavior. J Consum Res 14(3):350\u2013362.","journal-title":"J Consum Res"},{"issue":"6","key":"62_CR7","doi-asserted-by":"publisher","first-page":"1287","DOI":"10.1086\/228667","volume":"92","author":"RS Burt","year":"1987","unstructured":"Burt, RS (1987) Social contagion and innovation: Cohesion versus structural equivalence. Am J Sociol 92(6):1287\u20131335.","journal-title":"Am J Sociol"},{"issue":"5996","key":"62_CR8","doi-asserted-by":"publisher","first-page":"1194","DOI":"10.1126\/science.1185231","volume":"329","author":"D Centola","year":"2010","unstructured":"Centola, D (2010) The spread of behavior in an online social network experiment. Science 329(5996):1194\u20131197.","journal-title":"Science"},{"issue":"6","key":"62_CR9","doi-asserted-by":"publisher","first-page":"666","DOI":"10.14778\/2735703.2735706","volume":"8","author":"S Chen","year":"2015","unstructured":"Chen, S, Fan J, Li G, Feng J, Tan K, Tang J (2015) Online topic-aware influence maximization. Proc VLDB Endowment 8(6):666\u2013677.","journal-title":"Proc VLDB Endowment"},{"key":"62_CR10","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1137\/1.9781611972818.33","volume-title":"2011 SIAM International Conference on Data Mining","author":"W Chen","year":"2011","unstructured":"Chen, W, Collins A, Cummings R, Ke T, Liu Z, Rincon D, Sun X, Wang Y, Wei W, Yuan Y (2011) Influence maximization in social networks when negative opinions may emerge and propagate In: 2011 SIAM International Conference on Data Mining, 379\u2013390.. SIAM, Philadelphia."},{"key":"62_CR11","volume-title":"Information and Influence Propagation in Social Networks","author":"W Chen","year":"2013","unstructured":"Chen, W, Lakshmanan LVS, Castillo C (2013) Information and Influence Propagation in Social Networks. Morgan & Claypool Publishers, California."},{"key":"62_CR12","first-page":"592","volume-title":"26 t h AAAI Conference on Artificial Intelligence","author":"W Chen","year":"2012","unstructured":"Chen, W, Lu W, Zhang N (2012) Time-critical influence maximization in social networks with time-delayed diffusion process In: 26 t h AAAI Conference on Artificial Intelligence, 592\u2013598.. AAAI Press, Palo Alto."},{"key":"62_CR13","first-page":"88","volume-title":"IEEE 10 t h International Conference on Data Mining","author":"W Chen","year":"2010","unstructured":"Chen, W, Yuan Y, Zhang L (2010) Scalable influence maximization in social networks under the linear threshold model In: IEEE 10 t h International Conference on Data Mining, 88\u201397.. IEEE, Piscataway."},{"key":"62_CR14","first-page":"925","volume-title":"23 r d International Conference on World Wide Web","author":"J Cheng","year":"2014","unstructured":"Cheng, J, Adamic LA, Dow PA, Kleinberg J, Leskovec J (2014) Can cascades be predicted? In: 23 r d International Conference on World Wide Web, 925\u2013936.. ACM, New York."},{"key":"62_CR15","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1056\/NEJMsa066082","volume":"357","author":"NA Christakis","year":"2007","unstructured":"Christakis, NA, Fowler JH (2007) The spread of obesity in a large social network over 32 years. N Engl J Med 357:370\u2013379.","journal-title":"N Engl J Med"},{"key":"62_CR16","first-page":"57","volume-title":"7 t h ACM SIGKDD Conference on Knowledge Discovery and Data Mining","author":"P Domingos","year":"2001","unstructured":"Domingos, P, Richardson M (2001) Mining the network value of customers In: 7 t h ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 57\u201366.. ACM, New York."},{"key":"62_CR17","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511761942","volume-title":"Networks, Crowds, and Markets: Reasoning About a Highly Connected World","author":"D Easley","year":"2010","unstructured":"Easley, D, Kleinberg J (2010) Networks, Crowds, and Markets: Reasoning About a Highly Connected World. Cambridge University Press, Cambridge."},{"issue":"1","key":"62_CR18","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1287\/isre.1120.0461","volume":"24","author":"X Fang","year":"2013","unstructured":"Fang, X, Hu PJ, Li L, Tsai W (2013) Predicting adoption probabilities in social networks. Inf Syst Res 24(1):128\u2013145.","journal-title":"Inf Syst Res"},{"key":"62_CR19","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1145\/2817946.2817965","volume-title":"2015 ACM Conference on Online Social Networks","author":"N Gayraud","year":"2015","unstructured":"Gayraud, N, Pitoura E, Tsaparas P (2015) Diffusion maximization in evolving social networks In: 2015 ACM Conference on Online Social Networks, 125\u2013135.. ACM, New York."},{"key":"62_CR20","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1145\/1718487.1718518","volume-title":"3 r d ACM International Conference on Web Search and Data Mining","author":"A Goyal","year":"2010","unstructured":"Goyal, A, Bonchi F, Lakshmanan LVS (2010) Learning influence probabilities in social networks In: 3 r d ACM International Conference on Web Search and Data Mining, 241\u2013250.. ACM, New York."},{"key":"62_CR21","first-page":"47","volume-title":"20 t h International Conference on World Wide Web","author":"A Goyal","year":"2011","unstructured":"Goyal, A, Lu W, Lakshmanan LVS (2011) CELF++: Optimizing the greedy algorithm for influence maximization in social networks In: 20 t h International Conference on World Wide Web, 47\u201348.. ACM, New York."},{"key":"62_CR22","first-page":"211","volume-title":"IEEE 11 t h International Conference on Data Mining","author":"A Goyal","year":"2011","unstructured":"Goyal, A, Lu W, Lakshmanan LVS (2011) SIMPATH: An efficient algorithm for influence maximization under linear threshold model In: IEEE 11 t h International Conference on Data Mining, 211\u2013220.. IEEE, Piscataway."},{"key":"62_CR23","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1137\/1.9781611972825.40","volume-title":"2012 SIAM Conference on Data Mining","author":"X He","year":"2012","unstructured":"He, X, Song G, Chen W, Jiang Q (2012) Influence blocking maximization in social networks under the competitive linear threshold model In: 2012 SIAM Conference on Data Mining, 463\u2013474.. SIAM, Philadelphia."},{"key":"62_CR24","unstructured":"HEPT Collaboration Network (2009). http:\/\/research.microsoft.com\/en-us\/people\/weic\/graphdata.zip . Accessed 16 Apr 2016."},{"issue":"2","key":"62_CR25","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1214\/088342306000000222","volume":"21","author":"S Hill","year":"2006","unstructured":"Hill, S, Provost F, Volinsky C (2006) Network-based marketing: Identifying likely adopters via consumer networks. Stat Sci 21(2):256\u2013276.","journal-title":"Stat Sci"},{"issue":"6","key":"62_CR26","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1509\/jm.10.0088","volume":"75","author":"O Hinz","year":"2011","unstructured":"Hinz, O, Skiera B, Barrot C, Becker J (2011) Seeding strategies for viral marketing: An empirical comparison. J Mark 75(6):55\u201371.","journal-title":"J Mark"},{"key":"62_CR27","doi-asserted-by":"publisher","first-page":"038702","DOI":"10.1103\/PhysRevLett.103.038702","volume":"103","author":"JL Iribarren","year":"2009","unstructured":"Iribarren, JL, Moro E (2009) Impact of human activity patterns on the dynamics of information diffusion. Phys Rev Lett 103:038702.","journal-title":"Phys Rev Lett"},{"issue":"2","key":"62_CR28","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1287\/mksc.1100.0566","volume":"30","author":"R Iyengar","year":"2011","unstructured":"Iyengar, R, Van den Bulte C, Valente TW (2011) Opinion leadership and social contagion in new product diffusion. Mark Sci 30(2):195\u2013212.","journal-title":"Mark Sci"},{"key":"62_CR29","first-page":"127","volume-title":"25 t h AAAI Conference on Artificial Intelligence","author":"Q Jiang","year":"2011","unstructured":"Jiang, Q, Song G, Cong G, Wang Y, Si W, Xie K (2011) Simulated annealing based influence maximization in social networks In: 25 t h AAAI Conference on Artificial Intelligence, 127\u2013132.. AAAI Press, Palo Alto."},{"key":"62_CR30","first-page":"137","volume-title":"9 t h ACM SIGKDD Conference on Knowledge Discovery and Data Mining","author":"D Kempe","year":"2003","unstructured":"Kempe, D, Kleinberg J, Tardos E (2003) Maximizing the spread of influence through a social network In: 9 t h ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 137\u2013146.. ACM, New York."},{"issue":"4","key":"62_CR31","doi-asserted-by":"publisher","first-page":"105","DOI":"10.4086\/toc.2015.v011a004","volume":"11","author":"D Kempe","year":"2015","unstructured":"Kempe, D, Kleinberg J, Tardos E (2015) Maximizing the spread of influence through a social network. Theory Comput 11(4):105\u2013147.","journal-title":"Theory Comput"},{"issue":"2","key":"62_CR32","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1509\/jmkg.74.2.71","volume":"74","author":"R Kozinets","year":"2010","unstructured":"Kozinets, R, de Valck K, Wojnicki A, Wilner S (2010) Networked narratives: Understanding word-of-mouth in online communities. J Mark 74(2):71\u201389.","journal-title":"J Mark"},{"key":"62_CR33","first-page":"420","volume-title":"13 t h ACM SIGKDD Conference on Knowledge Discovery and Data Mining","author":"J Leskovec","year":"2007","unstructured":"Leskovec, J, Krause A, Guestrin C, Faloutsos C, VanBriesen J, Glance NS (2007) Cost-effective outbreak detection in networks In: 13 t h ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 420\u2013429.. ACM, New York."},{"key":"62_CR34","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1145\/1772690.1772755","volume-title":"19 t h International Conference on World Wide Web","author":"J Leskovec","year":"2010","unstructured":"Leskovec, J, Lang KJ, Mahoney MW (2010) Empirical comparison of algorithms for network community detection In: 19 t h International Conference on World Wide Web, 631\u2013640.. ACM, New York."},{"key":"62_CR35","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1137\/1.9781611972771.60","volume-title":"2007 SIAM International Conference on Data Mining","author":"J Leskovec","year":"2007","unstructured":"Leskovec, J, McGlohon M, Faloutsos, Glance N, Hurst M (2007) Patterns of cascading behavior in large blog graphs In: 2007 SIAM International Conference on Data Mining, 551\u2013556.. SIAM, Philadelphia."},{"key":"62_CR36","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1509\/jmr.11.0305","volume":"50","author":"B Libai","year":"2013","unstructured":"Libai, B, Muller E, Peres R (2013) Decomposing the value of word-of-mouth seeding programs: Acceleration vs. expansion. J Mark Res 50:161\u2013176.","journal-title":"J Mark Res"},{"key":"62_CR37","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1007\/s10618-012-0252-3","volume":"25","author":"L Liu","year":"2012","unstructured":"Liu, L, Tang J, Han J, Yang S (2012) Learning influence from heterogeneous social networks. Data Min Knowl Disc 25:511\u2013544.","journal-title":"Data Min Knowl Disc"},{"key":"62_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.socnet.2014.03.007","volume":"39","author":"AJ Morales","year":"2014","unstructured":"Morales, AJ, Borondo J, Losada JC, Benito RM (2014) Efficiency of human activity on information spreading on twitter. Soc Networks 39:1\u201311.","journal-title":"Soc Networks"},{"key":"62_CR39","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1016\/j.physa.2014.02.003","volume":"402","author":"R Peres","year":"2014","unstructured":"Peres, R (2014) The impact of network characteristics on the diffusion of innovations. Physica A 402:330\u2013343.","journal-title":"Physica A"},{"issue":"3","key":"62_CR40","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/j.ijresmar.2011.04.002","volume":"28","author":"W Rand","year":"2011","unstructured":"Rand, W, Rust RT (2011) Agent-based modeling in marketing: Guidelines for rigor. Int J Res Mark 28(3):181\u2013193.","journal-title":"Int J Res Mark"},{"key":"62_CR41","first-page":"61","volume-title":"8 t h ACM SIGKDD Conference on Knowledge Discovery and Data Mining","author":"M Richardson","year":"2002","unstructured":"Richardson, M, Domingos P (2002) Mining knowledge-sharing sites for viral marketing In: 8 t h ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 61\u201370.. ACM, New York."},{"key":"62_CR42","doi-asserted-by":"crossref","first-page":"695","DOI":"10.1145\/1963405.1963503","volume-title":"20 t h International Conference on World Wide Web","author":"DM Romero","year":"2011","unstructured":"Romero, DM, Meeder B, Kleinberg J (2011) Differences in the mechanics of information diffusion across topics: Idioms, political hashtags, and complex contagion on Twitter In: 20 t h International Conference on World Wide Web, 695\u2013704.. ACM, New York."},{"issue":"3","key":"62_CR43","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1007\/s10618-012-0262-1","volume":"25","author":"C Wang","year":"2012","unstructured":"Wang, C, Chen W, Wang Y (2012) Scalable influence maximization for independent cascade model in large-scale social networks. Data Min Knowl Discov 25(3):545\u2013576.","journal-title":"Data Min Knowl Discov"},{"key":"62_CR44","first-page":"555","volume-title":"2014 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining","author":"W Wang","year":"2014","unstructured":"Wang, W, Street WN (2014) A novel algorithm for community detection and influence ranking in social networks In: 2014 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining, 555\u2013560.. IEEE, Piscataway."},{"key":"62_CR45","doi-asserted-by":"crossref","unstructured":"Wang, W, Street WN (2015a) Modeling influence diffusion to uncover influence centrality and community structure in social networks. Soc Netw Anal Min 5:15.","DOI":"10.1007\/s13278-015-0254-4"},{"key":"62_CR46","doi-asserted-by":"crossref","unstructured":"Wang, W, Street WN (2015b) Finding hierarchical communities in complex networks using influence-guided label propagation In: 15 t h International Conference on Data Mining Workshops, 547\u2013556.. IEEE, Piscataway.","DOI":"10.1109\/ICDMW.2015.58"},{"issue":"1165","key":"62_CR47","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1098\/rstb.1986.0056","volume":"314","author":"JG White","year":"1986","unstructured":"White, JG, Southgate E, Thomson JN, Brenner S (1986) The structure of the nervous system of the nematode Caenorhabditis elegans. Philos Trans R Soc B 314(1165):1\u2013340.","journal-title":"Philos Trans R Soc B"},{"key":"62_CR48","unstructured":"Wikipedia Who-vote-whom Network (2010). https:\/\/snap.stanford.edu\/data\/wiki-Vote.html . Accessed 5 June 2016."}],"container-title":["Applied Network Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41109-018-0062-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s41109-018-0062-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41109-018-0062-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,18]],"date-time":"2022-08-18T21:02:28Z","timestamp":1660856548000},"score":1,"resource":{"primary":{"URL":"https:\/\/appliednetsci.springeropen.com\/articles\/10.1007\/s41109-018-0062-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,10]]},"references-count":48,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["62"],"URL":"https:\/\/doi.org\/10.1007\/s41109-018-0062-7","relation":{},"ISSN":["2364-8228"],"issn-type":[{"value":"2364-8228","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,4,10]]},"assertion":[{"value":"8 December 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 March 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 April 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Publisher\u2019s Note"}}],"article-number":"6"}}