{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T21:02:41Z","timestamp":1768424561417,"version":"3.49.0"},"reference-count":124,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T00:00:00Z","timestamp":1765411200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T00:00:00Z","timestamp":1768348800000},"content-version":"vor","delay-in-days":34,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/100000084","name":"Directorate for Engineering","doi-asserted-by":"publisher","award":["CMMI-2428625"],"award-info":[{"award-number":["CMMI-2428625"]}],"id":[{"id":"10.13039\/100000084","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000143","name":"Division of Computing and Communication Foundations","doi-asserted-by":"publisher","award":["OAC-1916805"],"award-info":[{"award-number":["OAC-1916805"]}],"id":[{"id":"10.13039\/100000143","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Netw Sci"],"DOI":"10.1007\/s41109-025-00758-z","type":"journal-article","created":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T13:34:47Z","timestamp":1765460087000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Blocking simple and complex social contagions using dominating set heuristics"],"prefix":"10.1007","volume":"11","author":[{"given":"Robert Chen","family":"Bao","sequence":"first","affiliation":[]},{"given":"Matthew","family":"Hancock","sequence":"additional","affiliation":[]},{"given":"Chris J.","family":"Kuhlman","sequence":"additional","affiliation":[]},{"given":"S. S.","family":"Ravi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,11]]},"reference":[{"key":"758_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3389\/fdata.2022.796897","volume":"5","author":"A Adiga","year":"2022","unstructured":"Adiga A, Palmer N, Baek YY, Mortveit H, Ravi S (2022) Network models and simulation analytics for multi-scale dynamics of biological invasions. Front Big Data 5:1\u201317","journal-title":"Front Big Data"},{"key":"758_CR2","doi-asserted-by":"crossref","unstructured":"Adiga A et al (2018a) Graphical dynamical systems and their applications to bio-social systems. Int J Adv Eng Sci Appl Math 11(2):153\u2013171","DOI":"10.1007\/s12572-018-0237-6"},{"key":"758_CR3","unstructured":"Adiga A, Kuhlman CJ, Marathe MV, Ravi SS, Rosenkrantz DJ, Stearns RE (2018b) Inferring users\u2019 choice functions in networked social systems through active queries. In: 7th international workshop on computational social choice (COMSOC), pp 1\u201319"},{"key":"758_CR4","unstructured":"Ahmed NK, et\u00a0al (2020) net.science: a cyberinfrastructure for sustained innovation in network science and engineering. In: Gateway conference, pp 71\u201374"},{"key":"758_CR5","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1038\/35019019","volume":"406","author":"R Albert","year":"2000","unstructured":"Albert R, Jeong H, Barabasi A (2000) Error and attack tolerance of complex networks. Nature 406:378\u2013382","journal-title":"Nature"},{"key":"758_CR6","doi-asserted-by":"crossref","unstructured":"Amos K, Kuhlman CJ, Ravi SS (2020) Despotic regimes instilling fear in citizens to suppress protests. In: ASONAM, pp 369\u2013373","DOI":"10.1109\/ASONAM49781.2020.9381455"},{"key":"758_CR7","doi-asserted-by":"publisher","first-page":"3273","DOI":"10.1140\/epjs\/s11734-021-00138-5","volume":"230","author":"S Ansari","year":"2021","unstructured":"Ansari S, Anvari M, Pfeffer O, Molkenthin N, Moosavi MR, Hellmann F, Heitzig J, Kurths J (2021) Moving the epidemic tipping point through topologically targeted social distancing. Eur Phys J Spec Top 230:3273\u20133280","journal-title":"Eur Phys J Spec Top"},{"key":"758_CR8","doi-asserted-by":"publisher","first-page":"14753","DOI":"10.1038\/ncomms14753","volume":"8","author":"S Aral","year":"2017","unstructured":"Aral S, Nicolaides C (2017) Exercise contagion in a global social network. Nat Commun 8:14753","journal-title":"Nat Commun"},{"key":"758_CR9","doi-asserted-by":"crossref","unstructured":"Bao RC, Hancock M, Kuhlman CJ, Ravi SS (2022) Using dominating sets to block contagions in social networks. In: IEEE\/ACM international conference on advances in social networks analysis and mining (ASONAM), pp 22\u201325","DOI":"10.1109\/ASONAM55673.2022.10068610"},{"key":"758_CR10","unstructured":"Berge C (1962) Theory of graphs and its applications. Methuen"},{"key":"758_CR11","doi-asserted-by":"crossref","unstructured":"Beutel A, Prakash BA, Rosenfeld R, Faloutsos C (2012) Interacting viruses in networks: can both survive? In: KDD, pp 426\u2013434","DOI":"10.1145\/2339530.2339601"},{"key":"758_CR12","first-page":"7","volume":"64","author":"C Biro","year":"2012","unstructured":"Biro C, Czabarka E, Dankelmann P, Szekely LA (2012) Remarks on the domination number of graphs. Bull Inst Combin Appl 64:7","journal-title":"Bull Inst Combin Appl"},{"key":"758_CR13","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/s41745-021-00260-2","volume":"101","author":"KR Bissett","year":"2021","unstructured":"Bissett KR, Cadena J, Khan M, Kuhlman CJ (2021) Agent-based computational epidemiological modeling. J Indian Inst Sci 101:303\u2013327","journal-title":"J Indian Inst Sci"},{"key":"758_CR14","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1038\/s41592-020-0856-2","volume":"17","author":"ON Bj\u00f8rnstad","year":"2020","unstructured":"Bj\u00f8rnstad ON, Shea K, Krzywinski M, Altman N (2020) The SEIRS model for infectious disease dynamics: realistic models of epidemics account for latency, loss of immunity, births and deaths. Nat Methods 17:557\u2013558","journal-title":"Nat Methods"},{"key":"758_CR15","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.92.062814","volume":"92","author":"D Broder-Rodgers","year":"2015","unstructured":"Broder-Rodgers D, P\u00e9rez-Reche FJ, Taraskin SN (2015) Effects of local and global network connectivity on synergistic epidemics. Phys Rev E 92:062814","journal-title":"Phys Rev E"},{"key":"758_CR16","unstructured":"Bump P (2024) Ted Cruz pushes the GOP\u2019s immigrant-voting lie deeper into the slime. [Online]. Available: https:\/\/www.washingtonpost.com\/politics\/2024\/07\/16\/ted-cruz-rnc-speech-immigration-voting\/"},{"key":"758_CR17","doi-asserted-by":"crossref","unstructured":"Campan A, Truta TM, Beckerich M (2015) Efficient approximation algorithms to determine minimum partial dominating sets in social networks. In: International conference on big data, pp 2390\u20132397","DOI":"10.1109\/BigData.2015.7364032"},{"key":"758_CR18","unstructured":"Campan A, Truta TM, Beckerich M (2015) Fast dominating set algorithms for social networks. In: Modern artificial intelligence and cognitive science conference (MAICS), pp 55\u201362"},{"key":"758_CR19","doi-asserted-by":"crossref","unstructured":"Carscadden HL, Kuhlman CJ, Marathe MV, Ravi SS, Rosenkrantz DJ (2020) Blocking the propagation of two simultaneous contagions over networks. In: International conference on complex networks and applications (complex networks), pp 455\u2013468","DOI":"10.1007\/978-3-030-65347-7_38"},{"issue":"3","key":"758_CR20","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1017\/nws.2022.18","volume":"10","author":"HL Carscadden","year":"2022","unstructured":"Carscadden HL, Kuhlman CJ, Marathe MV, Ravi SS, Rosenkrantz DJ (2022) Techniques for blocking the propagation of two simultaneous contagions over networks using a graph dynamical systems framework. Netw Sci 10(3):234\u2013260","journal-title":"Netw Sci"},{"key":"758_CR21","doi-asserted-by":"crossref","unstructured":"Castiglioni M, Ferraioli D, Gatti N (2020) Election control in social networks via edge addition or removal. In: The Thirty-Fourth AAAI conference on artificial intelligence (AAAI), pp 1878\u20131885","DOI":"10.1609\/aaai.v34i02.5556"},{"key":"758_CR22","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1080\/00222500802536988","volume":"33","author":"D Centola","year":"2009","unstructured":"Centola D (2009) Failure in complex social networks. J Math Sociol 33:64\u201368","journal-title":"J Math Sociol"},{"key":"758_CR23","doi-asserted-by":"publisher","first-page":"1194","DOI":"10.1126\/science.1185231","volume":"329","author":"D Centola","year":"2010","unstructured":"Centola D (2010) The spread of behavior in an online social network experiment. Science 329:1194\u20131197","journal-title":"Science"},{"key":"758_CR24","doi-asserted-by":"publisher","first-page":"1269","DOI":"10.1126\/science.1207055","volume":"334","author":"D Centola","year":"2011","unstructured":"Centola D (2011) An experimental study of homophily in the adoption of health behavior. Science 334:1269\u20131272","journal-title":"Science"},{"key":"758_CR25","doi-asserted-by":"publisher","first-page":"702","DOI":"10.1086\/521848","volume":"113","author":"D Centola","year":"2007","unstructured":"Centola D, Macy M (2007) Complex contagions and the weakness of long ties. Am J Sociol 113:702\u2013734","journal-title":"Am J Sociol"},{"key":"758_CR26","doi-asserted-by":"publisher","first-page":"1116","DOI":"10.1126\/science.aas8827","volume":"360","author":"D Centola","year":"2018","unstructured":"Centola D, Becker J, Brackbill D, Baronchelli A (2018) Social contagion theory: examining dynamic social networks and human behavior. Science 360:1116\u20131119","journal-title":"Science"},{"issue":"4","key":"758_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1284680.1284681","volume":"10","author":"D Chakrabarti","year":"2008","unstructured":"Chakrabarti D, Wang Y, Wang C, Leskovec J, Faloutsos C (2008) Epidemic thresholds in real networks. ACM Trans Inf Syst Secur 10(4):1\u201326","journal-title":"ACM Trans Inf Syst Secur"},{"issue":"12","key":"758_CR28","doi-asserted-by":"publisher","DOI":"10.1063\/1.5053911","volume":"28","author":"X-L Chen","year":"2018","unstructured":"Chen X-L, Cai S-M, Tang M, Wang W et al (2018) Controlling epidemic outbreak based on local dynamic infectiousness on complex networks. Chaos 28(12):123105","journal-title":"Chaos"},{"key":"758_CR29","doi-asserted-by":"publisher","first-page":"066102","DOI":"10.1103\/PhysRevE.68.066102","volume":"68","author":"G Chowell","year":"2003","unstructured":"Chowell G, Hyman JM, Eubank S, Castillo-Chavez C (2003) Scaling laws for the movement of people between locations in a large city. Phys Rev E 68:066102","journal-title":"Phys Rev E"},{"issue":"4","key":"758_CR30","doi-asserted-by":"publisher","first-page":"556","DOI":"10.1002\/sim.5408","volume":"32","author":"NA Christakis","year":"2013","unstructured":"Christakis NA, Fowler JH (2013) Social contagion theory: examining dynamic social networks and human behavior. Stat Med 32(4):556\u2013577","journal-title":"Stat Med"},{"issue":"1","key":"758_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-020-73510-5","volume":"10","author":"M Cinelli","year":"2020","unstructured":"Cinelli M, Quattrociocchi W, Galeazzi A, Valensise CM, Brugnoli E, Schmidt AL, Zola P, Zollo F, Scala A (2020) The COVID-19 social media infodemic. Sci Rep 10(1):1\u201310","journal-title":"Sci Rep"},{"key":"758_CR32","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.91.247901","volume":"91","author":"R Cohen","year":"2003","unstructured":"Cohen R, Havlin S, Ben-Avraham D (2003) Efficient immunization strategies for computer networks and populations. Phys Rev Lett 91:247901","journal-title":"Phys Rev Lett"},{"key":"758_CR33","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1080\/15427951.2005.10129105","volume":"2","author":"C Cooper","year":"2005","unstructured":"Cooper C, Klasing R, Zito M (2005) Lower bounds and algorithms for dominating sets in web graphs. Internet Math 2:275\u2013300","journal-title":"Internet Math"},{"key":"758_CR34","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.65.055103","volume":"65","author":"Z Dezso","year":"2002","unstructured":"Dezso Z, Barabasi A (2002) Halting viruses in scale-free networks. Phys Rev E 65:055103","journal-title":"Phys Rev E"},{"issue":"4","key":"758_CR35","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1016\/j.jtbi.2004.09.006","volume":"232","author":"P Dodds","year":"2005","unstructured":"Dodds P, Watts D (2005) A generalized model of social and biological contagion. J Theor Biol 232(4):587\u2013604","journal-title":"J Theor Biol"},{"issue":"6","key":"758_CR36","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1145\/2184319.2184338","volume":"55","author":"B Doerr","year":"2012","unstructured":"Doerr B, Fouz M, Friedrich T (2012) Why rumors spread so quickly in social networks. Commun ACM 55(6):70\u201375","journal-title":"Commun ACM"},{"key":"758_CR37","doi-asserted-by":"publisher","first-page":"1615","DOI":"10.1016\/j.dam.2008.09.012","volume":"157","author":"P Dreyer","year":"2009","unstructured":"Dreyer P, Roberts F (2009) Irreversible $$k$$-threshold processes: graph-theoretical threshold models of the spread of disease and opinion. Discret Appl Math 157:1615\u20131627","journal-title":"Discret Appl Math"},{"key":"758_CR38","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511761942","volume-title":"Networks, crowds and markets: reasoning about a highly connected world","author":"D Easley","year":"2010","unstructured":"Easley D, Kleinberg J (2010) Networks, crowds and markets: reasoning about a highly connected world. Cambridge University Press, Cambridge"},{"key":"758_CR39","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.jtbi.2015.02.005","volume":"371","author":"EA Enns","year":"2015","unstructured":"Enns EA, Brandeau ML (2015) Link removal for the control of stochastically evolving epidemics over networks: a comparison of approaches. J Theor Biol 371:154\u2013165","journal-title":"J Theor Biol"},{"key":"758_CR40","first-page":"17","volume":"5","author":"P Erdos","year":"1960","unstructured":"Erdos P, Renyi A (1960) On the evolution of random graphs. Publ Math Inst Hung Acad Sci 5:17\u201361","journal-title":"Publ Math Inst Hung Acad Sci"},{"key":"758_CR41","unstructured":"Eren A (2013) Protests in Turkey: The timeline and what people on the street want. http:\/\/subjektif.org\/protests-in-turkey-the-timeline-and-what-people-on-the-street-want\/"},{"key":"758_CR42","doi-asserted-by":"crossref","unstructured":"Ersoy C (2015) Chapter 5. A place for revolution: Urban space in the Arab Spring. In: The Arab revolution of 2011: a comparative perspective. In: Arjomand SA, Ersoy C, Fathi K, Filiu J-P, Goldstone JA et\u00a0al (eds), State University of New York, pp 112\u2013131","DOI":"10.2307\/jj.18473006.10"},{"key":"758_CR43","unstructured":"Eubank S, Kumar VSA, Marathe M, Srinivasan A, Wang N (2004) Structural and algorithmic aspects of massive social networks. In: ACM-SIAM symposium on discrete algorithms, pp 718\u2013727"},{"key":"758_CR44","doi-asserted-by":"crossref","unstructured":"Fabbri F, Wang Y, Bonchi F, Castillo C, Mathioudakis M (2022) Rewiring what-to-watch-next recommendations to reduce radicalization pathways. In: Proceedings of the ACM Web conference (WWW), pp 2719\u20132728","DOI":"10.1145\/3485447.3512143"},{"key":"758_CR45","unstructured":"Farajtabar M, Yang J, Ye X, Xu H, Trivedi R, Khalil E, Li S, Song L, Zha H (2017) Fake news mitigation via point process based intervention. In: ICML, pp 1097\u20131106"},{"key":"758_CR46","volume-title":"Trigger Points: inside the mission to stop mass shootings in America","author":"M Follman","year":"2022","unstructured":"Follman M (2022) Trigger Points: inside the mission to stop mass shootings in America. HarperCollins, New York"},{"key":"758_CR47","unstructured":"Garey MR, Johnson DS (1979) Computers and intractability: a Guide to the theory of NP-completeness. Freeman"},{"issue":"3","key":"758_CR48","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1257\/jel.20151228","volume":"54","author":"P Glasserman","year":"2016","unstructured":"Glasserman P, Young HP (2016) Contagion in financial networks. J Econ Lit 54(3):779\u2013831","journal-title":"J Econ Lit"},{"issue":"3","key":"758_CR49","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1023\/A:1011122126881","volume":"12","author":"J Goldenberg","year":"2001","unstructured":"Goldenberg J, Libai B, Muller E (2001) Talk of the network: a complex systems look at the underlying process of word-of-mouth. Mark Lett 12(3):211\u2013223","journal-title":"Mark Lett"},{"issue":"1","key":"758_CR50","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/srep00197","volume":"1","author":"S Gonzalez-Bailon","year":"2011","unstructured":"Gonzalez-Bailon S et al (2011) The dynamics of protest recruitment through an online network. Sci Rep 1(1):1\u20137","journal-title":"Sci Rep"},{"key":"758_CR51","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1016\/j.jda.2005.03.002","volume":"4","author":"F Grandoni","year":"2006","unstructured":"Grandoni F (2006) A note on the complexity of minimum dominating set. J Discrete Algorithms 4:209\u2013221","journal-title":"J Discrete Algorithms"},{"issue":"6","key":"758_CR52","doi-asserted-by":"publisher","first-page":"1420","DOI":"10.1086\/226707","volume":"83","author":"M Granovetter","year":"1978","unstructured":"Granovetter M (1978) Threshold models of collective behavior. Am J Sociol 83(6):1420\u20131443","journal-title":"Am J Sociol"},{"key":"758_CR53","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.96.208701","volume":"96","author":"T Gross","year":"2006","unstructured":"Gross T, D\u2019Lima CJD, Blasius B (2006) Epidemic dynamics on an adaptive network. Phys Rev Lett 96:208701","journal-title":"Phys Rev Lett"},{"key":"758_CR54","volume-title":"Fundamentals of domination in graphs","author":"TW Haynes","year":"1998","unstructured":"Haynes TW, Hedetniemi ST, Slater PJ (1998) Fundamentals of domination in graphs. Marcel Dekker, New York"},{"key":"758_CR55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51117-3","volume-title":"Topics in domination in graphs","author":"TW Haynes","year":"2020","unstructured":"Haynes TW, Hedetniemi ST, Henning MA (2020) Topics in domination in graphs. Springer, Cham"},{"key":"758_CR56","doi-asserted-by":"publisher","first-page":"2789","DOI":"10.1109\/TVT.2016.2585591","volume":"66","author":"Z He","year":"2016","unstructured":"He Z, Cai Z, Yu J, Wang X, Sun Y, Li D (2016) Cost-efficient strategies for restraining rumor spreading in mobile social networks. IEEE Trans Veh Technol 66:2789\u20132800","journal-title":"IEEE Trans Veh Technol"},{"key":"758_CR57","doi-asserted-by":"crossref","unstructured":"He J, Liang H, Yuan H (2011) Controlling infection by blocking nodes and links simultaneously. In: Proceedings of the 7th international workshop on internet and network economics (WINE). In: N.C. etal. (ed.), Singapore: Springer, pp 206\u2013217","DOI":"10.1007\/978-3-642-25510-6_18"},{"key":"758_CR58","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/978-3-030-51117-3_7","volume-title":"Topics in domination in graphs","author":"MA Henning","year":"2020","unstructured":"Henning MA (2020) Distance domination in graphs. In: Haynes TW, Hedetniemi ST, Henning MA (eds) Topics in domination in graphs. Springer, Cham, pp 205\u2013250"},{"key":"758_CR59","doi-asserted-by":"publisher","DOI":"10.1016\/j.copsyc.2025.101994","volume":"62","author":"M Janas","year":"2025","unstructured":"Janas M, Nikiforakis N, Siegenthaler S (2025) Predicting norm change using threshold models. Curr Opin Psychol 62:101994","journal-title":"Curr Opin Psychol"},{"key":"758_CR60","doi-asserted-by":"crossref","unstructured":"Janas M, Nikiforakis N, Siegenthaler S (2024) Eliciting thresholds for interdependent behavior. NBER Working. 32847, Tech Rep","DOI":"10.3386\/w32847"},{"key":"758_CR61","doi-asserted-by":"crossref","unstructured":"Kempe D, Kleinberg J, Tardos E (2003) Maximizing the spread of influence through a social network. In: Proceedings ACM international conference on data mining and knowledge discovery (KDD), pp 137\u2013146","DOI":"10.1145\/956750.956769"},{"key":"758_CR62","unstructured":"Kimura M, Saito K, Motoda H (2008) Minimizing the spread of contamination by blocking links in a network. In: Proceedings of the 23rd national conference on artificial intelligence - Vol 2, pp 1175\u20131180"},{"key":"758_CR63","unstructured":"Kuhlman CJ, Kumar VSA, Marathe MV, Ravi SS et\u00a0al (2011) Inhibiting the diffusion of contagions in bi-threshold systems: analytical and experimental results. In: Complex adaptive systems: energy, information and intelligence (CAS-AAAI), pp 91\u2013100"},{"key":"758_CR64","doi-asserted-by":"crossref","unstructured":"Kuhlman CJ, Tuli G, Marathe MV, Ravi SS, Swarup S (2013) Blocking simple and complex contagion by edge removal. In: ICDM, pp 399\u2013408","DOI":"10.1109\/ICDM.2013.47"},{"key":"758_CR65","doi-asserted-by":"publisher","first-page":"2121","DOI":"10.1016\/j.comnet.2012.11.025","volume":"57","author":"CJ Kuhlman","year":"2013","unstructured":"Kuhlman CJ, Kumar VSA, Ravi SS (2013) Controlling opinion propagation in online networks. Comput Netw 57:2121\u20132132","journal-title":"Comput Netw"},{"key":"758_CR66","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1007\/s10618-014-0351-4","volume":"29","author":"CJ Kuhlman","year":"2015","unstructured":"Kuhlman CJ, Kumar VA, Marathe MV, Ravi SS, Rosenkrantz DJ (2015) Inhibiting diffusion of complex contagions in social networks. Data Min Knowl Discov (DMKD) 29:423\u2013465","journal-title":"Data Min Knowl Discov (DMKD)"},{"key":"758_CR67","doi-asserted-by":"publisher","first-page":"1528","DOI":"10.1086\/230671","volume":"100","author":"T Kuran","year":"1995","unstructured":"Kuran T (1995) The inevitability of future revolutionary surprises. Am J Sociol 100:1528\u20131551","journal-title":"Am J Sociol"},{"key":"758_CR68","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2025.103701","volume":"155","author":"DC Kutner","year":"2026","unstructured":"Kutner DC, Larios-Jones L (2026) Temporal reachability dominating sets: contagion in temporal graphs. J Comput Syst Sci 155:103701","journal-title":"J Comput Syst Sci"},{"key":"758_CR69","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.cosrev.2018.02.002","volume":"28","author":"M Lalou","year":"2018","unstructured":"Lalou M, Tahraoui MA, Kheddouci H (2018) The critical node detection problem in networks: a survey. Comput Sci Rev 28:92\u2013117","journal-title":"Comput Sci Rev"},{"key":"758_CR70","doi-asserted-by":"crossref","unstructured":"Le LT, Eliassi-Rad T, Tong H (2015) Met: A fast algorithm for minimizing propagation in large graphs with small eigen-gaps. In: Proceedings of the SIAM international conference on data mining (SDM), pp 694\u2013702","DOI":"10.1137\/1.9781611974010.78"},{"key":"758_CR71","unstructured":"Leskovec J, Krevl A (2014) SNAP Datasets: stanford large network dataset collection. http:\/\/snap.stanford.edu\/data"},{"key":"758_CR72","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1016\/0012-365X(75)90058-8","volume":"13","author":"L Lovasz","year":"1975","unstructured":"Lovasz L (1975) On the ratio of optimal integral and fractional covers. Discret Math 13:383\u2013390","journal-title":"Discret Math"},{"key":"758_CR73","doi-asserted-by":"publisher","first-page":"20140409","DOI":"10.1098\/rsif.2014.0409","volume":"11","author":"K Lum","year":"2014","unstructured":"Lum K, Swarup S, Eubank S, Hawdon J (2014) The contagious nature of imprisonment: an agent-based model to explain racial disparities in incarceration rates. J R Soc Interfac 11:20140409","journal-title":"J R Soc Interfac"},{"issue":"3","key":"758_CR74","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1097\/YCO.0000000000000858","volume":"36","author":"V Mart\u00ednez","year":"2023","unstructured":"Mart\u00ednez V, Jim\u00e9nez-Molina \u00c1, Gerber MM (2023) Extreme overvalued beliefs. Curr Opin Psychiatry 36(3):237\u2013242","journal-title":"Curr Opin Psychiatry"},{"key":"758_CR75","doi-asserted-by":"publisher","first-page":"20140694","DOI":"10.1098\/rsif.2014.0694","volume":"11","author":"K M\u00e1rton","year":"2014","unstructured":"M\u00e1rton K, Gerardo I, Kimmo K, J\u00e1nos K (2014) Complex contagion process in spreading of online innovation. J R Soc Interface 11:20140694","journal-title":"J R Soc Interface"},{"key":"758_CR76","doi-asserted-by":"crossref","unstructured":"Meo PD, Ferrara E, Fiumara G, Provetti A (2011) Generalized louvain method for community detection in large networks. In: International conference on intelligent systems design and applications (ISDA), pp 88\u201393","DOI":"10.1109\/ISDA.2011.6121636"},{"key":"758_CR77","doi-asserted-by":"publisher","first-page":"14580","DOI":"10.1038\/s41598-018-32643-4","volume":"8","author":"B Min","year":"2018","unstructured":"Min B, Miguel MS (2018) Competition and dual users in complex contagion processes. Sci Rep 8:14580","journal-title":"Sci Rep"},{"key":"758_CR78","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1038\/srep01736","volume":"3","author":"F Molnar","year":"2013","unstructured":"Molnar F, Sreenivasan S, Szymanski K, Korniss G (2013) Minimum dominating sets in scale-free network ensembles. Sci Rep 3:383\u2013390","journal-title":"Sci Rep"},{"key":"758_CR79","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/srep08321","volume":"5","author":"F Molnar","year":"2015","unstructured":"Molnar F, Derszy N, Szymanski K, Korniss G (2015) Building damage-resilient dominating sets in complex networks against random and targeted attacks. Sci Rep 5:1\u201311","journal-title":"Sci Rep"},{"key":"758_CR80","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0184148","volume":"12","author":"B M\u00f8nsted","year":"2017","unstructured":"M\u00f8nsted B, Sapiezynski P, Ferrara E, Lehmann S (2017) Evidence of complex contagion of information in social media: An experiment using twitter bots. PLoS ONE 12:e0184148","journal-title":"PLoS ONE"},{"key":"758_CR81","volume-title":"An introduction to sequential dynamical systems","author":"H Mortveit","year":"2007","unstructured":"Mortveit H, Reidys C (2007) An introduction to sequential dynamical systems. Springer, New York"},{"key":"758_CR82","doi-asserted-by":"crossref","unstructured":"Myers SA, Leskovec J (2012) Clash of the contagions: cooperation and competition in information diffusion. In: Proceedings of the IEEE 12th international conference on data mining (ICDM), pp 539\u2013548","DOI":"10.1109\/ICDM.2012.159"},{"key":"758_CR83","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1088\/1367-2630\/14\/7\/073005","volume":"14","author":"JC Nacher","year":"2012","unstructured":"Nacher JC, Akutsu T (2012) Dominating scale-free networks with variable scaling exponent: heterogeneous networks are not difficult to control. New J Phys 14:24","journal-title":"New J Phys"},{"key":"758_CR84","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.cor.2015.11.001","volume":"69","author":"AK Nandi","year":"2016","unstructured":"Nandi AK, Medal HR (2016) Methods for removing links in a network to minimize the spread of infections. Comput Oper Res 69:10\u201324","journal-title":"Comput Oper Res"},{"key":"758_CR85","doi-asserted-by":"publisher","first-page":"522","DOI":"10.1086\/228313","volume":"91","author":"P Oliver","year":"1985","unstructured":"Oliver P, Marwell G, Teixeira R (1985) A theory of the critical mass. I. Interdependence, group heterogeneity, and the production of collective action. Am J Sociol 91:522\u2013556","journal-title":"Am J Sociol"},{"key":"758_CR86","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2020.126308","volume":"384","author":"S Piankoranee","year":"2020","unstructured":"Piankoranee S, Limkumnerd S (2020) Effect of local rewiring in adaptive epidemic networks. Phys Lett A 384:126308","journal-title":"Phys Lett A"},{"issue":"1\u20132","key":"758_CR87","first-page":"114","volume":"91","author":"C Porath","year":"2013","unstructured":"Porath C, Pearson C (2013) The price of incivility. Harv Bus Rev 91(1\u20132):114\u2013121","journal-title":"Harv Bus Rev"},{"key":"758_CR88","doi-asserted-by":"crossref","unstructured":"Prakash BA, Beutel A, Rosenfeld R, Faloutsos C (2012) Winner takes all: competing viruses or ideas on fair-play networks. In: WWW, pp 1037\u20131046","DOI":"10.1145\/2187836.2187975"},{"key":"758_CR89","doi-asserted-by":"crossref","unstructured":"Prakash BA, Chakrabarti D, Faloutsos M, Valler N, Faloutsos C (2011) Threshold conditions for arbitrary cascade models on arbitrary graphs. In: Proceedings of the 11th IEEE conference on data mining (ICDM\u00a02011), pp 537\u2013546","DOI":"10.1109\/ICDM.2011.145"},{"key":"758_CR90","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/s10115-012-0520-y","volume":"33","author":"BA Prakash","year":"2012","unstructured":"Prakash BA, Chakrabarti D, Valler N, Faloutsos M, Faloutsos C (2012) Threshold conditions for arbitrary cascade models on arbitrary networks. Knowl Inf Syst 33:549\u2013575","journal-title":"Knowl Inf Syst"},{"key":"758_CR91","doi-asserted-by":"publisher","DOI":"10.1063\/1.5078449","volume":"28","author":"M Qi","year":"2018","unstructured":"Qi M, Deng Y, Deng H, Wu J (2018) Optimal disintegration strategy in multiplex networks. Chaos 28:121104","journal-title":"Chaos"},{"key":"758_CR92","unstructured":"RadioFreeEurope (2022) Thousands detained at anti-war protests across Russia. [Online]. Available: https:\/\/www.rferl.org\/a\/russia-1000-protesters-arrested-ukraine-invasion\/31738786.html"},{"issue":"3","key":"758_CR93","first-page":"319","volume":"48","author":"T Rahman","year":"2020","unstructured":"Rahman T, Hartz S, Xiong W, Meloy J, Janofsky J, Harry B, Resnick P (2020) Extreme overvalued beliefs. J Am Acad Psychiatry Law 48(3):319\u2013326","journal-title":"J Am Acad Psychiatry Law"},{"key":"758_CR94","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.90.052806","volume":"90","author":"P Rattana","year":"2014","unstructured":"Rattana P, Berthouze L, Kiss IZ (2014) Impact of constrained rewiring on network structure and node dynamics. Phys Rev E 90:052806","journal-title":"Phys Rev E"},{"key":"758_CR95","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.jtbi.2016.01.015","volume":"394","author":"A Rizzo","year":"2016","unstructured":"Rizzo A, Pedalino B, Porfiri M (2016) A network model for Ebola spreading. J Theor Biol 394:212\u2013222","journal-title":"J Theor Biol"},{"key":"758_CR96","first-page":"21355","volume":"12","author":"F Sartori","year":"2022","unstructured":"Sartori F, Turchetto M, Bellingeri M, Scotognella F, Alfieri R, Nguyen N, Le T, Nguyen Q, Cassi D (2022) A comparison of node vaccination strategies to halt sir epidemic spreading in real-world complex networks. Eur Phys J Spec Top 12:21355","journal-title":"Eur Phys J Spec Top"},{"key":"758_CR97","volume-title":"Micromotives and Macrobehavior","author":"T Schelling","year":"1978","unstructured":"Schelling T (1978) Micromotives and Macrobehavior. W.W. Norton and Company, New York"},{"key":"758_CR98","doi-asserted-by":"publisher","first-page":"14217","DOI":"10.1038\/s41598-023-41460-3","volume":"13","author":"A Sheikhahmadi","year":"2023","unstructured":"Sheikhahmadi A, Bahrami M, Saremi H (2023) Minimizing outbreak through targeted blocking for disease control: a community-based approach using super-spreader node identification. Sci Rep 13:14217","journal-title":"Sci Rep"},{"key":"758_CR99","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1017\/S0022381611000727","volume":"73","author":"D Siegel","year":"2011","unstructured":"Siegel D (2011) When does repression work? Collective action and social networks. J Politics 73:993\u20131010","journal-title":"J Politics"},{"key":"758_CR100","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/71.980024","volume":"13","author":"I Stojmenovic","year":"2002","unstructured":"Stojmenovic I, Seddigh M, Zunic J (2002) Dominating sets and neighbor elimination-based broadcasting algorithms in wireless networks. IEEE Trans Parallel Distrib Syst 13:14\u201325","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"758_CR101","doi-asserted-by":"publisher","first-page":"20880","DOI":"10.1038\/s41598-022-25023-6","volume":"12","author":"S Sulaimany","year":"2022","unstructured":"Sulaimany S, Mafakheri A (2022) Reversibility of link prediction and its application to epidemic mitigation. Sci Rep 12:20880","journal-title":"Sci Rep"},{"key":"758_CR102","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13278-025-01424-z","volume":"15","author":"BR Sziklai","year":"2025","unstructured":"Sziklai BR, Barnes K, Pint\u00e9r J (2025) Realistic models for diffusion of innovation. Soc Netw Anal Min 15:1\u201312","journal-title":"Soc Netw Anal Min"},{"key":"758_CR103","doi-asserted-by":"crossref","unstructured":"Tong H, Prakash BA, Eliassi-Rad T, Faloutsos M, Faloutsos C (2012) Gelling, and melting, large graphs by edge manipulation. In: CIKM, pp 245\u2013254","DOI":"10.1145\/2396761.2396795"},{"key":"758_CR104","doi-asserted-by":"crossref","unstructured":"Tong H, Prakash B, Tsourakakis C, Eliassi-Rad T, Faloutsos C, Chau D (2010) On the vulnerability of large graphs. In: Proceedings of the 10th IEEE conference on data mining (ICDM), pp 1091\u20131096","DOI":"10.1109\/ICDM.2010.54"},{"key":"758_CR105","unstructured":"Tuli G, Kuhlman CJ, Kumar VSA, Marathe MV, Ravi SS, Rosenkrantz DJ (2013) Blocking complex contagions using community structure. In: MAIN workshop of AAMAS, pp 70\u201377"},{"key":"758_CR106","doi-asserted-by":"publisher","first-page":"5962","DOI":"10.1073\/pnas.1116502109","volume":"109","author":"J Ugander","year":"2012","unstructured":"Ugander J, Backstrom L, Marlow C, Kleinberg J (2012) Structural diversity in social contagion. PNAS 109:5962\u20135966","journal-title":"PNAS"},{"key":"758_CR107","doi-asserted-by":"publisher","first-page":"20190196","DOI":"10.1098\/rsif.2019.0196","volume":"16","author":"VV Vasconcelos","year":"2019","unstructured":"Vasconcelos VV, Levin SA, Pinheiro FL (2019) Consensus and polarization in competing complex contagion processes. J R Soc Interface 16:20190196","journal-title":"J R Soc Interface"},{"key":"758_CR108","doi-asserted-by":"publisher","DOI":"10.3389\/fphy.2020.588513","volume":"8","author":"J Wang","year":"2021","unstructured":"Wang J, Zhang L, Zhu W, Jiang Y, Wu W, Xu X, Zhao D (2021) The suppression of epidemic spreading through minimum dominating set. Front Phys 8:588513","journal-title":"Front Phys"},{"key":"758_CR109","unstructured":"Wang S, Zhao X, Chen Y, Li Z, Zhang K, Xia J (2013) Negative influence minimizing by blocking nodes in social networks. In: Twenty-Seventh AAAI conference on artificial intelligence (AAAI), pp 134\u2013136"},{"key":"758_CR110","unstructured":"Ward M (2024) Democrats lay out a counterargument on immigration during the RNC. [Online]. Available: https:\/\/www.politico.com\/live-updates\/2024\/07\/16\/rnc-live-updates-coverage\/dems-counter-on-immigration-00168690"},{"key":"758_CR111","unstructured":"Watch HR (2020) North Korea: Horrific pretrial detention system: Torture, lack of due process, arbitrary punishment, corruption rampant. [Online]. Available: https:\/\/www.hrw.org\/news\/2020\/10\/19\/north-korea-horrific-pretrial-detention-system"},{"key":"758_CR112","unstructured":"Watch HR (2024) World report 2024. [Online]. Available: https:\/\/www.hrw.org\/world-report\/2024\/country-chapters\/north-korea"},{"key":"758_CR113","doi-asserted-by":"publisher","first-page":"5766","DOI":"10.1073\/pnas.082090499","volume":"99","author":"D Watts","year":"2002","unstructured":"Watts D (2002) A simple model of global cascades on random networks. PNAS 99:5766\u20135771","journal-title":"PNAS"},{"key":"758_CR114","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1038\/30918","volume":"393","author":"DJ Watts","year":"1998","unstructured":"Watts DJ, Strogatz SH (1998) Collective dynamics of \u2018small-world\u2019 networks. Nature 393:440\u2013442","journal-title":"Nature"},{"key":"758_CR115","doi-asserted-by":"crossref","first-page":"13","DOI":"10.37236\/1557","volume":"8","author":"B Wieland","year":"2001","unstructured":"Wieland B, Godbole AP (2001) On the domination number of a random graph. Electron J Comb 8:13","journal-title":"Electron J Comb"},{"key":"758_CR116","unstructured":"Wikipedia (2024) Persecution of Uyghurs in China. [Online]. Available: https:\/\/en.wikipedia.org\/wiki\/Persecution_of_Uyghurs_in_China"},{"key":"758_CR117","doi-asserted-by":"publisher","first-page":"7156","DOI":"10.1073\/pnas.1311231111","volume":"111","author":"S Wuchty","year":"2014","unstructured":"Wuchty S (2014) Controllability in protein interaction networks. Proc Natl Acad Sci (PNAS) 111:7156\u20137160","journal-title":"Proc Natl Acad Sci (PNAS)"},{"key":"758_CR118","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.109.258701","volume":"109","author":"Y Yang","year":"2012","unstructured":"Yang Y, Wang J, Motter AE (2012) Network observability transitions. Phys Rev Lett 109:258701","journal-title":"Phys Rev Lett"},{"key":"758_CR119","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.compenvurbsys.2018.11.010","volume":"74","author":"Y Yang","year":"2019","unstructured":"Yang Y, Mao L, Metcalf SS (2019) Diffusion of hurricane evacuation behavior through a home-workplace social network: a spatially explicit agent-based simulation model. Comput Environ Urban Syst 74:13\u201322","journal-title":"Comput Environ Urban Syst"},{"key":"758_CR120","doi-asserted-by":"publisher","first-page":"3990","DOI":"10.1109\/TSMC.2023.3237933","volume":"53","author":"L Yang","year":"2023","unstructured":"Yang L, Ma Z, Li Z, Giua A (2023) Rumor containment by blocking nodes in social networks. IEEE Trans Syst Man Cybern Syst 53:3990\u20134002","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"issue":"2","key":"758_CR121","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3301302","volume":"13","author":"R Yan","year":"2019","unstructured":"Yan R, Li Y, Wu W, Li D, Wang Y (2019) Rumor blocking through online link deletion on social networks. ACM Trans Knowl Discov Data 13(2):1\u201326","journal-title":"ACM Trans Knowl Discov Data"},{"issue":"12","key":"758_CR122","doi-asserted-by":"publisher","first-page":"3339","DOI":"10.1109\/TKDE.2016.2605088","volume":"28","author":"Y Zhang","year":"2016","unstructured":"Zhang Y, Adiga A, Saha S, Vullikanti A, Prakash BA (2016) Near-optimal algorithms for controlling propagation at group scale on networks. IEEE Trans Knowl Data Eng 28(12):3339\u20133352","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"758_CR123","doi-asserted-by":"crossref","unstructured":"Zhang Y, Adiga A, Vullikanti A, Prakash BA (2015) Controlling propagation at group scale on networks. In: IEEE international conference on data mining, ICDM, pp 619\u2013628","DOI":"10.1109\/ICDM.2015.59"},{"key":"758_CR124","doi-asserted-by":"crossref","unstructured":"Zito M (2001) Greedy algorithms for minimisation problems in random regular graphs. In: 9th annual european symposium on algorithms, pp 525\u2013536","DOI":"10.1007\/3-540-44676-1_44"}],"container-title":["Applied Network Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41109-025-00758-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s41109-025-00758-z","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41109-025-00758-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T12:04:59Z","timestamp":1768392299000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s41109-025-00758-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,11]]},"references-count":124,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["758"],"URL":"https:\/\/doi.org\/10.1007\/s41109-025-00758-z","relation":{},"ISSN":["2364-8228"],"issn-type":[{"value":"2364-8228","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,11]]},"assertion":[{"value":"25 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 December 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"5"}}