{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T23:45:06Z","timestamp":1776123906328,"version":"3.50.1"},"reference-count":55,"publisher":"Elsevier BV","issue":"6","license":[{"start":{"date-parts":[[2026,9,1]],"date-time":"2026-09-01T00:00:00Z","timestamp":1788220800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,9,1]],"date-time":"2026-09-01T00:00:00Z","timestamp":1788220800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,9,1]],"date-time":"2026-09-01T00:00:00Z","timestamp":1788220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,9,1]],"date-time":"2026-09-01T00:00:00Z","timestamp":1788220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,9,1]],"date-time":"2026-09-01T00:00:00Z","timestamp":1788220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,9,1]],"date-time":"2026-09-01T00:00:00Z","timestamp":1788220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,9,1]],"date-time":"2026-09-01T00:00:00Z","timestamp":1788220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100012456","name":"National Social Science Fund of China","doi-asserted-by":"publisher","award":["22BGL264"],"award-info":[{"award-number":["22BGL264"]}],"id":[{"id":"10.13039\/501100012456","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information Processing &amp; Management"],"published-print":{"date-parts":[[2026,9]]},"DOI":"10.1016\/j.ipm.2026.104765","type":"journal-article","created":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T23:34:12Z","timestamp":1774654452000},"page":"104765","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"title":["Opinion maximization on social trust networks considering local and global information"],"prefix":"10.1016","volume":"63","author":[{"given":"Lin","family":"Yu","sequence":"first","affiliation":[]},{"given":"Yuzhi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Yang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6803-351X","authenticated-orcid":false,"given":"Dongpu","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Fulei","family":"Shi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1153-1416","authenticated-orcid":false,"given":"Cuiyou","family":"Yao","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.ipm.2026.104765_bib0001","series-title":"Paper presented at the 19th International Conference on Distributed Computing and Intelligent Technology (ICDCIT), Kalinga Inst Ind Technol, Sch Comp Engn, Bhubaneswar, INDIA","article-title":"Opinion maximization in signed social networks using centrality measures and clustering techniques","author":"Alla","year":"2023"},{"issue":"2","key":"10.1016\/j.ipm.2026.104765_bib0002","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1007\/s00778-021-00679-0","article-title":"A fractional memory-efficient approach for online continuous-time influence maximization","volume":"31","author":"Bevilacqua","year":"2022","journal-title":"Vldb Journal"},{"key":"10.1016\/j.ipm.2026.104765_bib0003","series-title":"Paper presented at the 7th ACM India Joint International Conference on Data Science and Management of Data (CODS-COMAD) \/11th ACM IKDD CODS Conference \/ 29th COMAD Conference","article-title":"Information spread in opinionated social networks","author":"Chakraborty","year":"2024"},{"key":"10.1016\/j.ipm.2026.104765_bib0004","series-title":"Influence: The psychology of persuasion","author":"Cialdini","year":"1984"},{"key":"10.1016\/j.ipm.2026.104765_bib0005","doi-asserted-by":"crossref","DOI":"10.3389\/fnbeh.2024.1443161","article-title":"Insights into conscious cognitive information processing","volume":"18","author":"Dere","year":"2024","journal-title":"Frontiers in Behavioral Neuroscience"},{"issue":"6","key":"10.1016\/j.ipm.2026.104765_bib0006","first-page":"2844","article-title":"Neighborhood matters: influence maximization in social networks with limited access","volume":"34","author":"Feng","year":"2022","journal-title":"Ieee Transactions on Knowledge and Data Engineering"},{"issue":"3","key":"10.1016\/j.ipm.2026.104765_bib0007","doi-asserted-by":"crossref","first-page":"673","DOI":"10.1007\/s11218-023-09761-7","article-title":"Recognizing the diversity in how students define belonging: evidence of differing conceptualizations, including as a function of students' gender and socioeconomic background","volume":"26","author":"Fern\u00e1ndez","year":"2023","journal-title":"Social Psychology of Education"},{"issue":"9","key":"10.1016\/j.ipm.2026.104765_bib0008","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1145\/1562164.1562186","article-title":"The status of the P versus NP problem","volume":"52","author":"Fortnow","year":"2009","journal-title":"Communications of The Acm"},{"key":"10.1016\/j.ipm.2026.104765_bib0009","series-title":"Paper presented at the Proceedings of the 2013 SIAM International Conference on Data Mining (SDM)","article-title":"Opinion maximization in social networks","author":"Gionis","year":"2013"},{"issue":"1","key":"10.1016\/j.ipm.2026.104765_bib0010","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/s11227-024-06566-z","article-title":"DiFuseR: a distributed sketch-based influence maximization algorithm for GPUs","volume":"81","author":"G\u00f6kt\u00fcrk","year":"2025","journal-title":"Journal of Supercomputing"},{"issue":"2","key":"10.1016\/j.ipm.2026.104765_bib0011","first-page":"289","article-title":"Least-cost influence maximization on social networks","volume":"32","author":"G\u00fcnne\u00e7","year":"2020","journal-title":"Informs Journal on Computing"},{"issue":"5","key":"10.1016\/j.ipm.2026.104765_bib0012","doi-asserted-by":"crossref","first-page":"3641","DOI":"10.1007\/s10878-022-00913-7","article-title":"Generalized opinion dynamics model for social trust networks","volume":"44","author":"He","year":"2022","journal-title":"Journal of Combinatorial Optimization"},{"issue":"1","key":"10.1016\/j.ipm.2026.104765_bib0013","first-page":"350","article-title":"Dynamic opinion maximization in social networks","volume":"35","author":"He","year":"2023","journal-title":"Ieee Transactions on Knowledge and Data Engineering"},{"key":"10.1016\/j.ipm.2026.104765_bib0014","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1016\/j.ins.2020.12.091","article-title":"Positive opinion maximization in signed social networks","volume":"558","author":"He","year":"2021","journal-title":"Information Sciences"},{"issue":"19","key":"10.1016\/j.ipm.2026.104765_bib0015","doi-asserted-by":"crossref","first-page":"12367","DOI":"10.1007\/s00521-021-05840-y","article-title":"Multi-stage opinion maximization in social networks","volume":"33","author":"He","year":"2021","journal-title":"Neural Computing & Applications"},{"issue":"2","key":"10.1016\/j.ipm.2026.104765_bib0016","doi-asserted-by":"crossref","first-page":"1874","DOI":"10.1109\/JSYST.2019.2922373","article-title":"Opinion maximization through unknown influence power in social networks under weighted voter model","volume":"14","author":"He","year":"2020","journal-title":"Ieee Systems Journal"},{"issue":"4","key":"10.1016\/j.ipm.2026.104765_bib0017","doi-asserted-by":"crossref","first-page":"7158","DOI":"10.1109\/TNNLS.2024.3387293","article-title":"Multistage competitive opinion maximization with Q-learning-based method in social networks","volume":"36","author":"He","year":"2025","journal-title":"Ieee Transactions on Neural Networks and Learning Systems"},{"issue":"1","key":"10.1016\/j.ipm.2026.104765_bib0018","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1080\/00223980.1946.9917275","article-title":"Attitudes and cognitive organization","volume":"21","author":"Heider","year":"1946","journal-title":"The Journal of Psychology"},{"issue":"2","key":"10.1016\/j.ipm.2026.104765_bib0019","doi-asserted-by":"crossref","first-page":"1259","DOI":"10.1109\/TNSE.2020.3034094","article-title":"Behavioral information diffusion for opinion maximization in online social networks","volume":"8","author":"Hudson","year":"2021","journal-title":"Ieee Transactions on Network Science and Engineering"},{"key":"10.1016\/j.ipm.2026.104765_bib0020","series-title":"Paper presented at the 22nd Pacific-Asia Conference on Knowledge Discovery and Data Mining","article-title":"SIGNet: scalable embeddings for signed networks","author":"Islam","year":"2018"},{"key":"10.1016\/j.ipm.2026.104765_bib0021","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1007\/978-1-4684-2001-2_9","article-title":"Reducibility among combinatorial problems","author":"Karp","year":"1972","journal-title":"Complexity of Computer Computations"},{"key":"10.1016\/j.ipm.2026.104765_bib0022","series-title":"Paper presented at the ACM SIGKDD international conference on knowledge discovery and data mining","article-title":"Maximizing the spread of influence through a social network","author":"Kempe","year":"2003"},{"key":"10.1016\/j.ipm.2026.104765_bib0023","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2023.111037","article-title":"Influence maximization in social networks using discretized Harris' Hawks Optimization algorithm","volume":"149","author":"Khatri","year":"2023","journal-title":"Applied Soft Computing"},{"key":"10.1016\/j.ipm.2026.104765_bib0024","series-title":"Paper presented at the 11th ACM International Conference on Web Search and Data Mining","article-title":"REV2: Fraudulent user prediction in rating platforms","author":"Kumar","year":"2018"},{"key":"10.1016\/j.ipm.2026.104765_bib0025","series-title":"Paper presented at the 16th IEEE International Conference on Data Mining","article-title":"Edge weight prediction in weighted signed networks","author":"Kumar","year":"2016"},{"key":"10.1016\/j.ipm.2026.104765_bib0026","series-title":"Paper presented at the 28th Annual CHI Conference on Human Factors in Computing Systems","article-title":"Signed networks in social Media","author":"Leskovec","year":"2010"},{"key":"10.1016\/j.ipm.2026.104765_bib0027","series-title":"Paper presented at the Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining","article-title":"Cost-effective outbreak detection in networks","author":"Leskovec","year":"2007"},{"issue":"4","key":"10.1016\/j.ipm.2026.104765_bib0028","doi-asserted-by":"crossref","first-page":"2617","DOI":"10.1109\/TNSE.2022.3168042","article-title":"Competitive influence minimization in multi-group social networks: an opinion-based solution","volume":"9","author":"Li","year":"2022","journal-title":"Ieee Transactions on Network Science and Engineering"},{"issue":"7","key":"10.1016\/j.ipm.2026.104765_bib0029","doi-asserted-by":"crossref","DOI":"10.1063\/5.0084178","article-title":"Game-theoretical approach for opinion dynamics on social networks","volume":"32","author":"Li","year":"2022","journal-title":"Chaos"},{"issue":"5","key":"10.1016\/j.ipm.2026.104765_bib0030","doi-asserted-by":"crossref","first-page":"1392","DOI":"10.1109\/TBDATA.2023.3283098","article-title":"Crime prediction with missing data via spatiotemporal regularized tensor decomposition","volume":"9","author":"Liang","year":"2023","journal-title":"Ieee Transactions on Big Data"},{"key":"10.1016\/j.ipm.2026.104765_bib0031","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2025.126436","article-title":"MECIM: multi-entity evolutionary competitive influence maximization in social networks","volume":"270","author":"Liang","year":"2025","journal-title":"Expert Systems with Applications"},{"issue":"4","key":"10.1016\/j.ipm.2026.104765_bib0032","doi-asserted-by":"crossref","DOI":"10.1016\/j.ipm.2025.104172","article-title":"Pure profit-oriented continuous influence maximization considering cost budget: A gradient descent-based approach","volume":"62","author":"Liu","year":"2025","journal-title":"Information Processing & Management"},{"issue":"5","key":"10.1016\/j.ipm.2026.104765_bib0033","doi-asserted-by":"crossref","first-page":"1760","DOI":"10.1109\/TEVC.2024.3431608","article-title":"Community opinion maximization in social networks","volume":"29","author":"Liu","year":"2025","journal-title":"Ieee Transactions on Evolutionary Computation"},{"key":"10.1016\/j.ipm.2026.104765_bib0034","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2022.118052","article-title":"Non-uniform influence maximization in social network","volume":"207","author":"Manouchehri","year":"2022","journal-title":"Expert Systems with Applications"},{"issue":"4","key":"10.1016\/j.ipm.2026.104765_bib0035","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1145\/3664618","article-title":"DCDIMB: dynamic community-based diversified influence maximization using bridge nodes","volume":"18","author":"Meena","year":"2024","journal-title":"Acm Transactions on the Web"},{"issue":"1","key":"10.1016\/j.ipm.2026.104765_bib0036","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1086\/700762","article-title":"Random choice and learning","volume":"127","author":"Natenzon","year":"2018","journal-title":"Journal of Political Economy"},{"key":"10.1016\/j.ipm.2026.104765_bib0037","series-title":"Paper presented at the IEEE Conference on Computer Communications (IEEE INFOCOM)","article-title":"Smart information spreading for opinion maximization in social networks","author":"Nayak","year":"2019"},{"issue":"1","key":"10.1016\/j.ipm.2026.104765_bib0038","doi-asserted-by":"crossref","DOI":"10.1016\/j.ipm.2023.103562","article-title":"Minimizing the misinformation concern over social networks","volume":"61","author":"Ni","year":"2024","journal-title":"Information Processing & Management"},{"issue":"3","key":"10.1016\/j.ipm.2026.104765_bib0039","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1016\/j.socnet.2010.03.006","article-title":"Node centrality in weighted networks: generalizing degree and shortest paths","volume":"32","author":"Opsahl","year":"2010","journal-title":"Social Networks"},{"key":"10.1016\/j.ipm.2026.104765_bib0040","doi-asserted-by":"crossref","DOI":"10.1016\/j.neucom.2024.129117","article-title":"Online dynamic influence maximization based on deep reinforcement learning","volume":"618","author":"Song","year":"2025","journal-title":"Neurocomputing"},{"key":"10.1016\/j.ipm.2026.104765_bib0041","series-title":"Paper presented at the Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data","article-title":"Influence maximization in near-linear time: A Martingale approach","author":"Tang","year":"2015"},{"key":"10.1016\/j.ipm.2026.104765_bib0042","series-title":"Paper presented at the Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data","article-title":"Influence maximization: near-optimal time complexity meets practical efficiency","author":"Tang","year":"2014"},{"issue":"07","key":"10.1016\/j.ipm.2026.104765_bib0043","doi-asserted-by":"crossref","DOI":"10.1142\/S0218127421501029","article-title":"Dynamics of infectious diseases: local versus global awareness","volume":"31","author":"Tiwari","year":"2021","journal-title":"International Journal of Bifurcation and Chaos"},{"key":"10.1016\/j.ipm.2026.104765_bib0044","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1016\/j.chb.2016.02.057","article-title":"How attitude strength biases information processing and evaluation on the web","volume":"60","author":"van Strien","year":"2016","journal-title":"Computers in Human Behavior"},{"issue":"15","key":"10.1016\/j.ipm.2026.104765_bib0045","doi-asserted-by":"crossref","first-page":"11041","DOI":"10.1007\/s00500-023-08391-7","article-title":"Efficient method for identifying prominent supplier in large-scale healthcare information networks in Medicare","volume":"27","author":"Venunath","year":"2023","journal-title":"Soft Computing"},{"issue":"1","key":"10.1016\/j.ipm.2026.104765_bib0046","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1016\/j.ejor.2024.03.025","article-title":"Trust exploration- and leadership incubation- based opinion dynamics model for social network group decision-making: A quantum theory perspective","volume":"317","author":"Wang","year":"2024","journal-title":"European Journal of Operational Research"},{"key":"10.1016\/j.ipm.2026.104765_bib0047","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1162\/tacl_a_00184","article-title":"Exploiting social network structure for person-to-person sentiment analysis","volume":"2","author":"West","year":"2014","journal-title":"Transactions of the Association for Computational Linguistics"},{"key":"10.1016\/j.ipm.2026.104765_bib0048","series-title":"Paper presented at the 29th International Joint Conference on Artificial Intelligence","article-title":"Opinion maximization in social trust networks","author":"Xu","year":"2021"},{"key":"10.1016\/j.ipm.2026.104765_bib0049","article-title":"Complementary influence maximization under comparative linear threshold model","volume":"238","author":"Yang","year":"2024","journal-title":"Expert Systems with Applications"},{"issue":"11","key":"10.1016\/j.ipm.2026.104765_bib0050","doi-asserted-by":"crossref","first-page":"11380","DOI":"10.3934\/mbe.2022530","article-title":"External intervention model with direct and indirect propagation behaviors on social media platforms","volume":"19","author":"Yin","year":"2022","journal-title":"Mathematical Biosciences and Engineering"},{"issue":"1","key":"10.1016\/j.ipm.2026.104765_bib0051","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1007\/s40747-024-01666-y","article-title":"Influence maximization under imbalanced heterogeneous networks via lightweight reinforcement learning with prior knowledge","volume":"11","author":"You","year":"2025","journal-title":"Complex & Intelligent Systems"},{"issue":"6","key":"10.1016\/j.ipm.2026.104765_bib0052","doi-asserted-by":"crossref","first-page":"3361","DOI":"10.1109\/TCSS.2022.3193583","article-title":"Network dynamic GCN influence maximization algorithm with leader fake labeling mechanism","volume":"10","author":"Zhang","year":"2023","journal-title":"Ieee Transactions on Computational Social Systems"},{"key":"10.1016\/j.ipm.2026.104765_bib0053","doi-asserted-by":"crossref","DOI":"10.1016\/j.cor.2025.107245","article-title":"Centrality measures and opinion dynamics in two-layer networks with replica nodes","volume":"185","author":"Zhao","year":"2026","journal-title":"Computers & Operations Research"},{"issue":"4","key":"10.1016\/j.ipm.2026.104765_bib0054","doi-asserted-by":"crossref","first-page":"2228","DOI":"10.3390\/e17042228","article-title":"A community-based approach to identifying influential spreaders","volume":"17","author":"Zhao","year":"2015","journal-title":"Entropy"},{"key":"10.1016\/j.ipm.2026.104765_bib0055","doi-asserted-by":"crossref","DOI":"10.1016\/j.ins.2024.121784","article-title":"SADPEA: structure-aware dual probability evolutionary adaptive algorithm for the budgeted influence maximization problem","volume":"699","author":"Zhu","year":"2025","journal-title":"Information Sciences"}],"container-title":["Information Processing &amp; Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0306457326001561?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0306457326001561?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T22:49:09Z","timestamp":1776120549000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0306457326001561"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,9]]},"references-count":55,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2026,9]]}},"alternative-id":["S0306457326001561"],"URL":"https:\/\/doi.org\/10.1016\/j.ipm.2026.104765","relation":{},"ISSN":["0306-4573"],"issn-type":[{"value":"0306-4573","type":"print"}],"subject":[],"published":{"date-parts":[[2026,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Opinion maximization on social trust networks considering local and global information","name":"articletitle","label":"Article Title"},{"value":"Information Processing & Management","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ipm.2026.104765","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"104765"}}