{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T20:30:57Z","timestamp":1770496257379,"version":"3.49.0"},"reference-count":49,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100007129","name":"Shandong Province Natural Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172265"],"award-info":[{"award-number":["62172265"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62271295"],"award-info":[{"award-number":["62271295"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62276156"],"award-info":[{"award-number":["62276156"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010029","name":"Taishan Scholar Foundation of Shandong Province","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100010029","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Knowledge-Based Systems"],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1016\/j.knosys.2025.113637","type":"journal-article","created":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T11:52:46Z","timestamp":1746273166000},"page":"113637","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":2,"special_numbering":"C","title":["Information diffusion over cyber\u2013physical conjoined networks: An immunity perspective"],"prefix":"10.1016","volume":"320","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-1033-957X","authenticated-orcid":false,"given":"Jing","family":"Chen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5435-5307","authenticated-orcid":false,"given":"Dianjie","family":"Lu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0000-1330-9515","authenticated-orcid":false,"given":"Fuwei","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1791-2079","authenticated-orcid":false,"given":"Jie","family":"Tian","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9545-8668","authenticated-orcid":false,"given":"Guijuan","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.knosys.2025.113637_b1","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2023.110869","article-title":"Structured multiagent decision-making in information diffusion: The model and dynamics","volume":"278","author":"Zhang","year":"2023","journal-title":"Knowl.-Based Syst."},{"key":"10.1016\/j.knosys.2025.113637_b2","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2023.110376","article-title":"Fault tolerance in fog-based social internet of things","volume":"265","author":"Mohammadi","year":"2023","journal-title":"Knowl.-Based Syst."},{"issue":"3","key":"10.1016\/j.knosys.2025.113637_b3","doi-asserted-by":"crossref","first-page":"751","DOI":"10.1109\/TCSS.2020.2986161","article-title":"An agent-based model of collective decision-making: How information sharing strategies scale with information overload","volume":"7","author":"van Veen","year":"2020","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"issue":"6","key":"10.1016\/j.knosys.2025.113637_b4","doi-asserted-by":"crossref","first-page":"938","DOI":"10.1037\/0022-3514.94.6.938","article-title":"Affective and cognitive meta-bases of attitudes: Unique effects on information interest and persuasion","volume":"94","author":"See","year":"2008","journal-title":"J. Pers. Soc. Psychol."},{"key":"10.1016\/j.knosys.2025.113637_b5","doi-asserted-by":"crossref","first-page":"734","DOI":"10.1109\/JSAIT.2023.3344760","article-title":"Optimal update times for stale information metrics including the age of information","volume":"4","author":"Ferguson","year":"2023","journal-title":"IEEE J. Sel. Areas Inf. Theory"},{"issue":"3","key":"10.1016\/j.knosys.2025.113637_b6","doi-asserted-by":"crossref","first-page":"460","DOI":"10.1038\/s41591-022-01713-6","article-title":"Misinformation: Susceptibility, spread, and interventions to immunize the public","volume":"28","author":"Van Der Linden","year":"2022","journal-title":"Nature Med."},{"issue":"3","key":"10.1016\/j.knosys.2025.113637_b7","doi-asserted-by":"crossref","first-page":"1539","DOI":"10.1109\/TCYB.2020.2989427","article-title":"Dynamic immunization node model for complex networks based on community structure and threshold","volume":"52","author":"Shang","year":"2020","journal-title":"IEEE Trans. Cybern."},{"issue":"6","key":"10.1016\/j.knosys.2025.113637_b8","doi-asserted-by":"crossref","first-page":"984","DOI":"10.1109\/TDSC.2017.2731844","article-title":"An immunization framework for social networks through big data based influence modeling","volume":"16","author":"Peng","year":"2017","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"issue":"1","key":"10.1016\/j.knosys.2025.113637_b9","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1109\/TNSM.2022.3209994","article-title":"Optimal control of information diffusion in temporal networks","volume":"20","author":"Chai","year":"2022","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"1","key":"10.1016\/j.knosys.2025.113637_b10","first-page":"229","article-title":"Efficient network immunization under limited knowledge","volume":"8","author":"Liu","year":"2021","journal-title":"Natl. Sci. Rev."},{"key":"10.1016\/j.knosys.2025.113637_b11","doi-asserted-by":"crossref","first-page":"1510","DOI":"10.1109\/TIFS.2023.3338423","article-title":"Diffusion containment in complex networks through collective influence of connections","volume":"19","author":"Liu","year":"2024","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"10.1016\/j.knosys.2025.113637_b12","doi-asserted-by":"crossref","first-page":"894","DOI":"10.1109\/TNSE.2021.3064952","article-title":"Periodic-aware intelligent prediction model for information diffusion in social networks","volume":"8","author":"Zhou","year":"2021","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"10.1016\/j.knosys.2025.113637_b13","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2023.110547","article-title":"Coevolution modeling of group behavior and opinion based on public opinion perception","volume":"270","author":"Li","year":"2023","journal-title":"Knowl.-Based Syst."},{"key":"10.1016\/j.knosys.2025.113637_b14","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2021.107365","article-title":"Identifying super-spreaders in information-epidemic coevolving dynamics on multiplex networks","volume":"229","author":"Zeng","year":"2021","journal-title":"Knowl.-Based Syst."},{"issue":"6","key":"10.1016\/j.knosys.2025.113637_b15","doi-asserted-by":"crossref","first-page":"1038","DOI":"10.1109\/JSAC.2013.130606","article-title":"Conjoining speeds up information diffusion in overlaying social-physical networks","volume":"31","author":"Yagan","year":"2013","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"8","key":"10.1016\/j.knosys.2025.113637_b16","doi-asserted-by":"crossref","first-page":"7875","DOI":"10.1109\/TCYB.2021.3052766","article-title":"Emotional contagion in physical-cyber integrated networks: The phase transition perspective","volume":"52","author":"Zhang","year":"2022","journal-title":"IEEE Trans. Cybern."},{"key":"10.1016\/j.knosys.2025.113637_b17","series-title":"An Introduction To Mathematical Epidemiology","first-page":"9","article-title":"Introduction to epidemic modeling","author":"Martcheva","year":"2015"},{"key":"10.1016\/j.knosys.2025.113637_b18","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1016\/j.chaos.2018.12.017","article-title":"Analysis of SIR epidemic model with information spreading of awareness","volume":"119","author":"Kabir","year":"2019","journal-title":"Chaos Solitons Fractals"},{"issue":"2","key":"10.1016\/j.knosys.2025.113637_b19","doi-asserted-by":"crossref","first-page":"828","DOI":"10.1109\/TNSE.2020.2975112","article-title":"Reemergence modeling of intelligent information diffusion in heterogeneous social networks: The dynamics perspective","volume":"8","author":"Yi","year":"2020","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"issue":"3","key":"10.1016\/j.knosys.2025.113637_b20","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevE.96.032304","article-title":"Promoting information diffusion through interlayer recovery processes in multiplex networks","volume":"96","author":"Wang","year":"2017","journal-title":"Phys. Rev. E"},{"issue":"5","key":"10.1016\/j.knosys.2025.113637_b21","doi-asserted-by":"crossref","first-page":"2837","DOI":"10.1109\/TCSS.2022.3201061","article-title":"A dynamic information dissemination model based on user awareness and evolutionary games","volume":"10","author":"Xiao","year":"2023","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"issue":"4","key":"10.1016\/j.knosys.2025.113637_b22","doi-asserted-by":"crossref","first-page":"2177","DOI":"10.1109\/JIOT.2020.3026995","article-title":"Social interaction and information diffusion in social internet of things: Dynamics, cloud-edge, traceability","volume":"8","author":"Yi","year":"2020","journal-title":"IEEE Internet Things J."},{"issue":"6","key":"10.1016\/j.knosys.2025.113637_b23","doi-asserted-by":"crossref","first-page":"2548","DOI":"10.1109\/TKDE.2019.2954901","article-title":"Intervening coupling diffusion of competitive information in online social networks","volume":"33","author":"Wan","year":"2019","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10.1016\/j.knosys.2025.113637_b24","doi-asserted-by":"crossref","first-page":"505","DOI":"10.1016\/j.spasta.2016.10.002","article-title":"Spatio-temporal point process statistics: A review","volume":"18","author":"Gonz\u00e1lez","year":"2016","journal-title":"Spat. Stat."},{"key":"10.1016\/j.knosys.2025.113637_b25","doi-asserted-by":"crossref","unstructured":"Y. Yuan, J. Ding, C. Shao, D. Jin, Y. Li, Spatio-temporal diffusion point processes, in: Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023, pp. 3173\u20133184.","DOI":"10.1145\/3580305.3599511"},{"issue":"4","key":"10.1016\/j.knosys.2025.113637_b26","doi-asserted-by":"crossref","first-page":"1681","DOI":"10.1109\/TNNLS.2020.3004626","article-title":"Modeling event propagation via graph biased temporal point process","volume":"34","author":"Wu","year":"2020","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"issue":"5","key":"10.1016\/j.knosys.2025.113637_b27","doi-asserted-by":"crossref","first-page":"3812","DOI":"10.1109\/TITS.2023.3325424","article-title":"Stochastic optimal intervention for robot-assisted crowd evacuation","volume":"25","author":"Lu","year":"2023","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.knosys.2025.113637_b28","series-title":"International Conference on Machine Learning","first-page":"11183","article-title":"Self-attentive hawkes process","author":"Zhang","year":"2020"},{"key":"10.1016\/j.knosys.2025.113637_b29","series-title":"Learning for Dynamics and Control Conference","first-page":"777","article-title":"Neural point process for learning spatiotemporal event dynamics","author":"Zhou","year":"2022"},{"key":"10.1016\/j.knosys.2025.113637_b30","doi-asserted-by":"crossref","unstructured":"M.-A. Rizoiu, S. Mishra, Q. Kong, M. Carman, L. Xie, SIR-Hawkes: Linking epidemic models and Hawkes processes to model diffusions in finite populations, in: Proceedings of the 2018 World Wide Web Conference, 2018, pp. 419\u2013428.","DOI":"10.1145\/3178876.3186108"},{"key":"10.1016\/j.knosys.2025.113637_b31","doi-asserted-by":"crossref","unstructured":"J. Shang, M. Sun, Geometric Hawkes processes with graph convolutional recurrent neural networks, in: Proceedings of the AAAI Conference on Artificial Intelligence, 2019, pp. 4878\u20134885.","DOI":"10.1609\/aaai.v33i01.33014878"},{"key":"10.1016\/j.knosys.2025.113637_b32","doi-asserted-by":"crossref","unstructured":"Q. Cao, H. Shen, K. Cen, W. Ouyang, X. Cheng, DeepHawkes: Bridging the gap between prediction and understanding of information cascades, in: Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017, pp. 1149\u20131158.","DOI":"10.1145\/3132847.3132973"},{"key":"10.1016\/j.knosys.2025.113637_b33","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2022.109740","article-title":"Transformer-enhanced hawkes process with decoupling training for information cascade prediction","volume":"255","author":"Yu","year":"2022","journal-title":"Knowl.-Based Syst."},{"key":"10.1016\/j.knosys.2025.113637_b34","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2023.110883","article-title":"Opinion-aware information diffusion model based on multivariate marked hawkes process","volume":"279","author":"Zhang","year":"2023","journal-title":"Knowl.-Based Syst."},{"issue":"12","key":"10.1016\/j.knosys.2025.113637_b35","doi-asserted-by":"crossref","first-page":"19511","DOI":"10.1109\/TVT.2024.3440958","article-title":"Temporal point process based information dissemination over cyber-physical interacting networks","volume":"73","author":"Chen","year":"2024","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"11","key":"10.1016\/j.knosys.2025.113637_b36","doi-asserted-by":"crossref","first-page":"1831","DOI":"10.1109\/LWC.2023.3295612","article-title":"Cooperative perception with learning-based V2V communications","volume":"12","author":"Liu","year":"2023","journal-title":"IEEE Wirel. Commun. Lett."},{"issue":"1","key":"10.1016\/j.knosys.2025.113637_b37","doi-asserted-by":"crossref","first-page":"5576","DOI":"10.1038\/s41467-020-19024-0","article-title":"Effects of social distancing and isolation on epidemic spreading modeled via dynamical density functional theory","volume":"11","author":"Te Vrugt","year":"2020","journal-title":"Nat. Commun."},{"issue":"1","key":"10.1016\/j.knosys.2025.113637_b38","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1109\/TIT.2015.2501799","article-title":"Interference functionals in Poisson networks","volume":"62","author":"Schilcher","year":"2015","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"1","key":"10.1016\/j.knosys.2025.113637_b39","doi-asserted-by":"crossref","first-page":"1017","DOI":"10.1038\/s41467-019-08746-5","article-title":"Scale-free networks are rare","volume":"10","author":"Broido","year":"2019","journal-title":"Nat. Commun."},{"issue":"8","key":"10.1016\/j.knosys.2025.113637_b40","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1063\/1.5038853","article-title":"Double transition of information spreading in a two-layered network","volume":"28","author":"Wu","year":"2018","journal-title":"Chaos: Interdiscip. J. Nonlinear Sci."},{"key":"10.1016\/j.knosys.2025.113637_b41","series-title":"Mathematical Epidemiology","first-page":"81","article-title":"An introduction to stochastic epidemic models","author":"Allen","year":"2008"},{"key":"10.1016\/j.knosys.2025.113637_b42","first-page":"1","article-title":"Temporal point processes","author":"De","year":"2019","journal-title":"Tech. Rep. Saarl. Univ."},{"key":"10.1016\/j.knosys.2025.113637_b43","first-page":"37","article-title":"Long short-term memory","volume":"385","author":"Graves","year":"2012","journal-title":"Supervised Seq. Label. Recurr. Neural Netw."},{"key":"10.1016\/j.knosys.2025.113637_b44","series-title":"Temporal Network Theory","first-page":"165","article-title":"Bursty time series analysis for temporal networks","author":"Jo","year":"2023"},{"issue":"6","key":"10.1016\/j.knosys.2025.113637_b45","doi-asserted-by":"crossref","first-page":"2193","DOI":"10.1016\/j.physa.2011.12.004","article-title":"Roulette-wheel selection via stochastic acceptance","volume":"391","author":"Lipowski","year":"2012","journal-title":"Phys. A"},{"issue":"2","key":"10.1016\/j.knosys.2025.113637_b46","doi-asserted-by":"crossref","first-page":"498","DOI":"10.1109\/TR.2011.2134350","article-title":"Estimation and analysis of some generalized multiple change-point software reliability models","volume":"60","author":"Huang","year":"2011","journal-title":"IEEE Trans. Reliab."},{"issue":"1","key":"10.1016\/j.knosys.2025.113637_b47","doi-asserted-by":"crossref","first-page":"2980","DOI":"10.1038\/srep02980","article-title":"The anatomy of a scientific rumor","volume":"3","author":"De Domenico","year":"2013","journal-title":"Sci. Rep."},{"key":"10.1016\/j.knosys.2025.113637_b48","series-title":"Next generation simulation (NGSIM) vehicle trajectories and supporting data [dataset]","author":"of Transportation Federal Highway Administration","year":"2016"},{"key":"10.1016\/j.knosys.2025.113637_b49","doi-asserted-by":"crossref","unstructured":"R. Rossi, N. Ahmed, The network data repository with interactive graph analytics and visualization, in: Proceedings of the AAAI Conference on Artificial Intelligence, 2015, pp. 1\u20132.","DOI":"10.1609\/aaai.v29i1.9277"}],"container-title":["Knowledge-Based Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950705125006835?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950705125006835?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T09:41:43Z","timestamp":1762335703000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0950705125006835"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6]]},"references-count":49,"alternative-id":["S0950705125006835"],"URL":"https:\/\/doi.org\/10.1016\/j.knosys.2025.113637","relation":{},"ISSN":["0950-7051"],"issn-type":[{"value":"0950-7051","type":"print"}],"subject":[],"published":{"date-parts":[[2025,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Information diffusion over cyber\u2013physical conjoined networks: An immunity perspective","name":"articletitle","label":"Article Title"},{"value":"Knowledge-Based Systems","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.knosys.2025.113637","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"113637"}}