{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T00:38:44Z","timestamp":1771807124907,"version":"3.50.1"},"reference-count":55,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"crossref","award":["2018YFB1004804"],"award-info":[{"award-number":["2018YFB1004804"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["11801595"],"award-info":[{"award-number":["11801595"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Program for Guangdong Introducing Innovative and Entrepreneurial Teams","award":["2016ZT06D211"],"award-info":[{"award-number":["2016ZT06D211"]}]},{"DOI":"10.13039\/501100009334","name":"Pearl River S&T Nova Program of Guangzhou","doi-asserted-by":"crossref","award":["201710010046"],"award-info":[{"award-number":["201710010046"]}],"id":[{"id":"10.13039\/501100009334","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2018]]},"DOI":"10.1109\/access.2018.2866981","type":"journal-article","created":{"date-parts":[[2018,8,24]],"date-time":"2018-08-24T19:38:39Z","timestamp":1535139519000},"page":"47240-47257","source":"Crossref","is-referenced-by-count":24,"title":["Identifying Influential Individuals on Large-Scale Social Networks: A Community Based Approach"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1063-6534","authenticated-orcid":false,"given":"Fanghua","family":"Ye","sequence":"first","affiliation":[]},{"given":"Jiahao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Chuan","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Guohui","family":"Ling","sequence":"additional","affiliation":[]},{"given":"Zibin","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Yuren","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0706851105"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"66111","DOI":"10.1103\/PhysRevE.70.066111","article-title":"Finding community structure in very large networks","volume":"70","author":"clauset","year":"2004","journal-title":"Phys Rev E Stat Phys Plasmas Fluids Relat Interdiscip Top"},{"key":"ref33","first-page":"58","article-title":"Influence maximization across partially aligned heterogenous social networks","author":"zhan","year":"2015","journal-title":"Proc PAKDD"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2563397"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2806416.2806462"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2016.7498224"},{"key":"ref37","first-page":"188","article-title":"Community detection using A neighborhood strength driven label propagation algorithm","author":"xie","year":"2011","journal-title":"Proc IEEE Netw Sci Workshop"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"36106","DOI":"10.1103\/PhysRevE.76.036106","article-title":"Near linear time algorithm to detect community structures in large-scale networks","volume":"76","author":"raghavan","year":"2007","journal-title":"Phys Rev E Stat Phys Plasmas Fluids Relat Interdiscip Top"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"26113","DOI":"10.1103\/PhysRevE.69.026113","article-title":"Finding and evaluating community structure in networks","volume":"69","author":"newman","year":"2004","journal-title":"Phys Rev E Stat Phys Plasmas Fluids Relat Interdiscip Top"},{"key":"ref28","first-page":"775","article-title":"Influence maximization in online social networks","author":"aslay","year":"2018","journal-title":"Proc ESDM"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939745"},{"key":"ref29","first-page":"1029","article-title":"Scalable influence maximization for prevalent viral marketing in large-scale social networks","author":"chen","year":"2010","journal-title":"Proc KDD"},{"key":"ref2","first-page":"1","article-title":"Identifying influential nodes in complex networks via semi-local centrality","author":"dong","year":"2018","journal-title":"Proc ISCAS"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"666","DOI":"10.14778\/2735703.2735706","article-title":"Online topic-aware influence maximization","volume":"8","author":"chen","year":"2015","journal-title":"Proc VLDB Endowment"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.14778\/3099622.3099623"},{"key":"ref22","first-page":"1433","article-title":"Submodular maximization with cardinality constraints","author":"buchbinder","year":"2014","journal-title":"Proc ACM-SIAM SODA"},{"key":"ref21","article-title":"Influence maximization on social graphs: A survey","author":"li","year":"0","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1038\/nature14604"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.dam.2013.05.015"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2723734"},{"key":"ref25","first-page":"75","article-title":"Influence maximization: Near-optimal time complexity meets practical efficiency","author":"tang","year":"2014","journal-title":"Proc SIGMOD"},{"key":"ref50","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1145\/1250910.1250923","article-title":"The role of compatibility in the diffusion of technologies through social networks","author":"immorlica","year":"2007","journal-title":"Proc 8th ACM Conf Electron Commerce"},{"key":"ref51","first-page":"1127","article-title":"Influential nodes in a diffusion model for social networks","author":"kempe","year":"2005","journal-title":"Proc Int Colloq Automata Lang Program"},{"key":"ref55","first-page":"211","article-title":"SIMPATH: An efficient algorithm for influence maximization under the linear threshold model","author":"goyal","year":"2011","journal-title":"Proc ICDM"},{"key":"ref54","first-page":"241","article-title":"Learning influence probabilities in social networks","author":"goyal","year":"2010","journal-title":"Proc WSDM"},{"key":"ref53","doi-asserted-by":"crossref","first-page":"36109","DOI":"10.1103\/PhysRevE.75.036109","article-title":"Cascading dynamics in modular networks","volume":"75","author":"galstyan","year":"2007","journal-title":"Phys Rev E Stat Phys Plasmas Fluids Relat Interdiscip Top"},{"key":"ref52","first-page":"88","article-title":"Scalable influence maximization in social networks under the linear threshold model","author":"chen","year":"2010","journal-title":"Proc ICDM"},{"key":"ref10","first-page":"918","article-title":"IRIE: Scalable and robust influence maximization in social networks","author":"jung","year":"2012","journal-title":"Proc ICDM"},{"key":"ref11","first-page":"266","article-title":"Scalable and parallelizable processing of influence maximization for large-scale social networks?","author":"kim","year":"2013","journal-title":"Proc ICDE"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1038\/nature03607"},{"key":"ref12","first-page":"475","article-title":"IMRank: Influence maximization via finding self-consistent ranking","author":"cheng","year":"2014","journal-title":"Proc SIGIR"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1137\/S003614450342480"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1145\/2903150.2903181","article-title":"Accelerating the mining of influential nodes in complex networks through community detection","author":"halappanavar","year":"2016","journal-title":"Proc ACM Int Conf Comput Frontiers"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pcbi.1000736"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741093"},{"key":"ref17","first-page":"281","article-title":"Some methods for classification and analysis of multivariate observations","author":"macqueen","year":"1967","journal-title":"Proc 5th Berkeley Symp Math Statist Probab"},{"key":"ref18","first-page":"605","article-title":"Efficient influential individuals discovery on service-oriented social networks: A community-based approach","author":"ye","year":"2017","journal-title":"Proc ICSOC"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557108"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1145\/502512.502525","article-title":"Mining the network value of customers","author":"domingos","year":"2001","journal-title":"Proc KDD"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1086\/209118"},{"key":"ref6","first-page":"420","article-title":"Cost-effective outbreak detection in networks","author":"leskovec","year":"2007","journal-title":"Proc KDD"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1145\/956750.956769","article-title":"Maximizing the spread of influence through a social network","author":"kempe","year":"2003","journal-title":"Proc KDD"},{"key":"ref8","first-page":"47","article-title":"CELF++: Optimizing the greedy algorithm for influence maximization in social networks","author":"goyal","year":"2011","journal-title":"Proc WWW"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1145\/1557019.1557047","article-title":"Efficient influence maximization in social networks","author":"chen","year":"2009","journal-title":"Proc KDD"},{"key":"ref49","doi-asserted-by":"crossref","first-page":"657","DOI":"10.1145\/2433396.2433478","article-title":"Influence diffusion dynamics and influence maximization in social networks with friend and foe relationships","author":"li","year":"2013","journal-title":"Proc WSDM"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-009-0150-5"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2016.09.029"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2016.05.006"},{"key":"ref48","author":"rodriguez","year":"2011","journal-title":"Uncovering the Temporal Dynamics of Diffusion Networks"},{"key":"ref47","first-page":"233","article-title":"Mining social networks using heat diffusion processes for marketing candidates selection","author":"ma","year":"2008","journal-title":"Proc CIKM"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.10.007"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1038\/nature09182"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835935"},{"key":"ref43","article-title":"CIM: Community-based influence maximization in social networks","volume":"5","author":"chen","year":"2014","journal-title":"ACM Trans Intell Syst Technol (TIST)"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8274985\/08445575.pdf?arnumber=8445575","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T15:09:22Z","timestamp":1751814562000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8445575\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":55,"URL":"https:\/\/doi.org\/10.1109\/access.2018.2866981","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}