{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T04:01:43Z","timestamp":1748491303811,"version":"3.41.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T00:00:00Z","timestamp":1743120000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T00:00:00Z","timestamp":1743120000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,3,28]]},"DOI":"10.1109\/cacml64929.2025.11010959","type":"proceedings-article","created":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T17:05:14Z","timestamp":1748365514000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["Rumor Suppression Maximization Algorithm Based on Local Dominance Tree"],"prefix":"10.1109","author":[{"given":"Xu","family":"Jingke","sequence":"first","affiliation":[{"name":"Shenyang Jianzhu University,Department of Computer Science and Technology,Shenyang,China"}]},{"given":"Zhao","family":"Di","sequence":"additional","affiliation":[{"name":"Shenyang Jianzhu University,Department of Computer Science and Technology,Shenyang,China"}]},{"given":"Zhou","family":"Lei","sequence":"additional","affiliation":[{"name":"Shenyang Jianzhu University,Department of Computer Science and Technology,Shenyang,China"}]}],"member":"263","reference":[{"key":"ref1","first-page":"15","article-title":"Research on the Value Creation Mechanism of E-commerce Livestreaming Business Model Empowered by Anchors: A Dual-case Analysis Based on Xiaohongshu Livestreaming[J]","volume":"08","author":"Mao","year":"2024","journal-title":"Modern Business"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2184319.2184338"},{"key":"ref3","article-title":"Minimizing the spread of contamination by blocking links in a network","author":"Kimura","year":"2008","journal-title":"AAAI"},{"key":"ref4","first-page":"134","article-title":"Negative influence minimizing by blocking nodes in social networks","volume-title":"Proceedings of the 17th AAAI Conference on Late - Breaking Developments in the Field of Artificial Intelligence","author":"Wang"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.66.035101"},{"article-title":"Minimizing the Influence of Misinformation via Vertex Blocking[J]","year":"2023","author":"J","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/502512.502525"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956769"},{"key":"ref9","first-page":"665","article-title":"Limiting the spread of misinformation in social networks","volume-title":"Proceedings of the 20th International Conference on World Wide Web. Hyderabad","author":"C"},{"key":"ref10","first-page":"564","article-title":"Negative influence blocking maximization with uncertain sources under the independent cascade model[J]","author":"Ling","year":"2021","journal-title":"Information Sciences"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2013.34"},{"key":"ref12","article-title":"Minimizing the spread of contamination by blocking links in a network","author":"Kimura","year":"2008","journal-title":"AAAI"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2013.47"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2019.00013"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2017.2783190"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1038\/35019019"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2740908.2742767"},{"key":"ref18","article-title":"Negative influence minimizing by blocking nodes in social networks","volume-title":"AAAI Workshops","volume":"WS-13-17","author":"Wang"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1002\/sim.5408"},{"key":"ref20","first-page":"20","article-title":"Research on Influence Maximization and Diffusion Model in Social Networks[D]","volume-title":"Thesis","author":"Xiaolong"},{"issue":"1","key":"ref21","first-page":"59","article-title":"Heuristic Algorthm Based on 3-layer Centrality for Influence Maximization in Social Networks[J]","volume":"41","author":"J","year":"2014","journal-title":"Computer Science"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972825.40"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2021.3059430"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/357062.357071"}],"event":{"name":"2025 4th Asia Conference on Algorithms, Computing and Machine Learning (CACML)","start":{"date-parts":[[2025,3,28]]},"location":"Guangzhou, China","end":{"date-parts":[[2025,3,30]]}},"container-title":["2025 4th Asia Conference on Algorithms, Computing and Machine Learning (CACML)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11010900\/11010924\/11010959.pdf?arnumber=11010959","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T04:49:46Z","timestamp":1748407786000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11010959\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,28]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/cacml64929.2025.11010959","relation":{},"subject":[],"published":{"date-parts":[[2025,3,28]]}}}