{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T16:32:35Z","timestamp":1771518755015,"version":"3.50.1"},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"China National Science Foundation","doi-asserted-by":"publisher","award":["91324012"],"award-info":[{"award-number":["91324012"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002367","name":"Project of Promoting Scientific Research Ability of Excellent Young Teachers in the University of Chinese Academy of Sciences","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002367","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput. Soc. Syst."],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1109\/tcss.2020.2997188","type":"journal-article","created":{"date-parts":[[2020,6,3]],"date-time":"2020-06-03T20:12:36Z","timestamp":1591215156000},"page":"897-906","source":"Crossref","is-referenced-by-count":46,"title":["Activity Minimization of Misinformation Influence in Online Social Networks"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8147-8254","authenticated-orcid":false,"given":"Jianming","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Peikun","family":"Ni","sequence":"additional","affiliation":[]},{"given":"Guoqing","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Algorithms","author":"berg","year":"2008","journal-title":"Computational Geometry Algorithms and Applications"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2019.2938575"},{"key":"ref33","first-page":"137","article-title":"Maximizing the spread of influence in a social network","author":"tardos","year":"2003","journal-title":"Proc ACM SIGKDD Int Conf Knowledge Discovery and Data Mining"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2728064"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2018.2818661"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CTS.2015.7210470"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2018.2873759"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2018.05.017"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339771"},{"key":"ref34","first-page":"267","article-title":"Mathematical models in population biology and epidemiology","volume":"40","author":"brauer","year":"2003","journal-title":"Amer Math Monthly"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1126\/science.1175570"},{"key":"ref40","first-page":"59","article-title":"Characterizing interactions in online social networks during exceptional events","volume":"3","author":"omodei","year":"2015","journal-title":"Frontiers in Physiology"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jtbi.2007.11.024"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7248481"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2013.11.021"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2585591"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2501025.2501027"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-016-0438-3"},{"key":"ref17","first-page":"134","article-title":"Negative influence minimizing by blocking nodes in social networks","author":"wang","year":"2013","journal-title":"Proc 27th AAAI Conf Artif Intell"},{"key":"ref18","first-page":"1175","article-title":"Minimizing the spread of contamination by blocking links in a network","volume":"2","author":"kimura","year":"0"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963499"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2019.2903272"},{"key":"ref4","first-page":"125","author":"wu","year":"2016","journal-title":"Big Data of Complex Networks"},{"key":"ref27","article-title":"Determining the top-k nodes in social networks using the Shapley value","volume":"3","author":"suri","year":"0"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2013.34"},{"key":"ref6","first-page":"1323","article-title":"Contrasting the spread of misinformation in online social networks","author":"ferraioli","year":"2017","journal-title":"Proc Int Joint Conf Auton Agents Multiagent Syst"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2013.47"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21786-4_4"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557077"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2019.2944120"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3301302"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1137\/S0036144500371907"},{"key":"ref1","article-title":"Swine flu: Twitter&#x2019;s power to misinform","author":"morozov","year":"2009","journal-title":"Foreign Policy"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835935"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2380718.2380746"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972825.40"},{"key":"ref42","article-title":"The PageRank citation ranking: Bringing order to the Web.","author":"page","year":"1999"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956769"},{"key":"ref41","first-page":"825","article-title":"The small world yields the most effective information spreading","volume":"abs 1107 429","author":"l\u00fc","year":"2011","journal-title":"New J Phys"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/502512.502525"},{"key":"ref26","first-page":"259","article-title":"Tractable models for information diffusion in social networks","author":"kimura","year":"2006","journal-title":"Knowledge Discovery in Databases PKDD"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/11523468_91"}],"container-title":["IEEE Transactions on Computational Social Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6570650\/9158594\/09107084.pdf?arnumber=9107084","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T17:30:35Z","timestamp":1651080635000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9107084\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8]]},"references-count":42,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tcss.2020.2997188","relation":{},"ISSN":["2329-924X","2373-7476"],"issn-type":[{"value":"2329-924X","type":"electronic"},{"value":"2373-7476","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,8]]}}}