{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T10:21:00Z","timestamp":1771064460653,"version":"3.50.1"},"reference-count":74,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072406"],"award-info":[{"award-number":["62072406"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Laboratory of Science and Technology on Information System Security","award":["61421110502"],"award-info":[{"award-number":["61421110502"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput. Soc. Syst."],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1109\/tcss.2022.3165739","type":"journal-article","created":{"date-parts":[[2022,4,22]],"date-time":"2022-04-22T19:34:17Z","timestamp":1650656057000},"page":"1115-1129","source":"Crossref","is-referenced-by-count":10,"title":["CTL-DIFF: Control Information Diffusion in Social Network by Structure Optimization"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7153-2755","authenticated-orcid":false,"given":"Jinyin","family":"Chen","sequence":"first","affiliation":[{"name":"Institute of Cyberspace Security, and the College of Information Engineering, Zhejiang University of Technology, Hangzhou, China"}]},{"given":"Xiaodong","family":"Xu","sequence":"additional","affiliation":[{"name":"Binjiang Institute, Zhejiang University, Hangzhou, China"}]},{"given":"Lihong","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Information Engineering, Zhejiang University of Technology, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4953-070X","authenticated-orcid":false,"given":"Zhongyuan","family":"Ruan","sequence":"additional","affiliation":[{"name":"Institute of Cyberspace Security, Zhejiang University of Technology, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6766-4579","authenticated-orcid":false,"given":"Zhaoyan","family":"Ming","sequence":"additional","affiliation":[{"name":"Institute of Computing Innovation, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4066-689X","authenticated-orcid":false,"given":"Yi","family":"Liu","sequence":"additional","affiliation":[{"name":"Institute of Process Equipment and Control Engineering, Zhejiang University of Technology, Hangzhou, China"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2015.08.043"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS48256.2020.9027478"},{"key":"ref12","first-page":"211","article-title":"Infectious diseases of humans: Dynamics and control","volume":"108","author":"joel cohen","year":"1991","journal-title":"Epidemiology and Infection"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737485"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2017.2786545"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.925623"},{"key":"ref14","volume":"5","author":"diekmann","year":"2000","journal-title":"Mathematical Epidemiology of Infectious Diseases Model Building Analysis and Interpretation"},{"key":"ref58","first-page":"1464","article-title":"Security games for controlling contagion","author":"tsai","year":"2012","journal-title":"Proc AAAI"},{"key":"ref53","first-page":"339","article-title":"On misinformation containment in online social networks","author":"tong","year":"2018","journal-title":"Proc 32nd Conf Neural Inf Process Syst (NeurIPS)"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1038\/srep22916"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1196\/annals.1385.022"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2017.2783190"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972818.33"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2018.2818661"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.3015387"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2013.34"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICAwST.2019.8923277"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2801854"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2017.134"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85567-5_9"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.115.218702"},{"key":"ref45","article-title":"Uncovering the temporal dynamics of diffusion networks","author":"rodriguez","year":"2011","journal-title":"arXiv 1105 0697"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-05224-8_25"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1063\/5.0005105"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623732"},{"key":"ref41","first-page":"2014","article-title":"Learning convolutional neural networks for graphs","author":"niepert","year":"2016","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220077"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.avb.2017.01.012"},{"key":"ref49","first-page":"193","article-title":"Generative models of information diffusion with asynchronous timedelay","author":"saito","year":"2010","journal-title":"Proc 2nd Asian Conf Mach Learn"},{"key":"ref8","article-title":"Multiscale evolutionary perturbation attack on community detection","author":"chen","year":"2019","journal-title":"arXiv 1910 09741"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5741"},{"key":"ref9","article-title":"Fast gradient attack on network embedding","author":"chen","year":"2018","journal-title":"arXiv 1809 02797"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2835776.2835817"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2556195.2556216"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1284680.1284681"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963499"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2380718.2380746"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2018.2885127"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-019-1561-7"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2556612"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1458082.1458115"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052643"},{"key":"ref30","article-title":"Snap datasets: Stanford large network dataset collection","author":"leskovec","year":"2014"},{"key":"ref74","article-title":"Adversarial attacks on graph neural networks via meta learning","author":"z\u00fcgner","year":"2019","journal-title":"arXiv 1902 08412"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2807843"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2702162"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17572-5_48"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1257\/jep.31.2.211"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.66.016128"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1140\/epjb\/e20020122"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/j.physrep.2016.07.002"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.03.140"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/872"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.08.089"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972825.40"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2017.2719056"},{"key":"ref23","article-title":"Discovering overlapping communities in dynamic networks based on cascade information diffusion","author":"he","year":"2021","journal-title":"IEEE Transactions on Computational Social Systems"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2939796"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.2100786118"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"599","DOI":"10.1137\/S0036144500371907","article-title":"The mathematics of infectious diseases","volume":"42","author":"herbert","year":"2000","journal-title":"SIAM Rev"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/SYSCON.2016.7490518"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICAwST.2019.8923277"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1088\/1751-8113\/40\/11\/005"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3186931"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2505571"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2957755"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1086\/226707"},{"key":"ref65","article-title":"DiffNet++: A neural influence and interest diffusion network for social recommendation","author":"wu","year":"2020","journal-title":"arXiv 2002 00844"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1038\/nphys1746"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/956755.956769"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106942"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2954901"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/416"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2913641"}],"container-title":["IEEE Transactions on Computational Social Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6570650\/10132891\/09761998.pdf?arnumber=9761998","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T18:16:46Z","timestamp":1687198606000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9761998\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6]]},"references-count":74,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tcss.2022.3165739","relation":{},"ISSN":["2329-924X","2373-7476"],"issn-type":[{"value":"2329-924X","type":"electronic"},{"value":"2373-7476","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6]]}}}