{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:16:55Z","timestamp":1740133015630,"version":"3.37.3"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"ARC","award":["DP220101434"],"award-info":[{"award-number":["DP220101434"]}]},{"name":"Natural Science Foundation of Fujian Province of China","award":["2021J01003"],"award-info":[{"award-number":["2021J01003"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Knowl. Data Eng."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1109\/tkde.2024.3423476","type":"journal-article","created":{"date-parts":[[2024,7,4]],"date-time":"2024-07-04T17:36:50Z","timestamp":1720114610000},"page":"8328-8340","source":"Crossref","is-referenced-by-count":0,"title":["From a Timeline Contact Graph to Close Contact Tracing and Infection Diffusion Intervention"],"prefix":"10.1109","volume":"36","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8791-139X","authenticated-orcid":false,"given":"Yipeng","family":"Zhang","sequence":"first","affiliation":[{"name":"CSIRO, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2477-381X","authenticated-orcid":false,"given":"Zhifeng","family":"Bao","sequence":"additional","affiliation":[{"name":"School of Computing Technolgies, RMIT University, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9646-291X","authenticated-orcid":false,"given":"Yuchen","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computing and Information System, Singapore Management University, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9792-9171","authenticated-orcid":false,"given":"Baihua","family":"Zheng","sequence":"additional","affiliation":[{"name":"School of Computing and Information System, Singapore Management University, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8677-9080","authenticated-orcid":false,"given":"Xiaoli","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Informatics, Xiamen University, Xiamen, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-020-2923-3"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3412863"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3412860"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s446-002-8028-1"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2017.7925786"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1186\/1687-1499-2014-49"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14778\/3090163.3090166"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-015-0416-z"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11341"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1137\/s0036144500371907"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SC41405.2020.00059"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2019.2898515"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2020.3017717"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3485273"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-018-20908-x"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.84.061911"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2903148"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15939-8_7"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2015.2495000"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.87.925"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-016-0061-4"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.14778\/3291264.3291266"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219946"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330829"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098198"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330987"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2433396.2433402"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780198545996.001.0001"},{"key":"ref29","first-page":"1097","article-title":"Fake news mitigation via point process based intervention","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Farajtabar"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18038-0_5"},{"article-title":"Principles of epidemiology in public health practice; an introduction to applied epidemiology and biostatistics","year":"2006","author":"Dicker","key":"ref31"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1017\/S0950268805005054"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0146021"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380028"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.14778\/2994509.2994525"},{"article-title":"A note on the hardness of the K-ambiguity problem","year":"2002","author":"Vinterbo","key":"ref36"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973402.70"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3318464.3389740"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2593670"},{"year":"2020","key":"ref40","article-title":"Clinical signs and symptoms of influenza"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.7326\/M20-0504"},{"article-title":"Advice on the use of masks in the context of COVID-19","year":"2020","author":"W. H. O.","key":"ref42"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.15557\/pimr.2020.0005"}],"container-title":["IEEE Transactions on Knowledge and Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/69\/10750897\/10586786.pdf?arnumber=10586786","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T15:38:58Z","timestamp":1732721938000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10586786\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":43,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tkde.2024.3423476","relation":{},"ISSN":["1041-4347","1558-2191","2326-3865"],"issn-type":[{"type":"print","value":"1041-4347"},{"type":"electronic","value":"1558-2191"},{"type":"electronic","value":"2326-3865"}],"subject":[],"published":{"date-parts":[[2024,12]]}}}