{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,17]],"date-time":"2025-12-17T12:52:48Z","timestamp":1765975968481,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,29]],"date-time":"2012-10-29T00:00:00Z","timestamp":1351468800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,29]]},"DOI":"10.1145\/2396761.2396837","type":"proceedings-article","created":{"date-parts":[[2012,11,15]],"date-time":"2012-11-15T16:38:00Z","timestamp":1352997480000},"page":"585-594","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":31,"title":["Influence propagation in adversarial setting"],"prefix":"10.1145","author":[{"given":"Shahrzad","family":"Shirazipourazad","sequence":"first","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"given":"Brian","family":"Bogard","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"given":"Harsh","family":"Vachhani","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"given":"Arunabha","family":"Sen","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"given":"Paul","family":"Horn","sequence":"additional","affiliation":[{"name":"Harvard University, Cambridge, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,10,29]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1145\/2124295.2124368"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.5555\/1781894.1781932"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1145\/1282100.1282167"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1145\/1557019.1557047"},{"key":"e_1_3_2_1_5_1","volume-title":"Modelling action cascades in social networks","author":"Dave K.","year":"2011","unstructured":"K. Dave , R. Bhatt , and V. Varma . Modelling action cascades in social networks . 2011 . K. Dave, R. Bhatt, and V. Varma. Modelling action cascades in social networks. 2011."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1145\/502512.502525"},{"key":"e_1_3_2_1_7_1","volume-title":"Approximation analysis of influence spread in social networks. arXiv:1008.2005v4","author":"Goyal A.","year":"2011","unstructured":"A. Goyal , F. Bonchi , L. V. S. Lakshmanan , and S. Venkatasubramanian . Approximation analysis of influence spread in social networks. arXiv:1008.2005v4 , 2011 . A. Goyal, F. Bonchi, L. V. S. Lakshmanan, and S. Venkatasubramanian. Approximation analysis of influence spread in social networks. arXiv:1008.2005v4, 2011."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.5555\/1883692.1883696"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.5555\/365411.365757"},{"key":"e_1_3_2_1_10_1","volume-title":"Simulated annealing based influence maximization in social networks","author":"Jiang Q.","year":"2011","unstructured":"Q. Jiang , G. Song , C. Gao , Y. Wang , W. Si , and K. Xie . Simulated annealing based influence maximization in social networks . 2011 . Q. Jiang, G. Song, C. Gao, Y. Wang, W. Si, and K. Xie. Simulated annealing based influence maximization in social networks. 2011."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/956750.956769"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1145\/2063576.2063721"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1145\/2020408.2020492"},{"unstructured":"M. Newman. http:\/\/networkdata.ics.uci.edu\/data\/hep-th\/.  M. Newman. http:\/\/networkdata.ics.uci.edu\/data\/hep-th\/.","key":"e_1_3_2_1_14_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1073\/pnas.98.2.404"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1098\/rstb.2009.0215"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1145\/1835804.1835935"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511815478","volume-title":"Social Network Analysis: Methods and Applications. Number 8 in Structural analysis in the social sciences","author":"Wasserman S.","year":"1994","unstructured":"S. Wasserman and K. Faust . Social Network Analysis: Methods and Applications. Number 8 in Structural analysis in the social sciences . Cambridge University Press , 1 edition, 1994 . S. Wasserman and K. Faust. Social Network Analysis: Methods and Applications. Number 8 in Structural analysis in the social sciences. Cambridge University Press, 1 edition, 1994."}],"event":{"sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"],"acronym":"CIKM'12","name":"CIKM'12: 21st ACM International Conference on Information and Knowledge Management","location":"Maui Hawaii USA"},"container-title":["Proceedings of the 21st ACM international conference on Information and knowledge management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2396761.2396837","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2396761.2396837","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:34:39Z","timestamp":1750239279000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2396761.2396837"}},"subtitle":["how to defeat competition with least amount of investment"],"short-title":[],"issued":{"date-parts":[[2012,10,29]]},"references-count":18,"alternative-id":["10.1145\/2396761.2396837","10.1145\/2396761"],"URL":"https:\/\/doi.org\/10.1145\/2396761.2396837","relation":{},"subject":[],"published":{"date-parts":[[2012,10,29]]},"assertion":[{"value":"2012-10-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}