{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T03:20:46Z","timestamp":1774495246359,"version":"3.50.1"},"reference-count":95,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2019,2,13]],"date-time":"2019-02-13T00:00:00Z","timestamp":1550016000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Callaghan Innovation, under an R8D Student Fellowship","award":["PTERN1502"],"award-info":[{"award-number":["PTERN1502"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2020,1,31]]},"abstract":"<jats:p>\n            Top-\n            <jats:italic>k<\/jats:italic>\n            nodes are the important actors for a subjectively determined topic in a social network. To some extent, a topic is taken as a ranking criteria for identifying top-\n            <jats:italic>k<\/jats:italic>\n            nodes. Within a viral marketing network, subjectively selected topics can include the following: Who can promote a new product to the largest number of people, and who are the highest spending customers? Based on these questions, there has been a growing interest in top-\n            <jats:italic>k<\/jats:italic>\n            nodes research to effectively identify key players. In this article, we review and classify existing literature on top-\n            <jats:italic>k<\/jats:italic>\n            nodes identification into two major categories: top-\n            <jats:italic>k<\/jats:italic>\n            influential nodes and top-\n            <jats:italic>k<\/jats:italic>\n            significant nodes. We survey both theoretical and applied work in the field and describe promising research directions based on our review. This research area has proven to be beneficial for data analysis on online social networks as well as practical applications on real-life networks.\n          <\/jats:p>","DOI":"10.1145\/3301286","type":"journal-article","created":{"date-parts":[[2019,2,14]],"date-time":"2019-02-14T19:36:17Z","timestamp":1550172977000},"page":"1-33","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":45,"title":["Identifying Top-\n            <i>k<\/i>\n            Nodes in Social Networks"],"prefix":"10.1145","volume":"52","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8594-7847","authenticated-orcid":false,"given":"Ranran","family":"Bian","sequence":"first","affiliation":[{"name":"University of Auckland and Pingar, Pingar"}]},{"given":"Yun Sing","family":"Koh","sequence":"additional","affiliation":[{"name":"University of Auckland, Pingar"}]},{"given":"Gillian","family":"Dobbie","sequence":"additional","affiliation":[{"name":"University of Auckland, Pingar"}]},{"given":"Anna","family":"Divoli","sequence":"additional","affiliation":[{"name":"Pingar,Pingar"}]}],"member":"320","published-online":{"date-parts":[[2019,2,13]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2601412"},{"key":"e_1_2_1_2_1","volume-title":"Yu","author":"Aggarwal Charu C.","year":"2012","unstructured":"Charu C. Aggarwal , Shuyang Lin , and Philip S . Yu . 2012 . On influential node discovery in dynamic social networks. In Proceedings of the 2012 SIAM International Conference on Data Mining. 636--647. Charu C. Aggarwal, Shuyang Lin, and Philip S. Yu. 2012. On influential node discovery in dynamic social networks. In Proceedings of the 2012 SIAM International Conference on Data Mining. 636--647."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1341531.1341557"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1215842"},{"key":"e_1_2_1_5_1","volume-title":"Proceedings of the 17th International Conference on Extending Database Technology (EDBT\u201914)","author":"Aslay \u00c7igdem","year":"2014","unstructured":"\u00c7igdem Aslay , Nicola Barbieri , Francesco Bonchi , and Ricardo A Baeza-Yates . 2014 . Online topic-aware influence maximization queries . In Proceedings of the 17th International Conference on Extending Database Technology (EDBT\u201914) . 295--306. \u00c7igdem Aslay, Nicola Barbieri, Francesco Bonchi, and Ricardo A Baeza-Yates. 2014. Online topic-aware influence maximization queries. In Proceedings of the 17th International Conference on Extending Database Technology (EDBT\u201914). 295--306."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935845"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-013-0646-6"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.70.066149"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1086\/228631"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10588-006-7084-x"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401994"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2016.05.006"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7552(98)00110-X"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963499"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SocialInformatics.2012.82"},{"key":"e_1_2_1_16_1","volume-title":"Proceedings of the International AAAI Conference on Web and Social Media (ICWSM\u201910)","author":"Cha Meeyoung","unstructured":"Meeyoung Cha , Hamed Haddadi , Fabricio Benevenuto , and P. Krishna Gummadi . 2010. Measuring user influence in twitter: The million follower fallacy . In Proceedings of the International AAAI Conference on Web and Social Media (ICWSM\u201910) . Meeyoung Cha, Hamed Haddadi, Fabricio Benevenuto, and P. Krishna Gummadi. 2010. Measuring user influence in twitter: The million follower fallacy. In Proceedings of the International AAAI Conference on Web and Social Media (ICWSM\u201910)."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2011.09.017"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SmartCity.2015.86"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835934"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557047"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2010.118"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177698950"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/502512.502525"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5220\/0005811701130120"},{"key":"e_1_2_1_25_1","unstructured":"Facebook. 2017. Statistics. (2017). Retrieved from http:\/\/www.facebook.com\/press\/info.php?statistics.  Facebook. 2017. Statistics. (2017). Retrieved from http:\/\/www.facebook.com\/press\/info.php?statistics."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/584792.584827"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2006.536"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/0378-8733(78)90021-7"},{"key":"e_1_2_1_29_1","volume-title":"Proceedings of the Fourth SNA-KDD Workshop. http:\/\/arxiv.org\/abs\/1005","author":"Ghosh Rumi","year":"2010","unstructured":"Rumi Ghosh and Kristina Lerman . 2010 . Predicting influential users in online social networks . In Proceedings of the Fourth SNA-KDD Workshop. http:\/\/arxiv.org\/abs\/1005 .4882. Rumi Ghosh and Kristina Lerman. 2010. Predicting influential users in online social networks. In Proceedings of the Fourth SNA-KDD Workshop. http:\/\/arxiv.org\/abs\/1005.4882."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011122126881"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1086\/226707"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988739"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2503792.2503797"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1458082.1458204"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3054"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/511446.511513"},{"key":"e_1_2_1_37_1","volume-title":"Proceedings of the International Conference on Information Systems.","author":"Heidemann Julia","year":"2010","unstructured":"Julia Heidemann , Mathias Klier , and Florian Probst . 2010 . Identifying key users in online social networks: A pagerank based approach . In Proceedings of the International Conference on Information Systems. Julia Heidemann, Mathias Klier, and Florian Probst. 2010. Identifying key users in online social networks: A pagerank based approach. In Proceedings of the International Conference on Information Systems."},{"key":"e_1_2_1_38_1","volume-title":"A Heuristic Method of Identifying Key Microbloggers","author":"Huang Lidong","unstructured":"Lidong Huang , Wenxian Wang , Xiaozhou Chen , and Junhua Chen . 2016. A Heuristic Method of Identifying Key Microbloggers . Springer International Publishing , Cham , 417--426. Lidong Huang, Wenxian Wang, Xiaozhou Chen, and Junhua Chen. 2016. A Heuristic Method of Identifying Key Microbloggers. Springer International Publishing, Cham, 417--426."},{"key":"e_1_2_1_39_1","volume-title":"Proceedings of the 2011 IEEE International Conference on Communications (ICC\u201911)","author":"Muhammad","unstructured":"Muhammad U. Ilyas and Hayder Radha. 2011. Identifying influential nodes in online social networks using principal component centrality . In Proceedings of the 2011 IEEE International Conference on Communications (ICC\u201911) . 1--5. Muhammad U. Ilyas and Hayder Radha. 2011. Identifying influential nodes in online social networks using principal component centrality. In Proceedings of the 2011 IEEE International Conference on Communications (ICC\u201911). 1--5."},{"key":"e_1_2_1_40_1","volume-title":"Proceedings of the International AAAI Conference on Web and Social Media (ICWSM\u201907)","author":"Java Akshay","year":"2007","unstructured":"Akshay Java , Pranam Kolari , Tim Finin , Anupam Joshi , and Tim Oates . 2007 . Feeds that matter: A study of bloglines subscriptions . In Proceedings of the International AAAI Conference on Web and Social Media (ICWSM\u201907) . Akshay Java, Pranam Kolari, Tim Finin, Anupam Joshi, and Tim Oates. 2007. Feeds that matter: A study of bloglines subscriptions. In Proceedings of the International AAAI Conference on Web and Social Media (ICWSM\u201907)."},{"key":"e_1_2_1_41_1","volume-title":"Proceedings of the 15th International World Wide Web Conference. 22--26","author":"Java Akshay","year":"2006","unstructured":"Akshay Java , Pranam Kolari , Tim Finin , and Tim Oates . 2006 . Modeling the spread of influence on the blogosphere . In Proceedings of the 15th International World Wide Web Conference. 22--26 . Akshay Java, Pranam Kolari, Tim Finin, and Tim Oates. 2006. Modeling the spread of influence on the blogosphere. In Proceedings of the 15th International World Wide Web Conference. 22--26."},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321440.1321575"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1277741.1277938"},{"key":"e_1_2_1_44_1","unstructured":"Jon Kleinberg Jure Leskovec Daniel Huttenlocher. 2010. Wikipedia Vote Network. (2010). Retrieved from http:\/\/snap.stanford.edu\/data\/wiki-Vote.html.  Jon Kleinberg Jure Leskovec Daniel Huttenlocher. 2010. Wikipedia Vote Network. (2010). Retrieved from http:\/\/snap.stanford.edu\/data\/wiki-Vote.html."},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956769"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/11523468_91"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2009.59"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2012.6289230"},{"key":"e_1_2_1_49_1","volume-title":"Tractable Models for Information Diffusion in Social Networks","author":"Kimura Masahiro","unstructured":"Masahiro Kimura and Kazumi Saito . 2006. Tractable Models for Information Diffusion in Social Networks . Springer , Berlin , 259--271. Masahiro Kimura and Kazumi Saito. 2006. Tractable Models for Information Diffusion in Social Networks. Springer, Berlin, 259--271."},{"key":"e_1_2_1_50_1","first-page":"1371","article-title":"Extracting influential nodes for information diffusion on a social network","volume":"7","author":"Kimura Masahiro","year":"2007","unstructured":"Masahiro Kimura , Kazumi Saito , and Ryohei Nakano . 2007 . Extracting influential nodes for information diffusion on a social network . In AAAI , Vol. 7. 1371 -- 1376 . Masahiro Kimura, Kazumi Saito, and Ryohei Nakano. 2007. Extracting influential nodes for information diffusion on a social network. In AAAI, Vol. 7. 1371--1376.","journal-title":"AAAI"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/324133.324140"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772751"},{"key":"e_1_2_1_53_1","volume-title":"A Survey of Algorithms and Systems for Expert Location in Social Networks","author":"Lappas Theodoros","unstructured":"Theodoros Lappas , Kun Liu , and Evimaria Terzi . 2011. A Survey of Algorithms and Systems for Expert Location in Social Networks . Springer US , Boston, MA , 215--241. Theodoros Lappas, Kun Liu, and Evimaria Terzi. 2011. A Survey of Algorithms and Systems for Expert Location in Social Networks. Springer US, Boston, MA, 215--241."},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835937"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281239"},{"key":"e_1_2_1_56_1","volume-title":"Proceedings of the 2017 2nd International Conference on Image, Vision and Computing (ICIVC\u201917)","author":"Li Hongbo","year":"2017","unstructured":"Hongbo Li , Jianpei Zhang , Jing Yang , Jinbo Bai , and Yuming Zhao . 2017 . Efficient star nodes discovery algorithm in social networks based on acquaintance immunization . In Proceedings of the 2017 2nd International Conference on Image, Vision and Computing (ICIVC\u201917) . IEEE, 937--940. Hongbo Li, Jianpei Zhang, Jing Yang, Jinbo Bai, and Yuming Zhao. 2017. Efficient star nodes discovery algorithm in social networks based on acquaintance immunization. In Proceedings of the 2017 2nd International Conference on Image, Vision and Computing (ICIVC\u201917). IEEE, 937--940."},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871467"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2661829.2662009"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.5555\/1103329.1710514"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/383952.384086"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04441-0_31"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2010.2052042"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/945721.945722"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2380718.2380746"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2010.03.006"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935843"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871658"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-013-0263-7"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2016.04.003"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.5555\/2034161.2034164"},{"key":"e_1_2_1_72_1","volume-title":"A Mathematical Theory of Evidence","author":"Shafer Glenn","unstructured":"Glenn Shafer . 1976. A Mathematical Theory of Evidence . Vol. 1 . Princeton University Press . Glenn Shafer. 1976. A Mathematical Theory of Evidence. Vol. 1. Princeton University Press."},{"key":"e_1_2_1_73_1","volume-title":"A Value for N-person Games in Contributions to the Theory of Games","author":"Shapley L. S.","unstructured":"L. S. Shapley . 1950. A Value for N-person Games in Contributions to the Theory of Games . Vol. 1 . Princeton University Press . L. S. Shapley. 1950. A Value for N-person Games in Contributions to the Theory of Games. Vol. 1. Princeton University Press."},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2620141"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2505626"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815625"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/2835776.2835788"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-014-0219-z"},{"key":"e_1_2_1_79_1","volume-title":"A Survey of Models and Algorithms for Social Influence Analysis","author":"Sun Jimeng","unstructured":"Jimeng Sun and Jie Tang . 2011. A Survey of Models and Algorithms for Social Influence Analysis . Springer US , Boston, MA , 177--214. Jimeng Sun and Jie Tang. 2011. A Survey of Models and Algorithms for Social Influence Analysis. Springer US, Boston, MA, 177--214."},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557108"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2563397"},{"key":"e_1_2_1_82_1","volume-title":"Significant Node Identification in Social Networks","author":"Tseng Chi-Yao","unstructured":"Chi-Yao Tseng and Ming-Syan Chen . 2012. Significant Node Identification in Social Networks . Springer Berlin , 459--470. Chi-Yao Tseng and Ming-Syan Chen. 2012. Significant Node Identification in Social Networks. Springer Berlin, 459--470."},{"key":"e_1_2_1_83_1","unstructured":"Daniel Tunkelang. 2009. A twitter analog to pagerank. The Noisy Channel.  Daniel Tunkelang. 2009. A twitter analog to pagerank. The Noisy Channel."},{"key":"e_1_2_1_84_1","volume-title":"Proceedings of the 2015 The International Symposium on Artificial Intelligence and Signal Processing (AISP\u201915)","author":"Vadoodparast M.","unstructured":"M. Vadoodparast and F. Taghiyareh . 2015. A multi-agent solution to maximizing product adoption in dynamic social networks . In Proceedings of the 2015 The International Symposium on Artificial Intelligence and Signal Processing (AISP\u201915) . 71--78. M. Vadoodparast and F. Taghiyareh. 2015. A multi-agent solution to maximizing product adoption in dynamic social networks. In Proceedings of the 2015 The International Symposium on Artificial Intelligence and Signal Processing (AISP\u201915). 71--78."},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835935"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.14778\/3067421.3067429"},{"key":"e_1_2_1_87_1","volume-title":"Social Network Analysis: Methods and Applications","author":"Wasserman Stanley","unstructured":"Stanley Wasserman and Katherine Faust . 1994. Social Network Analysis: Methods and Applications . Vol. 8 . Cambridge University Press . Stanley Wasserman and Katherine Faust. 1994. Social Network Analysis: Methods and Applications. Vol. 8. Cambridge University Press."},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2013.01.054"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718487.1718520"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/1149941.1149962"},{"key":"e_1_2_1_91_1","volume-title":"Mining Research Communities in Bibliographical Data","author":"Za\u00efane Osmar R.","unstructured":"Osmar R. Za\u00efane , Jiyang Chen , and Randy Goebel . 2009. Mining Research Communities in Bibliographical Data . Springer , Berlin , 59--76. Osmar R. Za\u00efane, Jiyang Chen, and Randy Goebel. 2009. Mining Research Communities in Bibliographical Data. Springer, Berlin, 59--76."},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242603"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2007.57"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.06.011"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2015.67"},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2013.145"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3301286","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3301286","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:58:02Z","timestamp":1750208282000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3301286"}},"subtitle":["A Survey"],"short-title":[],"issued":{"date-parts":[[2019,2,13]]},"references-count":95,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,1,31]]}},"alternative-id":["10.1145\/3301286"],"URL":"https:\/\/doi.org\/10.1145\/3301286","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,2,13]]},"assertion":[{"value":"2016-09-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-11-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-02-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}