{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T21:07:29Z","timestamp":1760044049720,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T00:00:00Z","timestamp":1557705600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,13]]},"DOI":"10.1145\/3308560.3316701","type":"proceedings-article","created":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T12:17:59Z","timestamp":1557749879000},"page":"1087-1094","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Learning Influence Probabilities and Modelling Influence Diffusion in Twitter"],"prefix":"10.1145","author":[{"given":"Zizhu","family":"Zhang","sequence":"first","affiliation":[{"name":"Macquarie Univ."}]},{"given":"Weiliang","family":"Zhao","sequence":"additional","affiliation":[{"name":"Macquarie Univ."}]},{"given":"Jian","family":"Yang","sequence":"additional","affiliation":[{"name":"Macquarie Univ."}]},{"given":"Cecile","family":"Paris","sequence":"additional","affiliation":[{"name":"CSIRO"}]},{"given":"Surya","family":"Nepal","sequence":"additional","affiliation":[{"name":"CSIRO"}]}],"member":"320","published-online":{"date-parts":[[2019,5,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Information Propagation Trees for Protest Event Prediction. In Pacific-Asia Conference on Knowledge Discovery and Data Mining. Springer, 777\u2013789","author":"Ansah Jeffery","year":"2018","unstructured":"Jeffery Ansah , Wei Kang , Lin Liu , Jixue Liu , and Jiuyong Li . 2018 . Information Propagation Trees for Protest Event Prediction. In Pacific-Asia Conference on Knowledge Discovery and Data Mining. Springer, 777\u2013789 . Jeffery Ansah, Wei Kang, Lin Liu, Jixue Liu, and Jiuyong Li. 2018. Information Propagation Trees for Protest Event Prediction. In Pacific-Asia Conference on Knowledge Discovery and Data Mining. Springer, 777\u2013789."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935845"},{"key":"e_1_3_2_1_3_1","volume-title":"Topic-aware social influence propagation models. Knowledge and information systems 37, 3","author":"Barbieri Nicola","year":"2013","unstructured":"Nicola Barbieri , Francesco Bonchi , and Giuseppe Manco . 2013. Topic-aware social influence propagation models. Knowledge and information systems 37, 3 ( 2013 ), 555\u2013584. Nicola Barbieri, Francesco Bonchi, and Giuseppe Manco. 2013. Topic-aware social influence propagation models. Knowledge and information systems 37, 3 (2013), 555\u2013584."},{"key":"e_1_3_2_1_4_1","volume-title":"Measuring user influence in twitter: The million follower fallacy.Icwsm 10, 10-17","author":"Cha Meeyoung","year":"2010","unstructured":"Meeyoung Cha , Hamed Haddadi , Fabricio Benevenuto , P\u00a0Krishna Gummadi , 2010. Measuring user influence in twitter: The million follower fallacy.Icwsm 10, 10-17 ( 2010 ), 30. Meeyoung Cha, Hamed Haddadi, Fabricio Benevenuto, P\u00a0Krishna Gummadi, 2010. Measuring user influence in twitter: The million follower fallacy.Icwsm 10, 10-17 (2010), 30."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/2601921"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Manlio De\u00a0Domenico Antonio Lima Paul Mougel and Mirco Musolesi. 2013. The anatomy of a scientific rumor. Scientific reports 3(2013) 2980.  Manlio De\u00a0Domenico Antonio Lima Paul Mougel and Mirco Musolesi. 2013. The anatomy of a scientific rumor. Scientific reports 3(2013) 2980.","DOI":"10.1038\/srep02980"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1287\/mnsc.2015.2158","article-title":"The structural virality of online diffusion","volume":"62","author":"Goel Sharad","year":"2015","unstructured":"Sharad Goel , Ashton Anderson , Jake Hofman , and Duncan\u00a0 J Watts . 2015 . The structural virality of online diffusion . Management Science 62 , 1 (2015), 180 \u2013 196 . Sharad Goel, Ashton Anderson, Jake Hofman, and Duncan\u00a0J Watts. 2015. The structural virality of online diffusion. Management Science 62, 1 (2015), 180\u2013196.","journal-title":"Management Science"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2229012.2229058"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718487.1718518"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2017.01.014"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956769"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487657"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972771.60"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2492517.2492601"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7996805"},{"key":"e_1_3_2_1_16_1","volume-title":"Influence analysis in social networks: A survey. Journal of Network and Computer Applications","author":"Peng Sancheng","year":"2018","unstructured":"Sancheng Peng , Yongmei Zhou , Lihong Cao , Shui Yu , Jianwei Niu , and Weijia Jia . 2018. Influence analysis in social networks: A survey. Journal of Network and Computer Applications ( 2018 ). Sancheng Peng, Yongmei Zhou, Lihong Cao, Shui Yu, Jianwei Niu, and Weijia Jia. 2018. Influence analysis in social networks: A survey. Journal of Network and Computer Applications (2018)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1017\/nws.2014.3"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963503"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85567-5_9"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2567948.2580050"},{"key":"e_1_3_2_1_21_1","volume-title":"Maximizing Social Influence on Target Users. In Pacific-Asia Conference on Knowledge Discovery and Data Mining. Springer, 701\u2013712","author":"Wen Yu-Ting","year":"2018","unstructured":"Yu-Ting Wen , Wen-Chih Peng , and Hong-Han Shuai . 2018 . Maximizing Social Influence on Target Users. In Pacific-Asia Conference on Knowledge Discovery and Data Mining. Springer, 701\u2013712 . Yu-Ting Wen, Wen-Chih Peng, and Hong-Han Shuai. 2018. Maximizing Social Influence on Target Users. In Pacific-Asia Conference on Knowledge Discovery and Data Mining. Springer, 701\u2013712."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783401"}],"event":{"name":"WWW '19: The Web Conference","sponsor":["IW3C2 International World Wide Web Conference Committee"],"location":"San Francisco USA","acronym":"WWW '19"},"container-title":["Companion Proceedings of The 2019 World Wide Web Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3308560.3316701","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3308560.3316701","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:24Z","timestamp":1750204404000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3308560.3316701"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,13]]},"references-count":22,"alternative-id":["10.1145\/3308560.3316701","10.1145\/3308560"],"URL":"https:\/\/doi.org\/10.1145\/3308560.3316701","relation":{},"subject":[],"published":{"date-parts":[[2019,5,13]]},"assertion":[{"value":"2019-05-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}