{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T05:20:50Z","timestamp":1755926450820,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":61,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,4,20]],"date-time":"2020-04-20T00:00:00Z","timestamp":1587340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4,20]]},"DOI":"10.1145\/3366423.3380028","type":"proceedings-article","created":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T08:16:51Z","timestamp":1588580211000},"page":"2711-2717","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["On the Robustness of Cascade Diffusion under Node Attacks"],"prefix":"10.1145","author":[{"given":"Alvis","family":"Logins","sequence":"first","affiliation":[{"name":"Aarhus University"}]},{"given":"Yuchen","family":"Li","sequence":"additional","affiliation":[{"name":"Singapore Management University"}]},{"given":"Panagiotis","family":"Karras","sequence":"additional","affiliation":[{"name":"Aarhus University"}]}],"member":"320","published-online":{"date-parts":[[2020,4,20]]},"reference":[{"volume-title":"Proc. 3rd Intl Workshop on Link Discovery. 36\u201343","author":"A.","key":"e_1_3_2_1_1_1","unstructured":"Lada\u00a0 A. Adamic and Natalie Glance. 2005. The Political Blogosphere and the 2004 U.S. Election: Divided They Blog . In Proc. 3rd Intl Workshop on Link Discovery. 36\u201343 . Lada\u00a0A. Adamic and Natalie Glance. 2005. The Political Blogosphere and the 2004 U.S. Election: Divided They Blog. In Proc. 3rd Intl Workshop on Link Discovery. 36\u201343."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/2750423.2750428"},{"key":"e_1_3_2_1_3_1","volume-title":"Error and attack tolerance of complex networks. Nature 406, 6794","author":"Albert R\u00e9ka","year":"2000","unstructured":"R\u00e9ka Albert , Hawoong Jeong , and Albert-L\u00e1szl\u00f3 Barab\u00e1si . 2000. Error and attack tolerance of complex networks. Nature 406, 6794 ( 2000 ), 378. R\u00e9ka Albert, Hawoong Jeong, and Albert-L\u00e1szl\u00f3 Barab\u00e1si. 2000. Error and attack tolerance of complex networks. Nature 406, 6794 (2000), 378."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2740908.2743055"},{"volume-title":"Network science","author":"Barab\u00e1si Albert-L\u00e1szl\u00f3","key":"e_1_3_2_1_5_1","unstructured":"Albert-L\u00e1szl\u00f3 Barab\u00e1si . 2016. Network science . Cambridge university press . Albert-L\u00e1szl\u00f3 Barab\u00e1si. 2016. Network science. Cambridge university press."},{"key":"e_1_3_2_1_6_1","volume-title":"Gephi: An Open Source Software for Exploring and Manipulating Networks.","author":"Bastian Mathieu","year":"2009","unstructured":"Mathieu Bastian , Sebastien Heymann , and Mathieu Jacomy . 2009 . Gephi: An Open Source Software for Exploring and Manipulating Networks. Mathieu Bastian, Sebastien Heymann, and Mathieu Jacomy. 2009. Gephi: An Open Source Software for Exploring and Manipulating Networks."},{"key":"e_1_3_2_1_7_1","unstructured":"Ilija Bogunovic. 2012. Robust protection of networks against cascading phenomena. Master\u2019s thesis. Department of Computer Science ETH Z\u00fcrich.  Ilija Bogunovic. 2012. Robust protection of networks against cascading phenomena. Master\u2019s thesis. Department of Computer Science ETH Z\u00fcrich."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Ulrik Brandes Marco Gaertler and Dorothea Wagner. 2003. Experiments on Graph Clustering Algorithms. In ESA. 568\u2013579.  Ulrik Brandes Marco Gaertler and Dorothea Wagner. 2003. Experiments on Graph Clustering Algorithms. In ESA. 568\u2013579.","DOI":"10.1007\/978-3-540-39658-1_52"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1088\/1478-3975\/aac194"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1214\/aoap\/1019487612"},{"key":"e_1_3_2_1_11_1","first-page":"113","article-title":"Node Immunization on Large Graphs: Theory and Algorithms","volume":"28","author":"Chen Chen","year":"2016","unstructured":"Chen Chen , Hanghang Tong , B.\u00a0 Aditya Prakash , Charalampos\u00a0 E. Tsourakakis , Tina Eliassi-Rad , Christos Faloutsos , and Duen\u00a0Horng Chau . 2016 . Node Immunization on Large Graphs: Theory and Algorithms . IEEE TKDE 28 , 1 (2016), 113 \u2013 126 . Chen Chen, Hanghang Tong, B.\u00a0Aditya Prakash, Charalampos\u00a0E. Tsourakakis, Tina Eliassi-Rad, Christos Faloutsos, and Duen\u00a0Horng Chau. 2016. Node Immunization on Large Graphs: Theory and Algorithms. IEEE TKDE 28, 1 (2016), 113\u2013126.","journal-title":"IEEE TKDE"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Wei Chen Tian Lin Zihan Tan Mingfei Zhao and Xuren Zhou. 2016. Robust Influence Maximization. In KDD. 795\u2013804.  Wei Chen Tian Lin Zihan Tan Mingfei Zhao and Xuren Zhou. 2016. Robust Influence Maximization. In KDD. 795\u2013804.","DOI":"10.1145\/2939672.2939745"},{"key":"e_1_3_2_1_13_1","unstructured":"Eunjoon Cho Seth\u00a0A. Myers and Jure Leskovec. 2011. Friendship and mobility: user movement in location-based social networks. In KDD. 1082\u20131090.  Eunjoon Cho Seth\u00a0A. Myers and Jure Leskovec. 2011. Friendship and mobility: user movement in location-based social networks. In KDD. 1082\u20131090."},{"key":"e_1_3_2_1_14_1","volume-title":"Efficient immunization strategies for computer networks and populations. Physical review letters 91, 24","author":"Cohen Reuven","year":"2003","unstructured":"Reuven Cohen , Shlomo Havlin , and Daniel Ben-Avraham . 2003. Efficient immunization strategies for computer networks and populations. Physical review letters 91, 24 ( 2003 ), 247901. Reuven Cohen, Shlomo Havlin, and Daniel Ben-Avraham. 2003. Efficient immunization strategies for computer networks and populations. Physical review letters 91, 24 (2003), 247901."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.69.045104"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0914402107"},{"key":"e_1_3_2_1_17_1","unstructured":"Wendy Ellens and Robert\u00a0E. Kooij. 2013. Graph measures and network robustness. CoRR abs\/1311.5064(2013). arxiv:1311.5064  Wendy Ellens and Robert\u00a0E. Kooij. 2013. Graph measures and network robustness. CoRR abs\/1311.5064(2013). arxiv:1311.5064"},{"key":"e_1_3_2_1_18_1","first-page":"880","article-title":"Efficient Information Flow Maximization in Probabilistic Graphs","volume":"30","author":"Frey Christian","year":"2018","unstructured":"Christian Frey , Andreas Z\u00fcfle , Tobias Emrich , and Matthias Renz . 2018 . Efficient Information Flow Maximization in Probabilistic Graphs . IEEE TKDE 30 , 5 (2018), 880 \u2013 894 . Christian Frey, Andreas Z\u00fcfle, Tobias Emrich, and Matthias Renz. 2018. Efficient Information Flow Maximization in Probabilistic Graphs. IEEE TKDE 30, 5 (2018), 880\u2013894.","journal-title":"IEEE TKDE"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-018-29626-w"},{"key":"e_1_3_2_1_20_1","unstructured":"Xinran He and David Kempe. 2014. Stability of influence maximization. In KDD. 1256\u20131265.  Xinran He and David Kempe. 2014. Stability of influence maximization. In KDD. 1256\u20131265."},{"key":"e_1_3_2_1_21_1","unstructured":"Xinran He and David Kempe. 2016. Robust Influence Maximization. In KDD. 885\u2013894.  Xinran He and David Kempe. 2016. Robust Influence Maximization. In KDD. 885\u2013894."},{"key":"e_1_3_2_1_22_1","unstructured":"Xinran He Guojie Song Wei Chen and Qingye Jiang. 2012. Influence Blocking Maximization in Social Networks under the Competitive Linear Threshold Model. In SDM. 463\u2013474.  Xinran He Guojie Song Wei Chen and Qingye Jiang. 2012. Influence Blocking Maximization in Social Networks under the Competitive Linear Threshold Model. In SDM. 463\u2013474."},{"key":"e_1_3_2_1_23_1","volume-title":"Growing scale-free networks with tunable clustering. Physical review E 65, 2","author":"Holme Petter","year":"2002","unstructured":"Petter Holme and Beom\u00a0Jun Kim . 2002. Growing scale-free networks with tunable clustering. Physical review E 65, 2 ( 2002 ), 26107. Petter Holme and Beom\u00a0Jun Kim. 2002. Growing scale-free networks with tunable clustering. Physical review E 65, 2 (2002), 26107."},{"key":"e_1_3_2_1_24_1","volume-title":"Harvester: Influence Optimization in Symmetric Interaction Networks. In IEEE Intl Conf. Data Science and Advanced Analytics. 61\u201370","author":"Ivanov Sergei","year":"2016","unstructured":"Sergei Ivanov and Panagiotis Karras . 2016 . Harvester: Influence Optimization in Symmetric Interaction Networks. In IEEE Intl Conf. Data Science and Advanced Analytics. 61\u201370 . Sergei Ivanov and Panagiotis Karras. 2016. Harvester: Influence Optimization in Symmetric Interaction Networks. In IEEE Intl Conf. Data Science and Advanced Analytics. 61\u201370."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Sergei Ivanov Konstantinos Theocharidis Manolis Terrovitis and Panagiotis Karras. 2017. Content Recommendation for Viral Social Influence. In SIGIR. 565\u2013574.  Sergei Ivanov Konstantinos Theocharidis Manolis Terrovitis and Panagiotis Karras. 2017. Content Recommendation for Viral Social Influence. In SIGIR. 565\u2013574.","DOI":"10.1145\/3077136.3080788"},{"key":"e_1_3_2_1_26_1","unstructured":"Dimitris Kalimeris Gal Kaplun and Yaron Singer. 2019. Robust Influence Maximization for Hyperparametric Models. In ICML. 3192\u20133200.  Dimitris Kalimeris Gal Kaplun and Yaron Singer. 2019. Robust Influence Maximization for Hyperparametric Models. In ICML. 3192\u20133200."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02289026"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"David Kempe Jon\u00a0M. Kleinberg and \u00c9va Tardos. 2003. Maximizing the spread of influence through a social network. In KDD. 137\u2013146.  David Kempe Jon\u00a0M. Kleinberg and \u00c9va Tardos. 2003. Maximizing the spread of influence through a social network. In KDD. 137\u2013146.","DOI":"10.1145\/956750.956769"},{"key":"e_1_3_2_1_29_1","volume-title":"Klau and Ren\u00e9 Weiskircher","author":"W.","year":"2005","unstructured":"Gunnar\u00a0 W. Klau and Ren\u00e9 Weiskircher . 2005 . Robustness and Resilience. In Network Analysis. Springer Berlin Heidelberg , 417\u2013437. Gunnar\u00a0W. Klau and Ren\u00e9 Weiskircher. 2005. Robustness and Resilience. In Network Analysis. Springer Berlin Heidelberg, 417\u2013437."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487788.2488173"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217301"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45735-6_1"},{"key":"e_1_3_2_1_33_1","unstructured":"Yuchen Li Ju Fan George\u00a0V. Ovchinnikov and Panagiotis Karras. 2019. Maximizing Multifaceted Network Influence. In ICDE. 446\u2013457.  Yuchen Li Ju Fan George\u00a0V. Ovchinnikov and Panagiotis Karras. 2019. Maximizing Multifaceted Network Influence. In ICDE. 446\u2013457."},{"key":"e_1_3_2_1_34_1","first-page":"1852","article-title":"Influence Maximization on Social Graphs: A Survey","volume":"30","author":"Li Yuchen","year":"2018","unstructured":"Yuchen Li , Ju Fan , Yanhao Wang , and Kian-Lee Tan . 2018 . Influence Maximization on Social Graphs: A Survey . IEEE TKDE 30 , 10 (2018), 1852 \u2013 1872 . Yuchen Li, Ju Fan, Yanhao Wang, and Kian-Lee Tan. 2018. Influence Maximization on Social Graphs: A Survey. IEEE TKDE 30, 10 (2018), 1852\u20131872.","journal-title":"IEEE TKDE"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1140\/epjb\/e2016-60612-y"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-016-6108-z"},{"key":"e_1_3_2_1_37_1","volume-title":"Content-Based Network Influence Probabilities: Extraction and Application. In ICDM Workshops. 69\u201372","author":"Logins Alvis","year":"2019","unstructured":"Alvis Logins and Panagiotis Karras . 2019 . Content-Based Network Influence Probabilities: Extraction and Application. In ICDM Workshops. 69\u201372 . Alvis Logins and Panagiotis Karras. 2019. Content-Based Network Influence Probabilities: Extraction and Application. In ICDM Workshops. 69\u201372."},{"key":"e_1_3_2_1_38_1","unstructured":"Alvis Logins and Panagiotis Karras. 2019. An Experimental Study on Network Immunization. In EDBT. 726\u2013729.  Alvis Logins and Panagiotis Karras. 2019. An Experimental Study on Network Immunization. In EDBT. 726\u2013729."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Alvis Logins Panagiotis Karras and Christian\u00a0S. Jensen. 2019. Multicapacity Facility Selection in Networks. In ICDE. 794\u2013805.  Alvis Logins Panagiotis Karras and Christian\u00a0S. Jensen. 2019. Multicapacity Facility Selection in Networks. In ICDE. 794\u2013805.","DOI":"10.1109\/ICDE.2019.00076"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2018.11.020"},{"key":"e_1_3_2_1_41_1","volume-title":"Bowling Alone and Trust Decline in Social Network Sites. In The 8th IEEE Intl Conf. Dependable, Autonomic and Secure Computing. 658\u2013663","author":"Massa Paolo","year":"2009","unstructured":"Paolo Massa , Martino Salvetti , and Danilo Tomasoni . 2009 . Bowling Alone and Trust Decline in Social Network Sites. In The 8th IEEE Intl Conf. Dependable, Autonomic and Secure Computing. 658\u2013663 . Paolo Massa, Martino Salvetti, and Danilo Tomasoni. 2009. Bowling Alone and Trust Decline in Social Network Sites. In The 8th IEEE Intl Conf. Dependable, Autonomic and Secure Computing. 658\u2013663."},{"volume-title":"Optimization techniques","author":"Minoux Michel","key":"e_1_3_2_1_42_1","unstructured":"Michel Minoux . 1978. Accelerated greedy algorithms for maximizing submodular set functions . In Optimization techniques . Springer , 234\u2013243. Michel Minoux. 1978. Accelerated greedy algorithms for maximizing submodular set functions. In Optimization techniques. Springer, 234\u2013243."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.14778\/2994509.2994525"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1098\/rsos.181301"},{"volume-title":"Propagation Phenomena in Real World Networks. Generating Robust and Efficient Networks Under Targeted Attacks","author":"Hugo\u00a0Louzada Patricio Vitor","key":"e_1_3_2_1_46_1","unstructured":"Vitor Hugo\u00a0Louzada Patricio , Fabio Daolio , Hans\u00a0 J. Herrmann , and Marco Tomassini . 2015. Propagation Phenomena in Real World Networks. Generating Robust and Efficient Networks Under Targeted Attacks . Springer , 215\u2013224. Vitor Hugo\u00a0Louzada Patricio, Fabio Daolio, Hans\u00a0J. Herrmann, and Marco Tomassini. 2015. Propagation Phenomena in Real World Networks. Generating Robust and Efficient Networks Under Targeted Attacks. Springer, 215\u2013224."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1140\/epjb\/e2005-00385-x"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Ryan\u00a0A. Rossi and Nesreen\u00a0K. Ahmed. 2015. The Network Data Repository with Interactive Graph Analytics and Visualization. In AAAI. 4292\u20134293. http:\/\/networkrepository.com  Ryan\u00a0A. Rossi and Nesreen\u00a0K. Ahmed. 2015. The Network Data Repository with Interactive Graph Analytics and Visualization. In AAAI. 4292\u20134293. http:\/\/networkrepository.com","DOI":"10.1609\/aaai.v29i1.9277"},{"volume-title":"Modern Epidemiology","author":"Rothman J.","key":"e_1_3_2_1_49_1","unstructured":"Kenneth\u00a0 J. Rothman , Sander Greenland , and Timothy\u00a0 L. Lash . 2013. Modern Epidemiology . Lippincott Williams & Wilki . Kenneth\u00a0J. Rothman, Sander Greenland, and Timothy\u00a0L. Lash. 2013. Modern Epidemiology. Lippincott Williams & Wilki."},{"key":"e_1_3_2_1_50_1","unstructured":"Kevin Scaman Argyris Kalogeratos Luca Corinzia and Nicolas Vayatis. 2017. A Spectral Method for Activity Shaping in Continuous-Time Information Cascades. CoRR abs\/1709.05231(2017).  Kevin Scaman Argyris Kalogeratos Luca Corinzia and Nicolas Vayatis. 2017. A Spectral Method for Activity Shaping in Continuous-Time Information Cascades. CoRR abs\/1709.05231(2017)."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.7155\/jgaa.00108"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-44914-2_5"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1009440108"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.66.015104"},{"volume-title":"Introduction to percolation theory","author":"Stauffer Dietrich","key":"e_1_3_2_1_55_1","unstructured":"Dietrich Stauffer and Ammon Aharony . 2003. Introduction to percolation theory . Taylor & Francis . Dietrich Stauffer and Ammon Aharony. 2003. Introduction to percolation theory. Taylor & Francis."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"crossref","unstructured":"Youze Tang Yanchen Shi and Xiaokui Xiao. 2015. Influence maximization in near-linear time: A martingale approach. In SIGMOD. 1539\u20131554.  Youze Tang Yanchen Shi and Xiaokui Xiao. 2015. Influence maximization in near-linear time: A martingale approach. In SIGMOD. 1539\u20131554.","DOI":"10.1145\/2723372.2723734"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"crossref","unstructured":"Sho Tsugawa and Hiroyuki Ohsaki. 2017. On the Robustness of Influence Maximization Algorithms against Non-Adversarial Perturbations. In ASONAM. 91\u201394.  Sho Tsugawa and Hiroyuki Ohsaki. 2017. On the Robustness of Influence Maximization Algorithms against Non-Adversarial Perturbations. In ASONAM. 91\u201394.","DOI":"10.1145\/3110025.3110070"},{"volume-title":"An introduction to infectious disease modelling","author":"Vynnycky Emilia","key":"e_1_3_2_1_58_1","unstructured":"Emilia Vynnycky and Richard White . 2010. An introduction to infectious disease modelling . Oxford University Press . Emilia Vynnycky and Richard White. 2010. An introduction to infectious disease modelling. Oxford University Press."},{"key":"e_1_3_2_1_59_1","volume-title":"Collective dynamics of \u2018small-world\u2019networks. Nature 393, 6684","author":"Watts J","year":"1998","unstructured":"Duncan\u00a0 J Watts and Steven\u00a0 H Strogatz . 1998. Collective dynamics of \u2018small-world\u2019networks. Nature 393, 6684 ( 1998 ), 440. Duncan\u00a0J Watts and Steven\u00a0H Strogatz. 1998. Collective dynamics of \u2018small-world\u2019networks. Nature 393, 6684 (1998), 440."},{"key":"e_1_3_2_1_60_1","volume-title":"DAGGER: A Scalable Index for Reachability Queries in Large Dynamic Graphs. CoRR abs\/1301.0977(2013).","author":"Yildirim Hilmi","year":"2013","unstructured":"Hilmi Yildirim , Vineet Chaoji , and Mohammed\u00a0 J. Zaki . 2013 . DAGGER: A Scalable Index for Reachability Queries in Large Dynamic Graphs. CoRR abs\/1301.0977(2013). Hilmi Yildirim, Vineet Chaoji, and Mohammed\u00a0J. Zaki. 2013. DAGGER: A Scalable Index for Reachability Queries in Large Dynamic Graphs. CoRR abs\/1301.0977(2013)."},{"key":"e_1_3_2_1_61_1","first-page":"1","article-title":"Recent advances in information diffusion and influence maximization in complex social networks","volume":"37","author":"Zhang Huiyuan","year":"2014","unstructured":"Huiyuan Zhang , Subhankar Mishra , My\u00a0 T Thai , J Wu , and Y Wang . 2014 . Recent advances in information diffusion and influence maximization in complex social networks . Opportunistic Mobile Social Networks 37 , 1 .1 (2014), 37. Huiyuan Zhang, Subhankar Mishra, My\u00a0T Thai, J Wu, and Y Wang. 2014. Recent advances in information diffusion and influence maximization in complex social networks. Opportunistic Mobile Social Networks 37, 1.1 (2014), 37.","journal-title":"Opportunistic Mobile Social Networks"},{"key":"e_1_3_2_1_62_1","volume-title":"Data-Aware Vaccine Allocation Over Large Networks. ACM TKDD 10, 2","author":"Zhang Yao","year":"2015","unstructured":"Yao Zhang and B.\u00a0 Aditya Prakash . 2015. Data-Aware Vaccine Allocation Over Large Networks. ACM TKDD 10, 2 ( 2015 ), 20:1\u201320:32. Yao Zhang and B.\u00a0Aditya Prakash. 2015. Data-Aware Vaccine Allocation Over Large Networks. ACM TKDD 10, 2 (2015), 20:1\u201320:32."}],"event":{"name":"WWW '20: The Web Conference 2020","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Taipei Taiwan","acronym":"WWW '20"},"container-title":["Proceedings of The Web Conference 2020"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3366423.3380028","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3366423.3380028","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:16Z","timestamp":1750199596000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3366423.3380028"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,20]]},"references-count":61,"alternative-id":["10.1145\/3366423.3380028","10.1145\/3366423"],"URL":"https:\/\/doi.org\/10.1145\/3366423.3380028","relation":{},"subject":[],"published":{"date-parts":[[2020,4,20]]},"assertion":[{"value":"2020-04-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}