{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:47:04Z","timestamp":1750308424601,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,27]],"date-time":"2021-05-27T00:00:00Z","timestamp":1622073600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CSR-1909077"],"award-info":[{"award-number":["CSR-1909077"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,5,27]]},"DOI":"10.1145\/3471287.3471294","type":"proceedings-article","created":{"date-parts":[[2021,9,25]],"date-time":"2021-09-25T16:14:25Z","timestamp":1632586465000},"page":"128-137","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Rumor Remove Order Strategy on Social Networks"],"prefix":"10.1145","author":[{"given":"Yuanda","family":"Wang","sequence":"first","affiliation":[{"name":"University of Florida, USA"}]},{"given":"Haibo","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Florida, USA"}]},{"given":"Shigang","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Florida, USA"}]},{"given":"Ye","family":"Xia","sequence":"additional","affiliation":[{"name":"University of Florida, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,9,25]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Semi-Supervised Clustering Algorithm for Rumor Minimization and Propagation with Classification in Social Networks. 2020 International Conference on Inventive Computation Technologies (ICICT) (Feb.","author":"Amutha R.","year":"2020","unstructured":"R. Amutha and D.\u00a0 Vimal Kumar . 2020 . Semi-Supervised Clustering Algorithm for Rumor Minimization and Propagation with Classification in Social Networks. 2020 International Conference on Inventive Computation Technologies (ICICT) (Feb. 2020). R. Amutha and D.\u00a0Vimal Kumar. 2020. Semi-Supervised Clustering Algorithm for Rumor Minimization and Propagation with Classification in Social Networks. 2020 International Conference on Inventive Computation Technologies (ICICT) (Feb. 2020)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963499"},{"key":"e_1_3_2_1_3_1","unstructured":"Xin Chen Qingqin Nong Yan Feng Yongchang Cao Suning Gong Qizhi Fang and Ker-I Ko. 2017. Centralized and decentralized rumor blocking problems. Journal of Combinatorial Optimization volume (2017).  Xin Chen Qingqin Nong Yan Feng Yongchang Cao Suning Gong Qizhi Fang and Ker-I Ko. 2017. Centralized and decentralized rumor blocking problems. Journal of Combinatorial Optimization volume (2017)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.3934\/dcdsb.2020124"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"M.L. Goldstein S.A. Morris and G.G. Yen. 2004. Problems with fitting to the power-law distribution. THE EUROPEAN PHYSICAL JOURNAL B(2004) 255\u2013258.  M.L. Goldstein S.A. Morris and G.G. Yen. 2004. Problems with fitting to the power-law distribution. THE EUROPEAN PHYSICAL JOURNAL B(2004) 255\u2013258.","DOI":"10.1140\/epjb\/e2004-00316-5"},{"volume-title":"Proceedings of the 2012 SIAM International Conference on Data Mining ([n.\u00a0d.]).","author":"He Xinran","key":"e_1_3_2_1_6_1","unstructured":"Xinran He , Guojie Song , Wei Chen , and Qingye Jiang . [n.d.]. Influence Blocking Maximization in Social Networks under the Competitive Linear Threshold Model . Proceedings of the 2012 SIAM International Conference on Data Mining ([n.\u00a0d.]). Xinran He, Guojie Song, Wei Chen, and Qingye Jiang. [n.d.]. Influence Blocking Maximization in Social Networks under the Competitive Linear Threshold Model. Proceedings of the 2012 SIAM International Conference on Data Mining ([n.\u00a0d.])."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Z. He Z. Cai and X. Wang. 2015. Modeling Propagation Dynamics and Developing Optimized Countermeasures for Rumor Spreading in Online Social Networks. (2015) 205\u2013214.  Z. He Z. Cai and X. Wang. 2015. Modeling Propagation Dynamics and Developing Optimized Countermeasures for Rumor Spreading in Online Social Networks. (2015) 205\u2013214.","DOI":"10.1109\/ICDCS.2015.29"},{"key":"e_1_3_2_1_8_1","volume-title":"Optimal control of information epidemics modeled as Maki Thompson rumors. Communications in Nonlinear Science and Numerical Simulation 19 (December","author":"Kandhway Kundan","year":"2014","unstructured":"Kundan Kandhway and Joy Kuri . 2014. Optimal control of information epidemics modeled as Maki Thompson rumors. Communications in Nonlinear Science and Numerical Simulation 19 (December 2014 ), 4135\u20134147. Kundan Kandhway and Joy Kuri. 2014. Optimal control of information epidemics modeled as Maki Thompson rumors. Communications in Nonlinear Science and Numerical Simulation 19 (December 2014), 4135\u20134147."},{"volume-title":"Rumor Restriction in Online Social Networks. 2013 IEEE 32nd International Performance Computing and Communications Conference (IPCCC) ([n.\u00a0d.]).","author":"Li Songsong","key":"e_1_3_2_1_9_1","unstructured":"Songsong Li , Yuqing Zhu , Deying Li , Donghyun Kim , , and Hejiao Huang . [n.d.]. Rumor Restriction in Online Social Networks. 2013 IEEE 32nd International Performance Computing and Communications Conference (IPCCC) ([n.\u00a0d.]). Songsong Li, Yuqing Zhu, Deying Li, Donghyun Kim, , and Hejiao Huang. [n.d.]. Rumor Restriction in Online Social Networks. 2013 IEEE 32nd International Performance Computing and Communications Conference (IPCCC) ([n.\u00a0d.])."},{"key":"e_1_3_2_1_10_1","unstructured":"Bess Lovejoy. Online. 9 False Rumors With Real-Life Consequences. https:\/\/www.mentalfloss.com\/article\/72892\/9-false-rumors-real-life-consequences(Online).  Bess Lovejoy. Online. 9 False Rumors With Real-Life Consequences. https:\/\/www.mentalfloss.com\/article\/72892\/9-false-rumors-real-life-consequences(Online)."},{"key":"e_1_3_2_1_11_1","volume-title":"Dependable Policy Enforcement in Traditional Non-SDN Networks. 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS)","author":"Odegbile O.","year":"2019","unstructured":"O. Odegbile , S. Chen , and Y. Wang . 2019 . Dependable Policy Enforcement in Traditional Non-SDN Networks. 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS) ( 2019 ), 545\u2013554. O. Odegbile, S. Chen, and Y. Wang. 2019. Dependable Policy Enforcement in Traditional Non-SDN Networks. 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS) (2019), 545\u2013554."},{"key":"e_1_3_2_1_12_1","unstructured":"Mathematicla\u00a0Association of America. Online. The SIR Model for Spread of Disease - The Differential Equation Model. https:\/\/www.maa.org\/press\/periodicals\/loci\/joma\/the-sir-model-for-spread-of-disease-the-differential-equation-model(Online).  Mathematicla\u00a0Association of America. Online. The SIR Model for Spread of Disease - The Differential Equation Model. https:\/\/www.maa.org\/press\/periodicals\/loci\/joma\/the-sir-model-for-spread-of-disease-the-differential-equation-model(Online)."},{"key":"e_1_3_2_1_13_1","unstructured":"Nathaniel Percy. Online. Social media threat rumors cause panic at football game at Diamond Bar High School. https:\/\/www.sgvtribune.com\/2018\/08\/18\/social-media-threat-rumors-cause-panic-at-football-game-at-diamond-bar-high-school\/(Online).  Nathaniel Percy. Online. Social media threat rumors cause panic at football game at Diamond Bar High School. https:\/\/www.sgvtribune.com\/2018\/08\/18\/social-media-threat-rumors-cause-panic-at-football-game-at-diamond-bar-high-school\/(Online)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1811039.1811063"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJWSR.2020010104"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1601\/3\/032032"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2017.2783190"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1088\/0253-6102\/59\/4\/21"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591971.2591993"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591971.2591993"},{"key":"e_1_3_2_1_21_1","volume-title":"Rumor events detection enhanced by encoding sentimental information into time series division and word representations. Neurocomputing","author":"Wang Zhihong","year":"2020","unstructured":"Zhihong Wang and Yi Guo . 2020. Rumor events detection enhanced by encoding sentimental information into time series division and word representations. Neurocomputing ( 2020 ). Zhihong Wang and Yi Guo. 2020. Rumor events detection enhanced by encoding sentimental information into time series division and word representations. Neurocomputing (2020)."},{"key":"e_1_3_2_1_22_1","article-title":"Electoral Consequences of Political Rumors: Motivated Reasoning, Candidate Rumors, and Vote Choice during the 2008 U.S","volume":"26","author":"Weeks E.","year":"2014","unstructured":"Brian\u00a0 E. Weeks and R.\u00a0 Kelly Garrett . 2014 . Electoral Consequences of Political Rumors: Motivated Reasoning, Candidate Rumors, and Vote Choice during the 2008 U.S . Presidential Election. International Journal of Public Opinion Research 26 , 4 (03 2014), 401\u2013422. https:\/\/doi.org\/10.1093\/ijpor\/edu005 arXiv:https:\/\/academic.oup.com\/ijpor\/article-pdf\/26\/4\/401\/2191815\/edu005.pdf Brian\u00a0E. Weeks and R.\u00a0Kelly Garrett. 2014. Electoral Consequences of Political Rumors: Motivated Reasoning, Candidate Rumors, and Vote Choice during the 2008 U.S. Presidential Election. International Journal of Public Opinion Research 26, 4 (03 2014), 401\u2013422. https:\/\/doi.org\/10.1093\/ijpor\/edu005 arXiv:https:\/\/academic.oup.com\/ijpor\/article-pdf\/26\/4\/401\/2191815\/edu005.pdf","journal-title":"Presidential Election. International Journal of Public Opinion Research"},{"key":"e_1_3_2_1_23_1","unstructured":"Wikipedia. Online. Runge-Kutta methods. https:\/\/en.wikipedia.org\/wiki\/Runge-Kutta_methods(Online).  Wikipedia. Online. Runge-Kutta methods. https:\/\/en.wikipedia.org\/wiki\/Runge-Kutta_methods(Online)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1108\/IJCS-09-2019-0025"},{"key":"e_1_3_2_1_25_1","volume-title":"Minimizing Influence of Rumors by Blockers on Social Networks: Algorithms and Analysis","author":"Yan Ruidong","year":"2019","unstructured":"Ruidong Yan , Deying Li , Weili Wu , Ding-Zhu Du , and Yongcai Wang . 2019. Minimizing Influence of Rumors by Blockers on Social Networks: Algorithms and Analysis . IEEE Transactions on Network Science and Engineering ( 2019 ), 1\u20131. Ruidong Yan, Deying Li, Weili Wu, Ding-Zhu Du, and Yongcai Wang. 2019. Minimizing Influence of Rumors by Blockers on Social Networks: Algorithms and Analysis. IEEE Transactions on Network Science and Engineering (2019), 1\u20131."},{"key":"e_1_3_2_1_26_1","volume-title":"A novel approach for detecting multiple rumor sources in networks with partial observations","author":"Zhang Zhao","year":"2015","unstructured":"Zhao Zhang , Wen Xu , Weili Wu , and Ding-Zhu Du. 2015. A novel approach for detecting multiple rumor sources in networks with partial observations . Springer Science +Business Media ( August 2015 ). Zhao Zhang, Wen Xu, Weili Wu, and Ding-Zhu Du. 2015. A novel approach for detecting multiple rumor sources in networks with partial observations. Springer Science+Business Media (August 2015)."},{"key":"e_1_3_2_1_27_1","volume-title":"SIR rumor spreading model in the new media age. Physica A: Statistical Mechanics and its Applications 392","author":"Zhao Laijun","year":"2013","unstructured":"Laijun Zhao , Hongxin Cui , Xiaoyan Qiu , Xiaoli Wang , and Jiajia Wang . 2013. SIR rumor spreading model in the new media age. Physica A: Statistical Mechanics and its Applications 392 ( 2013 ), 995\u20131003. Laijun Zhao, Hongxin Cui, Xiaoyan Qiu, Xiaoli Wang, and Jiajia Wang. 2013. SIR rumor spreading model in the new media age. Physica A: Statistical Mechanics and its Applications 392 (2013), 995\u20131003."},{"key":"e_1_3_2_1_28_1","volume-title":"SIHR rumor spreading model in social networks. Physica A: Statistical Mechanics and its Applications 391 (April","author":"Zhao Laijun","year":"2012","unstructured":"Laijun Zhao , Jiajia Wang , Yucheng Chen , Qin Wang , Jingjing Cheng , and Hongxin Cui . 2012. SIHR rumor spreading model in social networks. Physica A: Statistical Mechanics and its Applications 391 (April 2012 ), 2444\u20132453. Laijun Zhao, Jiajia Wang, Yucheng Chen, Qin Wang, Jingjing Cheng, and Hongxin Cui. 2012. SIHR rumor spreading model in social networks. Physica A: Statistical Mechanics and its Applications 391 (April 2012), 2444\u20132453."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"L. Zheng and C.\u00a0W. Tan. 2015. A probabilistic characterization of the rumor graph boundary in rumor source detection. (2015) 765\u2013769.  L. Zheng and C.\u00a0W. Tan. 2015. A probabilistic characterization of the rumor graph boundary in rumor source detection. (2015) 765\u2013769.","DOI":"10.1109\/ICDSP.2015.7251979"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSP.2015.7251979"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Kai Zhu and Lei Ying. 2014. A robust information source estimator with sparse observations. Computational Social Networks volume(2014).  Kai Zhu and Lei Ying. 2014. A robust information source estimator with sparse observations. Computational Social Networks volume(2014).","DOI":"10.1109\/INFOCOM.2014.6848164"}],"event":{"name":"ICISDM 2021: 2021 the 5th International Conference on Information System and Data Mining","acronym":"ICISDM 2021","location":"Silicon Valley CA USA"},"container-title":["2021 the 5th International Conference on Information System and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3471287.3471294","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3471287.3471294","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3471287.3471294","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:31Z","timestamp":1750268971000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3471287.3471294"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,27]]},"references-count":31,"alternative-id":["10.1145\/3471287.3471294","10.1145\/3471287"],"URL":"https:\/\/doi.org\/10.1145\/3471287.3471294","relation":{},"subject":[],"published":{"date-parts":[[2021,5,27]]},"assertion":[{"value":"2021-09-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}