{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T19:00:21Z","timestamp":1772910021119,"version":"3.50.1"},"reference-count":238,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2021,11,23]],"date-time":"2021-11-23T00:00:00Z","timestamp":1637625600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61902013, U1636208, and 61862008"],"award-info":[{"award-number":["61902013, U1636208, and 61862008"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Beihang Youth Top Talent Support Program","award":["YWF-20-BJ-J-1038, NYWF-21-BJ-J-1039"],"award-info":[{"award-number":["YWF-20-BJ-J-1038, NYWF-21-BJ-J-1039"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2023,1,31]]},"abstract":"<jats:p>Studying information diffusion in SNS (Social Networks Service) has remarkable significance in both academia and industry. Theoretically, it boosts the development of other subjects such as statistics, sociology, and data mining. Practically, diffusion modeling provides fundamental support for many downstream applications (e.g., public opinion monitoring, rumor source identification, and viral marketing). Tremendous efforts have been devoted to this area to understand and quantify information diffusion dynamics. This survey investigates and summarizes the emerging distinguished works in diffusion modeling. We first put forward a unified information diffusion concept in terms of three components: information, user decision, and social vectors, followed by a detailed introduction of the methodologies for diffusion modeling. And then, a new taxonomy adopting hybrid philosophy (i.e., granularity and techniques) is proposed, and we made a series of comparative studies on elementary diffusion models under our taxonomy from the aspects of assumptions, methods, and pros and cons. We further summarized representative diffusion modeling in special scenarios and significant downstream tasks based on these elementary models. Finally, open issues in this field following the methodology of diffusion modeling are discussed.<\/jats:p>","DOI":"10.1145\/3485273","type":"journal-article","created":{"date-parts":[[2021,11,23]],"date-time":"2021-11-23T17:36:59Z","timestamp":1637689019000},"page":"1-51","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Capturing Dynamics of Information Diffusion in SNS: A Survey of Methodology and Techniques"],"prefix":"10.1145","volume":"55","author":[{"given":"Huacheng","family":"Li","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Beihang University, Haidian, Beijing, China"}]},{"given":"Chunhe","family":"Xia","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Beihang University, Haidian, Beijing, China"}]},{"given":"Tianbo","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Beihang University, Haidian, Beijing, China"}]},{"given":"Sheng","family":"Wen","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Software Engineering, Swinburne Universityof Technology, Townsville, Queensland, Australia"}]},{"given":"Chao","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Science and Engineering, James Cook University, Hawthorn, Victoria, Australia"}]},{"given":"Yang","family":"Xiang","sequence":"additional","affiliation":[{"name":"Digital Research &amp; Innovation Capability Platform, Swinburne Universityof Technology, Hawthorn, Victoria, Australia"}]}],"member":"320","published-online":{"date-parts":[[2021,11,23]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/2433396.2433473"},{"key":"e_1_3_1_3_2","volume-title":"Proceedings of the 36th International Conference on Information Systems (ICIS\u201915)","author":"Alarifi Abdulrahman Hamad E.","year":"2015","unstructured":"Abdulrahman Hamad E. Alarifi, Darshana Sedera, and Jan Recker. 2015. Posters versus lurkers: Improving participation in enterprise social networks through promotional messages. In Proceedings of the 36th International Conference on Information Systems (ICIS\u201915), J. Ross and D. Leidner (Eds.). Association for Information Systems. Retrieved from http:\/\/aisel.aisnet.org\/."},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/3018661.3018672"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16268-3_1"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780195324259.001.0001"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.5555\/3382225.3382281"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187907"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/2983323.2983868"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/2740908.2742744"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-013-0646-6"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-54241-6_8"},{"key":"e_1_3_1_13_2","first-page":"127","volume-title":"Epidemic Spreading in Complex Networks with Degree Correlations","author":"Bogu\u00e1 Mari\u00e1n","year":"2003","unstructured":"Mari\u00e1n Bogu\u00e1, Romualdo Pastor-Satorras, and Alessandro Vespignani. 2003. Epidemic Spreading in Complex Networks with Degree Correlations. Springer Berlin, 127\u2013147."},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1086\/228631"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.5555\/2999792.2999923"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/2556195.2556216"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/2835776.2835817"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132973"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/3336191.3371834"},{"issue":"4","key":"e_1_3_1_20_2","first-page":"595","article-title":"Evolutionary information diffusion over heterogeneous social networks","volume":"2","author":"Cao Xuanyu","year":"2016","unstructured":"Xuanyu Cao, Yan Chen, Chunxiao Jiang, and K. J. Ray Liu. 2016. Evolutionary information diffusion over heterogeneous social networks. IEEE Trans. Sig. Inf. Process. Netw. 2, 4 (2016), 595\u2013610.","journal-title":"IEEE Trans. Sig. Inf. Process. Netw."},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.71.027103"},{"key":"e_1_3_1_22_2","article-title":"The 43rd China Statistical Report on Internet Development(in Chinese)","author":"Center China Internet Network Information","year":"2019","unstructured":"China Internet Network Information Center. 2019. The 43rd China Statistical Report on Internet Development(in Chinese). Retrieved February 1, 2019 from http:\/\/ www.cnnic.net.cn\/hlwfzyj\/hlwxzbg\/hlwtjbg\/201902\/ P020190318523029756345.pdf\/.","journal-title":"Retrieved February 1, 2019 from http:\/\/ www.cnnic.net.cn\/hlwfzyj\/hlwxzbg\/hlwtjbg\/201902\/ P020190318523029756345.pdf\/"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.5555\/2900728.2900813"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3331184.3331288"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2019.00074"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/2566486.2567997"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2015.198"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/60.3.581"},{"key":"e_1_3_1_29_2","article-title":"Facebook Now Has 2 Billion Monthly Users","author":"Constine Josh","year":"2017","unstructured":"Josh Constine. 2017. Facebook Now Has 2 Billion Monthly Users. Retrieved June 28, 2017 from https:\/\/techcrunch.com\/2017\/06\/27\/facebook-2-billion-users\/.","journal-title":"Retrieved June 28, 2017 from https:\/\/techcrunch.com\/2017\/06\/27\/facebook-2-billion-users\/"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401914"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0803685105"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487639"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/2009916.2009945"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1038\/2041118a0"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.5555\/3157382.3157527"},{"key":"e_1_3_1_36_2","article-title":"A survey on personality-aware recommendation systems","author":"Dhelim Sahraoui","year":"2021","unstructured":"Sahraoui Dhelim, Nyothiri Aung, Mohammed Amine Bouras, Huansheng Ning, and Erik Cambria. 2021. A survey on personality-aware recommendation systems. arXiv preprint arXiv:2101.12153 (2021).","journal-title":"arXiv preprint arXiv:2101.12153"},{"key":"e_1_3_1_37_2","volume-title":"Mathematical Epidemiology of Infectious Diseases: Model Building, Analysis and Interpretation","author":"Diekmann Odo","year":"2000","unstructured":"Odo Diekmann and Johan Andre Peter Heesterbeek. 2000. Mathematical Epidemiology of Infectious Diseases: Model Building, Analysis and Interpretation. Vol. 5. John Wiley & Sons."},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975321.23"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1145\/3343031.3356062"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939875"},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.5555\/2969442.2969458"},{"key":"e_1_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.26"},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.02.025"},{"key":"e_1_3_1_44_2","first-page":"1","article-title":"Social influence networks and opinion change","volume":"16","author":"Friedkin Noah","year":"1999","unstructured":"Noah Friedkin and Eugene Johnsen. 1999. Social influence networks and opinion change. Adv. Group Process. 16 (01 1999), 1\u201329.","journal-title":"Adv. Group Process."},{"key":"e_1_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2020.125266"},{"key":"e_1_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.1145\/2567948.2577312"},{"key":"e_1_3_1_47_2","doi-asserted-by":"publisher","DOI":"10.1145\/2684822.2685303"},{"key":"e_1_3_1_48_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2684160"},{"key":"e_1_3_1_49_2","doi-asserted-by":"publisher","DOI":"10.1145\/3301303"},{"key":"e_1_3_1_50_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2014.10.034"},{"key":"e_1_3_1_51_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48653-5_32"},{"key":"e_1_3_1_52_2","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011122126881"},{"key":"e_1_3_1_53_2","doi-asserted-by":"publisher","DOI":"10.5555\/3104482.3104553"},{"key":"e_1_3_1_54_2","doi-asserted-by":"publisher","DOI":"10.1145\/2086737.2086741"},{"key":"e_1_3_1_55_2","doi-asserted-by":"publisher","DOI":"10.1145\/2433396.2433402"},{"key":"e_1_3_1_56_2","doi-asserted-by":"publisher","DOI":"10.5555\/3042573.3042776"},{"key":"e_1_3_1_57_2","doi-asserted-by":"publisher","DOI":"10.5555\/2969033.2969125"},{"key":"e_1_3_1_58_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-017-1143-0"},{"key":"e_1_3_1_59_2","doi-asserted-by":"publisher","DOI":"10.1086\/226707"},{"key":"e_1_3_1_60_2","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988739"},{"key":"e_1_3_1_61_2","doi-asserted-by":"publisher","DOI":"10.1145\/2187980.2188254"},{"key":"e_1_3_1_62_2","doi-asserted-by":"publisher","DOI":"10.1145\/2503792.2503797"},{"key":"e_1_3_1_63_2","doi-asserted-by":"publisher","DOI":"10.1016\/0378-8733(94)00248-9"},{"key":"e_1_3_1_64_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE48307.2020.00060"},{"key":"e_1_3_1_65_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_1_66_2","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972825.40"},{"key":"e_1_3_1_67_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2585591"},{"key":"e_1_3_1_68_2","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052626"},{"key":"e_1_3_1_69_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2562628"},{"key":"e_1_3_1_70_2","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_1_71_2","doi-asserted-by":"publisher","DOI":"10.1145\/1963192.1963222"},{"key":"e_1_3_1_72_2","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076747"},{"key":"e_1_3_1_73_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2016.12.024"},{"key":"e_1_3_1_74_2","doi-asserted-by":"publisher","DOI":"10.1145\/2808797.2809394"},{"key":"e_1_3_1_75_2","doi-asserted-by":"publisher","DOI":"10.5555\/3192424.3192472"},{"key":"e_1_3_1_76_2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.103.038702"},{"key":"e_1_3_1_77_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2018.00134"},{"key":"e_1_3_1_78_2","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487624"},{"key":"e_1_3_1_79_2","doi-asserted-by":"publisher","DOI":"10.1145\/2806416.2806650"},{"key":"e_1_3_1_80_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2014.2339799"},{"key":"e_1_3_1_81_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2014.2313024"},{"key":"e_1_3_1_82_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2522436"},{"key":"e_1_3_1_83_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2615098"},{"key":"e_1_3_1_84_2","doi-asserted-by":"publisher","DOI":"10.1145\/2396761.2396771"},{"key":"e_1_3_1_85_2","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623644"},{"key":"e_1_3_1_86_2","doi-asserted-by":"publisher","DOI":"10.5555\/3015812.3015815"},{"key":"e_1_3_1_87_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2016.02.048"},{"key":"e_1_3_1_88_2","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956769"},{"key":"e_1_3_1_89_2","doi-asserted-by":"publisher","DOI":"10.1007\/11523468_91"},{"key":"e_1_3_1_90_2","article-title":"Chinese Scramble to Buy Salt as Radiation Fears Grow","author":"Kent Jo Ling","year":"2011","unstructured":"Jo Ling Kent. 2011. Chinese Scramble to Buy Salt as Radiation Fears Grow. Retrieved March 18, 2011 from http:\/\/www.cnn.com\/2011\/WORLD\/asiapcf\/03\/17\/china.salt.scramble \/index.html\/.","journal-title":"Retrieved March 18, 2011 from http:\/\/www.cnn.com\/2011\/WORLD\/asiapcf\/03\/17\/china.salt.scramble \/index.html\/"},{"key":"e_1_3_1_91_2","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.1927.0118"},{"key":"e_1_3_1_92_2","doi-asserted-by":"publisher","DOI":"10.1080\/14747731.2011.621287"},{"key":"e_1_3_1_93_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2009.09.006"},{"key":"e_1_3_1_94_2","doi-asserted-by":"publisher","DOI":"10.5555\/3120007.3120051"},{"key":"e_1_3_1_95_2","volume-title":"2nd International Conference on Learning Representations, ICLR 2014, Banff, AB, Canada, April 14\u201316, 2014, Conference Track Proceedings","author":"Kingma Diederik P.","year":"2014","unstructured":"Diederik P. Kingma and Max Welling. 2014. Auto-encoding variational Bayes. In 2nd International Conference on Learning Representations, ICLR 2014, Banff, AB, Canada, April 14\u201316, 2014, Conference Track Proceedings, Yoshua Bengio and Yann LeCun (Eds.)."},{"key":"e_1_3_1_96_2","volume-title":"Proceedings of the 5th International Conference on Learning Representations","author":"Kipf Thomas N.","year":"2017","unstructured":"Thomas N. Kipf and Max Welling. 2017. Semi-supervised classification with graph convolutional networks. In Proceedings of the 5th International Conference on Learning Representations."},{"key":"e_1_3_1_97_2","volume-title":"Survival Analysis","author":"Kleinbaum David G.","year":"2010","unstructured":"David G. Kleinbaum and Mitchel Klein. 2010. Survival Analysis. Vol. 3. Springer."},{"key":"e_1_3_1_98_2","volume-title":"Proceedings of the 10th International AAAI Conference on Web and Social Media","author":"Kobayashi Ryota","year":"2016","unstructured":"Ryota Kobayashi and Renaud Lambiotte. 2016. Tideh: Time-dependent Hawkes process for predicting retweet dynamics. In Proceedings of the 10th International AAAI Conference on Web and Social Media."},{"key":"e_1_3_1_99_2","article-title":"FEASTPACK v1. 2","author":"Kolda Tamara G.","year":"2014","unstructured":"Tamara G. Kolda, Ali Pinar et\u00a0al. 2014. FEASTPACK v1. 2. Sandia National Laboratories, Albuquerque, NM. Retrieved from https:\/\/old-www.sandia.gov\/tgkolda\/feastpack\/.","journal-title":"Sandia National Laboratories, Albuquerque, NM"},{"key":"e_1_3_1_100_2","doi-asserted-by":"publisher","DOI":"10.1137\/130914218"},{"key":"e_1_3_1_101_2","doi-asserted-by":"publisher","DOI":"10.1145\/3289600.3291601"},{"key":"e_1_3_1_102_2","doi-asserted-by":"publisher","DOI":"10.1145\/2600428.2609476"},{"key":"e_1_3_1_103_2","doi-asserted-by":"publisher","DOI":"10.1145\/2396761.2398634"},{"key":"e_1_3_1_104_2","volume-title":"Proceedings of the Fourth International Conference on Weblogs and Social Media, ICWSM 2010, Washington, DC, USA, May 23\u201326, 2010","author":"Lerman Kristina","year":"2010","unstructured":"Kristina Lerman and Rumi Ghosh. 2010. Information contagion: An empirical study of the spread of news on Digg and Twitter social networks. In Proceedings of the Fourth International Conference on Weblogs and Social Media, ICWSM 2010, Washington, DC, USA, May 23\u201326, 2010, William W. Cohen and Samuel Gosling (Eds.). The AAAI Press. Retrieved from http:\/\/www.aaai.org\/ocs\/index.php\/ICWSM\/ICWSM10\/paper\/view\/1509."},{"key":"e_1_3_1_105_2","doi-asserted-by":"publisher","DOI":"10.5555\/1756006.1756039"},{"key":"e_1_3_1_106_2","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217301"},{"key":"e_1_3_1_107_2","article-title":"SNAP Datasets: Stanford Large Network Dataset Collection","author":"Leskovec Jure","year":"2014","unstructured":"Jure Leskovec and Andrej Krevl. 2014. SNAP Datasets: Stanford Large Network Dataset Collection. Retrieved from http:\/\/snap.stanford.edu\/data.","journal-title":"Retrieved from http:\/\/snap.stanford.edu\/data"},{"key":"e_1_3_1_108_2","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052643"},{"key":"e_1_3_1_109_2","first-page":"613","article-title":"Modeling influence diffusion over signed social networks","author":"Li Dong","year":"2021","unstructured":"Dong Li and Jiming Liu. 2021. Modeling influence diffusion over signed social networks. IEEE Trans. Knowl. Data Eng. 33, 2 (2021), 613\u2013625.","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"e_1_3_1_110_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2702162"},{"key":"e_1_3_1_111_2","doi-asserted-by":"publisher","DOI":"10.1038\/srep20058"},{"key":"e_1_3_1_112_2","doi-asserted-by":"publisher","DOI":"10.3390\/info8040118"},{"key":"e_1_3_1_113_2","doi-asserted-by":"publisher","DOI":"10.1016\/0025-5564(95)92756-5"},{"key":"e_1_3_1_114_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2019.2909269"},{"key":"e_1_3_1_115_2","doi-asserted-by":"crossref","first-page":"042810","DOI":"10.1103\/PhysRevE.92.042810","article-title":"How multiple social networks affect user awareness: The information diffusion process in multiplex networks","volume":"92","author":"Li Weihua","year":"2015","unstructured":"Weihua Li, Shaoting Tang, Wenyi Fang, Quantong Guo, Xiao Zhang, and Zhiming Zheng. 2015. How multiple social networks affect user awareness: The information diffusion process in multiplex networks. Phys. Rev. E 92, 4 (Oct. 2015), 042810.","journal-title":"Phys. Rev. E"},{"key":"e_1_3_1_116_2","doi-asserted-by":"publisher","DOI":"10.1080\/15427951.2013.862884"},{"key":"e_1_3_1_117_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2807843"},{"key":"e_1_3_1_118_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.3301200"},{"key":"e_1_3_1_119_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.09.015"},{"key":"e_1_3_1_120_2","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488461"},{"key":"e_1_3_1_121_2","doi-asserted-by":"publisher","DOI":"10.14778\/2850578.2850581"},{"key":"e_1_3_1_122_2","doi-asserted-by":"publisher","DOI":"10.1145\/1458082.1458205"},{"key":"e_1_3_1_123_2","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935877"},{"key":"e_1_3_1_124_2","doi-asserted-by":"publisher","DOI":"10.1145\/2348283.2348525"},{"key":"e_1_3_1_125_2","doi-asserted-by":"publisher","DOI":"10.1002\/asi.22844"},{"key":"e_1_3_1_126_2","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339537"},{"key":"e_1_3_1_127_2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.64.066112"},{"key":"e_1_3_1_128_2","doi-asserted-by":"publisher","DOI":"10.5555\/2999134.2999195"},{"key":"e_1_3_1_129_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.112986"},{"key":"e_1_3_1_130_2","doi-asserted-by":"publisher","DOI":"10.1145\/2983323.2983812"},{"key":"e_1_3_1_131_2","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298311"},{"key":"e_1_3_1_132_2","doi-asserted-by":"publisher","DOI":"10.5555\/2997046.2997090"},{"key":"e_1_3_1_133_2","doi-asserted-by":"publisher","DOI":"10.1145\/2566486.2568043"},{"key":"e_1_3_1_134_2","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339540"},{"key":"e_1_3_1_135_2","doi-asserted-by":"publisher","DOI":"10.1145\/2527031.2527052"},{"key":"e_1_3_1_136_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737538"},{"key":"e_1_3_1_137_2","doi-asserted-by":"publisher","DOI":"10.1177\/2056305119897322"},{"key":"e_1_3_1_138_2","doi-asserted-by":"publisher","DOI":"10.1137\/S003614450342480"},{"key":"e_1_3_1_139_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.04.002"},{"key":"e_1_3_1_140_2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.118.138302"},{"key":"e_1_3_1_141_2","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.87.925"},{"key":"e_1_3_1_142_2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.86.3200"},{"key":"e_1_3_1_143_2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.102.052316"},{"key":"e_1_3_1_144_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2017.2762730"},{"issue":"1","key":"e_1_3_1_145_2","article-title":"Learning to lurker rank: An evaluation of learning-to-rank methods for lurking behavior analysis","volume":"8","author":"Perna Diego","year":"2018","unstructured":"Diego Perna, Roberto Interdonato, and Andrea Tagarelli. 2018. Learning to lurker rank: An evaluation of learning-to-rank methods for lurking behavior analysis. Soc. Netw. Anal. Mining 8, 1 (2018).","journal-title":"Soc. Netw. Anal. Mining"},{"key":"e_1_3_1_146_2","volume-title":"Proceedings of the 6th International AAAI Conference on Weblogs and Social Media","author":"Pfitzner Ren\u00e9","year":"2012","unstructured":"Ren\u00e9 Pfitzner, Antonios Garas, and Frank Schweitzer. 2012. Emotional divergence influences information spreading in Twitter. In Proceedings of the 6th International AAAI Conference on Weblogs and Social Media."},{"key":"e_1_3_1_147_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-016-2068-3"},{"key":"e_1_3_1_148_2","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220077"},{"key":"e_1_3_1_149_2","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052650"},{"key":"e_1_3_1_150_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmateco.2019.05.003"},{"key":"e_1_3_1_151_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2239658"},{"key":"e_1_3_1_152_2","doi-asserted-by":"publisher","DOI":"10.5555\/2029759.2029781"},{"key":"e_1_3_1_153_2","doi-asserted-by":"publisher","DOI":"10.1145\/3336191.3371811"},{"key":"e_1_3_1_154_2","article-title":"An Update on Our Plans to Restrict Data Access on Facebook","author":"Schroepfer Mike","year":"2018","unstructured":"Mike Schroepfer. 2018. An Update on Our Plans to Restrict Data Access on Facebook. Retrieved April 4, 2018 from https:\/\/about.fb.com\/news\/2018\/04\/restricting-data-access\/.","journal-title":"Retrieved April 4, 2018 from https:\/\/about.fb.com\/news\/2018\/04\/restricting-data-access\/"},{"key":"e_1_3_1_155_2","doi-asserted-by":"publisher","DOI":"10.1145\/2740908.2742466"},{"key":"e_1_3_1_156_2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.85.056109"},{"key":"e_1_3_1_157_2","first-page":"10","volume-title":"Triadic Measures on Graphs: The Power of Wedge Sampling","author":"Seshadhri C.","year":"2013","unstructured":"C. Seshadhri, Ali Pinar, and Tamara G. Kolda. 2013. Triadic Measures on Graphs: The Power of Wedge Sampling. SIAM, 10\u201318. https:\/\/doi.org\/10.1137\/1.9781611972832.2"},{"key":"e_1_3_1_158_2","doi-asserted-by":"publisher","DOI":"10.5555\/2893873.2893920"},{"key":"e_1_3_1_159_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.02.008"},{"key":"e_1_3_1_160_2","doi-asserted-by":"publisher","DOI":"10.1111\/jcom.12284"},{"key":"e_1_3_1_161_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2017.2691405"},{"key":"e_1_3_1_162_2","volume-title":"3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, May 7\u20139, 2015, Conference Track Proceedings","author":"Simonyan Karen","year":"2015","unstructured":"Karen Simonyan and Andrew Zisserman. 2015. Very deep convolutional networks for large-scale image recognition. In 3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, May 7\u20139, 2015, Conference Track Proceedings, Yoshua Bengio and Yann LeCun (Eds.)."},{"key":"e_1_3_1_163_2","first-page":"426","volume-title":"Proceedings of the International Conference on Advanced Informatics for Computing Research","author":"Singh Shashank Sheshar","year":"2018","unstructured":"Shashank Sheshar Singh, Kuldeep Singh, Ajay Kumar, Harish Kumar Shakya, and Bhaskar Biswas. 2018. A survey on information diffusion models in social networks. In Proceedings of the International Conference on Advanced Informatics for Computing Research. Springer, 426\u2013439."},{"key":"e_1_3_1_164_2","volume-title":"Cognitive Psychology: Mind and Brain","author":"Smith E. E.","year":"2008","unstructured":"E. E. Smith and S. M. Kosslyn. 2008. Cognitive Psychology: Mind and Brain. Pearson Prentice Hall. Retrieved from https:\/\/books.google.com.tw\/books?id=YIPSNwAACAAJ."},{"key":"e_1_3_1_165_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2017.2784184"},{"key":"e_1_3_1_166_2","doi-asserted-by":"publisher","DOI":"10.1111\/j.1460-2466.2010.01497.x"},{"key":"e_1_3_1_167_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-18576-3_30"},{"key":"e_1_3_1_168_2","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2010.33"},{"key":"e_1_3_1_169_2","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1100.0339"},{"issue":"1","key":"e_1_3_1_170_2","article-title":"Lurking in social networks: Topology-based analysis and ranking methods","volume":"4","author":"Tagarelli Andrea","year":"2014","unstructured":"Andrea Tagarelli and Roberto Interdonato. 2014. Lurking in social networks: Topology-based analysis and ranking methods. Soc. Netw. Anal. Mining 4, 1 (2014).","journal-title":"Soc. Netw. Anal. Mining"},{"key":"e_1_3_1_171_2","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-015-0276-y"},{"key":"e_1_3_1_172_2","doi-asserted-by":"publisher","DOI":"10.5555\/3313204"},{"key":"e_1_3_1_173_2","doi-asserted-by":"publisher","DOI":"10.1007\/s41109-019-0233-1"},{"key":"e_1_3_1_174_2","doi-asserted-by":"publisher","DOI":"10.1145\/2740908.2742572"},{"key":"e_1_3_1_175_2","article-title":"Datasets for Social Network Analysis","author":"Tang Jie","year":"2006","unstructured":"Jie Tang. 2006. Datasets for Social Network Analysis. Retrieved from https:\/\/www.aminer.cn\/data-sna.","journal-title":"Retrieved from https:\/\/www.aminer.cn\/data-sna"},{"key":"e_1_3_1_176_2","doi-asserted-by":"publisher","DOI":"10.1145\/2124295.2124309"},{"key":"e_1_3_1_177_2","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-013-0141-9"},{"key":"e_1_3_1_178_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2018.06.041"},{"key":"e_1_3_1_179_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2017.2783190"},{"key":"e_1_3_1_180_2","doi-asserted-by":"publisher","DOI":"10.1145\/2124295.2124320"},{"key":"e_1_3_1_181_2","doi-asserted-by":"publisher","DOI":"10.5555\/3295222.3295349"},{"key":"e_1_3_1_182_2","volume-title":"Proceedings of the 6th International Conference on Learning Representations","author":"Velickovic Petar","year":"2018","unstructured":"Petar Velickovic, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Li\u00f2, and Yoshua Bengio. 2018. Graph attention networks. In Proceedings of the 6th International Conference on Learning Representations."},{"key":"e_1_3_1_183_2","article-title":"Network Data Sources","year":"2010","unstructured":"Vlado. 2010. Network Data Sources. Retrieved from http:\/\/vladowiki.fmf.uni-lj.si\/doku.php?id=pajek:data:urls:index.","journal-title":"Retrieved from http:\/\/vladowiki.fmf.uni-lj.si\/doku.php?id=pajek:data:urls:index"},{"key":"e_1_3_1_184_2","doi-asserted-by":"publisher","DOI":"10.1126\/science.aap9559"},{"key":"e_1_3_1_185_2","doi-asserted-by":"publisher","DOI":"10.5555\/3104482.3104590"},{"key":"e_1_3_1_186_2","doi-asserted-by":"publisher","DOI":"10.1093\/aje\/kwh255"},{"key":"e_1_3_1_187_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2012.16"},{"key":"e_1_3_1_188_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2017.57"},{"key":"e_1_3_1_189_2","doi-asserted-by":"publisher","DOI":"10.5555\/3120007.3120047"},{"key":"e_1_3_1_190_2","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623728"},{"key":"e_1_3_1_191_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2711424"},{"key":"e_1_3_1_192_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2651826"},{"key":"e_1_3_1_193_2","series-title":"Database Systems for Advanced Applications - 23rd International Conference, DASFAA 2018, Gold Coast, QLD, Australia, May 21\u201324, 2018, Proceedings, Part II","first-page":"509","volume":"10828","author":"Wang Wen","year":"2018","unstructured":"Wen Wang, Wei Zhang, and Jun Wang. 2018. Factorization meets memory network: Learning to predict activity popularity. In Database Systems for Advanced Applications - 23rd International Conference, DASFAA 2018, Gold Coast, QLD, Australia, May 21\u201324, 2018, Proceedings, Part II(Lecture Notes in Computer Science, Vol. 10828), Jian Pei, Yannis Manolopoulos, Shazia W. Sadiq, and Jianxin Li (Eds.). Springer, 509\u2013525."},{"key":"e_1_3_1_194_2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.96.032304"},{"key":"e_1_3_1_195_2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.100913.00195"},{"key":"e_1_3_1_196_2","doi-asserted-by":"publisher","DOI":"10.1088\/0253-6102\/59\/4\/21"},{"key":"e_1_3_1_197_2","unstructured":"Audrey Watters. 2011. How Recent Changes to Twitter\u2019s Terms of Service Might Hurt Academic Research. https:\/\/readwrite.com\/2011\/03\/03\/how_recent_changes_to_twitters_terms_of_service_mi\/. Accessed March 3 2011."},{"key":"e_1_3_1_198_2","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487607"},{"key":"e_1_3_1_199_2","doi-asserted-by":"publisher","DOI":"10.5555\/3172077.3172316"},{"key":"e_1_3_1_200_2","doi-asserted-by":"publisher","DOI":"10.1145\/3331184.3331214"},{"key":"e_1_3_1_201_2","doi-asserted-by":"publisher","DOI":"10.5555\/3327345.3327461"},{"key":"e_1_3_1_202_2","doi-asserted-by":"publisher","DOI":"10.1145\/3269206.3271714"},{"key":"e_1_3_1_203_2","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380004"},{"key":"e_1_3_1_204_2","doi-asserted-by":"publisher","DOI":"10.5555\/2887007.2887056"},{"key":"e_1_3_1_205_2","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2015.2414792"},{"key":"e_1_3_1_206_2","doi-asserted-by":"publisher","DOI":"10.5555\/3504035.3504095"},{"issue":"3","key":"e_1_3_1_207_2","first-page":"1128","article-title":"Neural diffusion model for microscopic cascade study","volume":"33","author":"Yang Cheng","year":"2021","unstructured":"Cheng Yang, Maosong Sun, Haoran Liu, Shiyi Han, Zhiyuan Liu, and Huanbo Luan. 2021. Neural diffusion model for microscopic cascade study. IEEE Trans. Knowl. Data Eng. 33, 3 (2021), 1128\u20131139.","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"e_1_3_1_208_2","doi-asserted-by":"publisher","DOI":"10.5555\/3367471.3367602"},{"key":"e_1_3_1_209_2","volume-title":"Proceedings of the Fourth International Conference on Weblogs and Social Media, ICWSM 2010, Washington, DC, USA, May 23\u201326, 2010","author":"Yang Jiang","year":"2010","unstructured":"Jiang Yang and Scott Counts. 2010. Comparing information diffusion structure in weblogs and microblogs. In Proceedings of the Fourth International Conference on Weblogs and Social Media, ICWSM 2010, Washington, DC, USA, May 23\u201326, 2010, William W. Cohen and Samuel Gosling (Eds.). The AAAI Press. Retrieved from http:\/\/www.aaai.org\/ocs\/index.php\/ICWSM\/ICWSM10\/paper\/view\/1467."},{"key":"e_1_3_1_210_2","volume-title":"Proceedings of the 4th International AAAI Conference on Weblogs and Social Media","author":"Yang Jiang","year":"2010","unstructured":"Jiang Yang and Scott Counts. 2010. Predicting the speed, scale, and range of information diffusion in Twitter. In Proceedings of the 4th International AAAI Conference on Weblogs and Social Media."},{"key":"e_1_3_1_211_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2010.22"},{"key":"e_1_3_1_212_2","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935863"},{"key":"e_1_3_1_213_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.07.055"},{"key":"e_1_3_1_214_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2017.2734075"},{"key":"e_1_3_1_215_2","doi-asserted-by":"publisher","DOI":"10.5555\/2887007.2887059"},{"key":"e_1_3_1_216_2","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871691"},{"key":"e_1_3_1_217_2","doi-asserted-by":"publisher","DOI":"10.1109\/MobServ.2015.44"},{"key":"e_1_3_1_218_2","doi-asserted-by":"publisher","DOI":"10.1177\/1077699017710453"},{"key":"e_1_3_1_219_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2015.79"},{"key":"e_1_3_1_220_2","doi-asserted-by":"publisher","DOI":"10.1145\/2835776.2835800"},{"key":"e_1_3_1_221_2","doi-asserted-by":"publisher","DOI":"10.5555\/3298239.3298275"},{"key":"e_1_3_1_222_2","doi-asserted-by":"publisher","DOI":"10.5555\/2540128.2540526"},{"key":"e_1_3_1_223_2","doi-asserted-by":"publisher","DOI":"10.1145\/2700398"},{"key":"e_1_3_1_224_2","doi-asserted-by":"publisher","DOI":"10.1145\/2983323.2983848"},{"key":"e_1_3_1_225_2","doi-asserted-by":"publisher","DOI":"10.1145\/2983323.2983809"},{"key":"e_1_3_1_226_2","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186026"},{"key":"e_1_3_1_227_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2011.12.008"},{"key":"e_1_3_1_228_2","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783401"},{"key":"e_1_3_1_229_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2018.01.001"},{"key":"e_1_3_1_230_2","doi-asserted-by":"publisher","DOI":"10.1145\/3433000"},{"key":"e_1_3_1_231_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155349"},{"key":"e_1_3_1_232_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2007.01.094"},{"key":"e_1_3_1_233_2","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxu062"},{"key":"e_1_3_1_234_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2016.11.119"},{"key":"e_1_3_1_235_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2018.02.060"},{"key":"e_1_3_1_236_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.02.031"},{"key":"e_1_3_1_237_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524472"},{"key":"e_1_3_1_238_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISPA-BDCloud-SustainCom-SocialCom48970.2019.00120"},{"key":"e_1_3_1_239_2","doi-asserted-by":"publisher","DOI":"10.1145\/3161603"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3485273","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3485273","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:36Z","timestamp":1750191516000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3485273"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,23]]},"references-count":238,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,1,31]]}},"alternative-id":["10.1145\/3485273"],"URL":"https:\/\/doi.org\/10.1145\/3485273","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11,23]]},"assertion":[{"value":"2020-08-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-09-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-11-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}