{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T22:40:45Z","timestamp":1765233645122,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,21]],"date-time":"2023-10-21T00:00:00Z","timestamp":1697846400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62002073"],"award-info":[{"award-number":["62002073"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guangdong Basic and Applied Basic Research Foundation","award":["2023A1515012603"],"award-info":[{"award-number":["2023A1515012603"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,21]]},"DOI":"10.1145\/3583780.3614743","type":"proceedings-article","created":{"date-parts":[[2023,10,21]],"date-time":"2023-10-21T07:45:26Z","timestamp":1697874326000},"page":"5101-5105","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["IMinimize: A System for Negative Influence Minimization via Vertex Blocking"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-1210-4672","authenticated-orcid":false,"given":"Siyi","family":"Teng","sequence":"first","affiliation":[{"name":"East China Normal University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4535-8359","authenticated-orcid":false,"given":"Jiadong","family":"Xie","sequence":"additional","affiliation":[{"name":"University of New South Wales, Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6198-1039","authenticated-orcid":false,"given":"Mingkai","family":"Zhang","sequence":"additional","affiliation":[{"name":"Guangzhou University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3123-2184","authenticated-orcid":false,"given":"Kai","family":"Wang","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0548-0130","authenticated-orcid":false,"given":"Fan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Guangzhou University, Guangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2023,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Ceren Budak Divyakant Agrawal and Amr El Abbadi. 2011. Limiting the spread of misinformation in social networks. In WWW. 665--674. Ceren Budak Divyakant Agrawal and Amr El Abbadi. 2011. Limiting the spread of misinformation in social networks. In WWW. 665--674.","DOI":"10.1145\/1963405.1963499"},{"key":"e_1_3_2_1_2_1","volume-title":"Science","volume":"329","author":"Centola Damon","year":"2010","unstructured":"Damon Centola . 2010 . The Spread of Behavior in an Online Social Network Experiment . Science , Vol. 329 , 5996 (2010), 1194--1197. Damon Centola. 2010. The Spread of Behavior in an Online Social Network Experiment. Science, Vol. 329, 5996 (2010), 1194--1197."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Wei Chen Chi Wang and Yajun Wang. 2010. Scalable influence maximization for prevalent viral marketing in large-scale social networks. In KDD. 1029--1038. Wei Chen Chi Wang and Yajun Wang. 2010. Scalable influence maximization for prevalent viral marketing in large-scale social networks. In KDD. 1029--1038.","DOI":"10.1145\/1835804.1835934"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"David Kempe Jon M. Kleinberg and \u00c9 va Tardos. 2003. Maximizing the spread of influence through a social network. In KDD. 137--146. David Kempe Jon M. Kleinberg and \u00c9 va Tardos. 2003. Maximizing the spread of influence through a social network. In KDD. 137--146.","DOI":"10.1145\/956750.956769"},{"key":"e_1_3_2_1_5_1","unstructured":"Masahiro Kimura Kazumi Saito and Hiroshi Motoda. 2008. Minimizing the Spread of Contamination by Blocking Links in a Network. In AAAI. Masahiro Kimura Kazumi Saito and Hiroshi Motoda. 2008. Minimizing the Spread of Contamination by Blocking Links in a Network. In AAAI."},{"key":"e_1_3_2_1_6_1","volume-title":"Email Networks and the Spread of Computer Viruses. Physical Review E","author":"Newman","year":"2002","unstructured":"Newman M, Forrest Stephanie , and Balthrop Justin . 2002. Email Networks and the Spread of Computer Viruses. Physical Review E ( 2002 ), 035101. Newman M, Forrest Stephanie, and Balthrop Justin. 2002. Email Networks and the Spread of Computer Viruses. Physical Review E (2002), 035101."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Takanori Maehara Hirofumi Suzuki and Masakazu Ishihata. 2017. Exact Computation of Influence Spread by Binary Decision Diagrams. In WWW. 947--956. Takanori Maehara Hirofumi Suzuki and Masakazu Ishihata. 2017. Exact Computation of Influence Spread by Binary Decision Diagrams. In WWW. 947--956.","DOI":"10.1145\/3038912.3052567"},{"key":"e_1_3_2_1_8_1","volume-title":"Mohammad Sadegh Helfroush, and Habibollah Danyali","author":"Manouchehri Mohammad Ali","year":"2021","unstructured":"Mohammad Ali Manouchehri , Mohammad Sadegh Helfroush, and Habibollah Danyali . 2021 . A Theoretically Guaranteed Approach to Efficiently Block the Influence of Misinformation in Social Networks. IEEE Trans. Comput. Soc. Syst . (2021), 716--727. Mohammad Ali Manouchehri, Mohammad Sadegh Helfroush, and Habibollah Danyali. 2021. A Theoretically Guaranteed Approach to Efficiently Block the Influence of Misinformation in Social Networks. IEEE Trans. Comput. Soc. Syst. (2021), 716--727."},{"volume-title":"Learning from Multiple Social Networks","author":"Nie Liqiang","key":"e_1_3_2_1_9_1","unstructured":"Liqiang Nie , Xuemeng Song , and Tat-Seng Chua . 2016. Learning from Multiple Social Networks . Vol. 8 . Synthesis Lectures on Information Concepts Retrieval and Services . 118 pages. Liqiang Nie, Xuemeng Song, and Tat-Seng Chua. 2016. Learning from Multiple Social Networks. Vol. 8. Synthesis Lectures on Information Concepts Retrieval and Services. 118 pages."},{"key":"e_1_3_2_1_10_1","volume-title":"Scaling up COVID-19 rapid antigen tests: promises and challenges. The Lancet infectious diseases","author":"Peeling Rosanna W","year":"2021","unstructured":"Rosanna W Peeling , Piero L Olliaro , Debrah I Boeras , and Noah Fongwen . 2021. Scaling up COVID-19 rapid antigen tests: promises and challenges. The Lancet infectious diseases , Vol. 21 , 9 ( 2021 ), e290--e295. Rosanna W Peeling, Piero L Olliaro, Debrah I Boeras, and Noah Fongwen. 2021. Scaling up COVID-19 rapid antigen tests: promises and challenges. The Lancet infectious diseases, Vol. 21, 9 (2021), e290--e295."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1038\/35019019"},{"key":"e_1_3_2_1_12_1","volume-title":"Mitigating Misinformation in Online Social Network with Top-k Debunkers and Evolving User Opinions. In Companion of The Web Conference. ACM \/ IW3C2, 363--370","author":"Saxena Akrati","year":"2020","unstructured":"Akrati Saxena , Wynne Hsu , Mong-Li Lee , Hai Leong Chieu , Lynette Ng , and Loo-Nin Teow . 2020 . Mitigating Misinformation in Online Social Network with Top-k Debunkers and Evolving User Opinions. In Companion of The Web Conference. ACM \/ IW3C2, 363--370 . Akrati Saxena, Wynne Hsu, Mong-Li Lee, Hai Leong Chieu, Lynette Ng, and Loo-Nin Teow. 2020. Mitigating Misinformation in Online Social Network with Top-k Debunkers and Evolving User Opinions. In Companion of The Web Conference. ACM \/ IW3C2, 363--370."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3336191.3371805"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Youze Tang Xiaokui Xiao and Yanchen Shi. 2014. Influence maximization: near-optimal time complexity meets practical efficiency. In SIGMOD. 75--86. Youze Tang Xiaokui Xiao and Yanchen Shi. 2014. Influence maximization: near-optimal time complexity meets practical efficiency. In SIGMOD. 75--86.","DOI":"10.1145\/2588555.2593670"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2017.2783190"},{"key":"e_1_3_2_1_16_1","volume-title":"DRIMUX: Dynamic Rumor Influence Minimization with User Experience in Social Networks. In AAAI. 791--797.","author":"Wang Biao","year":"2016","unstructured":"Biao Wang , Ge Chen , Luoyi Fu , Li Song , Xinbing Wang , and Xue Liu . 2016 . DRIMUX: Dynamic Rumor Influence Minimization with User Experience in Social Networks. In AAAI. 791--797. Biao Wang, Ge Chen, Luoyi Fu, Li Song, Xinbing Wang, and Xue Liu. 2016. DRIMUX: Dynamic Rumor Influence Minimization with User Experience in Social Networks. In AAAI. 791--797."},{"key":"e_1_3_2_1_17_1","volume-title":"AAAI Workshops","volume":"17","author":"Wang Senzhang","year":"2013","unstructured":"Senzhang Wang , Xiaojian Zhao , Yan Chen , Zhoujun Li , Kai Zhang , and Jiali Xia . 2013 . Negative Influence Minimizing by Blocking Nodes in Social Networks . In AAAI Workshops , Vol. WS-13-- 17 . Senzhang Wang, Xiaojian Zhao, Yan Chen, Zhoujun Li, Kai Zhang, and Jiali Xia. 2013. Negative Influence Minimizing by Blocking Nodes in Social Networks. In AAAI Workshops, Vol. WS-13--17."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Yidi Wu Yuntao Gui Tatiana Jin James Cheng Xiao Yan Peiqi Yin Yufei Cai Bo Tang and Fan Yu. 2021. Vertex-Centric Visual Programming for Graph Neural Networks. In SIGMOD. ACM 2803--2807. Yidi Wu Yuntao Gui Tatiana Jin James Cheng Xiao Yan Peiqi Yin Yufei Cai Bo Tang and Fan Yu. 2021. Vertex-Centric Visual Programming for Graph Neural Networks. In SIGMOD. ACM 2803--2807.","DOI":"10.1145\/3448016.3452770"},{"key":"e_1_3_2_1_19_1","unstructured":"Siyuan Xia Beizhen Chang Karl Knopf Yihan He Yuchao Tao and Xi He. 2021. DPGraph: A Benchmark Platform for Differentially Private Graph Analysis. In SIGMOD. ACM 2808--2812. Siyuan Xia Beizhen Chang Karl Knopf Yihan He Yuchao Tao and Xi He. 2021. DPGraph: A Benchmark Platform for Differentially Private Graph Analysis. In SIGMOD. ACM 2808--2812."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Jiadong Xie. 2022. Hindering Influence Diffusion of Community. In SIGMOD. ACM 2518--2520. Jiadong Xie. 2022. Hindering Influence Diffusion of Community. In SIGMOD. ACM 2518--2520.","DOI":"10.1145\/3514221.3520250"},{"volume-title":"Minimizing the Influence of Misinformation via Vertex Blocking","author":"Xie Jiadong","key":"e_1_3_2_1_21_1","unstructured":"Jiadong Xie , Fan Zhang , Kai Wang , Xuemin Lin , and Wenjie Zhang . 2023. Minimizing the Influence of Misinformation via Vertex Blocking . In ICDE. IEEE , 789--801. Jiadong Xie, Fan Zhang, Kai Wang, Xuemin Lin, and Wenjie Zhang. 2023. Minimizing the Influence of Misinformation via Vertex Blocking. In ICDE. IEEE, 789--801."},{"key":"e_1_3_2_1_22_1","first-page":"1067","article-title":"Minimizing Influence of Rumors by Blockers on Social Networks","volume":"7","author":"Yan Ruidong","year":"2020","unstructured":"Ruidong Yan , Deying Li , Weili Wu , Ding-Zhu Du , and Yongcai Wang . 2020 . Minimizing Influence of Rumors by Blockers on Social Networks : Algorithms and Analysis. IEEE Trans. Netw. Sci. Eng. , Vol. 7 , 3 (2020), 1067 -- 1078 . Ruidong Yan, Deying Li, Weili Wu, Ding-Zhu Du, and Yongcai Wang. 2020. Minimizing Influence of Rumors by Blockers on Social Networks: Algorithms and Analysis. IEEE Trans. Netw. Sci. Eng., Vol. 7, 3 (2020), 1067--1078.","journal-title":"Algorithms and Analysis. IEEE Trans. Netw. Sci. Eng."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2015.2466080"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Qipeng Yao Ruisheng Shi Chuan Zhou Peng Wang and Li Guo. 2015. Topic-aware Social Influence Minimization. In WWW. 139--140. Qipeng Yao Ruisheng Shi Chuan Zhou Peng Wang and Li Guo. 2015. Topic-aware Social Influence Minimization. In WWW. 139--140.","DOI":"10.1145\/2740908.2742767"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Ahmad Zareie and Rizos Sakellariou. 2021. Minimizing the spread of misinformation in online social networks: A survey. J. Netw. Comput. Appl. (2021). Ahmad Zareie and Rizos Sakellariou. 2021. Minimizing the spread of misinformation in online social networks: A survey. J. Netw. Comput. Appl. (2021).","DOI":"10.1016\/j.jnca.2021.103094"},{"key":"e_1_3_2_1_26_1","volume-title":"C\u00e9 cile Paris, and Surya Nepal","author":"Zhang Zizhu","year":"2019","unstructured":"Zizhu Zhang , Weiliang Zhao , Jian Yang , C\u00e9 cile Paris, and Surya Nepal . 2019 . Learning Influence Probabilities and Modelling Influence Diffusion in Twitter. In WWW. ACM , 1087--1094. Zizhu Zhang, Weiliang Zhao, Jian Yang, C\u00e9 cile Paris, and Surya Nepal. 2019. Learning Influence Probabilities and Modelling Influence Diffusion in Twitter. In WWW. ACM, 1087--1094."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.14778\/3415478.3415522"}],"event":{"name":"CIKM '23: The 32nd ACM International Conference on Information and Knowledge Management","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Birmingham United Kingdom","acronym":"CIKM '23"},"container-title":["Proceedings of the 32nd ACM International Conference on Information and Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3583780.3614743","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3583780.3614743","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:30Z","timestamp":1750178790000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3583780.3614743"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,21]]},"references-count":27,"alternative-id":["10.1145\/3583780.3614743","10.1145\/3583780"],"URL":"https:\/\/doi.org\/10.1145\/3583780.3614743","relation":{},"subject":[],"published":{"date-parts":[[2023,10,21]]},"assertion":[{"value":"2023-10-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}