{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:10:54Z","timestamp":1750219854328,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T00:00:00Z","timestamp":1685059200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,5,26]]},"DOI":"10.1145\/3603781.3603886","type":"proceedings-article","created":{"date-parts":[[2023,7,27]],"date-time":"2023-07-27T18:02:29Z","timestamp":1690480949000},"page":"600-606","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Probing the influence maximization-cost minimization problem in social networks by using a multi-objective discrete differential evolution optimization"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6822-0590","authenticated-orcid":false,"given":"Jx","family":"Tang","sequence":"first","affiliation":[{"name":"Lanzhou University of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1877-6187","authenticated-orcid":false,"given":"L","family":"Zhang","sequence":"additional","affiliation":[{"name":"Lanzhou University of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9949-4850","authenticated-orcid":false,"given":"Pl","family":"Lu","sequence":"additional","affiliation":[{"name":"Lanzhou University of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5692-9968","authenticated-orcid":false,"given":"Jm","family":"Lan","sequence":"additional","affiliation":[{"name":"Lanzhou University of Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2023,7,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2019.02.056"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2019.2962231"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.03.005"},{"volume-title":"Proceedings of the ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp. 137-146)","author":"Kempe D.","key":"e_1_3_2_1_4_1","unstructured":"Kempe , D. and Kleinberg , J . 2003. Maximizing the spread of influence through a social network . In Proceedings of the ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp. 137-146) . Kempe, D. and Kleinberg, J. 2003. Maximizing the spread of influence through a social network. In Proceedings of the ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp. 137-146)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2021.3081478"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2021.102818"},{"key":"e_1_3_2_1_7_1","volume-title":"International Conference on Advanced Informatics for Computing Research (pp. 426-439)","author":"Singh S. S.","year":"2018","unstructured":"Singh , S. S. , Singh , K. , Kumar , A. , Shakya , H. K. an Biswas , B. 2018 . A survey on information diffusion models in social networks . In International Conference on Advanced Informatics for Computing Research (pp. 426-439) . Springer, Singapore. Singh, S. S., Singh, K., Kumar, A., Shakya, H. K. an Biswas, B. 2018. A survey on information diffusion models in social networks. In International Conference on Advanced Informatics for Computing Research (pp. 426-439). Springer, Singapore."},{"volume-title":"International Conference on the Applications of Evolutionary Computation (pp. 117-124)","author":"Bucur D.","key":"e_1_3_2_1_8_1","unstructured":"Bucur , D. , Iacca , G. , Marcelli , A. , Squillero , G. and Tonda , A . 2018. Improving multi-objective evolutionary influence maximization in social networks . In International Conference on the Applications of Evolutionary Computation (pp. 117-124) . Springer, Cham. Bucur, D., Iacca, G., Marcelli, A., Squillero, G. and Tonda, A. 2018. Improving multi-objective evolutionary influence maximization in social networks. In International Conference on the Applications of Evolutionary Computation (pp. 117-124). Springer, Cham."},{"volume-title":"2020 IEEE Congress on Evolutionary Computation (CEC) (pp. 1-8). IEEE.","author":"Zhang L.","key":"e_1_3_2_1_9_1","unstructured":"Zhang , L. , Sun , F. , Cheng , F. , Ma , H. and Sun , X . 2020. An overlapping community detection based multi-objective evolutionary algorithm for diversified social influence maximization . In 2020 IEEE Congress on Evolutionary Computation (CEC) (pp. 1-8). IEEE. Zhang, L., Sun, F., Cheng, F., Ma, H. and Sun, X. 2020. An overlapping community detection based multi-objective evolutionary algorithm for diversified social influence maximization. In 2020 IEEE Congress on Evolutionary Computation (CEC) (pp. 1-8). IEEE."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-020-00694-z"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Wu G. Gao X. Yan G. and Chen G. 2021. Parallel greedy algorithm to multiple influence maximization in social network. ACM Transactions on Knowledge Discovery from Data (TKDD) 15(3) 1-21.  Wu G. Gao X. Yan G. and Chen G. 2021. Parallel greedy algorithm to multiple influence maximization in social network. ACM Transactions on Knowledge Discovery from Data (TKDD) 15(3) 1-21.","DOI":"10.1145\/3442341"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2782814"},{"volume-title":"Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 57-66)","author":"Domingos P.","key":"e_1_3_2_1_13_1","unstructured":"Domingos , P. and Richardson , M . 2001. Mining the network value of customers . In Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 57-66) . Domingos, P. and Richardson, M. 2001. Mining the network value of customers. In Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 57-66)."},{"volume-title":"Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 420-429)","author":"Leskovec J.","key":"e_1_3_2_1_14_1","unstructured":"Leskovec , J. , Krause , A. , Guestrin , C. , Faloutsos , C. , VanBriesen , J. and Glance , N . 2007. Cost-effective outbreak detection in networks . In Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 420-429) . Leskovec, J., Krause, A., Guestrin, C., Faloutsos, C., VanBriesen, J. and Glance, N. 2007. Cost-effective outbreak detection in networks. In Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 420-429)."},{"volume-title":"Twenty-fifth AAAI conference on artificial intelligence.","author":"Jiang Q.","key":"e_1_3_2_1_15_1","unstructured":"Jiang , Q. , Song , G. , Gao , C. , Wang , Y. , Si , W. and Xie , K . 2011. Simulated annealing based influence maximization in social networks . In Twenty-fifth AAAI conference on artificial intelligence. Jiang, Q., Song, G., Gao, C., Wang, Y., Si, W. and Xie, K. 2011. Simulated annealing based influence maximization in social networks. In Twenty-fifth AAAI conference on artificial intelligence."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.07.012"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2022.03.041"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Lotf J. J. Azgomi M. A. and Dishabi M. R. E. 2022. An improved influence maximization method for social networks based on genetic algorithm. Physica A: Statistical Mechanics and its Applications 586 126480.  Lotf J. J. Azgomi M. A. and Dishabi M. R. E. 2022. An improved influence maximization method for social networks based on genetic algorithm. Physica A: Statistical Mechanics and its Applications 586 126480.","DOI":"10.1016\/j.physa.2021.126480"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.116342"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106436"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.106623"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2021.103597"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008202821328"}],"event":{"name":"CNIOT'23: 2023 4th International Conference on Computing, Networks and Internet of Things","acronym":"CNIOT'23","location":"Xiamen China"},"container-title":["Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603781.3603886","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3603781.3603886","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:11Z","timestamp":1750178831000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603781.3603886"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,26]]},"references-count":23,"alternative-id":["10.1145\/3603781.3603886","10.1145\/3603781"],"URL":"https:\/\/doi.org\/10.1145\/3603781.3603886","relation":{},"subject":[],"published":{"date-parts":[[2023,5,26]]},"assertion":[{"value":"2023-07-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}