{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:15:08Z","timestamp":1775229308212,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":74,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"InnoHK Fund, Innovation and Technology Commission, Hong Kong"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,22]]},"DOI":"10.1145\/3696410.3714729","type":"proceedings-article","created":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T22:52:18Z","timestamp":1745362338000},"page":"2435-2449","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Reinforcement-Learning Based Covert Social Influence Operations"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5909-5567","authenticated-orcid":false,"given":"Saurabh","family":"Kumar","sequence":"first","affiliation":[{"name":"IIT Hyderabad, Sangareddy District, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5941-4684","authenticated-orcid":false,"given":"Valerio","family":"La Gatta","sequence":"additional","affiliation":[{"name":"Northwestern University, Evanston, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4385-958X","authenticated-orcid":false,"given":"Andrea","family":"Pugliese","sequence":"additional","affiliation":[{"name":"University of Calabria, Rende, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-8852-3060","authenticated-orcid":false,"given":"Andrew","family":"Pulver","sequence":"additional","affiliation":[{"name":"Northwestern University, Evanston, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7191-0296","authenticated-orcid":false,"given":"V.S.","family":"Subrahmanian","sequence":"additional","affiliation":[{"name":"Northwestern University, Evanston, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-8610-4296","authenticated-orcid":false,"given":"Jiazhi","family":"Zhang","sequence":"additional","affiliation":[{"name":"Hong Kong University of Science and Technology, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2984-734X","authenticated-orcid":false,"given":"Youzhi","family":"Zhang","sequence":"additional","affiliation":[{"name":"Hong Kong Institute of Science &amp; Innovation, Hong Kong, China and Chinese Academy of Sciences, Hong Kong, China"}]}],"member":"320","published-online":{"date-parts":[[2025,4,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v13i01.3205"},{"key":"e_1_3_2_1_2_1","volume-title":"Content-based features predict social media influence operations. Science advances 6, 30","author":"Alizadeh Meysam","year":"2020","unstructured":"Meysam Alizadeh, Jacob N Shapiro, Cody Buntain, and Joshua A Tucker. 2020. Content-based features predict social media influence operations. Science advances 6, 30 (2020), eabb5824."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274289"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-019-0578-6"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","unstructured":"Adam Badawy Emilio Ferrara and Kristina Lerman. 2018. Analyzing the Digital Traces of Political Manipulation: The 2016 Russian Interference Twitter Campaign. In 2018 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). 258--265. doi:10.1109\/ASONAM.2018.8508646","DOI":"10.1109\/ASONAM.2018.8508646"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.54501\/jots.v1i4.55"},{"key":"e_1_3_2_1_7_1","volume-title":"Weaponized health communication: Twitter bots and Russian trolls amplify the vaccine debate. American journal of public health 108, 10","author":"Broniatowski David A","year":"2018","unstructured":"David A Broniatowski, Amelia M Jamison, SiHua Qi, Lulwah AlKulaib, Tao Chen, Adrian Benton, Sandra C Quinn, and Mark Dredze. 2018. Weaponized health communication: Twitter bots and Russian trolls amplify the vaccine debate. American journal of public health 108, 10 (2018), 1378--1384."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1974.10482955"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v18i1.31305"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.14778\/2735703.2735706"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2023.3272331"},{"key":"e_1_3_2_1_12_1","volume-title":"Real-time topic-aware influence maximization using preprocessing. Computational social networks 3","author":"Chen Wei","year":"2016","unstructured":"Wei Chen, Tian Lin, and Cheng Yang. 2016. Real-time topic-aware influence maximization using preprocessing. Computational social networks 3 (2016), 1--19."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835934"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2532549"},{"key":"e_1_3_2_1_15_1","volume-title":"An Unsupervised Approach to Detect Spam Campaigns that Use Botnets on Twitter. CoRR abs\/1804.05232","author":"Chen Zhouhan","year":"2018","unstructured":"Zhouhan Chen and Devika Subramanian. 2018. An Unsupervised Approach to Detect Spam Campaigns that Use Botnets on Twitter. CoRR abs\/1804.05232 (2018). arXiv:1804.05232 http:\/\/arxiv.org\/abs\/1804.05232"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-61255-9_31"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3393482"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2016.29"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2014.6921650"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-023-02453-1"},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the 28th International Conference on International Conference on Machine Learning","author":"Eisenstein Jacob","unstructured":"Jacob Eisenstein, Amr Ahmed, and Eric P. Xing. 2011. Sparse additive generative models of text. In Proceedings of the 28th International Conference on International Conference on Machine Learning (Bellevue, Washington, USA) (ICML'11). Omnipress, Madison, WI, USA, 1041--1048."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1140\/epjds\/s13688-023-00423-4"},{"key":"e_1_3_2_1_23_1","unstructured":"Facebook. 2024. August 2020 Coordinated Inauthentic Behavior Report. https:\/\/about.fb.com\/wp-content\/uploads\/2020\/09\/August-2020-CIB-Report.pdf"},{"key":"e_1_3_2_1_24_1","unstructured":"Facebook. 2024. March 2020 Coordinated Inauthentic Behavior Report. https:\/\/about.fb.com\/wp-content\/uploads\/2020\/04\/March-2020-DetailedCIB-Report.pdf"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3482019"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3637528.3671983"},{"key":"e_1_3_2_1_27_1","volume-title":"Social bot detection in the age of ChatGPT: Challenges and opportunities. First Monday","author":"Ferrara Emilio","year":"2023","unstructured":"Emilio Ferrara. 2023. Social bot detection in the age of ChatGPT: Challenges and opportunities. First Monday (2023)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISI49825.2020.9280525"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.04105"},{"key":"e_1_3_2_1_30_1","volume-title":"Multi-objective influence maximization. algorithms 20","author":"Gershtein Shay","year":"2021","unstructured":"Shay Gershtein, Tova Milo, and Brit Youngmann. 2021. Multi-objective influence maximization. algorithms 20 (2021), 33."},{"key":"e_1_3_2_1_31_1","volume-title":"Talk of the network: A complex systems look at the underlying process of word-of-mouth. Marketing letters 12","author":"Goldenberg Jacob","year":"2001","unstructured":"Jacob Goldenberg, Barak Libai, and Eitan Muller. 2001. Talk of the network: A complex systems look at the underlying process of word-of-mouth. Marketing letters 12 (2001), 211--223."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.119138"},{"key":"e_1_3_2_1_33_1","volume-title":"Threshold models of collective behavior. American journal of sociology 83, 6","author":"Granovetter Mark","year":"1978","unstructured":"Mark Granovetter. 1978. Threshold models of collective behavior. American journal of sociology 83, 6 (1978), 1420--1443."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v16i1.19375"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v14i1.7370"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394231.3397889"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956769"},{"key":"e_1_3_2_1_38_1","volume-title":"Proceedings of The Workshop Proceedings of the 14th International AAAI Conference on Web and Social Media (ICWSM)(SocialSens '21)","author":"Kin Wai NG","year":"2021","unstructured":"NG Kin Wai, Sameera Horawalavithana, and Adriana Iamnitchi. 2021. Multiplatform information operations: Twitter, facebook and youtube against the white helmets. In Proceedings of The Workshop Proceedings of the 14th International AAAI Conference on Web and Social Media (ICWSM)(SocialSens '21). Atlanta, USA."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583481"},{"key":"e_1_3_2_1_40_1","volume-title":"Proceedings of the International AAAI Conference on Web and Social Media (2011","author":"Lee Kyumin","year":"2011","unstructured":"Kyumin Lee, Brian Eoff, and James Caverlee. 2011. Seven Months with the Devils: A Long-Term Study of Content Polluters on Twitter. Proceedings of the International AAAI Conference on Web and Social Media (2011). https:\/\/api. semanticscholar.org\/CorpusID:18181"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2807843"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2807843"},{"key":"e_1_3_2_1_43_1","volume-title":"Using impression data to improve models of online social influence. Scientific reports 11, 1","author":"Liu Rui","year":"2021","unstructured":"Rui Liu, Kevin T Greene, Ruibo Liu, Mihovil Mandic, Benjamin A Valentino, Soroush Vosoughi, and VS Subrahmanian. 2021. Using impression data to improve models of online social influence. Scientific reports 11, 1 (2021), 16613."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3589335.3651912"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v14i1.7311"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3589334.3645529"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2024.3403891"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2012.6459912"},{"key":"e_1_3_2_1_49_1","unstructured":"Diego A Martin and Jacob N Shapiro. 2019. Trends in online foreign influence efforts."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.09.022"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2024.104900"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1140\/epjds\/s13688-023-00410-9"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v15i1.18075"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1057\/crr.2008.14"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.07.103"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2024.111343"},{"key":"e_1_3_2_1_57_1","volume-title":"Levine (Eds.)","volume":"36","author":"Rui Xiaobin","year":"2023","unstructured":"Xiaobin Rui, Zhixiao Wang, Jiayu Zhao, Lichao Sun, and Wei Chen. 2023. Scalable Fair Influence Maximization. In Advances in Neural Information Processing Systems, A. Oh, T. Naumann, A. Globerson, K. Saenko, M. Hardt, and S. Levine (Eds.), Vol. 36. Curran Associates, Inc., 66675-- 66691. https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2023\/file\/ d242dafdb2c5407ae420bc54c9325fdf-Paper-Conference.pdf"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833706"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-023-04928-3"},{"key":"e_1_3_2_1_60_1","volume-title":"Proximal policy optimization algorithms. arXiv preprint arXiv:1707.06347","author":"Schulman John","year":"2017","unstructured":"John Schulman, Filip Wolski, Prafulla Dhariwal, Alec Radford, and Oleg Klimov. 2017. Proximal policy optimization algorithms. arXiv preprint arXiv:1707.06347 (2017)."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467391"},{"key":"e_1_3_2_1_62_1","volume-title":"Daily time spent on social networking by internet users worldwide from 2012 to","year":"2024","unstructured":"Statista. 2024. Daily time spent on social networking by internet users worldwide from 2012 to 2024. https:\/\/www.statista.com\/statistics\/433871\/daily-socialmedia-usage-worldwide\/"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.183"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v17i1.22191"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11306"},{"key":"e_1_3_2_1_66_1","unstructured":"TikTok. 2024. Covert Influence Operations. https:\/\/www.tiktok.com\/transparency\/en-us\/covert-influence-operations"},{"key":"e_1_3_2_1_67_1","volume-title":"Combating fake news by empowering fact-checked news spread via topology-based interventions. CoRR abs\/2107.05016","author":"Wang Ke","year":"2021","unstructured":"Ke Wang, Waheeb Yaqub, Abdallah Lakhdari, and Basem Suleiman. 2021. Combating fake news by empowering fact-checked news spread via topology-based interventions. CoRR abs\/2107.05016 (2021). arXiv:2107.05016 https:\/\/arxiv.org\/abs\/2107.05016"},{"key":"e_1_3_2_1_68_1","volume-title":"Evidence of inter-state coordination amongst state-backed information operations. Scientific reports 13, 1","author":"Wang Xinyu","year":"2023","unstructured":"Xinyu Wang, Jiayi Li, Eesha Srivatsavaya, and Sarah Rajtmajer. 2023. Evidence of inter-state coordination amongst state-backed information operations. Scientific reports 13, 1 (2023), 7716."},{"key":"e_1_3_2_1_69_1","volume-title":"Sang Jung Kim, and Chau Tong","author":"Xia Yiping","year":"2021","unstructured":"Yiping Xia, Josephine Lukito, Yini Zhang, Chris Wells, Sang Jung Kim, and Chau Tong. 2021. Disinformation, performed: Self-presentation of a Russian IRA account on Twitter. In Disinformation and Data Lockdown on Social Platforms. Routledge, 116--134."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/DNSR.2004.1344743"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2348283.2348373"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v14i1.7342"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308560.3316495"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467229"}],"event":{"name":"WWW '25: The ACM Web Conference 2025","location":"Sydney NSW Australia","acronym":"WWW '25","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the ACM on Web Conference 2025"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714729","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3696410.3714729","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:57Z","timestamp":1750295937000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714729"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,22]]},"references-count":74,"alternative-id":["10.1145\/3696410.3714729","10.1145\/3696410"],"URL":"https:\/\/doi.org\/10.1145\/3696410.3714729","relation":{},"subject":[],"published":{"date-parts":[[2025,4,22]]},"assertion":[{"value":"2025-04-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}