{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T18:24:17Z","timestamp":1763749457878,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T00:00:00Z","timestamp":1741564800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"Snap","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006374","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["IIS-2006844, IIS-2144209, IIS-2223769, CNS-2154962, BCS-2228534, and CMMI-2411248"],"award-info":[{"award-number":["IIS-2006844, IIS-2144209, IIS-2223769, CNS-2154962, BCS-2228534, and CMMI-2411248"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006374","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N000142412636"],"award-info":[{"award-number":["N000142412636"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Commonwealth Cyber Initiative","award":["VV-1Q24-011, VV-1Q25-004"],"award-info":[{"award-number":["VV-1Q24-011, VV-1Q25-004"]}]},{"name":"Netflix"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,3,10]]},"DOI":"10.1145\/3701551.3703575","type":"proceedings-article","created":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T12:30:16Z","timestamp":1740573016000},"page":"905-913","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Demystify Epidemic Containment in Directed Networks: Theory and Algorithms"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-8163-395X","authenticated-orcid":false,"given":"Yinhan","family":"He","sequence":"first","affiliation":[{"name":"University of Virginia, Charlottesville, VA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7099-7905","authenticated-orcid":false,"given":"Chen","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Virginia, Charlottesville, VA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1273-7694","authenticated-orcid":false,"given":"Song","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Virginia, Charlottesville, VA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-5906-3743","authenticated-orcid":false,"given":"Guanghui","family":"Min","sequence":"additional","affiliation":[{"name":"University of Virginia, Charlottesville, VA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1878-817X","authenticated-orcid":false,"given":"Jundong","family":"Li","sequence":"additional","affiliation":[{"name":"University of Virginia, Charlottesville, VA, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,3,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780198545996.001.0001"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Arnoldi W. E. The principle of minimized iterations in the solution of the matrix eigenvalue problem. Q Appl Math. (1951).","DOI":"10.1090\/qam\/42792"},{"key":"e_1_3_2_1_3_1","volume-title":"AISTATS","author":"Babay A. E.","year":"2022","unstructured":"Babay, A. E., Dinitz, M., Srinivasan, A., Tsepenekas, L., and Vullikanti, A. Controlling epidemic spread using probabilistic diffusion models on networks. In AISTATS (2022)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1521587"},{"key":"e_1_3_2_1_5_1","author":"Bavelas A.","year":"1950","unstructured":"Bavelas, A. Communication patterns in task-oriented groups. J. Acoust. Soc. Am. (1950).","journal-title":"J. Acoust. Soc. Am. ("},{"key":"e_1_3_2_1_6_1","volume-title":"ICML","author":"Bian A. A.","year":"2017","unstructured":"Bian, A. A., Buhmann, J. M., Krause, A., and Tschiatschek, S. Guarantees for greedy maximization of non-submodular functions with applications. In ICML (2017)."},{"key":"e_1_3_2_1_7_1","volume-title":"\u00c1. Generalized percolation in random directed networks. Phys. Rev. E","author":"Bogun\u00e1 M.","year":"2005","unstructured":"Bogun\u00e1, M., and Serrano, M. \u00c1. Generalized percolation in random directed networks. Phys. Rev. E (2005)."},{"key":"e_1_3_2_1_8_1","volume-title":"Asymptotics of the spectral radius for directed chung-lu random graphs with community structure. arXiv","author":"Burstein D.","year":"2017","unstructured":"Burstein, D. Asymptotics of the spectral radius for directed chung-lu random graphs with community structure. arXiv (2017)."},{"key":"e_1_3_2_1_9_1","volume-title":"Epidemic thresholds in real networks. TISSEC","author":"Chakrabarti D.","year":"2008","unstructured":"Chakrabarti, D.,Wang, Y.,Wang, C., Leskovec, J., and Faloutsos, C. Epidemic thresholds in real networks. TISSEC (2008)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220019"},{"key":"e_1_3_2_1_11_1","volume-title":"Node immunization on large graphs: Theory and algorithms","author":"Chen C.","year":"2015","unstructured":"Chen, C., Tong, H., Prakash, B. A., Tsourakakis, C. E., Eliassi-Rad, T., Faloutsos, C., and Chau, D. H. Node immunization on large graphs: Theory and algorithms. IEEE Trans. Knowl. Data Eng. (2015)."},{"key":"e_1_3_2_1_12_1","author":"Chen C.-L.","year":"2021","unstructured":"Chen, C.-L., Lai, C.-C., Luh, D.-L., Chuang, S.-Y., Yang, K.-C., Yeh, Y.-P., Yen, A. M.-F., Chang, K.-J., Chang, R.-E., and Chen, S. L.-S. Review of epidemic, containment strategies, clinical management, and economic evaluation of covid-19 pandemic. J. Formos. Med. Assoc. (2021).","journal-title":"J. Formos. Med. Assoc. ("},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Chung F. Lu L. and Vu V. Eigenvalues of random power law graphs. Ann. Comb. (2003).","DOI":"10.1007\/s000260300002"},{"key":"e_1_3_2_1_14_1","volume-title":"Efficient immunization strategies for computer networks and populations. PRL","author":"Cohen R.","year":"2003","unstructured":"Cohen, R., Havlin, S., and Ben-Avraham, D. Efficient immunization strategies for computer networks and populations. PRL (2003)."},{"key":"e_1_3_2_1_15_1","volume-title":"Management & Financial Markets","author":"Daniasa C. I.","year":"2010","unstructured":"Daniasa, C. I., Tomita, V., Stuparu, D., and Stanciu, M. The mechanisms of the influence of viral marketing in social media. Economics, Management & Financial Markets (2010)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Danon L. Ford A. P. House T. Jewell C. P. Keeling M. J. Roberts G. O. Ross J. V. Vernon M. C. et al. Networks and the epidemiology of infectious disease. Interdiscip Perspect Infect Dis (2011).","DOI":"10.1155\/2011\/284909"},{"key":"e_1_3_2_1_17_1","unstructured":"Dasgupta A. and Sengupta S. Scalable estimation of epidemic thresholds via node sampling."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Dorogovtsev S. N. Goltsev A. V. and Mendes J. F. Critical phenomena in complex networks. Rev. Mod. Phys. (2008).","DOI":"10.1103\/RevModPhys.80.1275"},{"key":"e_1_3_2_1_19_1","volume-title":"Structure of social contact networks and their impact on epidemics. DIMACS","author":"Eubank S.","year":"2006","unstructured":"Eubank, S., Kumar, V. A., Marathe, M. V., Srinivasan, A., and Wang, N. Structure of social contact networks and their impact on epidemics. DIMACS (2006)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Holme P. Kim B. J. Yoon C. N. and Han S. K. Attack vulnerability of complex networks. Phys. Rev. Lett. (2002).","DOI":"10.1103\/PhysRevE.65.056109"},{"key":"e_1_3_2_1_21_1","volume-title":"Random graphs","author":"Janson S.","year":"2011","unstructured":"Janson, S., Rucinski, A., and Luczak, T. Random graphs. 2011."},{"key":"e_1_3_2_1_22_1","volume-title":"A new status index derived from sociometric analysis. Psychometrika","author":"Katz L.","year":"1953","unstructured":"Katz, L. A new status index derived from sociometric analysis. Psychometrika (1953)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-50806-1"},{"key":"e_1_3_2_1_24_1","volume-title":"Authoritative sources in a hyperlinked environment. JACM","author":"Kleinberg J. M.","year":"1999","unstructured":"Kleinberg, J. M. Authoritative sources in a hyperlinked environment. JACM (1999)."},{"key":"e_1_3_2_1_25_1","volume-title":"Global analysis of a deterministic and stochastic nonlinear sirs epidemic model. Nonlinear Anal.: Model. Control","author":"Lahrouz A.","year":"2011","unstructured":"Lahrouz, A., Omari, L., and Kiouach, D. Global analysis of a deterministic and stochastic nonlinear sirs epidemic model. Nonlinear Anal.: Model. Control (2011)."},{"key":"e_1_3_2_1_26_1","volume-title":"SNAP Datasets: Stanford large network dataset collection","author":"Leskovec J.","year":"2014","unstructured":"Leskovec, J., and Krevl, A. SNAP Datasets: Stanford large network dataset collection, 2014."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Lewis A. S. The mathematics of eigenvalue optimization. Math. Program. (2003).","DOI":"10.1007\/s10107-003-0441-3"},{"key":"e_1_3_2_1_28_1","volume-title":"Epidemic threshold in directed networks. Physical Review E","author":"Li C.","year":"2013","unstructured":"Li, C.,Wang, H., and Van Mieghem, P. Epidemic threshold in directed networks. Physical Review E (2013)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Li P. Zhang J. Xu X.-K. and Small M. Dynamical influence of nodes revisited: A markov chain analysis of epidemic process on networks. Chin. Phys. Lett. (2012).","DOI":"10.1088\/0256-307X\/29\/4\/048903"},{"key":"e_1_3_2_1_30_1","volume-title":"Handbook of linear algebra.","author":"Li R.-C.","year":"2006","unstructured":"Li, R.-C. Matrix perturbation theory. In Handbook of linear algebra. 2006."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2015.133"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Matamalas J. T. Arenas A. and G\u00f3mez S. Effective approach to epidemic containment using link equations in complex networks. Sci. Adv. (2018).","DOI":"10.1126\/sciadv.aau4212"},{"key":"e_1_3_2_1_33_1","volume-title":"Hiv transmission network metastudy project: An archive of data from eight network studies","author":"Morris M.","year":"1988","unstructured":"Morris, M., and Rothenberg, R. Hiv transmission network metastudy project: An archive of data from eight network studies, 1988--2001. ICPSR Data Holdings (2011)."},{"key":"e_1_3_2_1_34_1","volume-title":"Disease spread in small-size directed networks: epidemic threshold, correlation between links to and from nodes, and clustering. Journal of theoretical biology","author":"Moslonka-Lefebvre M.","year":"2009","unstructured":"Moslonka-Lefebvre, M., Pautasso, M., and Jeger, M. J. Disease spread in small-size directed networks: epidemic threshold, correlation between links to and from nodes, and clustering. Journal of theoretical biology (2009)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Newman M. Networks. 2018.","DOI":"10.1093\/oso\/9780198805090.001.0001"},{"key":"e_1_3_2_1_36_1","volume-title":"The pagerank citation ranking: Bringing order to the web. Tech. rep","author":"Page L.","year":"1998","unstructured":"Page, L., Brin, S., Motwani, R., and Winograd, T. The pagerank citation ranking: Bringing order to the web. Tech. rep., 1998."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/CISE.2009.5365379"},{"key":"e_1_3_2_1_38_1","volume-title":"An immunization framework for social networks through big data-based influence modeling","author":"Peng S.","year":"2017","unstructured":"Peng, S., Wang, G., Zhou, Y., Wan, C., Wang, C., Yu, S., and Niu, J. An immunization framework for social networks through big data-based influence modeling. IEEE Trans. Dependable Secure Comput. (2017)."},{"key":"e_1_3_2_1_39_1","author":"Pilosof S.","year":"2017","unstructured":"Pilosof, S., Greenbaum, G., Krasnov, B. R., and Zelnik, Y. R. Asymmetric disease dynamics in multihost interconnected networks. J. Theor. Biol. (2017).","journal-title":"J. Theor. Biol. ("},{"key":"e_1_3_2_1_40_1","volume-title":"Threshold conditions for arbitrary cascade models on arbitrary networks. KAIS","author":"Prakash B. A.","year":"2012","unstructured":"Prakash, B. A., Chakrabarti, D., Valler, N. C., Faloutsos, M., and Faloutsos, C. Threshold conditions for arbitrary cascade models on arbitrary networks. KAIS (2012)."},{"key":"e_1_3_2_1_41_1","first-page":"2754370","author":"Putra M. D.","year":"2016","unstructured":"Putra, M. D. New media and terrorism: Role of the social media to countering cyber terrorism and cyber extremism for effective response. Available at SSRN 2754370 (2016).","journal-title":"SSRN"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v28i1.8819"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","unstructured":"Salath\u00e9 M. and Jones J. H. Dynamics and control of diseases in networks with community structure. PLoS Comput. Biol. (2010).","DOI":"10.1371\/journal.pcbi.1000736"},{"key":"e_1_3_2_1_44_1","volume-title":"Suppressing epidemics with a limited amount of immunization units. Phys. Rev. E","author":"Schneider C. M.","year":"2011","unstructured":"Schneider, C. M., Mihaljev, T., Havlin, S., and Herrmann, H. J. Suppressing epidemics with a limited amount of immunization units. Phys. Rev. E (2011)."},{"key":"e_1_3_2_1_45_1","volume-title":"Epidemic thresholds in directed complex networks. arXiv preprint arXiv:1103.1680","author":"Tanimoto S.","year":"2011","unstructured":"Tanimoto, S. Epidemic thresholds in directed complex networks. arXiv preprint arXiv:1103.1680 (2011)."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2010.54"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.2003.1238052"},{"key":"e_1_3_2_1_48_1","volume-title":"A useful variant of the davis--kahan theorem for statisticians. Biometrika","author":"Yu Y.","year":"2015","unstructured":"Yu, Y., Wang, T., and Samworth, R. J. A useful variant of the davis--kahan theorem for statisticians. Biometrika (2015)."}],"event":{"name":"WSDM '25: The Eighteenth ACM International Conference on Web Search and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Hannover Germany","acronym":"WSDM '25"},"container-title":["Proceedings of the Eighteenth ACM International Conference on Web Search and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3701551.3703575","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3701551.3703575","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T09:12:56Z","timestamp":1755767576000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3701551.3703575"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,10]]},"references-count":48,"alternative-id":["10.1145\/3701551.3703575","10.1145\/3701551"],"URL":"https:\/\/doi.org\/10.1145\/3701551.3703575","relation":{},"subject":[],"published":{"date-parts":[[2025,3,10]]},"assertion":[{"value":"2025-03-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}