{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T14:33:12Z","timestamp":1769005992996,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,7,13]]},"DOI":"10.1145\/3726302.3730334","type":"proceedings-article","created":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T01:38:52Z","timestamp":1752457132000},"page":"3733-3742","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["SAGraph: A Large-Scale Social Graph Dataset with Comprehensive Context for Influencer Selection in Marketing"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4532-2156","authenticated-orcid":false,"given":"Xiaoqing","family":"Zhang","sequence":"first","affiliation":[{"name":"Renmin University of China, Gaoling School of Artificial Intelligence, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2912-750X","authenticated-orcid":false,"given":"Yuhan","family":"Liu","sequence":"additional","affiliation":[{"name":"Renmin University of China, Gaoling School of Artificial Intelligence, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-8864-1732","authenticated-orcid":false,"given":"Jianzhou","family":"Wang","sequence":"additional","affiliation":[{"name":"Moonshot AI, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-2677-4416","authenticated-orcid":false,"given":"Zhenxing","family":"Hu","sequence":"additional","affiliation":[{"name":"Moonshot AI, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6633-0796","authenticated-orcid":false,"given":"Xiuying","family":"Chen","sequence":"additional","affiliation":[{"name":"Computer Science, Mohamed bin Zayed University of Artificial Intelligence, Abu Dhabi, United Arab Emirates"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3356-6823","authenticated-orcid":false,"given":"Rui","family":"Yan","sequence":"additional","affiliation":[{"name":"Renmin University of China, Gaoling School of Artificial Intelligence, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2025,7,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/2634074.2634144"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3336191.3371834"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3539618.3591630"},{"key":"e_1_3_2_1_4_1","unstructured":"Covington &#38; Burling LLP. 2019. Measures for Data Security Management . Technical Report Draft for Comments. Covington &#38; Burling LLP Washington D.C. https:\/\/www.insideprivacy.com\/wp-content\/uploads\/sites\/51\/2019\/05\/Measures-for-Data-Security-Management_Bilingual-1.pdf"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.physd.2016.01.002"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403251"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2882929"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33016399"},{"key":"e_1_3_2_1_9_1","first-page":"47","volume-title":"Proceedings of the 20th international conference companion on World wide web. Association for Computing Machinery","author":"Goyal Amit","year":"2011","unstructured":"Amit Goyal, Wei Lu, and Laks VS Lakshmanan. 2011. Celf optimizing the greedy algorithm for influence maximization in social networks. In Proceedings of the 20th international conference companion on World wide web. Association for Computing Machinery, New York, NY, USA, 47-48."},{"key":"e_1_3_2_1_10_1","volume-title":"The Contemporary Monologue: Men","author":"Guare John","unstructured":"John Guare. 2016. Six degrees of separation. In The Contemporary Monologue: Men. Routledge, Abingdon, Oxfordshire, United Kingdom, 89-93."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956769"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772751"},{"key":"e_1_3_2_1_13_1","volume-title":"Looking for the perfect tweet. The use of data mining techniques to find influencers on twitter. Computers in human behavior","author":"Lahuerta-Otero Eva","year":"2016","unstructured":"Eva Lahuerta-Otero and Rebeca Cordero-Guti\u00e9rrez. 2016. Looking for the perfect tweet. The use of data mining techniques to find influencers on twitter. Computers in human behavior, Vol. 64 (2016), 575-583."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/E14-1043"},{"key":"e_1_3_2_1_15_1","first-page":"89","article-title":"How to choose the right influencer for a marketing strategy","volume":"8","author":"Lenger Asli Diyadin","year":"2022","unstructured":"Asli Diyadin Lenger. 2022. How to choose the right influencer for a marketing strategy. Applied Marketing Analytics, Vol. 8, 1 (2022), 89-104.","journal-title":"Applied Marketing Analytics"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217301"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281239"},{"key":"e_1_3_2_1_18_1","volume-title":"Learning to discover social circles in ego networks. Advances in neural information processing systems","author":"Leskovec Jure","year":"2012","unstructured":"Jure Leskovec and Julian Mcauley. 2012. Learning to discover social circles in ego networks. Advances in neural information processing systems, Vol. 25 (2012), 1-9."},{"key":"e_1_3_2_1_19_1","volume-title":"SNAP: A general purpose network analysis and graph mining library in C.","author":"Leskovec Jure","year":"2014","unstructured":"Jure Leskovec and Rok Sosic. 2014. SNAP: A general purpose network analysis and graph mining library in C."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2898361"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.752"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2017EDP7364"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.14778\/2794367.2794376"},{"key":"e_1_3_2_1_24_1","volume-title":"From skepticism to acceptance: Simulating the attitude dynamics toward fake news. arXiv preprint arXiv:2403.09498","author":"Liu Yuhan","year":"2024","unstructured":"Yuhan Liu, Xiuying Chen, Xiaoqing Zhang, Xing Gao, Ji Zhang, and Rui Yan. 2024a. From skepticism to acceptance: Simulating the attitude dynamics toward fake news. arXiv preprint arXiv:2403.09498 (2024)."},{"key":"e_1_3_2_1_25_1","volume-title":"From a tiny slip to a giant leap: An llm-based simulation for fake news evolution. arXiv preprint arXiv:2410.19064","author":"Liu Yuhan","year":"2024","unstructured":"Yuhan Liu, Zirui Song, Xiaoqing Zhang, Xiuying Chen, and Rui Yan. 2024b. From a tiny slip to a giant leap: An llm-based simulation for fake news evolution. arXiv preprint arXiv:2410.19064 (2024)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2020.3899"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220077"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.114400"},{"key":"e_1_3_2_1_29_1","volume-title":"Mmac-copilot: Multi-modal agent collaboration operating system copilot. arXiv e-prints","author":"Song Zirui","year":"2024","unstructured":"Zirui Song, Yaohang Li, Meng Fang, Zhenhao Chen, Zecheng Shi, and Yuan Huang. 2024. Mmac-copilot: Multi-modal agent collaboration operating system copilot. arXiv e-prints (2024), arXiv-2404."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2723734"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2593670"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2019.2903272"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2350190.2350203"},{"key":"e_1_3_2_1_34_1","volume-title":"Weaving Context Across Images: Improving Vision-Language Models through Focus-Centric Visual Chains. arXiv preprint arXiv:2504.20199","author":"Zhang Juntian","year":"2025","unstructured":"Juntian Zhang, Chuanqi Cheng, Yuhan Liu, Wei Liu, Jian Luan, and Rui Yan. 2025. Weaving Context Across Images: Improving Vision-Language Models through Focus-Centric Visual Chains. arXiv preprint arXiv:2504.20199 (2025)."},{"key":"e_1_3_2_1_35_1","volume-title":"Who influenced you? predicting retweet via social influence locality. ACM Transactions on Knowledge Discovery from Data (TKDD)","author":"Zhang Jing","year":"2015","unstructured":"Jing Zhang, Jie Tang, Juanzi Li, Yang Liu, and Chunxiao Xing. 2015. Who influenced you? predicting retweet via social influence locality. ACM Transactions on Knowledge Discovery from Data (TKDD), Vol. 9, 3 (2015), 1-26."},{"key":"e_1_3_2_1_36_1","volume-title":"A large-scale time-aware agents simulation for influencer selection in digital advertising campaigns. arXiv preprint arXiv:2411.01143","author":"Zhang Xiaoqing","year":"2024","unstructured":"Xiaoqing Zhang, Xiuying Chen, Yuhan Liu, Jianzhou Wang, Zhenxing Hu, and Rui Yan. 2024. A large-scale time-aware agents simulation for influencer selection in digital advertising campaigns. arXiv preprint arXiv:2411.01143 (2024)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i11.21694"},{"key":"e_1_3_2_1_38_1","volume-title":"Identifying the influential nodes via eigen-centrality from the differences and similarities of structure. Physica A: Statistical Mechanics and its Applications","author":"Zhong Lin-Feng","year":"2018","unstructured":"Lin-Feng Zhong, Ming-Sheng Shang, Xiao-Long Chen, and Shi-Ming Cai. 2018. Identifying the influential nodes via eigen-centrality from the differences and similarities of structure. Physica A: Statistical Mechanics and its Applications, Vol. 510 (2018), 77-82. endthebibl"}],"event":{"name":"SIGIR '25: The 48th International ACM SIGIR Conference on Research and Development in Information Retrieval","location":"Padua Italy","acronym":"SIGIR '25","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 48th International ACM SIGIR Conference on Research and Development in Information Retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3726302.3730334","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T12:08:34Z","timestamp":1755864514000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3726302.3730334"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,13]]},"references-count":38,"alternative-id":["10.1145\/3726302.3730334","10.1145\/3726302"],"URL":"https:\/\/doi.org\/10.1145\/3726302.3730334","relation":{},"subject":[],"published":{"date-parts":[[2025,7,13]]},"assertion":[{"value":"2025-07-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}