{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T19:36:39Z","timestamp":1770233799402,"version":"3.49.0"},"update-to":[{"DOI":"10.1371\/journal.pcbi.1007897","type":"new_version","label":"New version","source":"publisher","updated":{"date-parts":[[2020,7,28]],"date-time":"2020-07-28T00:00:00Z","timestamp":1595894400000}}],"reference-count":83,"publisher":"Public Library of Science (PLoS)","issue":"7","license":[{"start":{"date-parts":[[2020,7,9]],"date-time":"2020-07-09T00:00:00Z","timestamp":1594252800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["www.ploscompbiol.org"],"crossmark-restriction":false},"short-container-title":["PLoS Comput Biol"],"DOI":"10.1371\/journal.pcbi.1007897","type":"journal-article","created":{"date-parts":[[2020,7,9]],"date-time":"2020-07-09T17:53:02Z","timestamp":1594317182000},"page":"e1007897","update-policy":"https:\/\/doi.org\/10.1371\/journal.pcbi.corrections_policy","source":"Crossref","is-referenced-by-count":23,"title":["Immunization strategies in networks with missing data"],"prefix":"10.1371","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9249-6423","authenticated-orcid":true,"given":"Samuel F.","family":"Rosenblatt","sequence":"first","affiliation":[]},{"given":"Jeffrey A.","family":"Smith","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7472-2597","authenticated-orcid":true,"given":"G. Robin","family":"Gauthier","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0008-3673","authenticated-orcid":true,"given":"Laurent","family":"H\u00e9bert-Dufresne","sequence":"additional","affiliation":[]}],"member":"340","published-online":{"date-parts":[[2020,7,9]]},"reference":[{"key":"pcbi.1007897.ref001","article-title":"Assessing the international spreading risk associated with the 2014 West African Ebola outbreak","volume":"6","author":"MF Gomes","year":"2014","journal-title":"PLoS Currents"},{"key":"pcbi.1007897.ref002","volume-title":"Network science","author":"AL Barab\u00e1si","year":"2016"},{"issue":"1","key":"pcbi.1007897.ref003","doi-asserted-by":"crossref","first-page":"4787","DOI":"10.1038\/s41467-018-06930-7","article-title":"The spread of low-credibility content by social bots","volume":"9","author":"C Shao","year":"2018","journal-title":"Nature Communications"},{"issue":"3","key":"pcbi.1007897.ref004","doi-asserted-by":"crossref","first-page":"16","DOI":"10.17730\/humo.7.3.f4033344851gl053","article-title":"A mathematical model for group structures","volume":"7","author":"A Bavelas","year":"1948","journal-title":"Human Organization"},{"issue":"1","key":"pcbi.1007897.ref005","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1177\/0049124193022001005","article-title":"Epidemiology and social networks: Modeling structured diffusion","volume":"22","author":"M Morris","year":"1993","journal-title":"Sociological Methods & Research"},{"issue":"5","key":"pcbi.1007897.ref006","doi-asserted-by":"crossref","first-page":"5678","DOI":"10.1103\/PhysRevE.61.5678","article-title":"Epidemics and percolation in small-world networks","volume":"61","author":"C Moore","year":"2000","journal-title":"Physical Review E"},{"issue":"3","key":"pcbi.1007897.ref007","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1287\/mnsc.21.3.362","article-title":"Finding the n most vital nodes in a flow network","volume":"21","author":"H Corley","year":"1974","journal-title":"Management Science"},{"issue":"1","key":"pcbi.1007897.ref008","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1016\/0025-5564(82)90053-0","article-title":"Gonorrhea modeling: a comparison of control methods","volume":"58","author":"HW Hethcote","year":"1982","journal-title":"Mathematical Biosciences"},{"issue":"11","key":"pcbi.1007897.ref009","doi-asserted-by":"crossref","first-page":"1203","DOI":"10.1016\/0277-9536(85)90269-2","article-title":"Social networks and the spread of infectious diseases: the AIDS example","volume":"21","author":"AS Klovdahl","year":"1985","journal-title":"Social Science & Medicine"},{"issue":"6794","key":"pcbi.1007897.ref010","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1038\/35019019","article-title":"Error and attack tolerance of complex networks","volume":"406","author":"R Albert","year":"2000","journal-title":"Nature"},{"issue":"3","key":"pcbi.1007897.ref011","doi-asserted-by":"crossref","first-page":"036104","DOI":"10.1103\/PhysRevE.65.036104","article-title":"Immunization of complex networks","volume":"65","author":"R Pastor-Satorras","year":"2002","journal-title":"Physical Review E"},{"key":"pcbi.1007897.ref012","doi-asserted-by":"crossref","first-page":"2171","DOI":"10.1038\/srep02171","article-title":"Global efficiency of local immunization on complex networks","volume":"3","author":"L H\u00e9bert-Dufresne","year":"2013","journal-title":"Scientific Reports"},{"issue":"1","key":"pcbi.1007897.ref013","doi-asserted-by":"crossref","first-page":"3268","DOI":"10.1038\/s41598-017-03379-4","article-title":"An immunization strategy for hidden populations","volume":"7","author":"S Chen","year":"2017","journal-title":"Scientific Reports"},{"issue":"4","key":"pcbi.1007897.ref014","doi-asserted-by":"crossref","first-page":"e1000736","DOI":"10.1371\/journal.pcbi.1000736","article-title":"Dynamics and control of diseases in networks with community structure","volume":"6","author":"M Salath\u00e9","year":"2010","journal-title":"PLoS Computational Biology"},{"issue":"4","key":"pcbi.1007897.ref015","doi-asserted-by":"crossref","first-page":"46002","DOI":"10.1209\/0295-5075\/98\/46002","article-title":"Inverse targeting\u2014An effective immunization strategy","volume":"98","author":"CM Schneider","year":"2012","journal-title":"EPL (Europhysics Letters)"},{"issue":"12","key":"pcbi.1007897.ref016","doi-asserted-by":"crossref","first-page":"123018","DOI":"10.1088\/1367-2630\/11\/12\/123018","article-title":"Immunization of networks with community structure","volume":"11","author":"N Masuda","year":"2009","journal-title":"New Journal of Physics"},{"issue":"6","key":"pcbi.1007897.ref017","doi-asserted-by":"crossref","first-page":"061911","DOI":"10.1103\/PhysRevE.84.061911","article-title":"Suppressing epidemics with a limited amount of immunization units","volume":"84","author":"CM Schneider","year":"2011","journal-title":"Physical Review E"},{"issue":"24","key":"pcbi.1007897.ref018","doi-asserted-by":"crossref","first-page":"247901","DOI":"10.1103\/PhysRevLett.91.247901","article-title":"Efficient immunization strategies for computer networks and populations","volume":"91","author":"R Cohen","year":"2003","journal-title":"Physical Review Letters"},{"issue":"12","key":"pcbi.1007897.ref019","doi-asserted-by":"crossref","first-page":"2782","DOI":"10.1088\/1009-1963\/15\/12\/003","article-title":"Immunization for scale-free networks by random walker","volume":"15","author":"H Ke","year":"2006","journal-title":"Chinese Physics"},{"issue":"12","key":"pcbi.1007897.ref020","doi-asserted-by":"crossref","first-page":"e83489","DOI":"10.1371\/journal.pone.0083489","article-title":"An efficient immunization strategy for community networks","volume":"8","author":"K Gong","year":"2013","journal-title":"PloS One"},{"key":"pcbi.1007897.ref021","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1016\/j.epidem.2019.03.002","article-title":"Efficient vaccination strategies for epidemic control using network information","volume":"27","author":"Y Yang","year":"2019","journal-title":"Epidemics"},{"issue":"3","key":"pcbi.1007897.ref022","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1086\/650449","article-title":"Influenza vaccination among healthcare workers: ten-year experience of a large healthcare organization","volume":"31","author":"MC Ajenjo","year":"2010","journal-title":"Infection Control & Hospital Epidemiology"},{"issue":"10","key":"pcbi.1007897.ref023","doi-asserted-by":"crossref","first-page":"e387","DOI":"10.1371\/journal.pmed.0030387","article-title":"A comparative analysis of influenza vaccination programs","volume":"3","author":"S Bansal","year":"2006","journal-title":"PLoS Medicine"},{"issue":"9","key":"pcbi.1007897.ref024","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pmed.1002890","article-title":"Social network interventions for health behaviours and outcomes: A systematic review and meta-analysis","volume":"16","author":"RF Hunter","year":"2019","journal-title":"PLoS Medicine"},{"key":"pcbi.1007897.ref025","unstructured":"An W. Peer effects on adolescent smoking and social network-based interventions. Dissertation, Department of Sociology, Harvard University; 2011."},{"key":"pcbi.1007897.ref026","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1016\/j.socscimed.2013.12.034","article-title":"A new HIV prevention network approach: sociometric peer change agent selection","volume":"125","author":"JA Schneider","year":"2015","journal-title":"Social Science & Medicine"},{"issue":"3","key":"pcbi.1007897.ref027","doi-asserted-by":"crossref","first-page":"406","DOI":"10.2105\/AJPH.91.3.406","article-title":"Selective risk taking among needle exchange participants: implications for supplemental interventions","volume":"91","author":"TW Valente","year":"2001","journal-title":"American Journal of Public Health"},{"issue":"6447","key":"pcbi.1007897.ref028","doi-asserted-by":"crossref","DOI":"10.1126\/science.364.6447.1221","article-title":"Plan to use second Ebola vaccine sparks debate","volume":"364","author":"K Kupferschmidt","year":"2019","journal-title":"Science"},{"key":"pcbi.1007897.ref029","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511780356","volume-title":"Complex networks: structure, robustness and function","author":"R Cohen","year":"2010"},{"key":"pcbi.1007897.ref030","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.physrep.2016.10.006","article-title":"Statistical physics of vaccination","volume":"664","author":"Z Wang","year":"2016","journal-title":"Physics Reports"},{"issue":"1","key":"pcbi.1007897.ref031","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1146\/annurev.so.16.080190.002251","article-title":"Network data and measurement","volume":"16","author":"PV Marsden","year":"1990","journal-title":"Annual Review of Sociology"},{"issue":"3","key":"pcbi.1007897.ref032","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1016\/j.socnet.2005.07.002","article-title":"Effects of missing data in social networks","volume":"28","author":"G Kossinets","year":"2006","journal-title":"Social Networks"},{"issue":"2","key":"pcbi.1007897.ref033","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.socnet.2005.05.001","article-title":"On the robustness of centrality measures under conditions of imperfect data","volume":"28","author":"SP Borgatti","year":"2006","journal-title":"Social Networks"},{"issue":"4","key":"pcbi.1007897.ref034","doi-asserted-by":"crossref","first-page":"652","DOI":"10.1016\/j.socnet.2013.09.003","article-title":"Structural effects of network sampling coverage I: Nodes missing at random","volume":"35","author":"JA Smith","year":"2013","journal-title":"Social Networks"},{"key":"pcbi.1007897.ref035","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/j.socnet.2017.05.002","article-title":"The next steps in the study of missing individuals in networks: a comment on Smith et al. (2017)","volume":"52","author":"MJ Silk","year":"2018","journal-title":"Social Networks"},{"key":"pcbi.1007897.ref036","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.epidem.2014.07.003","article-title":"Eight challenges for network epidemic models","volume":"10","author":"L Pellis","year":"2015","journal-title":"Epidemics"},{"issue":"4","key":"pcbi.1007897.ref037","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1016\/S0378-8733(03)00012-1","article-title":"The stability of centrality measures when networks are sampled","volume":"25","author":"E Costenbader","year":"2003","journal-title":"Social Networks"},{"issue":"4","key":"pcbi.1007897.ref038","doi-asserted-by":"crossref","first-page":"466","DOI":"10.1016\/j.socnet.2005.11.005","article-title":"A graph-theoretic perspective on centrality","volume":"28","author":"SP Borgatti","year":"2006","journal-title":"Social Networks"},{"key":"pcbi.1007897.ref039","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/j.jtbi.2013.01.006","article-title":"The importance of contact network topology for the success of vaccination strategies","volume":"325","author":"J Ma","year":"2013","journal-title":"Journal of Theoretical Biology"},{"issue":"2","key":"pcbi.1007897.ref040","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1140\/epjb\/e2004-00119-8","article-title":"Immunization and epidemic dynamics in complex networks","volume":"38","author":"N Madar","year":"2004","journal-title":"The European Physical Journal B"},{"issue":"2","key":"pcbi.1007897.ref041","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1137\/S003614450342480","article-title":"The structure and function of complex networks","volume":"45","author":"ME Newman","year":"2003","journal-title":"SIAM Review"},{"issue":"1","key":"pcbi.1007897.ref042","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1111\/j.1468-2958.1977.tb00591.x","article-title":"Informant accuracy in social network data II","volume":"4","author":"PD Killworth","year":"1977","journal-title":"Human Communication Research"},{"issue":"2","key":"pcbi.1007897.ref043","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1016\/j.socnet.2006.12.004","article-title":"Partner naming and forgetting: recall of network members","volume":"29","author":"DC Bell","year":"2007","journal-title":"Social Networks"},{"issue":"2","key":"pcbi.1007897.ref044","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1016\/S0378-8733(02)00038-2","article-title":"Network inference, error, and informant (in) accuracy: a Bayesian approach","volume":"25","author":"CT Butts","year":"2003","journal-title":"Social Networks"},{"issue":"1","key":"pcbi.1007897.ref045","doi-asserted-by":"crossref","first-page":"28","DOI":"10.17730\/humo.60.1.efx5t9gjtgmga73y","article-title":"Comparing two methods for estimating network size","volume":"60","author":"C McCarty","year":"2001","journal-title":"Human Organization"},{"key":"pcbi.1007897.ref046","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1016\/j.socscimed.2014.04.022","article-title":"Challenges to recruiting population representative samples of female sex workers in China using Respondent Driven Sampling","volume":"125","author":"MG Merli","year":"2015","journal-title":"Social Science & Medicine"},{"issue":"2","key":"pcbi.1007897.ref047","doi-asserted-by":"crossref","first-page":"174","DOI":"10.2307\/3096941","article-title":"Respondent-driven sampling: a new approach to the study of hidden populations","volume":"44","author":"DD Heckathorn","year":"1997","journal-title":"Social Problems"},{"issue":"18","key":"pcbi.1007897.ref048","doi-asserted-by":"crossref","first-page":"2079","DOI":"10.1002\/(SICI)1097-0258(19980930)17:18<2079::AID-SIM902>3.0.CO;2-H","article-title":"Sampling biases and missing data in explorations of sexual partner networks for the spread of sexually transmitted diseases","volume":"17","author":"A Ghani","year":"1998","journal-title":"Statistics in Medicine"},{"issue":"7","key":"pcbi.1007897.ref049","doi-asserted-by":"crossref","first-page":"1003","DOI":"10.1111\/j.1360-0443.2006.01431.x","article-title":"The dynamics of injection drug users\u2019 personal networks and HIV risk behaviors","volume":"101","author":"EC Costenbader","year":"2006","journal-title":"Addiction"},{"issue":"1","key":"pcbi.1007897.ref050","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1177\/0081175012461248","article-title":"Network sampling with memory: a proposal for more efficient sampling from social networks","volume":"42","author":"T Mouw","year":"2012","journal-title":"Sociological Methodology"},{"key":"pcbi.1007897.ref051","doi-asserted-by":"crossref","first-page":"394","DOI":"10.1038\/ncomms1396","article-title":"Ranking stability and super-stable nodes in complex networks","volume":"2","author":"G Ghoshal","year":"2011","journal-title":"Nature Communications"},{"issue":"2","key":"pcbi.1007897.ref052","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1017\/nws.2019.12","article-title":"Influence of measurement errors on networks: Estimating the robustness of centrality measures","volume":"7","author":"C Martin","year":"2019","journal-title":"Network Science"},{"issue":"6","key":"pcbi.1007897.ref053","doi-asserted-by":"crossref","first-page":"068902","DOI":"10.1088\/0256-307X\/28\/6\/068902","article-title":"Optimal attack strategy in random scale-free networks based on incomplete information","volume":"28","author":"L Jun","year":"2011","journal-title":"Chinese Physics Letters"},{"issue":"4","key":"pcbi.1007897.ref054","doi-asserted-by":"crossref","first-page":"821","DOI":"10.1109\/TSMC.2017.2733545","article-title":"Subgraph robustness of complex networks under attacks","volume":"49","author":"Y Shang","year":"2017","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics: Systems"},{"issue":"5","key":"pcbi.1007897.ref055","doi-asserted-by":"crossref","first-page":"58007","DOI":"10.1209\/0295-5075\/123\/58007","article-title":"Influence maximization in noisy networks","volume":"123","author":"\u015e Erkol","year":"2018","journal-title":"EPL (Europhysics Letters)"},{"issue":"11","key":"pcbi.1007897.ref056","doi-asserted-by":"crossref","first-page":"888","DOI":"10.1038\/nphys1746","article-title":"Identification of influential spreaders in complex networks","volume":"6","author":"M Kitsak","year":"2010","journal-title":"Nature Physics"},{"issue":"6","key":"pcbi.1007897.ref057","doi-asserted-by":"crossref","first-page":"062305","DOI":"10.1103\/PhysRevE.96.062305","article-title":"Three faces of node importance in network epidemiology: Exact results for small graphs","volume":"96","author":"P Holme","year":"2017","journal-title":"Physical Review E"},{"issue":"2","key":"pcbi.1007897.ref058","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1016\/j.jtbi.2006.12.027","article-title":"Network structure, and vaccination strategy and effort interact to affect the dynamics of influenza epidemics","volume":"246","author":"G Hartvigsen","year":"2007","journal-title":"Journal of Theoretical Biology"},{"issue":"1","key":"pcbi.1007897.ref059","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1016\/0277-9536(94)90302-6","article-title":"Social networks and infectious disease: The Colorado Springs study","volume":"38","author":"AS Klovdahl","year":"1994","journal-title":"Social Science & Medicine"},{"issue":"6","key":"pcbi.1007897.ref060","doi-asserted-by":"crossref","first-page":"1410","DOI":"10.1093\/infdis\/170.6.1410","article-title":"Incidence and prevalence of human immunodeficiency virus, hepatitis B virus, hepatitis C virus, and cytomegalovirus among health care personnel at risk for blood exposure: final report from a longitudinal study","volume":"170","author":"JL Gerberding","year":"1994","journal-title":"Journal of Infectious Diseases"},{"issue":"9651","key":"pcbi.1007897.ref061","doi-asserted-by":"crossref","first-page":"1733","DOI":"10.1016\/S0140-6736(08)61311-2","article-title":"Global epidemiology of injecting drug use and HIV among people who inject drugs: a systematic review","volume":"372","author":"BM Mathers","year":"2008","journal-title":"The Lancet"},{"key":"pcbi.1007897.ref062","first-page":"4","article-title":"Identifying and gaining access to hidden populations","volume":"98","author":"WW Wiebel","year":"1990","journal-title":"NIDA Res Monogr"},{"issue":"1","key":"pcbi.1007897.ref063","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1525\/sp.2002.49.1.11","article-title":"Respondent-driven sampling II: deriving valid population estimates from chain-referral samples of hidden populations","volume":"49","author":"DD Heckathorn","year":"2002","journal-title":"Social Problems"},{"key":"pcbi.1007897.ref064","author":"KM Harris","year":"2009","journal-title":"The national longitudinal study of adolescent to adult health: Research design [WWW document]"},{"key":"pcbi.1007897.ref065","volume-title":"The Add Health network variable codebook","author":"P Bearman","year":"1997"},{"issue":"2","key":"pcbi.1007897.ref066","doi-asserted-by":"crossref","first-page":"020901","DOI":"10.1103\/PhysRevE.80.020901","article-title":"Percolation and epidemics in random clustered networks","volume":"80","author":"JC Miller","year":"2009","journal-title":"Physical Review E"},{"key":"pcbi.1007897.ref067","article-title":"Using ego network data to inform agent-based models of diffusion","author":"JA Smith","year":"2018","journal-title":"Sociological Methods & Research"},{"key":"pcbi.1007897.ref068","author":"MS Handcock","year":"2018","journal-title":"ERGM: Fit, Simulate and Diagnose Exponential-Family Models for Networks"},{"key":"pcbi.1007897.ref069","doi-asserted-by":"crossref","first-page":"35","DOI":"10.2307\/3033543","article-title":"A set of measures of centrality based on betweenness","author":"LC Freeman","year":"1977","journal-title":"Sociometry"},{"issue":"2","key":"pcbi.1007897.ref070","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1080\/0022250X.2001.9990249","article-title":"A faster algorithm for betweenness centrality","volume":"25","author":"U Brandes","year":"2001","journal-title":"Journal of Mathematical Sociology"},{"issue":"1","key":"pcbi.1007897.ref071","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1111\/j.0081-1750.2004.00152.x","article-title":"Sampling and estimation in hidden populations using respondent-driven sampling","volume":"34","author":"MJ Salganik","year":"2004","journal-title":"Sociological Methodology"},{"issue":"1","key":"pcbi.1007897.ref072","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1111\/j.1467-9531.2009.01216.x","article-title":"An Empirical Test of Respondent-Driven Sampling: Point Estimates, Variance, Degree Measures, and Out-of-Equilibrium Data","volume":"39","author":"C Wejnert","year":"2009","journal-title":"Sociological Methodology"},{"issue":"4","key":"pcbi.1007897.ref073","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1016\/0378-8733(84)90007-8","article-title":"Network items and the general social survey","volume":"6","author":"RS Burt","year":"1984","journal-title":"Social Networks"},{"issue":"4","key":"pcbi.1007897.ref074","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1016\/S0378-8733(02)00016-3","article-title":"Egocentric and sociocentric measures of network centrality","volume":"24","author":"PV Marsden","year":"2002","journal-title":"Social Networks"},{"issue":"6","key":"pcbi.1007897.ref075","doi-asserted-by":"crossref","first-page":"1464","DOI":"10.1086\/229693","article-title":"Why your friends have more friends than you do","volume":"96","author":"SL Feld","year":"1991","journal-title":"American Journal of Sociology"},{"key":"pcbi.1007897.ref076","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.cpc.2019.02.008","article-title":"Efficient sampling of spreading processes on complex networks using a composition and rejection algorithm","volume":"240","author":"G St-Onge","year":"2019","journal-title":"Computer Physics Communications"},{"issue":"1","key":"pcbi.1007897.ref077","doi-asserted-by":"crossref","first-page":"016128","DOI":"10.1103\/PhysRevE.66.016128","article-title":"Spread of epidemic disease on networks","volume":"66","author":"ME Newman","year":"2002","journal-title":"Physical Review E"},{"key":"pcbi.1007897.ref078","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1016\/j.socnet.2016.04.005","article-title":"Network sampling coverage II: The effect of non-random missing data on network measurement","volume":"48","author":"JA Smith","year":"2017","journal-title":"Social Networks"},{"issue":"4","key":"pcbi.1007897.ref079","doi-asserted-by":"crossref","first-page":"1004","DOI":"10.1007\/s10461-016-1568-6","article-title":"The interaction of risk network structures and virus natural history in the non-spreading of HIV among people who inject drugs in the early stages of the epidemic","volume":"21","author":"K Dombrowski","year":"2017","journal-title":"AIDS and Behavior"},{"key":"pcbi.1007897.ref080","doi-asserted-by":"crossref","first-page":"22506","DOI":"10.1038\/srep22506","article-title":"Six susceptible-infected-susceptible models on scale-free networks","volume":"6","author":"S Morita","year":"2016","journal-title":"Scientific Reports"},{"key":"pcbi.1007897.ref081","first-page":"87","article-title":"The boundary specification problem in network analysis","volume":"61","author":"EO Laumann","year":"1989","journal-title":"Research Methods in Social Network Analysis"},{"issue":"12","key":"pcbi.1007897.ref082","doi-asserted-by":"crossref","first-page":"e0143406","DOI":"10.1371\/journal.pone.0143406","article-title":"Improving the network scale-up estimator: Incorporating means of sums, recursive back estimation, and sampling weights","volume":"10","author":"P Habecker","year":"2015","journal-title":"PloS one"},{"key":"pcbi.1007897.ref083","doi-asserted-by":"crossref","unstructured":"Bernstein MS, Bakshy E, Burke M, Karrer B. Quantifying the invisible audience in social networks. In: Proceedings of the SIGCHI conference on human factors in computing systems. ACM; 2013. p. 21\u201330.","DOI":"10.1145\/2470654.2470658"}],"updated-by":[{"DOI":"10.1371\/journal.pcbi.1007897","type":"new_version","label":"New version","source":"publisher","updated":{"date-parts":[[2020,7,28]],"date-time":"2020-07-28T00:00:00Z","timestamp":1595894400000}}],"container-title":["PLOS Computational Biology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dx.plos.org\/10.1371\/journal.pcbi.1007897","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,28]],"date-time":"2020-07-28T19:22:10Z","timestamp":1595964130000},"score":1,"resource":{"primary":{"URL":"https:\/\/dx.plos.org\/10.1371\/journal.pcbi.1007897"}},"subtitle":[],"editor":[{"given":"Corina E.","family":"Tarnita","sequence":"first","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2020,7,9]]},"references-count":83,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2020,7,9]]}},"URL":"https:\/\/doi.org\/10.1371\/journal.pcbi.1007897","relation":{"new_version":[{"id-type":"doi","id":"10.1371\/journal.pcbi.1007897","asserted-by":"object"}]},"ISSN":["1553-7358"],"issn-type":[{"value":"1553-7358","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7,9]]}}}