{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T04:29:01Z","timestamp":1777696141603,"version":"3.51.4"},"reference-count":27,"publisher":"SAGE Publications","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IDA"],"published-print":{"date-parts":[[2022,3,14]]},"abstract":"<jats:p>This paper focuses on the influence maximization problem in social networks, which aims to find some influence nodes that maximize the spread of information. Most existing achievements usually adopt a uniform propagation probability, without considering the topic information. Moreover, the classic Independent Cascade Model and its approximations have suffered from much running time. To overcome this limitation, this paper proposed a Topic based Shortest Path Set algorithm (TSPS). Additionally, a comprehensive set of experiments are conducted on large real-world networks, showing that our proposal provides more impressive results in the aspects of influence spread and running time.<\/jats:p>","DOI":"10.3233\/ida-215790","type":"journal-article","created":{"date-parts":[[2022,3,22]],"date-time":"2022-03-22T18:20:00Z","timestamp":1647973200000},"page":"469-480","source":"Crossref","is-referenced-by-count":1,"title":["TSPS: A Topic based Shortest Path Set algorithm for influence maximization"],"prefix":"10.1177","volume":"26","author":[{"given":"Xiuliang","family":"Duan","sequence":"first","affiliation":[]},{"given":"Liqing","family":"Qiu","sequence":"additional","affiliation":[]},{"given":"Chengai","family":"Sun","sequence":"additional","affiliation":[]}],"member":"179","reference":[{"key":"10.3233\/IDA-215790_ref1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2017\/8313942","article-title":"Quality of experience assessment of video quality in social clouds","volume":"2017","author":"Laghari","year":"2017","journal-title":"Wireless Communications and Mobile Computing"},{"issue":"2","key":"10.3233\/IDA-215790_ref2","doi-asserted-by":"crossref","first-page":"125","DOI":"10.3233\/MGS-180284","article-title":"Assessment of quality of experience (QoE) of image compression in social cloud computing","volume":"14","author":"Laghari","year":"2018","journal-title":"Multiagent and Grid Systems"},{"key":"10.3233\/IDA-215790_ref3","doi-asserted-by":"crossref","unstructured":"S. Karim, H. He, G.A. Mallah, A.A. Laghari, H. Madiha and R.S.A. Larik, The Impact of Using Facebook on the Academic Performance of University Students, in: International Conference on Artificial Intelligence and Security, 2019, pp. 405\u2013418.","DOI":"10.1007\/978-3-030-24271-8_37"},{"key":"10.3233\/IDA-215790_ref4","doi-asserted-by":"crossref","first-page":"100370","DOI":"10.1016\/j.entcom.2020.100370","article-title":"The evaluation video quality in social clouds","volume":"35","author":"Karim","year":"2020","journal-title":"Entertainment Computing"},{"issue":"10","key":"10.3233\/IDA-215790_ref5","doi-asserted-by":"crossref","first-page":"1831","DOI":"10.1007\/s10994-018-05776-w","article-title":"Collaborative topic regression for predicting topic-based social influence","volume":"108","author":"Hamzehei","year":"2019","journal-title":"Machine Learning"},{"issue":"1","key":"10.3233\/IDA-215790_ref6","doi-asserted-by":"crossref","first-page":"105","DOI":"10.4086\/toc.2015.v011a004","article-title":"Maximizing the spread of influence through a social network","volume":"11","author":"Kempe","year":"2015","journal-title":"Theory of Computing"},{"issue":"2","key":"10.3233\/IDA-215790_ref7","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1145\/2532549","article-title":"CIM: Community-based influence maximization in social networks","volume":"5","author":"Chen","year":"2014","journal-title":"ACM Transactions on Intelligent Systems and Technology"},{"issue":"10","key":"10.3233\/IDA-215790_ref8","first-page":"108101","article-title":"Relative influence maximization in competitive social networks","volume":"60","author":"Yang","year":"2017","journal-title":"Science in China Series F: Information Sciences"},{"key":"10.3233\/IDA-215790_ref10","doi-asserted-by":"crossref","unstructured":"J. Weng, E.-P. Lim, J. Jiang and Q. He, TwitterRank: finding topic-sensitive influential twitterers, in: Proceedings of the Third ACM International Conference on Web Search and Data Mining, 2010, pp. 261\u2013270.","DOI":"10.1145\/1718487.1718520"},{"issue":"3","key":"10.3233\/IDA-215790_ref11","doi-asserted-by":"crossref","first-page":"555","DOI":"10.1007\/s10115-013-0646-6","article-title":"Topic-aware social influence propagation models","volume":"37","author":"Barbieri","year":"2013","journal-title":"Knowledge and Information Systems"},{"key":"10.3233\/IDA-215790_ref12","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1016\/j.future.2012.06.011","article-title":"Preference-based mining of top-K influential nodes in social networks","volume":"31","author":"Zhou","year":"2014","journal-title":"Future Generation Computer Systems"},{"issue":"3","key":"10.3233\/IDA-215790_ref13","doi-asserted-by":"crossref","first-page":"796","DOI":"10.1109\/TMM.2014.2298216","article-title":"Topic-sensitive influencer mining in interest-based social media networks via hypergraph learning","volume":"16","author":"Fang","year":"2014","journal-title":"IEEE Transactions on Multimedia"},{"key":"10.3233\/IDA-215790_ref14","doi-asserted-by":"crossref","unstructured":"D. Quercia, H. Askham and J. Crowcroft, TweetLDA: supervised topic classification and link prediction in Twitter, in: Proceedings of the 4th Annual ACM Web Science Conference on, 2012, pp. 247\u2013250.","DOI":"10.1145\/2380718.2380750"},{"key":"10.3233\/IDA-215790_ref15","doi-asserted-by":"crossref","unstructured":"H. Misra, O. Cappe and F. Yvon, Using LDA to detect semantically incoherent documents, in: CoNLL 2008: Proceedings of the Twelfth Conference on Computational Natural Language Learning, 2008, pp. 41\u201348.","DOI":"10.3115\/1596324.1596332"},{"key":"10.3233\/IDA-215790_ref16","unstructured":"M. Hoffman, F.R. Bach and D.M. Blei, Online Learning for Latent Dirichlet Allocation, in: Advances in Neural Information Processing Systems 23, 2010, pp. 856\u2013864."},{"issue":"1","key":"10.3233\/IDA-215790_ref17","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1016\/j.trit.2016.03.011","article-title":"An efficient shortest path approach for social networks based on community structure","volume":"1","author":"Gong","year":"2016","journal-title":"CAAI Transactions on Intelligence Technology"},{"key":"10.3233\/IDA-215790_ref18","doi-asserted-by":"crossref","unstructured":"H. Liu, C. Jin, B. Yang and A. Zhou, Finding Top-k Shortest Paths with Diversity, in: 2018 IEEE 34th International Conference on Data Engineering (ICDE), 2018, pp. 1761\u20131762.","DOI":"10.1109\/ICDE.2018.00238"},{"key":"10.3233\/IDA-215790_ref19","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1016\/j.physa.2015.10.020","article-title":"Influence maximization in social networks under an independent cascade-based model","volume":"444","author":"Wang","year":"2016","journal-title":"Physica A-statistical Mechanics and Its Applications"},{"key":"10.3233\/IDA-215790_ref20","doi-asserted-by":"crossref","unstructured":"X. Yu, X. Wei and X. Lin, Algorithms of BBS opinion leader mining based on sentiment analysis, in: WISM\u201910 Proceedings of the 2010 International Conference on Web Information Systems and Mining, 2010, pp. 360\u2013369.","DOI":"10.1007\/978-3-642-16515-3_45"},{"issue":"22","key":"10.3233\/IDA-215790_ref21","doi-asserted-by":"crossref","first-page":"5779","DOI":"10.1016\/j.physa.2012.06.047","article-title":"PageRank model of opinion formation on social networks","volume":"391","author":"Kandiah","year":"2012","journal-title":"Physica A-statistical Mechanics and Its Applications"},{"issue":"2","key":"10.3233\/IDA-215790_ref22","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1109\/TKDE.2014.2330833","article-title":"A query approach for influence maximization on specific users in social networks","volume":"27","author":"Lee","year":"2015","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"10.3233\/IDA-215790_ref23","doi-asserted-by":"crossref","unstructured":"W. Chen, Y. Wang and S. Yang, Efficient influence maximization in social networks, in: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2009, pp. 199\u2013208.","DOI":"10.1145\/1557019.1557047"},{"issue":"5","key":"10.3233\/IDA-215790_ref24","first-page":"646","article-title":"Research on topic-based local influence maximization algorithm in social network","volume":"10","author":"Shengnan","year":"2016","journal-title":"Journal of Frontiers of Computer ence and Technology"},{"key":"10.3233\/IDA-215790_ref25","doi-asserted-by":"crossref","unstructured":"H. Kwak, C. Lee, H. Park and S. Moon, What is Twitter, a social network or a news media, in: Proceedings of the 19th International Conference on World Wide Web, 2010, pp. 591\u2013600.","DOI":"10.1145\/1772690.1772751"},{"key":"10.3233\/IDA-215790_ref26","doi-asserted-by":"crossref","unstructured":"J. Yang and J. Leskovec, Patterns of temporal variation in online media, in: Proceedings of the Fourth ACM International Conference on Web Search and Data Mining, 2011, pp. 177\u2013186.","DOI":"10.1145\/1935826.1935863"},{"issue":"3","key":"10.3233\/IDA-215790_ref27","doi-asserted-by":"crossref","first-page":"545","DOI":"10.1007\/s10618-012-0262-1","article-title":"Scalable influence maximization for independent cascade model in large-scale social networks","volume":"25","author":"Wang","year":"2012","journal-title":"Data Mining and Knowledge Discovery"},{"key":"10.3233\/IDA-215790_ref28","doi-asserted-by":"crossref","unstructured":"J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. VanBriesen and N. Glance, Cost-effective outbreak detection in networks, in: Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2007, pp. 420\u2013429.","DOI":"10.1145\/1281192.1281239"}],"container-title":["Intelligent Data Analysis"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/IDA-215790","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:19:22Z","timestamp":1777454362000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/IDA-215790"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,14]]},"references-count":27,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.3233\/ida-215790","relation":{},"ISSN":["1088-467X","1571-4128"],"issn-type":[{"value":"1088-467X","type":"print"},{"value":"1571-4128","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,14]]}}}