{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T06:43:23Z","timestamp":1777704203889,"version":"3.51.4"},"reference-count":32,"publisher":"SAGE Publications","issue":"3","license":[{"start":{"date-parts":[[2020,5,30]],"date-time":"2020-05-30T00:00:00Z","timestamp":1590796800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2020,10,7]]},"abstract":"<jats:p>Influence maximization is a fundamental problem, which is aimed to specify a small number of individuals as seed set to influence the largest number of individuals under a certain influence cascade model. Most existing works on influence maximization may have either high effectiveness or good efficiency,which can not balance both the effectiveness and efficiency. One of the reason is that they do not consider the effect of influence overlap on the effectiveness. That is, these works ignore the phenomenon that the same set of nodes may be influenced by a subset of different influential nodes. To tackle the effectiveness of heuristic algorithm, we propose a three-phase-based heuristic algorithm, called Three-Phase-based Heuristic (TPH), which uses K-shell method to find influential nodes firstly. Moreover, we utilize weighed degree to make up for the coarse-grained of K-shell method. At last, we take advantage of similarity index to reduce the effect of influence overlap by covering the similar neighbor nodes with low influence. Furthermore, exhaustive experiments indicate that the proposed algorithm outperforms the other baseline algorithms in the aspects of influence spread and running time.<\/jats:p>","DOI":"10.3233\/jifs-200383","type":"journal-article","created":{"date-parts":[[2020,6,2]],"date-time":"2020-06-02T13:16:58Z","timestamp":1591103818000},"page":"4393-4403","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":4,"title":["TPH: A Three-Phase-based Heuristic algorithm for influence maximization in social networks"],"prefix":"10.1177","volume":"39","author":[{"given":"Wei","family":"Jia","sequence":"first","affiliation":[{"name":"College of Computer Science &amp; Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China"}]},{"given":"Li","family":"Yan","sequence":"additional","affiliation":[{"name":"College of Computer Science &amp; Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China"}]},{"given":"Zongmin","family":"Ma","sequence":"additional","affiliation":[{"name":"College of Computer Science &amp; Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China"}]},{"given":"Weinan","family":"Niu","sequence":"additional","affiliation":[{"name":"College of Computer Science &amp; Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China"}]}],"member":"179","published-online":{"date-parts":[[2020,5,30]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"crossref","unstructured":"LiuY. LumingZ. et al. Fortune Teller: Predicting Your Career Path AAAI (2016).","DOI":"10.1609\/aaai.v30i1.9969"},{"key":"e_1_3_1_3_2","doi-asserted-by":"crossref","unstructured":"LiuY. NieL. LiuL. et al. From action to activity: Sensor-based activity recognition Neurocomputing (2015) 108\u2013115.","DOI":"10.1016\/j.neucom.2015.08.096"},{"key":"e_1_3_1_4_2","doi-asserted-by":"crossref","unstructured":"Preot\u0306iuc-PietroD. LiuY. HopkinsD. et al. Beyond Binary Labels: Political Ideology Prediction of Twitter Users Meeting of the Association for Computational Linguistics (2017).","DOI":"10.18653\/v1\/P17-1068"},{"key":"e_1_3_1_5_2","doi-asserted-by":"crossref","unstructured":"DomingosP. and RichardsonM. Mining the network value of customers in Proc. KDD (2001).","DOI":"10.1145\/502512.502525"},{"key":"e_1_3_1_6_2","doi-asserted-by":"crossref","unstructured":"RichardsonM. and DomingosP. Mining knowledge-sharing sites for viral marketing in Proc. KDD New York NY USA (2002).","DOI":"10.1145\/775056.775057"},{"key":"e_1_3_1_7_2","doi-asserted-by":"crossref","unstructured":"KempleD. KleinbergJ.M. and Tardos\u00c9. Maximizing the spread of influence through a social network Proceedings of the 9th ACM SIGKDD conference on knowledge discovery and data mining New York NY USA (2003).","DOI":"10.1145\/956750.956769"},{"key":"e_1_3_1_8_2","unstructured":"LeskovecJ. et al. Cost-effective outbreak detection in networks in Proc. KDD New York NY USA (2007)."},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-012-0262-1"},{"key":"e_1_3_1_10_2","unstructured":"CaoJ.X. DongD. XuS. et al. Ak-core based algorithm for influence maximization in social networks Chinese Journal of Computers (2015) 1\u20137."},{"key":"e_1_3_1_11_2","doi-asserted-by":"crossref","unstructured":"ChenW. WangY. and YangS. Efficient influence maximization in social networks ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM (2009) 199\u2013208.","DOI":"10.1145\/1557019.1557047"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2016.05.048"},{"key":"e_1_3_1_13_2","doi-asserted-by":"crossref","unstructured":"LiuQ. XiangB. ChenE. et al. Influence Maximization over Large-Scale Social Networks: A Bounded Linear Approach in Proc. KDD Shang Hai China (2014).","DOI":"10.1145\/2661829.2662009"},{"key":"e_1_3_1_14_2","doi-asserted-by":"crossref","unstructured":"JungK. HeoW. and ChenW. IRIE: Scalable and Robust Influence Maximization in Social Networks Proceedings of the 2014 IEEE International Conference on Data Mining. IEEE Washington DC USA (2013).","DOI":"10.1109\/ICDM.2012.79"},{"key":"e_1_3_1_15_2","doi-asserted-by":"crossref","unstructured":"WangX. ZhangY. ZhangW. et al. Bring Order into the Samples: A Novel Scalable Method for Influence Maximization (Extended Abstract) IEEE Transactions on Knowledge & Data Engineering (2017) 243-256.","DOI":"10.1109\/TKDE.2016.2624734"},{"key":"e_1_3_1_16_2","unstructured":"LiY. FanJ. WangY. et al. Influence Maximization on Social Graphs: A Survey IEEE Transactions on Knowledge and Data Engineering (2018) 1-1."},{"key":"e_1_3_1_17_2","doi-asserted-by":"crossref","unstructured":"ChengS. ShenH. HuangJ. et al. IMRank: influence maximization via finding self-consistent ranking Proceedings of the 37th International ACM SIGIR Conference on Research and Development in Information Retrieval Gold Coast Australia ACM (2014) 475\u2013484.","DOI":"10.1145\/2600428.2609592"},{"key":"e_1_3_1_18_2","volume-title":"A K-shell Decomposition Based Algorithm for Influence Maximization","author":"Zhao Q.","year":"2015","unstructured":"ZhaoQ., LuH., GanZ., et al., A K-shell Decomposition Based Algorithm for Influence Maximization, International Conference on Engineering the Web in the Big Data Era. Springer-Verlag New York, Inc. (2015)."},{"key":"e_1_3_1_19_2","doi-asserted-by":"crossref","unstructured":"PeiS. and MakseH.A. Spreading dynamics in complex networks Stat Mech Theory (2013).","DOI":"10.1088\/1742-5468\/2013\/12\/P12002"},{"key":"e_1_3_1_20_2","doi-asserted-by":"crossref","unstructured":"LiL. LiK. and XiangC. A Hierarchy Based Influence Maximization Algorithm in Social Networks Proceedings of the 27th International Conference on Artificial Neural Networks (2018).","DOI":"10.1007\/978-3-030-01421-6_42"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2943412"},{"key":"e_1_3_1_22_2","doi-asserted-by":"crossref","unstructured":"ShangJ. ZhouS. LiX. et al. CoFIM: A community-based framework for influence maximization on large-scale networks Knowledge-Based Systems (2016) 88\u2013100.","DOI":"10.1016\/j.knosys.2016.09.029"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2019.05278"},{"key":"e_1_3_1_24_2","doi-asserted-by":"crossref","unstructured":"TianJ.T. WangY.T. and FengX.J. A New Hybrid Algorithm for Influence Maximization in Social Networks Chinese Journal of Computers (2011) 1956\u20131965.","DOI":"10.3724\/SP.J.1016.2011.01956"},{"key":"e_1_3_1_25_2","doi-asserted-by":"crossref","unstructured":"TangJ. TangX. and YuanJ. An efficient and effective hop-based approach for influence maximization in social networks Social Network Analysis & Mining (2018) 1\u201319.","DOI":"10.1007\/s13278-018-0489-y"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10791-018-9335-0"},{"key":"e_1_3_1_27_2","doi-asserted-by":"crossref","unstructured":"GallagherB. TongH. Eliassi-RadT. et al. Using Ghost Edges for Classification in Sparsely Labeled Networks Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining Las Vegas Nevada USA August (2008) 24\u201327.","DOI":"10.1145\/1401890.1401925"},{"key":"e_1_3_1_28_2","unstructured":"HolmeP. HussM. and Soc.J.R. Interface 2 (2005)."},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1038\/nphys1746"},{"issue":"13172","key":"e_1_3_1_30_2","article-title":"Improving the accuracy of the k-shell method by removing redundant links: From a perspective of spreading dynamics","volume":"5","author":"Liu Y.","year":"2015","unstructured":"LiuY., TangM., ZhouT., et al., Improving the accuracy of the k-shell method by removing redundant links: From a perspective of spreading dynamics, Scientific Reports 5(13172) (2015).","journal-title":"Scientific Reports"},{"key":"e_1_3_1_31_2","doi-asserted-by":"crossref","unstructured":"ChenD. LuL. ShangM.-S. ZhangY.-C. and ZhouT. Identifying influential nodes in complex networks Physica A (2012) 1777\u20131787.","DOI":"10.1016\/j.physa.2011.09.017"},{"key":"e_1_3_1_32_2","doi-asserted-by":"crossref","unstructured":"GaoS. MaJ. ChenZ. WangG. and XingC. Ranking the spreading capability of nodes in complex networks based on local structure Physica A (2014) 130\u2013147.","DOI":"10.1016\/j.physa.2014.02.032"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","unstructured":"ZhaQ. DongY. ZhangH. ChiclanaF. and Herrera-ViedmaE. A Personalized Feedback Mechanism Based on Bounded Confidence Learning to Support Consensus Reaching in Group Decision Making IEEE Transactions on Systems Man and Cybernetics: Systems (2019). DOI: 10.1109\/TSMC.2019.2945922","DOI":"10.1109\/TSMC.2019.2945922"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-200383","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-200383","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-200383","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:40:41Z","timestamp":1777455641000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-200383"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,30]]},"references-count":32,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,10,7]]}},"alternative-id":["10.3233\/JIFS-200383"],"URL":"https:\/\/doi.org\/10.3233\/jifs-200383","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,5,30]]}}}