{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T00:39:08Z","timestamp":1726101548259},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030607951"},{"type":"electronic","value":"9783030607968"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-60796-8_43","type":"book-chapter","created":{"date-parts":[[2020,10,15]],"date-time":"2020-10-15T07:02:59Z","timestamp":1602745379000},"page":"498-509","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Adaptive Seed Node Mining Algorithm Based on Graph Clustering to Maximize the Influence of Social Networks"],"prefix":"10.1007","author":[{"given":"Tie Hua","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Bo","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Ling","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,5]]},"reference":[{"issue":"57","key":"43_CR1","first-page":"5","volume":"6","author":"RP Curiel","year":"2020","unstructured":"Curiel, R.P., Cresci, S., Muntean, C.I., Bishop, S.R.: Crime and its fear in social media. Palgrave Commun. 6(57), 5\u20139 (2020)","journal-title":"Palgrave Commun."},{"key":"43_CR2","doi-asserted-by":"crossref","unstructured":"Kempe, D., Kleinberg, J., Tardos, \u00c9.: Maximizing the spread of influence through a social network. In: 9th ACM SIGKDD international conference on knowledge discovery and data mining, KDD\u201903, pp. 137\u2013146 (2003)","DOI":"10.1145\/956750.956769"},{"issue":"2","key":"43_CR3","doi-asserted-by":"publisher","first-page":"99","DOI":"10.3233\/AIC-170720","volume":"30","author":"R MohamadiBaghmolaei","year":"2017","unstructured":"MohamadiBaghmolaei, R., Mozafari, N., Hamzeh, A.: Continuous states latency aware influence maximization in social networks. AI Commun. 30(2), 99\u2013116 (2017)","journal-title":"AI Commun."},{"issue":"1","key":"43_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13278-019-0586-6","volume":"9","author":"B Saxena","year":"2019","unstructured":"Saxena, B., Kumar, P.: A node activity and connectivity-based model for influence maximization in social networks. Soc. Netw. Anal. Min. 9(1), 1\u201316 (2019). \nhttps:\/\/doi.org\/10.1007\/s13278-019-0586-6","journal-title":"Soc. Netw. Anal. Min."},{"key":"43_CR5","doi-asserted-by":"crossref","unstructured":"Leskovec, J., et al.: Cost-effective outbreak detection in networks. In: Proceedings of the 13th ACM SIGKDD international conference on knowledge discovery and data mining, KDD\u201907, pp. 420\u2013429 (2007)","DOI":"10.1145\/1281192.1281239"},{"key":"43_CR6","doi-asserted-by":"crossref","unstructured":"Chen, W., Wang, Y., Yang, S.: Efficient influence maximization in social networks. In: Proceedings of the 15th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, KDD\u201909, pp. 199\u2013208 (2009)","DOI":"10.1145\/1557019.1557047"},{"issue":"14811","key":"43_CR7","first-page":"1","volume":"9","author":"D Zhang","year":"2019","unstructured":"Zhang, D., Wang, Y., Zhang, Z.: Identifying and quantifying potential super-spreaders in social networks. Sci. Report. 9(14811), 1\u201310 (2019)","journal-title":"Sci. Report."},{"issue":"4","key":"43_CR8","first-page":"5","volume":"28","author":"M Han","year":"2016","unstructured":"Han, M., et al.: Influence maximization by probing partial communities in dynamic online social networks. Trans. Emerg. Telecommun. Technol. 28(4), 5\u201313 (2016)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"43_CR9","unstructured":"Youze, T., Xiaokui, X., Yanchen, S.: Influence maximization: near-optimal time complexity meets practical efficiency. In: ACM SIGMOD International Conference on Management of Data, pp. 75\u201386. ACM (2014)"},{"key":"43_CR10","doi-asserted-by":"crossref","unstructured":"Tang, Y., Shi, Y., Xiao, X.: Influence maximization in near-linear time: a martingale approach. In: ACM SIGMOD International Conference on Management of Data, pp. 1539\u20131554. ACM (2015)","DOI":"10.1145\/2723372.2723734"},{"issue":"43330","key":"43_CR11","first-page":"1","volume":"7","author":"D Liu","year":"2017","unstructured":"Liu, D., et al.: A fast and efficient algorithm for mining top-k nodes in complex networks. Sci. Report 7(43330), 1\u20137 (2017)","journal-title":"Sci. Report"},{"key":"43_CR12","doi-asserted-by":"crossref","unstructured":"Hajdu, L., et al.: Community based influence maximization in the independent cascade model. Federated Conference on Computer Science and Information Systems, pp. 237\u2013243 (2018)","DOI":"10.15439\/2018F201"},{"key":"43_CR13","doi-asserted-by":"crossref","unstructured":"Cheng, S., et al.: IMRank: influence maximization via finding self-consistent ranking. In: SIGIR, pp. 475\u2013484 (2014)","DOI":"10.1145\/2600428.2609592"},{"issue":"3","key":"43_CR14","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1023\/A:1011122126881","volume":"12","author":"J Goldenberg","year":"2001","unstructured":"Goldenberg, J., Libai, B., Muller, E.: Talk of the network: a complex systems look at the underlying process of word-of-mouth. Mark. Lett. 12(3), 211\u2013223 (2001). \nhttps:\/\/doi.org\/10.1023\/A:1011122126881","journal-title":"Mark. Lett."},{"key":"43_CR15","unstructured":"Rogers, E.M.: Diffusion of Innovations, 5th ed Paperback \u2013 August 16 (2003) \nhttp:\/\/snap.stanford.edu\/data\/"}],"container-title":["Lecture Notes in Computer Science","Intelligent Computing Methodologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-60796-8_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,15]],"date-time":"2020-10-15T07:24:54Z","timestamp":1602746694000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-60796-8_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030607951","9783030607968"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-60796-8_43","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"5 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bari","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icic2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ic-ic.tongji.edu.cn\/2020\/index.htm","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}