{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T01:45:40Z","timestamp":1742953540685,"version":"3.40.3"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030647926"},{"type":"electronic","value":"9783030647933"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-64793-3_14","type":"book-chapter","created":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T20:09:37Z","timestamp":1608581377000},"page":"257-276","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Blocking Adversarial Influence in Social Networks"],"prefix":"10.1007","author":[{"given":"Feiran","family":"Jia","sequence":"first","affiliation":[]},{"given":"Kai","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Charles","family":"Kamhoua","sequence":"additional","affiliation":[]},{"given":"Yevgeniy","family":"Vorobeychik","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,12,22]]},"reference":[{"issue":"6794","key":"14_CR1","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1038\/35019019","volume":"406","author":"R Albert","year":"2000","unstructured":"Albert, R., Jeong, H., Barabasi, A.: Error and attack tolerance of complex networks. Nature 406(6794), 378\u2013382 (2000)","journal-title":"Nature"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Budak, C., Agrawal, D., El Abbadi, A.: Limiting the spread of misinformation in social networks. In: International Conference on World Wide Web, pp. 665\u2013674 (2011)","DOI":"10.1145\/1963405.1963499"},{"issue":"25","key":"14_CR3","doi-asserted-by":"publisher","first-page":"5468","DOI":"10.1103\/PhysRevLett.85.5468","volume":"85","author":"DS Callaway","year":"2000","unstructured":"Callaway, D.S., Newman, M., Strogatz, S.H., Watts, D.J.: Network robustness and fragility: percolation on random graphs. Phys. Rev. Lett. 85(25), 5468\u20135471 (2000)","journal-title":"Phys. Rev. Lett."},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Chen, W., Wang, C., Wang, Y.: Scalable influence maximization for prevalent viral marketing in large-scale social networks. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1029\u20131038 (2010)","DOI":"10.1145\/1835804.1835934"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Chen, W., Yuan, Y., Zhang, L.: Scalable influence maximization in social networks under the linear threshold model. In: IEEE International Conference on Data Mining, pp. 88\u201397 (2010)","DOI":"10.1109\/ICDM.2010.118"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Domingos, P., Richardson, M.: Mining the network value of customers. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 57\u201366 (2001)","DOI":"10.1145\/502512.502525"},{"key":"14_CR7","doi-asserted-by":"crossref","first-page":"290","DOI":"10.5486\/PMD.1959.6.3-4.12","volume":"6","author":"P Erd\u00f6s","year":"1959","unstructured":"Erd\u00f6s, P., R\u00e9nyi, A.: On random graphs i. Publicationes Mathematicae Debrecen 6, 290\u2013297 (1959)","journal-title":"Publicationes Mathematicae Debrecen"},{"key":"14_CR8","volume-title":"Computers and Intractability: A Guide to the Theory of NP-Completeness","author":"MR Garey","year":"1979","unstructured":"Garey, M.R., Johnson, D.S.: Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman, New York (1979)"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"He, X., Song, G., Chen, W., Jiang, Q.: Influence blocking maximization in social networks under the competitive linear threshold model. In: SIAM Data Mining Conference, pp. 463\u2013474 (2012)","DOI":"10.1137\/1.9781611972825.40"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Kempe, D., Kleinberg, J., Tardos, E.: Maximizing the spread of influence through a social network. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 137\u2013146 (2003)","DOI":"10.1145\/956750.956769"},{"key":"14_CR11","unstructured":"Khalil, E., Dilkina, B., Song, L.: Cuttingedge: Influence minimization in networks (2013)"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Khalil, E.B., Dilkina, B., Song, L.: Scalable diffusion-aware optimization of network topology. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1226\u20131235 (2014)","DOI":"10.1145\/2623330.2623704"},{"key":"14_CR13","unstructured":"Kimura, M., Saito, K., Motoda, H.: Minimizing the spread of contamination by blocking links in a network. In: National Conference on Artificial Intelligence, vol. 2, pp. 1175\u20131180 (2008)"},{"key":"14_CR14","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"977","DOI":"10.1007\/978-3-540-89197-0_94","volume-title":"PRICAI 2008: Trends in Artificial Intelligence","author":"M Kimura","year":"2008","unstructured":"Kimura, M., Saito, K., Motoda, H.: Solving the contamination minimization problem on networks for the linear threshold model. In: Ho, T.-B., Zhou, Z.-H. (eds.) PRICAI 2008. LNCS (LNAI), vol. 5351, pp. 977\u2013984. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-89197-0_94"},{"issue":"2","key":"14_CR15","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1145\/1514888.1514892","volume":"3","author":"M Kimura","year":"2009","unstructured":"Kimura, M., Saito, K., Motoda, H.: Blocking links to minimize contamination spread in a social network. ACM Trans. Knowl. Discov. Data 3(2), 91\u2013923 (2009)","journal-title":"ACM Trans. Knowl. Discov. Data"},{"key":"14_CR16","unstructured":"Klimt, B., Yang, Y.: Introducing the enron corpus. In: CEAS (2004)"},{"key":"14_CR17","unstructured":"KONECT: Hamsterster friendships network dataset \u2013 KONECT, September 2016"},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Kunegis, J.: KONECT - The Koblenz Network Collection. In: International Conference on World Wide Web Companion, pp. 1343\u20131350 (2013)","DOI":"10.1145\/2487788.2488173"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Leskovec, J., Faloutsos, C.: Sampling from large graphs. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 631\u2013636 (2006)","DOI":"10.1145\/1150402.1150479"},{"issue":"1","key":"14_CR20","doi-asserted-by":"publisher","first-page":"2-es","DOI":"10.1145\/1217299.1217301","volume":"1","author":"J Leskovec","year":"2007","unstructured":"Leskovec, J., Kleinberg, J., Faloutsos, C.: Graph evolution: Densification and shrinking diameters. ACM Trans. Knowl. Discov. Data 1(1), 2-es (2007)","journal-title":"ACM Trans. Knowl. Discov. Data"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Leskovec, J., et al.: Cost-effective outbreak detection in networks. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 420\u2013429 (2007)","DOI":"10.1145\/1281192.1281239"},{"key":"14_CR22","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1080\/15427951.2009.10129177","volume":"6","author":"J Leskovec","year":"2010","unstructured":"Leskovec, J., Lang, K.J., Dasgupta, A., Mahoney, M.W.: Community structure in large networks: natural cluster sizes and the absence of large well-defined clusters. Internet Math. 6, 29\u2013123 (2010)","journal-title":"Internet Math."},{"key":"14_CR23","unstructured":"McAuley, J., Leskovec, J.: Learning to discover social circles in ego networks. In: International Conference on Neural Information Processing Systems, pp. 539\u2013547 (2012)"},{"key":"14_CR24","unstructured":"Miyano, E., Ono, H.: Maximum domination problem. In: Seventeenth Australasian Symposium on Theory of Computing, pp. 55\u201362 (2011)"},{"key":"14_CR25","first-page":"035101","volume":"66","author":"MEJ Newman","year":"2002","unstructured":"Newman, M.E.J., Forrest, S., Balthrop, J.: Email networks and the spread of computer viruses. Phys. Rev. Lett. 66, 035101 (2002)","journal-title":"Phys. Rev. Lett."},{"key":"14_CR26","doi-asserted-by":"crossref","unstructured":"Tsai, J., Qian, Y., Vorobeychik, Y., Kiekintveld, C., Tambe, M.: Bayesian security games for controlling contagion. In: International Conference on Social Computing, pp. 33\u201338 (2013)","DOI":"10.1109\/SocialCom.2013.11"},{"key":"14_CR27","doi-asserted-by":"crossref","unstructured":"Tsai, J., Nguyen, T.H., Tambe, M.: Security games for controlling contagion. In: AAAI Conference on Artificial Intelligence, pp. 1464\u20131470 (2012)","DOI":"10.1109\/SocialCom.2013.11"},{"issue":"6","key":"14_CR28","doi-asserted-by":"publisher","first-page":"893","DOI":"10.1093\/comjnl\/bxt094","volume":"57","author":"J Tsai","year":"2013","unstructured":"Tsai, J., Nguyen, T.H., Weller, N., Tambe, M.: Game-theoretic target selection in contagion-based domains. Comput. J. 57(6), 893\u2013905 (2013)","journal-title":"Comput. J."},{"issue":"2","key":"14_CR29","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/s10458-014-9258-0","volume":"29","author":"Y Vorobeychik","year":"2014","unstructured":"Vorobeychik, Y., Letchford, J.: Securing interdependent assets. Auton. Agents Multi-agent Syst. 29(2), 305\u2013333 (2014). https:\/\/doi.org\/10.1007\/s10458-014-9258-0","journal-title":"Auton. Agents Multi-agent Syst."},{"key":"14_CR30","unstructured":"Wang, S., Zhao, X., Chen, Y., Li, Z., Zhang, K., Xia, J.: Negative influence minimizing by blocking nodes in social networks. In: AAAI Conference on Artificial Intelligence (2013)"},{"key":"14_CR31","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1038\/30918","volume":"393","author":"DJ Watts","year":"1998","unstructured":"Watts, D.J., Strogatz, S.: Collective dynamics of \u2018small-world\u2019 networks. Nature 393, 440\u2013442 (1998)","journal-title":"Nature"},{"key":"14_CR32","doi-asserted-by":"crossref","unstructured":"Wilder, B., Vorobeychik, Y.: Defending elections against malicious spread of misinformation. In: AAAI Conference on Artificial Intelligence, pp. 2213\u20132220 (2019)","DOI":"10.1609\/aaai.v33i01.33012213"},{"key":"14_CR33","doi-asserted-by":"crossref","unstructured":"Yao, Q., Shi, R., Zhou, C., Wang, P., Guo, L.: Topic-aware social influence minimization. In: International Conference on World Wide Web, pp. 139\u2013140 (2015)","DOI":"10.1145\/2740908.2742767"},{"key":"14_CR34","doi-asserted-by":"crossref","unstructured":"Yin, H., Benson, A.R., Leskovec, J., Gleich, D.F.: Local higher-order graph clustering. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 555\u2013564 (2017)","DOI":"10.1145\/3097983.3098069"}],"container-title":["Lecture Notes in Computer Science","Decision and Game Theory for Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-64793-3_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,8]],"date-time":"2022-12-08T06:28:51Z","timestamp":1670480931000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-64793-3_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030647926","9783030647933"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-64793-3_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"22 December 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"GameSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Decision and Game Theory for Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"College Park, MD","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"gamesec2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.gamesec-conf.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"72% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"He conference was held virtueally due to COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}