{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,23]],"date-time":"2024-11-23T06:04:21Z","timestamp":1732341861859,"version":"3.28.0"},"reference-count":47,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100012325","name":"National Office for Philosophy and Social Sciences","doi-asserted-by":"publisher","award":["23BGL270"],"id":[{"id":"10.13039\/501100012325","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information Sciences"],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1016\/j.ins.2024.121628","type":"journal-article","created":{"date-parts":[[2024,11,8]],"date-time":"2024-11-08T23:23:09Z","timestamp":1731108189000},"page":"121628","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Modeling information propagation for target user groups in online social networks based on guidance and incentive strategies"],"prefix":"10.1016","volume":"691","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-3426-8828","authenticated-orcid":false,"given":"Lei","family":"Meng","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-5093-3421","authenticated-orcid":false,"given":"Guiqiong","family":"Xu","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-9139-1734","authenticated-orcid":false,"given":"Chen","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Shoujin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/j.ins.2024.121628_br0010","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevE.108.014301","article-title":"Target control of complex networks: how to save control energy","volume":"108","author":"Meng","year":"2023","journal-title":"Phys. Rev. E"},{"issue":"4","key":"10.1016\/j.ins.2024.121628_br0020","doi-asserted-by":"crossref","first-page":"4062","DOI":"10.1109\/TKDE.2021.3138783","article-title":"Maximizing the spread of effective information in social networks","volume":"35","author":"Zhang","year":"2023","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"2","key":"10.1016\/j.ins.2024.121628_br0030","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1109\/TETC.2023.3292384","article-title":"Maximizing social influence with minimum information alteration","volume":"12","author":"Wang","year":"2024","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"issue":"10","key":"10.1016\/j.ins.2024.121628_br0040","doi-asserted-by":"crossref","first-page":"6383","DOI":"10.1109\/TSMC.2022.3144141","article-title":"RumorDecay: rumor dissemination interruption for target recipients in social networks","volume":"52","author":"Jiang","year":"2022","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"issue":"8","key":"10.1016\/j.ins.2024.121628_br0050","doi-asserted-by":"crossref","DOI":"10.1088\/1674-1056\/ad531f","article-title":"CRB: a new rumor blocking algorithm in online social networks based on competitive spreading model and influence maximization","volume":"33","author":"Dong","year":"2024","journal-title":"Chin. Phys. B"},{"key":"10.1016\/j.ins.2024.121628_br0060","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2023.109693","article-title":"Dominant coverage for target users at the lowest cost under competitive propagation in social networks","volume":"226","author":"Zheng","year":"2023","journal-title":"Comput. Netw."},{"issue":"05","key":"10.1016\/j.ins.2024.121628_br0070","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1109\/MIS.2020.3026430","article-title":"The era of intelligent recommendation: editorial on intelligent recommendation with advanced AI and learning","volume":"35","author":"Wang","year":"2020","journal-title":"IEEE Intell. Syst."},{"issue":"4","key":"10.1016\/j.ins.2024.121628_br0080","doi-asserted-by":"crossref","first-page":"6424","DOI":"10.1109\/TII.2023.3345474","article-title":"Time-aware multibehavior contrastive learning for social recommendation","volume":"20","author":"Wei","year":"2024","journal-title":"IEEE Trans. Ind. Inform."},{"key":"10.1016\/j.ins.2024.121628_br0090","doi-asserted-by":"crossref","DOI":"10.1016\/j.chaos.2022.112986","article-title":"Control energy scaling for target control of complex networks","volume":"167","author":"Meng","year":"2023","journal-title":"Chaos Solitons Fractals"},{"key":"10.1016\/j.ins.2024.121628_br0100","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevLett.117.208301","article-title":"Immunization and targeted destruction of networks using explosive percolation","volume":"117","author":"Clusella","year":"2016","journal-title":"Phys. Rev. Lett."},{"key":"10.1016\/j.ins.2024.121628_br0110","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2022.118702","article-title":"TSIFIM: a three-stage iterative framework for influence maximization in complex networks","volume":"212","author":"Dong","year":"2023","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.ins.2024.121628_br0120","doi-asserted-by":"crossref","DOI":"10.1016\/j.neucom.2023.126936","article-title":"Influence maximization algorithm based on group trust and local topology structure","volume":"564","author":"Guo","year":"2024","journal-title":"Neurocomputing"},{"issue":"4, SI","key":"10.1016\/j.ins.2024.121628_br0130","doi-asserted-by":"crossref","first-page":"2323","DOI":"10.1007\/s11280-019-00748-z","article-title":"Efficient targeted influence minimization in big social networks","volume":"23","author":"Wang","year":"2020","journal-title":"World Wide Web"},{"key":"10.1016\/j.ins.2024.121628_br0140","doi-asserted-by":"crossref","DOI":"10.1016\/j.cie.2022.108750","article-title":"Belief evolution network-based probability transformation and fusion","volume":"174","author":"Zhou","year":"2022","journal-title":"Comput. Ind. Eng."},{"key":"10.1016\/j.ins.2024.121628_br0150","doi-asserted-by":"crossref","DOI":"10.1016\/j.jocs.2022.101591","article-title":"A novel potential edge weight method for identifying influential nodes in complex networks based on neighborhood and position","volume":"60","author":"Meng","year":"2022","journal-title":"J. Comput. Sci."},{"key":"10.1016\/j.ins.2024.121628_br0160","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.121225","article-title":"SHI1I2R competitive information spreading model in online and offline two-layer networks in emergencies","volume":"235","author":"Du","year":"2024","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.ins.2024.121628_br0170","doi-asserted-by":"crossref","DOI":"10.1016\/j.chaos.2024.115298","article-title":"Improved information diffusion models based on a new two-sided sign-aware matching framework in complex networks","volume":"187","author":"Mohammadi","year":"2024","journal-title":"Chaos Solitons Fractals"},{"issue":"18","key":"10.1016\/j.ins.2024.121628_br0180","doi-asserted-by":"crossref","first-page":"16613","DOI":"10.1007\/s11071-024-09894-0","article-title":"Dynamics analysis and control of positive-negative information propagation model considering individual conformity psychology","volume":"112","author":"Yan","year":"2024","journal-title":"Nonlinear Dyn."},{"issue":"7","key":"10.1016\/j.ins.2024.121628_br0190","doi-asserted-by":"crossref","DOI":"10.1063\/5.0029411","article-title":"Guiding propagation to localized target nodes in complex networks","volume":"31","author":"Zhang","year":"2021","journal-title":"Chaos"},{"key":"10.1016\/j.ins.2024.121628_br0200","first-page":"437","article-title":"Coupling dynamics of epidemic spreading and information diffusion on complex networks","volume":"332","author":"Zhan","year":"2018","journal-title":"Appl. Math. Comput."},{"issue":"5722","key":"10.1016\/j.ins.2024.121628_br0210","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1038\/280455a0","article-title":"Population biology of infectious diseases: Part II","volume":"280","author":"May","year":"1979","journal-title":"Nature"},{"key":"10.1016\/j.ins.2024.121628_br0220","doi-asserted-by":"crossref","DOI":"10.1016\/j.chaos.2023.113155","article-title":"A novel algorithm for identifying influential nodes in complex networks based on local propagation probability model","volume":"168","author":"Xu","year":"2023","journal-title":"Chaos Solitons Fractals"},{"key":"10.1016\/j.ins.2024.121628_br0230","doi-asserted-by":"crossref","first-page":"1019","DOI":"10.1016\/j.physa.2018.08.006","article-title":"An extended SEIR model considering homepage effect for the information propagation of online social networks","volume":"512","author":"Zhao","year":"2018","journal-title":"Physica A"},{"key":"10.1016\/j.ins.2024.121628_br0240","doi-asserted-by":"crossref","DOI":"10.1016\/j.physa.2019.122764","article-title":"An interactive propagation model of multiple information in complex networks","volume":"537","author":"Yao","year":"2020","journal-title":"Physica A"},{"key":"10.1016\/j.ins.2024.121628_br0250","article-title":"Layered SIRS model of information spread in complex networks","volume":"411","author":"Zhang","year":"2021","journal-title":"Appl. Math. Comput."},{"key":"10.1016\/j.ins.2024.121628_br0260","doi-asserted-by":"crossref","DOI":"10.1016\/j.ins.2023.119723","article-title":"A multi-information epidemic spreading model on a two-layer network","volume":"651","author":"Li","year":"2023","journal-title":"Inf. Sci."},{"issue":"6","key":"10.1016\/j.ins.2024.121628_br0270","doi-asserted-by":"crossref","DOI":"10.1016\/j.ipm.2021.102731","article-title":"A rumor reversal model of online health information during the Covid-19 epidemic","volume":"58","author":"Wang","year":"2021","journal-title":"Inf. Process. Manag."},{"key":"10.1016\/j.ins.2024.121628_br0280","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1016\/j.ins.2019.08.064","article-title":"An incentive-based protection and recovery strategy for secure big data in social networks","volume":"508","author":"Wu","year":"2020","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2024.121628_br0290","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1016\/j.future.2018.11.038","article-title":"AIM: activation increment minimization strategy for preventing bad information diffusion in OSNs","volume":"94","author":"Tan","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.ins.2024.121628_br0300","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2021.104192","article-title":"HK-SEIR model of public opinion evolution based on communication factors","volume":"100","author":"Li","year":"2021","journal-title":"Eng. Appl. Artif. Intell."},{"issue":"2","key":"10.1016\/j.ins.2024.121628_br0310","doi-asserted-by":"crossref","DOI":"10.1016\/j.ipm.2021.102846","article-title":"Modeling and simulation of microblog-based public health emergency-associated public opinion communication","volume":"59","author":"Zhao","year":"2022","journal-title":"Inf. Process. Manag."},{"issue":"1","key":"10.1016\/j.ins.2024.121628_br0320","doi-asserted-by":"crossref","first-page":"889","DOI":"10.1007\/s10489-021-02398-z","article-title":"Friend circles network: formation and the law of news dissemination","volume":"52","author":"Nian","year":"2022","journal-title":"Appl. Intell."},{"issue":"8","key":"10.1016\/j.ins.2024.121628_br0330","doi-asserted-by":"crossref","first-page":"3284","DOI":"10.1109\/TFUZZ.2021.3112226","article-title":"LFIC: identifying influential nodes in complex networks by local fuzzy information centrality","volume":"30","author":"Zhang","year":"2022","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"10.1016\/j.ins.2024.121628_br0340","doi-asserted-by":"crossref","DOI":"10.1016\/j.chaos.2023.113103","article-title":"Identifying hidden target nodes for spreading in complex networks","volume":"168","author":"Yin","year":"2023","journal-title":"Chaos Solitons Fractals"},{"issue":"5","key":"10.1016\/j.ins.2024.121628_br0350","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevE.79.056102","article-title":"Maximizing influence propagation in networks with community structure","volume":"79","author":"Galstyan","year":"2009","journal-title":"Phys. Rev. E"},{"key":"10.1016\/j.ins.2024.121628_br0360","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.ins.2020.01.040","article-title":"Targeted influence maximization under a multifactor-based information propagation model","volume":"519","author":"Li","year":"2020","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2024.121628_br0370","doi-asserted-by":"crossref","DOI":"10.1016\/j.physd.2023.133677","article-title":"Targeted influence maximization in complex networks","volume":"446","author":"Zhang","year":"2023","journal-title":"Physica D"},{"key":"10.1016\/j.ins.2024.121628_br0380","doi-asserted-by":"crossref","first-page":"390","DOI":"10.1016\/j.ins.2022.11.041","article-title":"Targeted influence maximization in competitive social networks","volume":"619","author":"Liang","year":"2023","journal-title":"Inf. Sci."},{"issue":"1","key":"10.1016\/j.ins.2024.121628_br0390","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1109\/TNSE.2020.3037106","article-title":"Targeted activation probability maximization problem in online social networks","volume":"8","author":"Zhang","year":"2021","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"issue":"3","key":"10.1016\/j.ins.2024.121628_br0400","doi-asserted-by":"crossref","first-page":"1645","DOI":"10.1109\/TNSE.2019.2944108","article-title":"Targeted protection maximization in social networks","volume":"7","author":"Guo","year":"2020","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"10.1016\/j.ins.2024.121628_br0410","doi-asserted-by":"crossref","DOI":"10.1038\/srep38865","article-title":"Spreading to localized targets in complex networks","volume":"6","author":"Sun","year":"2016","journal-title":"Sci. Rep."},{"key":"10.1016\/j.ins.2024.121628_br0420","doi-asserted-by":"crossref","DOI":"10.3389\/fphy.2021.806259","article-title":"Spreading to localized targets in signed social networks","volume":"9","author":"Song","year":"2022","journal-title":"Front. Phys."},{"issue":"3","key":"10.1016\/j.ins.2024.121628_br0430","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevE.77.036111","article-title":"Communicability in complex networks","volume":"77","author":"Estrada","year":"2008","journal-title":"Phys. Rev. E"},{"issue":"3","key":"10.1016\/j.ins.2024.121628_br0440","first-page":"89","article-title":"The physics of communicability in complex networks","volume":"514","author":"Estrada","year":"2012","journal-title":"Phys. Rep.-Rev. Sec. Phys. Lett."},{"issue":"1","key":"10.1016\/j.ins.2024.121628_br0450","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1109\/TCYB.2020.2977322","article-title":"An efficient feedback control mechanism for positive\/negative information spread in online social networks","volume":"52","author":"Wang","year":"2022","journal-title":"IEEE Trans. Cybern."},{"issue":"21","key":"10.1016\/j.ins.2024.121628_br0460","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevLett.105.218701","article-title":"Thresholds for epidemic spreading in networks","volume":"105","author":"Castellano","year":"2010","journal-title":"Phys. Rev. Lett."},{"issue":"11","key":"10.1016\/j.ins.2024.121628_br0470","doi-asserted-by":"crossref","first-page":"888","DOI":"10.1038\/nphys1746","article-title":"Identification of influential spreaders in complex networks","volume":"6","author":"Kitsak","year":"2010","journal-title":"Nat. Phys."}],"container-title":["Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025524015421?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025524015421?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,11,23]],"date-time":"2024-11-23T02:58:29Z","timestamp":1732330709000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0020025524015421"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2]]},"references-count":47,"alternative-id":["S0020025524015421"],"URL":"https:\/\/doi.org\/10.1016\/j.ins.2024.121628","relation":{},"ISSN":["0020-0255"],"issn-type":[{"type":"print","value":"0020-0255"}],"subject":[],"published":{"date-parts":[[2025,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Modeling information propagation for target user groups in online social networks based on guidance and incentive strategies","name":"articletitle","label":"Article Title"},{"value":"Information Sciences","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ins.2024.121628","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 Published by Elsevier Inc.","name":"copyright","label":"Copyright"}],"article-number":"121628"}}