Computer Science ›› 2024, Vol. 51 ›› Issue (6): 161-171.doi: 10.11896/jsjkx.230400006
• Database & Big Data & Data Science • Previous Articles Next Articles
DENG Ziwei, CHEN Ling, LIU Wei
CLC Number:
[1]SHAO J H,ZHANG E,XIANG Y,et al.Efficient combinations of dual incentives on social networks to achieve viral spread[J/OL].https://link.springer.com/article/10.1007/s10660-022-09668-z. [2]HE Q,ZHANG D,WANG X,et al.Graph Convolutional Net-work-Based Rumor Blocking on Social Networks[J].IEEE Transactions on Computational Social Systems,2022,10(5):2244-2253. [3]REN J,LIU M,LIU Y,et al.Optimal resource allocation with spatiotemporal transmission discovery for effective disease control[J].Infectious Diseases of Poverty,2022,11(1):34. [4]FERRARA L,MOGLIANI M,SAHUC J G.High-frequencymonitoring of growth at risk[J].International Journal of Forecasting,2022,38(2):582-595. [5]DOMINGOS P,RICHARDSON M.Mining the network value of customers[C]//Proceedings of the seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mi-ning.2001:57-66. [6]RICHARDSON M,DOMINGOS P.Mining knowledge-sharingsites for viral marketing[C]//Proceedings of the eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.2002:61-70. [7]KEMPE D,KLEINBERG J,TARDOS É.Maximizing the spread of influence through a social network[C]//Proceedings of the ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.2003:137-146. [8]LI Y,FAN J,WANG Y,et al.Influence maximization on social graphs:A survey[J].IEEE Transactions on Knowledge and Data Engineering,2018,30(10):1852-1872. [9]LESKOVEC J,KRAUSE A,GUESTRIN C,et al.Cost-effective outbreak detection in networks[C]//Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Disco-very and Data Mining.2007:420-429. [10]LI W M,LI Z,LUVEMBE A M,et al.Influence maximizationalgorithm based on Gaussian propagation model[J].Information Sciences,2021,568:386-402. [11]KUMAR S,GUPTA A,KHATRI I.CSR:A community based spreaders ranking algorithm for influence maximization in social networks[J].World Wide Web,2022,25(6):2303-2322. [12]ZHANG J X,CHEN D B,DONG Q,et al.Identifying a set of influential spreaders in complex networks[J].Scientific reports,2016,6(1):27823. [13]LIU P,LI L,FANG S,et al.Identifying influential nodes in social networks:A voting approach[J].Chaos,Solitons & Fractals,2021,152:111309. [14]SUN G,CHEN C C.Influence maximization algorithm based on reverse reachable set[J].Mathematical Problems in Enginee-ring,2021,2021:1-12. [15]ZHU W,HUANG Y,YANG S,et al.A Positive Influence Maximization Algorithm in Signed Social Networks[J].Computers,Materials & Continua,2023,76(2):1977-1994. [16]ALI J,BABAEI M,CHAKRABORTY A,et al.On the fairness of time-critical influence maximization in social networks[C]//2022 IEEE 38th International Conference on Data Engineering(ICDE).IEEE,2022:1541-1542. [17]GONG H,GUO C.Influence maximization considering fairness:A multi-objective optimization approach with prior knowledge[J].Expert Systems with Applications,2023,214:119138. [18]QIN X,ZHONG C,YANG Q.An Influence Maximization Algorithm Based on Community-Topic Features for Dynamic Social Networks[J].IEEE Transactions on Network Science and Engineering,2021,9(2):608-621. [19]ZHANG X,XU L,XU Z.Influence maximization based on network motifs in mobile social networks[J].IEEE Transactions on Network Science and Engineering,2022,9(4):2353-2363. [20]GHOSHAL A K,DAS N,DAS S.Influence of community structure on misinformation containment in online social networks[J].Knowledge-Based Systems,2021,213:106693. [21]LI Y,ZHU J,JIAO J,et al.Competitive Influence Minimization in Multi-Group Social Networks:An Opinion-Based Solution[J].IEEE Transactions on Network Science and Engineering,2022,9(4):2617-2630. [22]KEMPE D,KLEINBERG J,TARDOS É.Maximizing the Spreadof Influence through a Social Network[J].Theory of Computing,2015,11(1):105-147. [23]YANG Y,MAO X,PEI J,et al.Continuous influence maximization:What discounts should we offer to social network users?[C]//Proceedings of the 2016 International Conference on Ma-nagement Df data.2016:727-741. [24]YANG Y,MAO X,PEI J,et al.Continuous influence maximization[J].ACM Transactions on Knowledge Discovery from Data(TKDD),2020,14(3):1-38. [25]CHEN W,WU R,YU Z.Scalable lattice influence maximization[J].IEEE Transactions on Computational Social Systems,2020,7(4):956-970. [26]CHEN W,ZHANG W,ZHAO H.Gradient method for continuous influence maximization with budget-saving considerations[C]//Proceedings of the AAAI Conference on Artificial Intelligence.2020,34(1):43-50. [27]CHEN W,WANG Y,YANG S.Efficient influence maximization in social networks[C]//Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.2009:199-208. [28]TANG Y,XIAO X,SHI Y.Influence maximization:Near-optimal time complexity meets practical efficiency[C]//Proceedings of the 2014 ACM SIGMOD International Conference on Ma-nagement of Data.2014:75-86. |
[1] | MIN Lihua, DING Tianzhong, JIN Zhengmeng. Deformable Image Registration Model Based on Weighted Bounded Deformation Function [J]. Computer Science, 2024, 51(6): 206-214. |
[2] | WANG Zhen, NIE Kai, HAN Lin. Auto-vectorization Cost Model Based on Instruction MKS [J]. Computer Science, 2024, 51(4): 78-85. |
[3] | YU Jiuyang, ZHANG Dean, DAI Yaonan, HU Tianhao, XIA Wenfeng. Path Planning of Mobile Robot Based on Improved B-RRT* Algorithm [J]. Computer Science, 2023, 50(6A): 220500038-7. |
[4] | CHEN Shanshan, GAO Jun, MA Zhenyu. GDLIN:A Learned Index By Gradient Descent [J]. Computer Science, 2023, 50(6A): 220600256-6. |
[5] | CAO Jinxin, XU Weizhong, JIN Di, DING Weiping. Survey of Community Discovery in Complex Networks [J]. Computer Science, 2023, 50(11A): 230100130-11. |
[6] | LIN Zeyang, LAI Jun, CHEN Xiliang, WANG Jun. UAV Anti-tank Policy Training Model Based on Curriculum Reinforcement Learning [J]. Computer Science, 2023, 50(10): 214-222. |
[7] | ZONG Di-di, XIE Yi-wu. Model Medial Axis Generation Method Based on Normal Iteration [J]. Computer Science, 2022, 49(6A): 764-770. |
[8] | WEI Peng, MA Yu-liang, YUAN Ye, WU An-biao. Study on Temporal Influence Maximization Driven by User Behavior [J]. Computer Science, 2022, 49(6): 119-126. |
[9] | GUO Lei, MA Ting-huai. Friend Closeness Based User Matching [J]. Computer Science, 2022, 49(3): 113-120. |
[10] | SHAO Yu, CHEN Ling, LIU Wei. Maximum Likelihood-based Method for Locating Source of Negative Influence Spreading Under Independent Cascade Model [J]. Computer Science, 2022, 49(2): 204-215. |
[11] | XU Yi-fei, XIONG Shu-hua, SUN Wei-heng, HE Xiao-hai, CHEN Hong-gang. HEVC Post-processing Algorithm Based on Non-local Low-rank and Adaptive Quantization Constraint Prior [J]. Computer Science, 2021, 48(5): 155-162. |
[12] | ZHANG Shao-jie, LU Xu-dong, GUO Wei, WANG Shi-peng, HE Wei. Prevention of Dishonest Behavior in Supply-Demand Matching [J]. Computer Science, 2021, 48(4): 303-308. |
[13] | YUAN De-yu, CHEN Shi-cong, GAO Jian, WANG Xiao-juan. Intervention Algorithm for Distorted Information in Online Social Networks Based on Stackelberg Game [J]. Computer Science, 2021, 48(3): 313-319. |
[14] | MA Li-bo, QIN Xiao-lin. Topic-Location-Category Aware Point-of-interest Recommendation [J]. Computer Science, 2020, 47(9): 81-87. |
[15] | LIANG Jun-bin, ZHANG Min, JIANG Chan. Research Progress of Social Sensor Cloud Security [J]. Computer Science, 2020, 47(6): 276-283. |
|