Proceedings of the 25th ACM International on Conference on Information and Knowledge Management 2016
DOI: 10.1145/2983323.2983724
|View full text |Cite
|
Sign up to set email alerts
|

Targeted Influence Maximization in Social Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
31
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 58 publications
(31 citation statements)
references
References 21 publications
0
31
0
Order By: Relevance
“…As early in 1940s and 1990s, a group of outstanding scholars emerged to deeply analyze the reasons for the spread of personal and group rumors [15], [16], [19], [20]. [15] demonstrated that rumors will mutate during the process of communication and construct corresponding rumor formulas.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…As early in 1940s and 1990s, a group of outstanding scholars emerged to deeply analyze the reasons for the spread of personal and group rumors [15], [16], [19], [20]. [15] demonstrated that rumors will mutate during the process of communication and construct corresponding rumor formulas.…”
Section: Related Workmentioning
confidence: 99%
“…[22] proposed a distributed expression model of users combined with emotional factors to solve the problem of serious imbalances in positive and negative cases. [15], [19], [20] constructed the Independent Cascade Model with Login Event (IC-L) model to simulate the delay propagation process. [19] proposed a regression equation to explain the relationship between the distance between nodes in a social network and the probability of being infected.…”
Section: Related Workmentioning
confidence: 99%
“…On these models, they formulated IM problem as a combinatorial optimization problem and designed a natural greedy algorithm with approximation ratio is 1 − 1/e. IM has been received much attention from the following aspects: proposing efficiency algorithms [2][3][4][5][6][7][8][9]24] and studying its variants [7,10,[25][26][27][28].…”
Section: Influence Maximizationmentioning
confidence: 99%
“…In each iteration, it creates a seed-set S cur in three phases: (a) dummy element creation, (b) construction of three candidate seed-sets (one using ASR, a second using ASR L and a third using ASR U ), and (c) selection of the best candidate seed-set and removal of dummy elements from it. The iterations stop when S cur is not better than the previously created seed-set S pr in terms of ASR (steps [21][22]. This guarantees that the algorithm terminates [9].…”
Section: Examplementioning
confidence: 99%
“…There are many works on targeted viral marketing (e.g., [11,13,20,22,25]). For example, [13] considered influence maximization when each target node has a constant profit, and [22] considered the impact of the location and login time of target nodes. Unlike ours, the works in [11,13,20,22,25] do not consider vulnerable nodes.…”
Section: Related Workmentioning
confidence: 99%