1 |
PENG S C, ZHOU Y M, CAO L H, et al. Influence analysis in social networks: a survey[J]. Journal of Network and Computer Applications, 2018, 106:17-32. 10.1016/j.jnca.2018.01.005
|
2 |
吴安彪,袁野,乔百友,等.大规模时序图影响力最大化的算法研究[J].计算机学报,2019,42(12):2647-2664. 10.11897/SP.J.1016.2019.02647
|
|
WU A B, YUAN Y, QIAO B Y, et al. The influence maximization problem based on large-scale temporal graph[J]. Chinese Journal of Computers, 2019, 42(12): 2647-2664. 10.11897/SP.J.1016.2019.02647
|
3 |
DOMINGOS P, RICHARDSON M. Mining the network value of customers[C]// Proceedings of the 7th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York: ACM, 2001: 57–66. 10.1145/502512.502525
|
4 |
陈卫.社交网络影响力传播研究[J].大数据,2015,1(3):82-98.
|
|
CHEN W. Research on the influence of social networks[J]. Big Data, 2015, 1(3): 82-98.
|
5 |
KEMPE D, KLEINBERG J, TARDOS É. Maximizing the spread of influence through a social network[C]// Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York: ACM, 2003: 137-146. 10.1145/956750.956769
|
6 |
LESKOVEC J, KRAUSE A, GUESTRIN C, et al. Cost-effective outbreak detection in networks[C]// Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York: ACM, 2007: 420-429. 10.1145/1281192.1281239
|
7 |
CHEN W, WANG Y J, YANG S Y. Efficient influence maximization in social networks[C]// Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York: ACM, 2009: 199-208. 10.1145/1557019.1557047
|
8 |
NGUYEN D, NGUYEN T, DO T, et al. Probability-based multi-hop diffusion method for influence maximization in social networks[J]. Wireless Personal Communications, 2017, 93: 903-916. 10.1007/s11277-016-3939-8
|
9 |
高菊远,王志晓,芮晓彬,等.基于节点覆盖范围的影响力最大化算法[J].计算机工程与设计,2019,40(8):2211-2215,2246.
|
|
GAO J Y, WANG Z X, RUI X B, et al. Influence maximization algorithm based on node coverage[J]. Computer Engineering and Design, 2019, 40(8): 2211-2215,2246.
|
10 |
WANG Z X, SUN C C, XI J K, et al. Influence maximization in social graphs based on community structure and node coverage gain[J]. Future Generation Computer Systems, 2021, 118: 327-338. 10.1016/j.future.2021.01.025
|
11 |
苏晓萍,宋玉蓉.利用邻域“结构洞”寻找社会网络中最具影响力节点[J].物理学报,2015,64(2):5-15. 10.7498/aps.64.020101
|
|
SU X P, SONG Y R. Using neighborhood "structure holes" to find the most influential nodes in social networks[J]. Acta Physica Sinica, 2015, 64(2): 5-15. 10.7498/aps.64.020101
|
12 |
LOU T C, TANG J. Mining structural hole spanners through information diffusion in social networks[C]// Proceedings of the 22nd International Conference on World Wide Web. New York: ACM, 2013: 825-836. 10.1145/2488388.2488461
|
13 |
DONG S. Improved label propagation algorithm for overlapping community detection[J]. Computing, 2020, 102: 2185-2198. 10.1007/s00607-020-00836-3
|
14 |
MCAULEY J, LESKOVEC J. Learning to discover social circles in ego networks[C]// Proceedings of the 25th International Conference on Neural Information Processing Systems. Cambridge: MIT Press, 2012: 539-547. 10.1109/icdm.2012.110
|
15 |
WANG B, POURSHAFEIE A, ZITNIK M, et al. Network enhancement as a general method to denoise weighted biological networks[J]. Nature Communications, 2018, 9(1):3108. 10.1038/s41467-018-05469-x
|
16 |
ROSSI R A, AHMED N K. The network data repository with interactive graph analytics and visualization [C]// Proceedings of the 29th AAAI Conference on Artificial Intelligence. Palo Alto: AAAI Press, 2015: 4292-4293.
|
17 |
LESKOVEC J, KLEINBERG J, FALOUTSOS C. Graph evolution: densification and shrinking diameters[J]. ACM Transactions on Knowledge Discovery from Data, 2007, 1(1):pp 2-es. 10.1145/1217299.1217301
|
18 |
YANG J, LESKOVEC J. Defining and evaluating network communities based on ground-truth[J]. Knowledge and Information Systems, 2015, 42: 181-213. 10.1007/s10115-013-0693-z
|
19 |
李敏佳,许国艳,朱帅,等.基于结构洞和度折扣的影响力最大化算法[J]. 计算机应用, 2018, 38(12):3419– 3424. 10.11772/j.issn.1001-9081.2018040920
|
|
LI M J, XU G Y, ZHU S, et al. Influence maximization algorithm based on structural hole and degree discount[J]. Journal of Computer Applications, 2018, 38(12):3419-3424. 10.11772/j.issn.1001-9081.2018040920
|