{"id":"https://openalex.org/W2976415302","doi":"https://doi.org/10.1109/icccn.2019.8847090","title":"Location-Aware Targeted Influence Blocking Maximization in Social Networks","display_name":"Location-Aware Targeted Influence Blocking Maximization in Social Networks","publication_year":2019,"publication_date":"2019-07-01","ids":{"openalex":"https://openalex.org/W2976415302","doi":"https://doi.org/10.1109/icccn.2019.8847090","mag":"2976415302"},"language":"en","primary_location":{"id":"doi:10.1109/icccn.2019.8847090","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn.2019.8847090","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 28th International Conference on Computer Communication and Networks (ICCCN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101430682","display_name":"Wenlong Zhu","orcid":"https://orcid.org/0000-0002-6538-9905"},"institutions":[{"id":"https://openalex.org/I111971639","display_name":"Qiqihar University","ror":"https://ror.org/01khf5d59","country_code":"CN","type":"education","lineage":["https://openalex.org/I111971639"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wenlong Zhu","raw_affiliation_strings":["College of Computer and Control Engineering, Qiqihar University, Qiqihar, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Control Engineering, Qiqihar University, Qiqihar, China","institution_ids":["https://openalex.org/I111971639"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067423683","display_name":"Wu Yang","orcid":"https://orcid.org/0000-0001-5985-7648"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wu Yang","raw_affiliation_strings":["Information Security Research Center, Harbin Engineering University, Harbin, China"],"affiliations":[{"raw_affiliation_string":"Information Security Research Center, Harbin Engineering University, Harbin, China","institution_ids":["https://openalex.org/I151727225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018922459","display_name":"Shichang Xuan","orcid":"https://orcid.org/0000-0003-0332-0686"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shichang Xuan","raw_affiliation_strings":["Information Security Research Center, Harbin Engineering University, Harbin, China"],"affiliations":[{"raw_affiliation_string":"Information Security Research Center, Harbin Engineering University, Harbin, China","institution_ids":["https://openalex.org/I151727225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103128952","display_name":"Dapeng Man","orcid":null},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dapeng Man","raw_affiliation_strings":["Information Security Research Center, Harbin Engineering University, Harbin, China"],"affiliations":[{"raw_affiliation_string":"Information Security Research Center, Harbin Engineering University, Harbin, China","institution_ids":["https://openalex.org/I151727225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100391971","display_name":"Wei Wang","orcid":"https://orcid.org/0000-0002-4392-1884"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Wang","raw_affiliation_strings":["Information Security Research Center, Harbin Engineering University, Harbin, China"],"affiliations":[{"raw_affiliation_string":"Information Security Research Center, Harbin Engineering University, Harbin, China","institution_ids":["https://openalex.org/I151727225"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059685245","display_name":"Jiguang Lv","orcid":"https://orcid.org/0000-0001-5502-7217"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiguang Lv","raw_affiliation_strings":["Information Security Research Center, Harbin Engineering University, Harbin, China"],"affiliations":[{"raw_affiliation_string":"Information Security Research Center, Harbin Engineering University, Harbin, China","institution_ids":["https://openalex.org/I151727225"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5101430682"],"corresponding_institution_ids":["https://openalex.org/I111971639"],"apc_list":null,"apc_paid":null,"fwci":0.1448,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.46257446,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"53","issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12592","display_name":"Opinion Dynamics and Social Influence","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11031","display_name":"Game Theory and Applications","score":0.9818000197410583,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/greedy-algorithm","display_name":"Greedy algorithm","score":0.8378106355667114},{"id":"https://openalex.org/keywords/blocking","display_name":"Blocking (statistics)","score":0.8047258853912354},{"id":"https://openalex.org/keywords/submodular-set-function","display_name":"Submodular set function","score":0.801369309425354},{"id":"https://openalex.org/keywords/maximization","display_name":"Maximization","score":0.6361418962478638},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.607367992401123},{"id":"https://openalex.org/keywords/heuristic","display_name":"Heuristic","score":0.5337257385253906},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.5230639576911926},{"id":"https://openalex.org/keywords/matching","display_name":"Matching (statistics)","score":0.5057723522186279},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.5014820098876953},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.49634701013565063},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.4835960268974304},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.34930381178855896},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.24879682064056396},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.15660151839256287},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.11410015821456909},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.10347765684127808}],"concepts":[{"id":"https://openalex.org/C51823790","wikidata":"https://www.wikidata.org/wiki/Q504353","display_name":"Greedy algorithm","level":2,"score":0.8378106355667114},{"id":"https://openalex.org/C144745244","wikidata":"https://www.wikidata.org/wiki/Q4927286","display_name":"Blocking (statistics)","level":2,"score":0.8047258853912354},{"id":"https://openalex.org/C178621042","wikidata":"https://www.wikidata.org/wiki/Q7631710","display_name":"Submodular set function","level":2,"score":0.801369309425354},{"id":"https://openalex.org/C2776330181","wikidata":"https://www.wikidata.org/wiki/Q18358244","display_name":"Maximization","level":2,"score":0.6361418962478638},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.607367992401123},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.5337257385253906},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.5230639576911926},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.5057723522186279},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.5014820098876953},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.49634701013565063},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.4835960268974304},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.34930381178855896},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.24879682064056396},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.15660151839256287},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.11410015821456909},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.10347765684127808},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccn.2019.8847090","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn.2019.8847090","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 28th International Conference on Computer Communication and Networks (ICCCN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1984069252","https://openalex.org/W2000922801","https://openalex.org/W2024626449","https://openalex.org/W2035165116","https://openalex.org/W2053105309","https://openalex.org/W2056473436","https://openalex.org/W2061820396","https://openalex.org/W2108278206","https://openalex.org/W2108858998","https://openalex.org/W2132801025","https://openalex.org/W2141403143","https://openalex.org/W2160411082","https://openalex.org/W2166470254","https://openalex.org/W2185001246","https://openalex.org/W2395439732","https://openalex.org/W2396832258","https://openalex.org/W2398784425","https://openalex.org/W2433886250","https://openalex.org/W2610922577","https://openalex.org/W2762717863","https://openalex.org/W2897684070","https://openalex.org/W2960690662","https://openalex.org/W2962773920","https://openalex.org/W2963122331","https://openalex.org/W3002828319","https://openalex.org/W6686670784"],"related_works":["https://openalex.org/W2896347948","https://openalex.org/W2402949237","https://openalex.org/W4302557420","https://openalex.org/W2950500962","https://openalex.org/W2915041254","https://openalex.org/W2594118609","https://openalex.org/W2765425000","https://openalex.org/W3204684126","https://openalex.org/W2735578456","https://openalex.org/W2891776881"],"abstract_inverted_index":{"In":[0],"this":[1],"issue,":[2],"we":[3,98],"consider":[4],"the":[5,41,48,85,92,95,116,123,127,151],"location-aware":[6],"targeted":[7,49],"influence":[8,42,82,109],"blocking":[9,124],"maximization":[10],"(LTIBM)":[11],"problem,":[12],"which":[13],"plays":[14],"a":[15,29,35,53,58,61,71,101],"very":[16],"important":[17],"role":[18],"in":[19,34,52,134],"viral":[20],"marketing":[21],"and":[22,56,78,107,130],"rumor":[23],"control.":[24],"LTIBM":[25],"aims":[26],"to":[27,39,126],"find":[28],"set":[30,64],"of":[31,44,81,94,136,147],"positive":[32],"seeds":[33,46],"given":[36,54,62],"social":[37],"network":[38],"block":[40],"propagation":[43],"negative":[45],"over":[47],"nodes":[50],"located":[51],"region":[55],"having":[57],"preference":[59],"on":[60,76,105],"topic":[63],"as":[65,67],"much":[66],"possible.":[68],"We":[69],"devise":[70],"simulation-based":[72],"greedy":[73,96,128,152],"algorithm":[74,103,119,129],"based":[75,104],"monotone":[77],"submodular":[79],"characteristics":[80],"function":[83],"under":[84],"homogeneous":[86],"independent":[87],"cascade":[88],"model.":[89],"To":[90],"improve":[91],"efficiency":[93],"algorithm,":[97],"propose":[99],"LTIBM-H,":[100],"heuristic":[102],"QT-tree":[106],"maximum":[108],"arborescence":[110],"(MIA).":[111],"Experimental":[112],"results":[113],"show":[114],"that":[115],"proposed":[117],"LTIBM-H":[118,143],"can":[120],"achieve":[121],"matching":[122],"effect":[125],"often":[131],"performs":[132],"better":[133],"terms":[135],"effectiveness":[137],"than":[138,150],"other":[139],"baseline":[140],"algorithms,":[141],"while":[142],"is":[144],"four":[145],"orders":[146],"magnitude":[148],"faster":[149],"algorithm.":[153]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
