{"id":"https://openalex.org/W2945012805","doi":"https://doi.org/10.1109/rivf.2019.8713676","title":"Competitive Influence Maximization on Online Social Networks: A Deterministic Modeling Approach","display_name":"Competitive Influence Maximization on Online Social Networks: A Deterministic Modeling Approach","publication_year":2019,"publication_date":"2019-03-01","ids":{"openalex":"https://openalex.org/W2945012805","doi":"https://doi.org/10.1109/rivf.2019.8713676","mag":"2945012805"},"language":"en","primary_location":{"id":"doi:10.1109/rivf.2019.8713676","is_oa":false,"landing_page_url":"https://doi.org/10.1109/rivf.2019.8713676","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE-RIVF International Conference on Computing and Communication Technologies (RIVF)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021107068","display_name":"Canh V. Pham","orcid":"https://orcid.org/0000-0002-8118-1768"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Canh V. Pham","raw_affiliation_strings":["Faculty of Technology and Information Security, People's Security Academy, Hanoi, Vietnam"],"affiliations":[{"raw_affiliation_string":"Faculty of Technology and Information Security, People's Security Academy, Hanoi, Vietnam","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103848978","display_name":"Nam V. Nguyen","orcid":null},"institutions":[{"id":"https://openalex.org/I123565023","display_name":"Vietnam National University Ho Chi Minh City","ror":"https://ror.org/00waaqh38","country_code":"VN","type":"education","lineage":["https://openalex.org/I123565023"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Nam V. Nguyen","raw_affiliation_strings":["University of Engineering and Technology, Vietnam National University"],"affiliations":[{"raw_affiliation_string":"University of Engineering and Technology, Vietnam National University","institution_ids":["https://openalex.org/I123565023"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031049948","display_name":"Tuan X. Le","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tuan X. Le","raw_affiliation_strings":["Faculty of Technology and Information Security, People's Security Academy, Hanoi, Vietnam"],"affiliations":[{"raw_affiliation_string":"Faculty of Technology and Information Security, People's Security Academy, Hanoi, Vietnam","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023647074","display_name":"Huan X. Hoang","orcid":null},"institutions":[{"id":"https://openalex.org/I123565023","display_name":"Vietnam National University Ho Chi Minh City","ror":"https://ror.org/00waaqh38","country_code":"VN","type":"education","lineage":["https://openalex.org/I123565023"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Huan X. Hoang","raw_affiliation_strings":["University of Engineering and Technology, Vietnam National University"],"affiliations":[{"raw_affiliation_string":"University of Engineering and Technology, Vietnam National University","institution_ids":["https://openalex.org/I123565023"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5021107068"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.5792,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.64843305,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12592","display_name":"Opinion Dynamics and Social Influence","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.757457971572876},{"id":"https://openalex.org/keywords/viral-marketing","display_name":"Viral marketing","score":0.6580124497413635},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.6532299518585205},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.6352736949920654},{"id":"https://openalex.org/keywords/maximization","display_name":"Maximization","score":0.6241526007652283},{"id":"https://openalex.org/keywords/competitor-analysis","display_name":"Competitor analysis","score":0.5883880257606506},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5589548349380493},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5346198678016663},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.4538780450820923},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.36550116539001465},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.33945631980895996},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.30332517623901367},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2969434857368469},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.12038791179656982},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10838666558265686},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.0972190797328949}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.757457971572876},{"id":"https://openalex.org/C187008535","wikidata":"https://www.wikidata.org/wiki/Q204255","display_name":"Viral marketing","level":3,"score":0.6580124497413635},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.6532299518585205},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.6352736949920654},{"id":"https://openalex.org/C2776330181","wikidata":"https://www.wikidata.org/wiki/Q18358244","display_name":"Maximization","level":2,"score":0.6241526007652283},{"id":"https://openalex.org/C127576917","wikidata":"https://www.wikidata.org/wiki/Q624630","display_name":"Competitor analysis","level":2,"score":0.5883880257606506},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5589548349380493},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5346198678016663},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.4538780450820923},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.36550116539001465},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.33945631980895996},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.30332517623901367},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2969434857368469},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.12038791179656982},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10838666558265686},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0972190797328949},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/rivf.2019.8713676","is_oa":false,"landing_page_url":"https://doi.org/10.1109/rivf.2019.8713676","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE-RIVF International Conference on Computing and Communication Technologies (RIVF)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W808055529","https://openalex.org/W1502487903","https://openalex.org/W1512602432","https://openalex.org/W1560267311","https://openalex.org/W1567923358","https://openalex.org/W1995323604","https://openalex.org/W2029316629","https://openalex.org/W2061820396","https://openalex.org/W2108278206","https://openalex.org/W2108614537","https://openalex.org/W2135086682","https://openalex.org/W2141403143","https://openalex.org/W2467225338","https://openalex.org/W2736635164","https://openalex.org/W2774494196","https://openalex.org/W2788460644","https://openalex.org/W2808629063","https://openalex.org/W4211017427"],"related_works":["https://openalex.org/W2902193799","https://openalex.org/W2046658895","https://openalex.org/W2269573953","https://openalex.org/W2465338762","https://openalex.org/W2939506735","https://openalex.org/W2770232349","https://openalex.org/W2729460574","https://openalex.org/W2558516130","https://openalex.org/W4289866588","https://openalex.org/W4281766472"],"abstract_inverted_index":{"The":[0],"Competitive":[1],"Influence":[2],"Maximization":[3],"(CIM)":[4],"problem":[5,22,68,126],"has":[6],"been":[7],"extensively":[8],"studied":[9],"in":[10,17,44,77,88,141,181],"recent":[11],"years":[12],"due":[13],"to":[14,31,65,109,123,158],"its":[15],"importance":[16],"Viral":[18],"Marketing.":[19],"Basically,":[20],"CIM":[21,125,160],"requires":[23],"finding":[24],"out":[25],"a":[26,45,120,130],"set":[27],"of":[28,38,72,91,102,183],"seed":[29],"users":[30],"diffuse":[32],"information":[33,54,112,132],"such":[34,129],"that":[35,138,174],"the":[36,70,89,100,124,139],"number":[37],"affected":[39],"nodes":[40],"could":[41],"be":[42],"maximized":[43],"competitive":[46],"context":[47],"where":[48],"other":[49,178],"competitors":[50],"are":[51,84,107],"also":[52,153],"performing":[53],"broadcasting":[55],"activities.":[56],"Recent":[57],"works":[58],"focus":[59],"on":[60,128,164,186],"uncertainty":[61],"models":[62],"(probabilistic":[63],"models)":[64],"address":[66,159],"this":[67,116],"at":[69],"cost":[71],"difficulty":[73],"which":[74],"is":[75,145],"#P-hard":[76],"estimating":[78,142],"objective":[79,143],"functions,":[80],"thus":[81],"those":[82],"algorithms":[83,157,176],"time":[85,185],"consuming":[86],"even":[87],"case":[90],"small":[92],"or":[93],"medium":[94,187],"size":[95,188],"networks.":[96,189],"In":[97,115],"reality,":[98],"with":[99],"support":[101],"data":[103],"mining":[104],"techniques,":[105],"we":[106,118],"able":[108],"build":[110],"deterministic":[111,131],"spreading":[113,133],"models.":[114],"work,":[117],"propose":[119],"new":[121],"approach":[122,136],"based":[127],"model.":[134],"Our":[135],"shows":[137],"complexity":[140],"functions":[144],"O(n":[146],"<sup":[147],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[148],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">2</sup>":[149],")":[150],"and":[151,171],"it":[152],"proposes":[154],"2":[155],"effective":[156],"problem.":[161],"Experiment":[162],"results":[163],"4":[165],"benchmark":[166],"datasets":[167],"Email-EU,":[168],"Gnutella-1,":[169],"Gnutella-2,":[170],"Epinion":[172],"show":[173],"our":[175],"outperform":[177],"algorithms,":[179],"especially":[180],"term":[182],"running":[184]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
