{"id":"https://openalex.org/W4226094521","doi":"https://doi.org/10.1109/tnse.2022.3163203","title":"Influence Maximization Based on Network Motifs in Mobile Social Networks","display_name":"Influence Maximization Based on Network Motifs in Mobile Social Networks","publication_year":2022,"publication_date":"2022-03-29","ids":{"openalex":"https://openalex.org/W4226094521","doi":"https://doi.org/10.1109/tnse.2022.3163203"},"language":"en","primary_location":{"id":"doi:10.1109/tnse.2022.3163203","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2022.3163203","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100375485","display_name":"Xinxin Zhang","orcid":"https://orcid.org/0000-0003-3667-9302"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xinxin Zhang","raw_affiliation_strings":["College of Computer and Cyber Security and Fujian Provincial Key Lab of Network Security and Cryptology, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security and Fujian Provincial Key Lab of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030884513","display_name":"Li Xu","orcid":"https://orcid.org/0000-0002-8972-3373"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li Xu","raw_affiliation_strings":["College of Computer and Cyber Security and Fujian Provincial Key Lab of Network Security and Cryptology, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security and Fujian Provincial Key Lab of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005617704","display_name":"Zhenyu Xu","orcid":"https://orcid.org/0000-0003-4890-4765"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenyu Xu","raw_affiliation_strings":["College of Computer and Cyber Security and Fujian Provincial Key Lab of Network Security and Cryptology, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security and Fujian Provincial Key Lab of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100375485"],"corresponding_institution_ids":["https://openalex.org/I111753288"],"apc_list":null,"apc_paid":null,"fwci":4.3729,"has_fulltext":false,"cited_by_count":37,"citation_normalized_percentile":{"value":0.95193253,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"9","issue":"4","first_page":"2353","last_page":"2363"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12592","display_name":"Opinion Dynamics and Social Influence","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/maximization","display_name":"Maximization","score":0.5789185762405396},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5732755661010742},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5627911686897278},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.5621393918991089},{"id":"https://openalex.org/keywords/greedy-algorithm","display_name":"Greedy algorithm","score":0.5307688117027283},{"id":"https://openalex.org/keywords/heuristic","display_name":"Heuristic","score":0.5188421010971069},{"id":"https://openalex.org/keywords/notation","display_name":"Notation","score":0.5161343812942505},{"id":"https://openalex.org/keywords/social-network","display_name":"Social network (sociolinguistics)","score":0.5107822418212891},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.41930681467056274},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3256329894065857},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.31644436717033386},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.30583053827285767},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.23624375462532043},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.16363537311553955},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.14853695034980774},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.1439754068851471}],"concepts":[{"id":"https://openalex.org/C2776330181","wikidata":"https://www.wikidata.org/wiki/Q18358244","display_name":"Maximization","level":2,"score":0.5789185762405396},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5732755661010742},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5627911686897278},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.5621393918991089},{"id":"https://openalex.org/C51823790","wikidata":"https://www.wikidata.org/wiki/Q504353","display_name":"Greedy algorithm","level":2,"score":0.5307688117027283},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.5188421010971069},{"id":"https://openalex.org/C45357846","wikidata":"https://www.wikidata.org/wiki/Q2001982","display_name":"Notation","level":2,"score":0.5161343812942505},{"id":"https://openalex.org/C4727928","wikidata":"https://www.wikidata.org/wiki/Q17164759","display_name":"Social network (sociolinguistics)","level":3,"score":0.5107822418212891},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.41930681467056274},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3256329894065857},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.31644436717033386},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.30583053827285767},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.23624375462532043},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.16363537311553955},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.14853695034980774},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.1439754068851471},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnse.2022.3163203","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2022.3163203","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Quality Education","id":"https://metadata.un.org/sdg/4","score":0.6000000238418579}],"awards":[{"id":"https://openalex.org/G4481851352","display_name":null,"funder_award_id":"62171132","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4778711934","display_name":null,"funder_award_id":"61771140","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4875579843","display_name":null,"funder_award_id":"U1905211","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":45,"referenced_works":["https://openalex.org/W137627111","https://openalex.org/W1931400479","https://openalex.org/W1966648745","https://openalex.org/W1971373575","https://openalex.org/W1981141219","https://openalex.org/W1984069252","https://openalex.org/W1993798795","https://openalex.org/W2004559608","https://openalex.org/W2043396212","https://openalex.org/W2056944867","https://openalex.org/W2061820396","https://openalex.org/W2081709066","https://openalex.org/W2096734559","https://openalex.org/W2105302963","https://openalex.org/W2108858998","https://openalex.org/W2110699703","https://openalex.org/W2139322160","https://openalex.org/W2150881673","https://openalex.org/W2153624566","https://openalex.org/W2324938255","https://openalex.org/W2558384379","https://openalex.org/W2574529824","https://openalex.org/W2591977458","https://openalex.org/W2627064876","https://openalex.org/W2766743208","https://openalex.org/W2792990871","https://openalex.org/W2800049438","https://openalex.org/W2889129406","https://openalex.org/W2904476569","https://openalex.org/W2911650965","https://openalex.org/W2914506472","https://openalex.org/W2922616448","https://openalex.org/W2937558194","https://openalex.org/W2944208101","https://openalex.org/W2946661471","https://openalex.org/W2963955587","https://openalex.org/W2981168838","https://openalex.org/W2986416218","https://openalex.org/W2987154163","https://openalex.org/W3014199725","https://openalex.org/W3034009801","https://openalex.org/W3036793176","https://openalex.org/W3047385176","https://openalex.org/W3100526240","https://openalex.org/W7033755713"],"related_works":["https://openalex.org/W2891776881","https://openalex.org/W2244559970","https://openalex.org/W2557467218","https://openalex.org/W2536297025","https://openalex.org/W2771290394","https://openalex.org/W2918080139","https://openalex.org/W3130064765","https://openalex.org/W1574303229","https://openalex.org/W2618582729","https://openalex.org/W4298470087"],"abstract_inverted_index":{"A":[0],"mobile":[1,7,22],"social":[2,13],"network":[3,43,79,110,148,164],"(MSN)":[4],"is":[5,57],"a":[6,20,42,109,197],"communications":[8],"system":[9],"that":[10,45,210],"involves":[11],"the":[12,16,46,51,103,122,126,146,158,167,172,176,184,189,204,206],"relationship":[14,124],"of":[15,71,99,121,199],"users,":[17],"in":[18,65,88,183],"such":[19,44],"network,":[21,173],"users":[23],"can":[24],"spread":[25,48],"information,":[26],"opinions,":[27],"ideas,":[28],"rumors.":[29],"Influence":[30],"Maximization":[31],"(IM)":[32],"aims":[33],"to":[34,101,170,187,202],"identify":[35],"<inline-formula":[36,52,159],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[37,53,160],"xmlns:xlink=\"http://www.w3.org/1999/xlink\"><tex-math":[38,54,161],"notation=\"LaTeX\">$k$</tex-math></inline-formula>":[39,55,162],"nodes":[40,56],"from":[41],"influence":[47,72,100,112],"generated":[49],"by":[50,150],"maximized,":[58],"which":[59],"has":[60],"been":[61],"attracting":[62],"increasing":[63],"attention":[64],"recent":[66],"years.":[67],"However,":[68],"existing":[69],"methods":[70,195],"maximization":[73],"are":[74],"heuristic":[75],"algorithms":[76,83],"based":[77,84],"on":[78,85,93,196],"topology":[80],"and":[81,125,138,174],"greedy":[82],"spreading.":[86],"Accordingly,":[87],"this":[89],"paper,":[90],"we":[91,106,129,144,156],"focused":[92],"Network":[94],"Motifs":[95],"(NM)":[96],"as":[97,166],"drivers":[98],"impact":[102],"spreading":[104],"process,":[105],"proposed":[107,194],"IM-NM,":[108],"motifs-based":[111],"maximation":[113],"scheme":[114],"for":[115],"delivering":[116],"information":[117],"efficiently.":[118],"In":[119],"consideration":[120],"communication":[123,181],"users\u2019":[127],"attributes,":[128],"first":[130],"defined":[131],"Weight":[132],"Ratio":[133],"(WR),":[134],"Degree":[135],"Density":[136],"(DD),":[137],"Structural":[139],"Stability":[140],"Level":[141],"(SSL).":[142],"Then":[143],"identified":[145],"key":[147,163,185],"motifs":[149,165,186],"Naive":[151],"Bayesian":[152],"machine":[153],"learning.":[154],"Finally,":[155],"adopted":[157],"unit":[168],"structure":[169],"reconstruct":[171],"select":[175],"bridge":[177],"node":[178],"with":[179],"strong":[180],"ability":[182],"maximize":[188],"information.":[190],"We":[191],"implement":[192],"our":[193,211],"set":[198],"real-world":[200],"networks":[201],"evaluate":[203],"performance,":[205],"experimental":[207],"results":[208],"demonstrate":[209],"proposal":[212],"achieves":[213],"better":[214],"performance":[215],"than":[216],"other":[217],"related":[218],"methods.":[219]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":14},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":6}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
