2018
DOI: 10.1007/s10489-018-1303-2
|View full text |Cite
|
Sign up to set email alerts
|

Influence maximization on signed networks under independent cascade model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 37 publications
(12 citation statements)
references
References 46 publications
0
12
0
Order By: Relevance
“…This algorithm uses the linear threshold model and its extended LT-N to maximize the influence of cumulative features by considering positive and negative relationships. Liu et al [31] used an independent cascading model in signed networks to study influence maximization and proposed a greedy algorithm based on independent paths to maximize the spread of positive influence in signed networks. Li et al [32][33][34][35][36] investigated Community-diversified Influence Maximization (CDIM) problem to find k nodes and also proposed a metric to measure the community-diversified influence and addresses a series of computational challenges.…”
Section: Related Workmentioning
confidence: 99%
“…This algorithm uses the linear threshold model and its extended LT-N to maximize the influence of cumulative features by considering positive and negative relationships. Liu et al [31] used an independent cascading model in signed networks to study influence maximization and proposed a greedy algorithm based on independent paths to maximize the spread of positive influence in signed networks. Li et al [32][33][34][35][36] investigated Community-diversified Influence Maximization (CDIM) problem to find k nodes and also proposed a metric to measure the community-diversified influence and addresses a series of computational challenges.…”
Section: Related Workmentioning
confidence: 99%
“…We generate the instances G t of the social network by using dynamic link prediction method [55], [56] at the beginning of every time slot or hop t. Again, the selective link prediction effectively reduces computational complexity, and hence, we predict links for only necessary newly infected nodes instead of all the nodes in the whole network.…”
Section: Dynamic Link Predictionmentioning
confidence: 99%
“…Liu et. al., have developed a greedy algorithm for the IM problem [15]. It constructs the set of spreading paths.…”
Section: Greedy Approaches (Aç Gözlü Yaklaşımlar)mentioning
confidence: 99%