[1] Katz E, Lazarsfeld P F, Roper E.Personal influence:the part played by people in the flow of mass communications[J].The Canadian Journal of Economics and Political Science, 1957, 23(4):572-574.
[2] Rogers E M, Singhal A, Quinlan M M.Diffusion of innovations[C]//An Integrated Approach to Communication Theory and Research.Routledge:[s.n.], 2014:432-448.
[3] Watts D J, Dodds P S.Influentials, networks, and public opinion formation[J].Journal of Consumer Research, 2007, 34(4):441-458.
[4] McCallum A, Wang Xueri, Corrada-Emmanuel A.Topic and role discovery in social networks with experiments on enron and academic email[J].Journal of Artificial Intelligence Research, 2007, 30(1):249-272.
[5] Zhang Yang, Wu Yao, Yang Qing.Community discovery in twitter based on user interests[J].Journal of Computational Information Systems, 2012, 8(3):991-1000.
[6] Fei Hongliang, Jiang Ruoyi, Yang Yuhao, et al.Content based social behavior prediction:a multi-task learning approach[C]//Proceedings of the 20th ACM International Conference on Information and Knowledge Management.New York:ACM, 2011:995-1000.
[7] Lin C, Mei Q, Jiang Y, et al.Inferring the diffusion and evolution of topics in social communities[J].Social Network Mining and Analysis, 2011(3):d5.
[8] Zhu Jiang, Xiong Fei, Piao Dongzhen, et al.Statistically modeling the effectiveness of disaster information in social media[C]//Global Humanitarian Technology Conference (GHTC).New York:IEEE Press, 2011:431-436.
[9] Altenburger K M, Ugander J.Monophily in social networks introduces similarity among friends-of-friends[J].Nature Human Behaviour, 2018, 2(4):284-290.
[10] Yang Ming, Hsu W H, Kallumadi S T.Predictive analytics of social networks:a survey of tasks and techniques[J].Social Media Marketing:Breakthroughs in Research and Practice.IGI Global, 2018:823-862.
[11] Leskovec J, McGlohon M, Faloutsos C, et al.Patterns of cascading behavior in large blog graphs[C]//Proceedings of the 2007 SIAM International Conference on Data Mining.2007:551-556.
[12] Barabasi A L.The origin of bursts and heavy tails in human dynamics[J].Nature, 2005, 435(7039):207-211.
[13] Malmgren R D, Stouffer D B, Motter A E, et al.A poissonian explanation for heavy tails in e-mail communication[J].Proceedings of the National Academy of Sciences of the United States of America, 2008, 105(47):18153-18158.
[14] Khuller S, Moss A, Naor J S.The budgeted maximum coverage problem[J].Information Processing Letters, 1999, 70(1):39-45.
[15] Leskovec J, Krause A, Guestrin C, et al.Cost-effective outbreak detection in networks[C]//Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.New York:ACM, 2007:420-429.
[16] Goyal A, Bonchi F, Lakshmanan L V S.Learning influence probabilities in social networks[C]//Proceedings of the Third ACM International Conference on Web Search and Data Mining.New York:ACM, 2010:241-250.
[17] Leskovec J, Faloutsos C.Scalable modeling of real graphs using Kronecker multiplication[C]//Proceedings of the 24th International Conference on Machine Learning.New York:ACM, 2007:497-504.
[18] Erdös P, Rényi A.On the evolution of random graphs[J].Publ Math Inst Hung Acad Sci, 1960(5):17-61.
[19] Clauset A, Moore C, Newman M E J.Hierarchical structure and the prediction of missing links in networks[J].Nature, 2008, 453(7191):98-101.
[20] Grover A, Zweig A, Ermon S.Graphite:iterative generative modeling of graphs[J].arXiv preprint arXiv:1803.10459, 2018.
[21] Shetty J, Adibi J.The Enron email dataset database schema and brief statistical report[J].Information Sciences Institute Technical Report.[S.l.]:University of Southern California, 2004, 4(1):120-128.
[22] Cohen W W.Enron email data set[EB/OL].2013.http://www.cs.cmu.edu/~enron/. |