<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Corresponding author.
$ auletta@unisa.it (V. Auletta); fcauteruccio@unisa.it (F. Cauteruccio); dferraioli@unisa.it (D. Ferraioli)</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Heuristics Approaches for the Influence Maximization Problem on Hypergraphs</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>(Discussion Paper)</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vincenzo Auletta</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Francesco Cauteruccio</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Diodato Ferraioli</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Information Engineering, Electrical Engineering and Applied Mathematics (DIEM), University of Salerno</institution>
          ,
          <addr-line>I84084, Fisciano</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2024</year>
      </pub-date>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>While the Influence Maximization (IM) problem has been extensively studied in graph topologies, with numerous algorithms and heuristics proposed, there has been relatively little focus on exploring this problem in the context of hypergraphs, which, despite being more complex, ofer greater expressiveness. In this paper, we consider the current IM scenario considering hypergraph topologies, and we discuss two families of algorithms for the IM problem. The first family uses node importance measures that are specifically defined for hypergraphs, leveraging both topological characteristics and concepts from cooperative game theory. The second family addresses the problem through two well-known metaheuristic approaches, namely, hill climbing and evolution strategy. An initial experimental evaluation demonstrates that these approaches frequently outperform the leading algorithms currently proposed in the literature.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Influence Maximization</kwd>
        <kwd>Hypergraphs</kwd>
        <kwd>Shapley Value</kwd>
        <kwd>Hill Climbing</kwd>
        <kwd>Evolution Strategies</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        The advent of social media and viral marketing has highlighted the critical need to understand how
information, behaviors, and innovations propagate through networks. Central to this exploration is
the influence maximization (IM) problem, a key concept in network theory, where the objective is to
identify a group of key individuals in a network whose combined influence is maximized [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ]. This
problem has attracted substantial attention in diferent areas, and its implications are broad, impacting
various applications, including opinion formation, combating misinformation, link recommendations,
and even influencing election outcomes on social networks [
        <xref ref-type="bibr" rid="ref3 ref4 ref5 ref6 ref7">3, 4, 5, 6, 7</xref>
        ]. The primary goal is to identify
the smallest set of nodes (or seeds) in a graph that can maximize the spread of information under specific
propagation models. Traditionally, the IM problem has been studied within the context of standard
networks with dyadic relationships [
        <xref ref-type="bibr" rid="ref2 ref8">2, 8</xref>
        ], with the seminal work in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] establishing hardness results and
introducing an algorithm with a (1 − 1/) approximation guarantee under the independent cascade (IC)
and linear threshold (LT) difusion models. Over time, a variety of approaches tackling the IM problem
have been developed [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref9">9, 10, 11, 12</xref>
        ]. However, recent advancements in hypernetwork science, a field that
explores higher-order interactions within complex systems [13], have introduced new opportunities.
Hypergraphs, the primary modeling tool in this field, extend traditional graph theory by enabling
edges (which we now call hyperedges) to connect multiple vertices simultaneously, ofering a richer
representation of real-world phenomena. While the IM problem has been extensively studied in ordinary
networks, its adaptation to hypergraphs remains a relatively nascent area of research. Early eforts
focused on transforming hypergraphs into simpler structures, such as bipartite graphs, to leverage
existing algorithms [14]. However, this approach often loses critical information encoded in the
higherorder structure of hypergraphs. The computational challenges of IM in hypergraphs were rigorously
explored in [15], which demonstrated the problem’s NP-hardness and proposed an approximation
framework with a (1 − 1/ −  ) guarantee. Building on this foundation, recent studies have developed
specialized algorithms tailored to specific difusion models. For instance, [ 16] introduced heuristics under
the LT difusion model, while [ 17] proposed a ranking-based approach for the HyperCascade model.
Algorithms like HADP [18] and MEI [19] have sought to minimize overlap between seeds to enhance
influence spread, though both rely on transforming hypergraphs into simpler graph representations.
Direct approaches to IM on hypergraphs have also gained traction. Similarly, [20] modeled hypergraphs
as electrostatic fields, introducing a novel perspective for assessing node influence. Other contributions,
such as [21], extended message-passing techniques from ordinary networks to hypergraphs, focusing on
collective influence within hyperedges. Research on weighted hypergraphs, as in [ 22], has introduced
adaptive dissemination models to better capture real-world dynamics. Despite these advancements,
many existing methods either specialize in a single difusion process or require structural transformations
that limit their generality.
      </p>
      <p>
        Furthermore, it is worth noting that, to the best of our knowledge, several aspects remain
understudied in this context. First, traditional types of IM algorithms have yet to be thoroughly explored
for hypergraph topologies. Generally, classical IM approaches are categorized into four main types: (i)
simulation-based, (ii) proxy-based, (iii) sketch-based, and (iv) intelligent optimization-based approaches.
The first category includes algorithms that utilize techniques such as Monte Carlo simulations to model
information propagation across individual nodes. A notable example is the algorithm proposed in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ],
which has also been extended to hypergraph topologies. The second category adopts proxy models
to approximate the influence spread of a given seed set, thereby avoiding potentially time-consuming
simulations. Several algorithms in this category, such as those proposed in [18, 19], have been adapted
for hypergraph topologies. The third category encompasses algorithms that evaluate influence spread
by computing sketches based on the given graph and a specific difusion model. While some classical
approaches, such as reverse influence sampling, have been explored in the literature [ 18], their
application to and formalization for hypergraph topologies remains an ongoing area of research. Finally, the
fourth category involves the use of intelligent optimization algorithms, such as metaheuristic methods,
to address the IM problem. Although a plethora of such approaches have been proposed in the classical
setting, relatively few have been developed specifically for hypergraph topologies [23].
      </p>
      <p>In this discussion paper, we illustrate an ongoing work focusing on the design and development of
two families of approaches for tackling the IM problem on hypergraphs. These include node
propertiesbased algorithms and metaheuristics-based algorithms. The former involves an algorithm that selects
seed nodes by considering diferent centrality values, some of them also based on cooperative game
theory. The latter consists of two metaheuristics algorithms based on hill climbing and evolutionary
strategy, respectively. Also, we highlight an initial experimental evaluation, in which these algorithms
are used, and we conclude by discussing several research directions that, in our opinion, are worth to
be studied in the future.</p>
      <p>The outline of the paper is as follows. In Section 2, we provide the background definitions and the
problem statement. In Section 3, we discuss the two families of algorithms, and we briefly highlight
an initial experimental evaluation assessing their performance. Finally, in Section 4, we draw our
conclusion and discuss a series of future directions regarding this context.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Problem Statement</title>
      <p>A hypergraph  = (, ) is a pair consisting of a set  = {1, . . . , } of elements called nodes, and a
family of sets  = (1, . . . , ) called hyperedges. A hyperedge represents a relation among a subset
of vertices in  , i.e.,  ⊆  , for all  = 1, . . . , . The order of a hypergraph is its number of nodes,
i.e.,  = | |, while the size of a hypergraph is  = ||. A node  ∈  belongs to a hyperedge  ∈ 
if  ∈  . The degree of a node  is the number () of neighbors of ; a node  ∈  is the neighbor
of node  if there exists at least one hyperedge  which  and  both belong to. The hyperdegree
of a node  is the number  () of hyperedges to which  belongs. The line graph () of  is
the graph on node set ′ = {′1, . . . , ′} and edge set  ′ = {{′, ′ } :  ∩  ̸= ∅ for  ̸= } [24]. In
other words, () is the graph where nodes represent the hyperedges, and there is an edge between
two nodes if the two hyperedges share at least one common node in . Furthermore, given a set  of
nodes and a function  : 2 → R, that assigns a measure of importance to each subset of nodes, the
Shapley value of  ∈  [25] with respect to  is defined as the average of the marginal contribution
of  to the subsets at which she belongs, i.e., how much she increases the importance of these groups.
The Shapley value can be eficiently computed for the following specific choices of  [26], namely: (i)
 (), that measures the importance of a subset  of nodes as its size and the number of neighbors; (ii)
 (), that measures the importance of a subset  of nodes as the inverse of the minimum distance
between nodes outside  from nodes in . Given a hypergraph  = (, ), a value  ∈ Z&gt;0, and a
difusion process model on hypergraph   , the Influence Maximization (IM) problem on hypergraphs
consists in finding a subset * ⊆  of  nodes, called seed node set, such that the expected number
of infected nodes is maximized. Formally, * = arg max⊆ ,||=   (), where   () indicates the
expected influence (i.e., the number of reached nodes) of the seed node set  at the end of the process.
In line with the literature [18, 19], we use the Susceptible-Infected (SI) model with Contact Process (CP)
dynamics on hypergraphs (SICP [18]). In this model, a node can be either in a susceptible (S) or infected
(I) state. An S-state node can be infected by each of its neighbors in the I-state with a given infection
rate  . The model works as follows: (i) nodes in the seed set are set to be infected (I-state), and the
remaining nodes are susceptible (S-state); (ii) at each time step , we find the I-state nodes. For each
I-state node , we find all hyperedges  containing the node . Then, a hyperedge  is chosen from
 uniformly at random. Then, each of the S-state nodes in  will be infected by  with probability  ;
(iii) the process terminates after  steps, and we set   () to be the number of nodes in I-state.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Algorithms and Results</title>
      <p>
        We discuss two families of algorithms to tackle the IM problem on hypergraphs. The first one consists
of an algorithm called SmartPROPS. It leverages node centrality to construct an optimal seed set, based
on a node property function  :  → R and a threshold function  :  → R. The idea behind the
algorithm is to use  to sort nodes, and then iteratively select the most important one based on  , which
ensures that nodes with a considerable number of overlapping hyperedges are discarded. We propose
four diferent variants of SmartPROPS, namely: (i) SmartDEG, in which the seeds coincide with the
top- highest degree nodes [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], and  is the degree centrality; (ii) SmartHYPERDEG, similar as the
previous one, it exploits the hyperdegree of each node; (iii) SmartSHAPDEG, the Shapley Degree value,
computed on (), is used as the node property; (iv) SmartSHAPCLOSE, here the Shapley Closeness
is used as the node property instead. The second family of algorithms is metaheuristics-based, and
includes two algorithms, HC and ES. The former is based on a random-restart steepest ascent hill
climbing approach. It is a simple yet powerful and versatile metaheuristic optimization algorithm that
iteratively seeks to improve a solution with respect to a given measure of quality; it has been used
extensively in disparate contexts [27, 28, 29]. The algorithm begins by randomly selecting an initial
solution and iteratively improves it by generating neighbor solutions, via a perturbation function, and
upgrading it accordingly to the calculated expected influence. Eventually, a global best solution is
obtained when no further improvements are possible. Four variants can be defined: HC1, where a node
from  is replaced with one of its neighbors chosen randomly from the largest hyperedge containing
the former; HC2, similarly as HC1 but the node to be replaced is the one with the smaller degree value;
HC3 and HC4 replace the node having respectively the smallest Shapley Degree value and the smallest
Shapley Closeness value. Instead, ES draws inspiration from a population-based metaheuristic inspired
by the principles of biological evolution, called evolution strategy [30], and it is based in particular on a
variant called ( +  ) [31], where  is the number of candidate solutions in the parent generation, and
 is the number of candidate solutions obtained from the parent generation. The algorithm iterates for
a given number of generations. At each generation, the best  solutions are kept from the  candidates
and their parents. At the start, ES initializes a population of  individuals, chosen uniformly at random.
200
)150
S
(H100
50
0
      </p>
      <p>In each generation, the algorithms iterates over  to generate the same amounts of new solutions via
a mutation operator. This operator implements the same variations proposed for the HC algorithm,
leading to the ES1, ES2, ES3, and ES4 variants.</p>
      <p>
        We now highlight some preliminary results of the proposed algorithms on eight real-world
hypergraphs used as benchmarks in the literature [18, 19]. Diferent baselines are considered, namely, Degree,
Greedy, HADP [18], and Adeff [19]1. The first is a common baseline based on selecting the top- 
nodes with the maximal degree. The second one is drawn by the approach in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], and selects the node
with maximal influence in each iteration. The last two are recently proposed algorithms for the problem.
For the discussed algorithms, we set parameters as follows: for HC, we set the number of restarts to
25, while for ES, we set  = 4,  = 10, and the maximum number of generations to 25. The obtained
influence spread curve is presented in Figure 1, averaged over 100 runs. For variants, we only show HC1
and ES1. The -axis refers to the value of , while the -axis reports the average expected influence
  (). Inside each plot, a smaller one reports the obtained value at  = 25. We can see how the
metaheuristics-based algorithms generally perform better than the remaining ones. Also, they achieve
the largest expected influence when  = 1. Except for some cases where the Greedy reaches similar
values, no other algorithms perform in the same manner. As far as  = 25 is concerned, we observe
almost identical behavior to the previous one. Here, HC1 and ES1 perform efectively, together with the
Greedy one.
      </p>
    </sec>
    <sec id="sec-4">
      <title>4. Conclusion and Future Directions</title>
      <p>This discussion paper explores the Influence Maximization (IM) problem within hypergraph topologies,
an area that remains largely understudied despite its significant potential for capturing higher-order
interactions in complex systems. In this paper, we critically discuss two families of algorithms, namely,
(i) node properties-based, (ii) and metaheuristics-based ones, designed to address the challenges of the
IM problem on hypergraph topologies. The first family involves an algorithm that leverages
hypergraphspecific features, such as Shapley-based centrality measures, to select the seed set, while the second one
includes metaheuristics algorithms, and in particular hill climbing and evolutionary strategies, to tackle
the problem. Our initial analysis, supported by experimental observations, provides insight into the
potential of these approaches while highlighting areas where further refinement is needed.</p>
      <p>As this is an ongoing efort, several directions for future research emerge. First, we aim to deepen our
understanding of the problem by performing a comprehensive evaluation across diverse hypergraph
structures and difusion models. This includes investigating settings with diferent conditions, such
as hypergraphs evolving over time, and hypergraphs presenting weights and other dynamic features.
1All algorithms have been implemented in Python 3.10
Second, a critical area of future work lies in designing scalable algorithms suitable for large-scale
hypergraphs. Indeed, such algorithms could require exploring parallelization techniques and designing
more eficient heuristics. Furthermore, incorporating adaptive mechanisms to optimize parameter
selection dynamically could improve algorithmic robustness and applicability. Third, an understudied
aspect is investigating practical applications of the IM problem in domains such as social influence
campaigns, biological networks, and knowledge graph propagation. Bridging the gap between theoretical
discussions and real-world deployment is essential for demonstrating the utility of hypergraph-based
IM approaches. Finally, future work could also explore the integration of these algorithms with machine
learning models to predict influence spread, potentially combining traditional IM techniques with
data-driven approaches.</p>
    </sec>
    <sec id="sec-5">
      <title>Acknowledgments</title>
      <p>This work is supported by the PNRR project FAIR—Future AI Research (PE00000013) under the NRRP
MUR program funded by NextGenerationEU.
[13] F. Battiston, G. Cencetti, I. Iacopini, V. Latora, M. Lucas, A. Patania, J.-G. Young, G. Petri, Networks
beyond pairwise interactions: Structure and dynamics, Physics Reports 874 (2020) 1–92. Elsevier.
[14] F. Amato, V. Moscato, A. Picariello, G. Sperlí, Influence maximization in social media networks
using hypergraphs, in: Proc. of the International Conference on Green, Pervasive, and Cloud
Computing (GPC), 2017, pp. 207–221. Springer.
[15] J. Zhu, J. Zhu, S. Ghosh, W. Wu, J. Yuan, Social influence maximization in hypergraph in social
networks, IEEE Transactions on Network Science and Engineering 6 (2018) 801–811. IEEE.
[16] A. Antelmi, G. Cordasco, C. Spagnuolo, P. Szufel, Social influence maximization in hypergraphs,</p>
      <p>Entropy 23 (2021) 796. MDPI.
[17] A. MA, A. Rajkumar, Hyper-imrank: Ranking-based influence maximization for hypergraphs, in:
Proc. of the 5th Joint International Conference on Data Science &amp; Management of Data (9th ACM
IKDD CODS and 27th COMAD), 2022, pp. 100–104. ACM.
[18] M. Xie, X.-X. Zhan, C. Liu, Z.-K. Zhang, An eficient adaptive degree-based heuristic algorithm for
influence maximization in hypergraphs, Information Processing &amp; Management 60 (2023) 103161.
[19] X. Gong, H. W. X., Wang, C. Chen, W. Zhang, Y. Zhang, Influence maximization on hypergraphs
via multi-hop influence estimation, Information Processing &amp; Management 61 (2024) 103683.
[20] S. Li, X. Li, Influence maximization in hypergraphs: A self-optimizing algorithm based on
electrostatic field, Chaos, Solitons &amp; Fractals 174 (2023) 113888. Elsevier.
[21] R. Zhang, X. Qu, Q. Zhang, X. Xu, S. Pei, Influence maximization based on threshold models in
hypergraphs, Chaos: An Interdisciplinary Journal of Nonlinear Science 34 (2024). AIP Publishing.
[22] Q. Pan, H. Wang, J. Tang, Z. Lv, Z. Wang, X. Wu, Y. Ruan, T. Yv, M. Lao, Eioa: A computing
expectation-based influence evaluation method in weighted hypergraphs, Information Processing
&amp; Management 61 (2024) 103856. Elsevier.
[23] S. Genetti, E. Ribaga, E. Cunegatti, Q. F. Lotito, G. Iacca, Influence maximization in hypergraphs
using multi-objective evolutionary algorithms, in: Proc. of the 18th International Conference on
Parallel Problem Solving from Nature (PPSN), 2024, pp. 217–235. Springer.
[24] S. G. Aksoy, C. Joslyn, C. O. Marrero, B. Praggastis, E. Purvine, Hypernetwork science via
high-order hypergraph walks, EPJ Data Science 9 (2020) 16. Springer.
[25] L. Shapley, A value for n-person games, Contributions to the Theory of Games (1953) 307–317.</p>
      <p>Princeton University Press.
[26] T. Michalak, K. Aadithya, P. Szczepanski, B. Ravindran, N. Jennings, Eficient computation of the
shapley value for game-theoretic network centrality, Journal of Artificial Intelligence Research 46
(2013) 607–650. AI Access Foundation.
[27] M. Gendreau, J.-Y. Potvin, Handbook of metaheuristics, volume 2, Springer, 2010.
[28] H. Li, Y. Liu, S. Yang, Y. Lin, Y. Yang, J. Yoo, An improved hill climbing algorithm for graph
partitioning, The Computer Journal 66 (2023) 1761–1776.
[29] C. Stamile, F. Cauteruccio, G. Terracina, D. Ursino, G. Kocevar, D. Sappey-Marinier, A model-guided
string-based approach to white matter fiber-bundles extraction, in: Proc. of 8th International
Conference on Brain Informatics and Health (BIH 2015), London, UK, August 30-September 2,
2015. Proceedings 8, 2015, pp. 135–144. Springer.
[30] T. Back, Evolutionary algorithms in theory and practice: evolution strategies, evolutionary
programming, genetic algorithms, Oxford University Press, 1996.
[31] D. Simon, Evolutionary optimization algorithms, John Wiley &amp; Sons, 2013.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>D.</given-names>
            <surname>Kempe</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Kleinberg</surname>
          </string-name>
          , E. Tardos,
          <article-title>Maximizing the spread of influence through a social network, in: Proc. of the of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining (KDD</article-title>
          ),
          <year>2003</year>
          , pp.
          <fpage>137</fpage>
          -
          <lpage>146</lpage>
          . ACM.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>S.</given-names>
            <surname>Banerjee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Jenamani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. K.</given-names>
            <surname>Pratihar</surname>
          </string-name>
          ,
          <article-title>A survey on influence maximization in a social network</article-title>
          ,
          <source>Knowledge and Information Systems</source>
          <volume>62</volume>
          (
          <year>2020</year>
          )
          <fpage>3417</fpage>
          -
          <lpage>3455</lpage>
          . Springer.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>V.</given-names>
            <surname>Auletta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Ferraioli</surname>
          </string-name>
          , G. Greco,
          <article-title>On the complexity of reasoning about opinion difusion under majority dynamics</article-title>
          ,
          <source>Artificial Intelligence</source>
          <volume>284</volume>
          (
          <year>2020</year>
          )
          <fpage>103288</fpage>
          . Elsevier.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M.</given-names>
            <surname>Castiglioni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Ferraioli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Gatti</surname>
          </string-name>
          , G. Landriani,
          <article-title>Election manipulation on social networks: Seeding, edge removal, edge addition</article-title>
          ,
          <source>Journal of Artificial Intelligence Research</source>
          <volume>71</volume>
          (
          <year>2021</year>
          )
          <fpage>1049</fpage>
          -
          <lpage>1090</lpage>
          . AI Access Foundation.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>G.</given-names>
            <surname>Bonifazi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Cauteruccio</surname>
          </string-name>
          , E. Corradini,
          <string-name>
            <given-names>M.</given-names>
            <surname>Marchetti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Pierini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Terracina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Ursino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Virgili</surname>
          </string-name>
          ,
          <article-title>An approach to detect backbones of information difusers among diferent communities of a social platform</article-title>
          ,
          <source>Data &amp; Knowledge Engineering</source>
          <volume>140</volume>
          (
          <year>2022</year>
          )
          <fpage>102048</fpage>
          . Elsevier.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>W.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <article-title>Scalable influence maximization for prevalent viral marketing in large-scale social networks</article-title>
          ,
          <source>in: Proc. of the ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD)</source>
          ,
          <year>2010</year>
          , pp.
          <fpage>1029</fpage>
          -
          <lpage>1038</lpage>
          . ACM.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>B.</given-names>
            <surname>Wilder</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Onasch-Vera</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Hudson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Luna</surname>
          </string-name>
          , N. Wilson,
          <string-name>
            <given-names>R.</given-names>
            <surname>Petering</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Woo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Tambe</surname>
          </string-name>
          , E. Rice,
          <article-title>End-to-end influence maximization in the field</article-title>
          ,
          <source>in: Proc. of the International Conference on Autonomous Agents and Multiagent Systems (AAMAS)</source>
          , volume
          <volume>18</volume>
          ,
          <year>2018</year>
          , pp.
          <fpage>1414</fpage>
          -
          <lpage>1422</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>P.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Fang</surname>
          </string-name>
          ,
          <article-title>Identifying influential nodes in social networks: Exploiting self-voting mechanism</article-title>
          ,
          <source>Big Data</source>
          <volume>11</volume>
          (
          <year>2023</year>
          )
          <fpage>296</fpage>
          -
          <lpage>306</lpage>
          . Mary Ann Liebert.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>A.</given-names>
            <surname>Goyal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Lu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. V.</given-names>
            <surname>Lakshmanan</surname>
          </string-name>
          , Celf+
          <article-title>+ optimizing the greedy algorithm for influence maximization in social networks</article-title>
          ,
          <source>in: Proc. of the 20th international conference companion on World Wide Web (WWW)</source>
          ,
          <year>2011</year>
          , pp.
          <fpage>47</fpage>
          -
          <lpage>48</lpage>
          . ACM.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>C.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <article-title>Scalable influence maximization for independent cascade model in large-scale social networks</article-title>
          ,
          <source>Data Mining and Knowledge Discovery</source>
          <volume>25</volume>
          (
          <year>2012</year>
          )
          <fpage>545</fpage>
          -
          <lpage>576</lpage>
          . Springer.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Tang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Shi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Xiao</surname>
          </string-name>
          ,
          <article-title>Influence maximization in near-linear time: A martingale approach</article-title>
          ,
          <source>in: Proc. of the 2015 ACM International Conference on Management of Data (SIGMOD)</source>
          ,
          <year>2015</year>
          , pp.
          <fpage>1539</fpage>
          -
          <lpage>1554</lpage>
          . ACM.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>W.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Yuan</surname>
          </string-name>
          ,
          <string-name>
            <surname>L. Zhang,</surname>
          </string-name>
          <article-title>Scalable influence maximization in social networks under the linear threshold model</article-title>
          ,
          <source>in: Proc. of the 2010 IEEE International Conference on Data Mining (ICDM)</source>
          ,
          <year>2010</year>
          , pp.
          <fpage>88</fpage>
          -
          <lpage>97</lpage>
          . IEEE.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>