iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1109/TCSS.2018.2818661
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,17]],"date-time":"2024-08-17T05:08:29Z","timestamp":1723871309019},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2018,6,1]],"date-time":"2018-06-01T00:00:00Z","timestamp":1527811200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput. Soc. Syst."],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/tcss.2018.2818661","type":"journal-article","created":{"date-parts":[[2018,4,10]],"date-time":"2018-04-10T18:09:49Z","timestamp":1523383789000},"page":"468-480","source":"Crossref","is-referenced-by-count":49,"title":["Distributed Rumor Blocking With Multiple Positive Cascades"],"prefix":"10.1109","volume":"5","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-3247-4019","authenticated-orcid":false,"given":"Guangmo","family":"Tong","sequence":"first","affiliation":[]},{"given":"Weili","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Ding-Zhu","family":"Du","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531642"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2505571"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2556612"},{"key":"ref30","author":"leskovec","year":"2014","journal-title":"SNAP Datasets Stanford large network dataset collection"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2011.99"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623684"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557047"},{"key":"ref10","first-page":"1589","article-title":"Rumor has it: Identifying misinformation in microblogs","author":"qazvinian","year":"2011","journal-title":"Proc Conf Empirical Methods Natural Language Process"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SCIS-ISIS.2012.6505254"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2015.29"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2158885"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2637364.2591993"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/502512.502525"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956769"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77105-0_31"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17572-5_48"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2585591"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2002.1181966"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963499"},{"key":"ref27","first-page":"286","author":"nash","year":"1951","journal-title":"Non-Cooperative Games"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2013.34"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8056957"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/BF01588971"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972825.40"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557077"},{"key":"ref7","first-page":"1","article-title":"Centralized and decentralized rumor blocking problems","author":"chen","year":"2016","journal-title":"J Combinat Optim"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2487788.2488033"},{"key":"ref9","first-page":"297","article-title":"Detecting and tracking political abuse in social media","author":"ratkiewicz","year":"2011","journal-title":"Proc ICSWM 5th Int AAAI Conf Weblogs and Social Media"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2380718.2380746"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69355-0_16"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2014.2313024"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2014.2339799"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2556719"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s10878-013-9635-7"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2563397"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2015.2451624"}],"container-title":["IEEE Transactions on Computational Social Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6570650\/8365861\/08334598.pdf?arnumber=8334598","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:22:44Z","timestamp":1642004564000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8334598\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":36,"journal-issue":{"issue":"2"},"URL":"http:\/\/dx.doi.org\/10.1109\/tcss.2018.2818661","relation":{},"ISSN":["2329-924X"],"issn-type":[{"value":"2329-924X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,6]]}}}