[2] Chen, W., Wang, C., & Wang, Y. (2010, July 25-28).
Scalable influence maximization for prevalent viral marketing in large-scale social networks. Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, Washington, DC, USA.
https://doi.org/10.1145/1835804.1835934
[3] Bakshy, E., Hofman, J. M., Mason, W. A., & Watts, D. J. (2011, February 9-12).
Everyone's an influencer: quantifying influence on twitter. Proceedings of the fourth ACM international conference on Web search and data mining, Hong Kong, China.
https://doi.org/10.1145/1 935826.1935845
[5] Li, Y., Fan, J., Wang, Y., & Tan, K. L. (2018). Influence Maximization on Social Graphs: A Survey.
IEEE Transactions on Knowledge and Data Engineering,
30(10), 1852-1872.
https://doi.org/10.1109/TKDE.2018.2807843
[7] Chandran, J., & Viswanatham, V. M. (2021, February 19-20).
Evaluating the Effectiveness of Community Detection Algorithms for Influence Maximization in Social Networks. 2021 International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies Bhilai, India
https://doi.org/10.1109/ICAECT49130.2021.939 2387
[8] Kumar, S., Singhla, L., Jindal, K., Grover, K., & Panda, B. S. (2021). IM-ELPR: Influence maximization in social networks using label propagation based community structure.
Applied Intelligence,
51(11), 7647-7665.
https://doi.org/10.1007/s10489-021-02266-w
[9] Wang, Z., Sun, C., Xi, J., & Li, X. (2021). Influence maximization in social graphs based on community structure and node coverage gain.
Future Generation Computer Systems,
118, 327-338.
https://doi.org/10.1016/j.future.2021.01.025
[11] Rosvall, M., & Bergstrom, C. T. (2008). Maps of random walks on complex networks reveal community structure.
Proceedings of the National Academy of Sciences,
105(4), 1118-1123.
https://doi.org/10.1073/pnas.0706851105
[13] Zhang, Y., Lyu, T., & Zhang, Y. (2018, February 2–7).
COSINE: Community-Preserving Social Network Embedding From Information Diffusion Cascades. The Thirty-Second AAAI Conference on Artificial Intelligence, New Orleans, Louisiana USA.
https://ojs.aa ai.org/index.php/AAAI/article/view/11856
[16] Amodei, D., Ananthanarayanan, S., Anubhai, R., Bai, J., Battenberg, E., & ... (2016, June 19-24).
Deep Speech 2 : End-to-End Speech Recognition in English and Mandarin. Proceedings of The 33rd International Conference on Machine Learning, NewYork, United States.
https:/ /proceedings.mlr.press/v48/amodei16.html
[17] Yang, H., Li, S., Wu, X., Lu, H., & Han, W. (2019). A Novel Solutions for Malicious Code Detection and Family Clustering Based on Machine Learning.
IEEE Access,
7, 148853-148860.
https://doi.org/10.1109/ACCESS.2019.2946482
[18] Zhao, D., Gao, B., Wang, Y., Wang, L., & Wang, Z. (2018). Optimal Dismantling of Interdependent Networks Based on Inverse Explosive Percolation.
IEEE Transactions on Circuits and Systems II: Express Briefs,
65(7), 953-957.
https://doi.org/10.1109/TCSII.2018.27 93257
[19] Collobert, R., & Weston, J. (2008, July 5-9).
A unified architecture for natural language processing: deep neural networks with multitask learning. Proceedings of the 25th international conference on Machine learning, Helsinki, Finland.
https://doi.org/10 .1145/1390156.1390177
[20] Li, S., Jiang, L., Wu, X., Han, W., Zhao, D., & Wang, Z. (2021). A weighted network community detection algorithm based on deep learning.
Applied Mathematics and Computation,
401(7), 126012.
https://doi.org/10.1016/j.amc.2021.126012
[21] Keikha, M. M., Rahgozar, M., Asadpour, M., & Abdollahi, M. F. (2020). Influence maximization across heterogeneous interconnected networks based on deep learning.
Expert Systems with Applications,
140(10), 112905.
https://doi.org/10.10 16/j.eswa.2019.112905
[22] Kitsak, M., Gallos, L. K., Havlin, S., Liljeros, F., Muchnik, L., Stanley, H. E., & Makse, H. A. (2010). Identification of influential spreaders in complex networks.
Nature Physics,
6(11), 888-893.
https://doi.org/10.1038/nphys1746