共 36 条
- [1] [Anonymous], 2002, KDD 2002, DOI DOI 10.1145/775047.775057
- [2] [Anonymous], 2013, NIPS
- [3] [Anonymous], 2011, P 28 INT C MACH LEAR, DOI 10.5555/3104482.3104553
- [4] [Anonymous], 2014, COSN
- [5] Reconciling Privacy and Utility in Continuous-Time Diffusion Networks [J]. 2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, : 292 - 304
- [6] A Tight Linear Time (1/2)-Approximation for Unconstrained Submodular Maximization [J]. 2012 IEEE 53RD ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS), 2012, : 649 - 658
- [7] Budak Ceren, 2011, WWW, P665, DOI [10.1145/1963405.1963499, DOI 10.1145/1963405.1963499]
- [8] Carnes Tim, 2007, P 9 INT C EL COMM, P351
- [9] Efficient Influence Maximization in Social Networks [J]. KDD-09: 15TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2009, : 199 - 207
- [10] Chen Wei, 2010, P KDD, P1029, DOI DOI 10.1145/1835804.1835934