Fig. 1From: Context-based influence maximization with privacy protection in social networksAn example of IDC model and the procedure of information diffusion in IDC modelBack to article page