Fig. 2From: Context-based influence maximization with privacy protection in social networksA continuous bag-of-word model commonly usedBack to article page