Return to Article Details Influence Maximization Using Influence and Susceptibility Embeddings Download Download PDF