计算机科学 ›› 2021, Vol. 48 ›› Issue (2): 76-86.doi: 10.11896/jsjkx.191200102

• 数据库&大数据&数据科学 • 上一篇    下一篇

社交网络用户影响力的建模方法

谭琪, 张凤荔, 张志扬, 陈学勤   

  1. 电子科技大学信息与软件工程学院(软件工程) 成都610054
  • 收稿日期:2019-12-16 修回日期:2020-04-23 出版日期:2021-02-15 发布日期:2021-02-04
  • 通讯作者: 张凤荔(fzhang@uestc.edu.cn)
  • 作者简介:tanqi1012more@163.com
  • 基金资助:
    国家自然科学基金(61802033,61472064,61602096);四川省科技计划(2018GZ0087,2019YJ0543);四川省区域创新合作项目(2020YFQ0018);博士后基金项目(2018M643453);广东省国家重点实验室项目(2017B030314131);网络与数据安全四川省重点实验室开放课题(NDSMS201606)

Modeling Methods of Social Network User Influence

TAN Qi, ZHANG Feng-li, ZHANG Zhi-yang, CHEN Xue-qin   

  1. School of Information and Software Engineering(Software Engineering),University of Electronic Science and Technology of China, Chengdu 610054,China
  • Received:2019-12-16 Revised:2020-04-23 Online:2021-02-15 Published:2021-02-04
  • About author:TAN Qi,born in 1996,postgraduate,is a member of China Computer Federation.Her main research interests include machine learning,data mining and cascade prediction.
    ZHANG Feng-li,born in 1963,Ph.D,professor,Ph.D supervisor,is a member of China Computer Federation.Her main research interests include network security and network engineering,cloud computing,big data and machine lear-ning.
  • Supported by:
    The National Natural Science Foundation of China(61802033,61472064,61602096),Science and Technology Project of Sichuan Province,China(2018GZ0087,2019YJ0543),Sichuan Provincial Regional Innovation CooperationProject (2020YFQ0018),Postdocto-ral Fund Project(2018M643453),State Key Laboratory Project of Guangdong Province(2017B030314131) and Network and Data Security Key Laboratory of Sichuan Province(NDSMS201606).

摘要: 社交网络用户影响力在舆情演化、广告营销及政治选举等领域有着广泛应用,研究者在过去的工作中,通过分析和建模,在影响力方面取得了一定的成果,但还存在着定义不明晰、技术落后和应用缺乏等问题。文中明确提出了社交网络用户影响力的研究模型,将传统技术与先进技术结合,并据此梳理了该领域的相关文献,主要从用户、内容特征和深度学习技术的角度论述了基于社交网络的用户影响力的研究方法,并进一步划分成本质和邻域属性、情感分析和元数据、面向局部网络和基于用户及内容特征,还介绍了节点识别的方法,为该领域的学者提供有效且全面的参考。其次,文中还介绍了用户影响力建模方法在预测应用方面的数据集、评价指标和实验结果等,旨在预测下一个激活节点。最后对其未来的发展趋势作出展望。

关键词: 级联预测, 节点识别, 社交网络, 信息扩散, 用户影响力

Abstract: Social network user influence has been widely used in the fields of public opinion evolution,advertising marketing,political election,etc.In the past work,researchers have achieved certain results by analyzing and modeling influence,but there are still some problems such as unclear definition,backward technology and lacking of application.This paper explicitly puts forwardthe research model of social network user influence,combines traditional technology and advanced technology,analyzes the related literature in this field,and mainly discusses the research methods of users influence based on the social network from the perspective of users,content features and deep learning technology,and then further divides it into nature and the neighborhood attri-butes,sentiment analysis and metadata,local network orientedand user and content based characteristics.It also introduces the methods of identification,providing effective and comprehensive reference for scholars in the field.Secondly,it also introduces the data set,evaluation index and experimental results of the prediction application of user influence modeling methods,aiming to predictthe next activation node.Finally,its future development trend is prospected.

Key words: Cascade prediction, Information diffusion, Node identification, Social network, User influence

中图分类号: 

  • TP391
[1] ALLCOTT H,BRAGHIERI L,EICHMEYER S,et al.The welfare effects of social media[R].National Bureau of Economic Research,2019.
[2] BLEVINS D P,RAGOZZINO R.On social media and the formation of organizationalreputation:How social media are increasing cohesion between organizational reputation and traditional media for stakeholders[J].Academy of Management Review,2019,44(1):219-222.
[3] ALLCOTT H,GENTZKOW M,YU C.Trends in the diffusion of misinformation onsocial media[J].Research & Politics,2019,6(2):2053168019848554.
[4] YU S,LIU M,DOU W,et al.Networking for big data:A survey[J].IEEE Communications Surveys & Tutorials,2016,19(1):531-549.
[5] PENG S,WANG G,XIE D.Social Influence Analysis in Social Networking Big Data:Opportunities and Challenges[J].IEEE Network,2016,PP(99):12-18.
[6] HAN Z M,CHEN Y,LIU W,et al.Influence analysis of social network nodes[J].Journal of Software,2017,28(1):84-104.
[7] PENG S,ZHOU Y,CAO L,et al.Influence analysis in social networks:A survey[J].Journal of Network and Computer Applications,2018,106:17-32.
[8] LI X,CHENG X,SU S,et al.A hybrid collaborative filteringmodel for social influence prediction in event-based social networks[J].Neurocomputing,2017,230:197-209.
[9] LU M,WANG Z,YE D.Topic Influence Analysis Based onUser Intimacy and Social Circle Difference[J].IEEE Access,2019,7:101665-101680.
[10] CHEN J,YING P,ZOU M.Improving music recommendation by incorporating social influence[J].Multimedia Tools and Applications,2019,78(3):2667-2687.
[11] WANG P.Evaluation of influence of social network nodes based on emotion analysis[D].Shanghai:Donghua University,2016.
[12] WEI J D,TAN X Z,JIA Z H,et al.User influence evaluation model based on user behavior andstructural hole[J].Modern Electronic Technology,2019(5):39.
[13] LUCERI L,BRAUN T,GIORDANO S.Analyzing and inferring human real-life behavior through online social networks with social influence deep learning[J].Applied Network Science,2019,4(1):34.
[14] CHUNG W,ZENG D.Dissecting emotion and user influence in social media communities:An interaction modeling approach[J].Information & Management,2020,57(1):103108.
[15] MENG Y,HAN C,ZHANG Y,et al.Image RecommendationWith Reciprocal Social Influence[J].IEEE Access,2019,7:132279-132285.
[16] WANG P,LI L,YU Y,et al.Social Influence-based Attentive Mavens Mining and Aggregative Representation Learning for Group Recommendation[J].arXiv:1909.01079,2019.
[17] ZHANG J,WANG B,SHENG J,et al.Identifying Influential Nodes in Complex Networks Based on Local Effective Distance[J].Information,2019,10(10):311.
[18] KEMPE D,KLEINBERG J,TARDOS É.Maximizing the spread of influence through a social network[C]//Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.ACM,2003:137-146.
[19] GOYAL A,BONCHI F,LAKSHMANAN L V S.Learning influence probabilities in social networks[C]//Proceedings of the Third ACM International Conference on Web Search and Data Mining.ACM,2010:241-250.
[20] HOSSEINI-POZVEH M,ZAMANIFAR K,NAGHSH-NILCHI A R.Assessing information diffusion models for influence maximization in signed social networks[J].Expert Systems with Applications,2019,119:476-490.
[21] CUOMO S,COLECCHIA G,PICCIALLI F,et al.Traditional and Deep Learning Approaches to Information and Influence Propagation in Social Networks[C]//2018 14th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS).IEEE,2018:480-484.
[22] PIŠKOREC M,ŠMUC T,ŠIKI M.Disentangling sources of influence in online social networks[J].IEEE Access,2019,PP(99):1-1.
[23] RAZIS G,ANAGNOSTOPOULOS I,ZEADALLY S.Modeling Influence with Semantics in Social Networks:a Survey[J].ar-Xiv:1801.09961,2018.
[24] CERCEL D C,TRAUSAN-MATU S.Opinion propagation inonline social networks:A survey[C]//Proceedings of the 4th International Conference on Web Intelligence,Mining and Semantics (WIMS14).ACM,2014:11.
[25] KUMAR N,GUO R,ALEALI A,et al.An empirical evaluation of social influence metrics[C]//2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mi-ning(ASONAM).IEEE,2016:1329-1336.
[26] YU L,CUI P,WANG F,et al.From micro to macro:Uncovering and predicting information cascading process with behavioral dynamics[C]//2015 IEEE International Conference on Data Mi-ning.IEEE,2015:559-568.
[27] ZHANG J,TANG J,LI J,et al.Who influenced you? predicting retweet via social influence locality[J].ACM Transactions on Knowledge Discovery from Data (TKDD),2015,9(3):25.
[28] LIU S,ZHENG H,SHEN H,et al.Learning Concise Representations of Users' Influences through Online Behaviors[C]//IJCAI.2017:2351-2357.
[29] ZHANG J D,YANG Y.Research on user influence measurement model of mobile social network based on interactivebeha-vior and emotional tendency[J].Intelligence Theory and Practice,2019,42(1):112.
[30] GUO Y,WANG X W,LI S M,et al.Research on the influence model of social network users based on emotion analysis[J].Acta Sinica Sinica,2017,36(11):1139-1147.
[31] ZHANG J,LIU B,TANG J,et al.Social influence locality for modeling retweeting behaviors[C]//Twenty-Third International Joint Conference on Artificial Intelligence.2013.
[32] PEI S,MUCHNIK L,ANDRADE J J S,et al.Searching for super spreaders of information in real-world social media[J].Scientific Reports,2014,4:5547.
[33] WANG J,ZHENG V W,LIU Z,et al.Topological recurrentneural network for diffusion prediction[C]//2017 IEEE International Conference on Data Mining (ICDM).IEEE,2017:475-484.
[34] NIEPERT M,AHMED M,KUTZKOV K.Learning convolu-tional neural networks for graphs[C]//International Conference on Machine Learning.2016:2014-2023.
[35] QIU J,TANG J,MA H,et al.Deepinf:Social influence prediction with deep learning[C]//Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining.ACM,2018:2110-2119.
[36] LI P,NIE H,YIN F,et al.Modeling and Estimating User Influence in Social Networks[J].IEEE Access,2020:1-1.
[37] TU C,ZENG X,WANG H,et al.A unified framework for community detection and network representation learning[J].IEEE Transactions on Knowledge and Data Engineering,2018,31(6):1051-1065.
[38] ZHANG C,TANG K,PENG Y B.Fuzzy comprehensive evaluation of the influence of social network users[J].Computer System Application,2017,26(12):18-24.
[39] HAN Z M,MAO R,ZHENG C Y,et al.An effective dynamic network node influence model[J].Computer Application Research,2019(7):1960-1964.
[40] OYIBO K,VASSILEVA J.The relationship between personality traits and susceptibility to social influence[J].Computers in Human Behavior,2019,98:174-188.
[41] MOHAMMADINEJAD A,FARAHBAKHSH R,CRESPI N.Consensus Opinion Model in Online Social Networks Based on Influential Users[J].IEEE Access,2019,7:28436-28451.
[42] CHEN C,WEI J J,LIAO X W,et al.Analysis of social influence based on user perspective[J].Chinese Journal of Information Technology,2017,31(4):191-198.
[43] JU C H,ZHAO K D,BAO F G.Calculation model of user in-fluence intensity of social network with integrationcentrality and credit[J].Acta Sinica Sinica,2019,38(2):170-177.
[44] WANG Z F,ZHU J Y,ZHENG Z Y,et al.Influence analysis of weibo community users based on RC model[J].Computer Science,2017,44(3):254-258,282.
[45] ZAREIE A,SHEIKHAHMADI A,JALILI M.Identification of influential users in social networks based on users' interest[J].Information Sciences,2019,493:217-231.
[46] YOU Q.Analysis method of network community influencebased on interactive relationship[D].Beijing:University of Chinese Academy of Sciences,2016.
[47] WEI J M,HE H.Research on user behavior and influence evaluation algorithm in social network[J].Intelligent Computer and Application,2019,9(2):162-167.
[48] LUCERI L,BRAUN T,GIORDANO S.Social influence (deep) learning for human behavior prediction[C]//International Workshop on Complex Networks.Springer,Cham,2018:261-269.
[49] ZHU Y Q,QI L F.Research on the relationship between user Posting behavior,user types and interest groups[J].Intelligence Exploration,2019,257(3):22-30.
[50] DUC F.Measurement of network node influence based on k-shell and information entropy redundancy[J].Mobile Communications,2017,41(24):24-28.
[51] XING Y F,WANG X W,HAN X W,et al.Influence of network nodes in new media environment based on information entropy -- a case study of WeChat public account[J].Library and Information Work,2018,62(5):76-86.
[52] BHOWMICK A K,GUEUNING M,DELVENNE J C,et al.Temporal Sequence of Retweets Help to Detect Influential Nodes in Social Networks[J].IEEE Transactions on Computational Social Systems,2019:1-15.
[53] GUO R,SHAKARIAN P.A comparison of methods for cascade prediction[C]//Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.IEEE Press,2016:591-598.
[54] LYU L,CHEN D,REN X L,et al.Vital nodes identification in complex networks[J].Physics Reports,2016,650:1-63.
[55] CHANG F,ZHOU G,TIAN C,et al.Identification of influential nodes in multi-layer mapping service network for high-endmanu-facturing equipment[C]//2018 IEEE 15th International Confe-rence on Networking,Sensing and Control (ICNSC).IEEE,2018:1-6.
[56] ZHANG W,YANG J,DING X,et al.Groups make nodespowerful:Identifying influential nodes in social networks based on social conformity theory and community features[J].Expert Systems with Applications,2019,125:249-258.
[57] SHAO Z,LIU S,ZHAO Y,et al.Identifying influential nodes in complex networks based on Neighbours and edges[J].Peer-to-Peer Networking and Applications,2019,12(6):1528-1537.
[58] WANG Y,SHEN H W,LIU S,et al.Learning user-specific latent influence and susceptibility from information cascades[J].arXiv:1310.3911,2013.
[59] HOGG T,LERMAN K.Social dynamics of digg[J].EPJ Data Science,2012,1(1):5.
[60] DEDOMENICO M,LIMA A,MOUGEL P,et al.The anatomy of a scientific rumor[J].Scientific Reports,2013,3:2980.
[61] LIU X,HE Q,TIAN Y,et al.Event-based social networks:lin-king the online and offline social worlds[C]//Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.ACM,2012:1032-1040.
[62] BAO J,ZHENG Y,MOKBEL M F.Location-based and prefe-rence-aware recommendation using sparse geo-social networking data[C]//Proceedings of the 20th International Conference on Advances in Geographic Information Systems.ACM,2012:199-208.
[63] JAQUES N,LAZARIDOU A,HUGHES E,et al.Social In-fluence as Intrinsic Motivation for Multi-Agent Deep Reinforcement Learning[C]//International Conference on Machine Learning.2019:3040-3049.
[64] ULLAH H,ULLAH M,UZAIR M.A hybrid social influencemodel for pedestrian motion segmentation[J].Neural Computing and Applications,2019,31(11):7317-7333.
[65] PICCOLI V,CARNAGHI A,GRASSI M,et al.Cyberbullying through the lens of social influence:Predicting cyberbullying perpetration from perceived peer-norm,cyberspace regulations and ingroup processes[J].Computers in Human Behavior,2020,102:260-273.
[66] GARCIA D.Privacy beyond the individual[J].Nature Human Behaviour,2019,3(2):112.
[67] BAGROW J P,LIU X,MITCHELL L.Information flow reveals prediction limits in online social activity[J].Nature Human Behaviour,2019,3(2):122.
[1] 王剑, 彭雨琦, 赵宇斐, 杨健.
基于深度学习的社交网络舆情信息抽取方法综述
Survey of Social Network Public Opinion Information Extraction Based on Deep Learning
计算机科学, 2022, 49(8): 279-293. https://doi.org/10.11896/jsjkx.220300099
[2] 魏鹏, 马玉亮, 袁野, 吴安彪.
用户行为驱动的时序影响力最大化问题研究
Study on Temporal Influence Maximization Driven by User Behavior
计算机科学, 2022, 49(6): 119-126. https://doi.org/10.11896/jsjkx.210700145
[3] 余皑欣, 冯秀芳, 孙静宇.
结合物品相似性的社交信任推荐算法
Social Trust Recommendation Algorithm Combining Item Similarity
计算机科学, 2022, 49(5): 144-151. https://doi.org/10.11896/jsjkx.210300217
[4] 畅雅雯, 杨波, 高玥琳, 黄靖云.
基于SEIR的微信公众号信息传播建模与分析
Modeling and Analysis of WeChat Official Account Information Dissemination Based on SEIR
计算机科学, 2022, 49(4): 56-66. https://doi.org/10.11896/jsjkx.210900169
[5] 左园林, 龚月姣, 陈伟能.
成本受限条件下的社交网络影响最大化方法
Budget-aware Influence Maximization in Social Networks
计算机科学, 2022, 49(4): 100-109. https://doi.org/10.11896/jsjkx.210300228
[6] 郭磊, 马廷淮.
基于好友亲密度的用户匹配
Friend Closeness Based User Matching
计算机科学, 2022, 49(3): 113-120. https://doi.org/10.11896/jsjkx.210200137
[7] 王剑, 王玉翠, 黄梦杰.
社交网络中的虚假信息:定义、检测及控制
False Information in Social Networks:Definition,Detection and Control
计算机科学, 2021, 48(8): 263-277. https://doi.org/10.11896/jsjkx.210300053
[8] 谭琪, 张凤荔, 王婷, 王瑞锦, 周世杰.
融入结构度中心性的社交网络用户影响力评估算法
Social Network User Influence Evaluation Algorithm Integrating Structure Centrality
计算机科学, 2021, 48(7): 124-129. https://doi.org/10.11896/jsjkx.200600096
[9] 张人之, 朱焱.
基于主动学习的社交网络恶意用户检测方法
Malicious User Detection Method for Social Network Based on Active Learning
计算机科学, 2021, 48(6): 332-337. https://doi.org/10.11896/jsjkx.200700151
[10] 鲍志强, 陈卫东.
基于最大后验估计的谣言源定位器
Rumor Source Detection in Social Networks via Maximum-a-Posteriori Estimation
计算机科学, 2021, 48(4): 243-248. https://doi.org/10.11896/jsjkx.200400053
[11] 张少杰, 鹿旭东, 郭伟, 王世鹏, 何伟.
供需匹配中的非诚信行为预防
Prevention of Dishonest Behavior in Supply-Demand Matching
计算机科学, 2021, 48(4): 303-308. https://doi.org/10.11896/jsjkx.200900090
[12] 袁得嵛, 陈世聪, 高见, 王小娟.
基于斯塔克尔伯格博弈的在线社交网络扭曲信息干预算法
Intervention Algorithm for Distorted Information in Online Social Networks Based on Stackelberg Game
计算机科学, 2021, 48(3): 313-319. https://doi.org/10.11896/jsjkx.200400079
[13] 郁友琴, 李弼程.
基于多粒度文本特征表示的微博用户兴趣识别
Microblog User Interest Recognition Based on Multi-granularity Text Feature Representation
计算机科学, 2021, 48(12): 219-225. https://doi.org/10.11896/jsjkx.201100128
[14] 马理博, 秦小麟.
话题-位置-类别感知的兴趣点推荐
Topic-Location-Category Aware Point-of-interest Recommendation
计算机科学, 2020, 47(9): 81-87. https://doi.org/10.11896/jsjkx.191100120
[15] 张志扬, 张凤荔, 谭琪, 王瑞锦.
基于深度学习的信息级联预测方法综述
Review of Information Cascade Prediction Methods Based on Deep Learning
计算机科学, 2020, 47(7): 141-153. https://doi.org/10.11896/jsjkx.200300130
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!