Computer Science ›› 2021, Vol. 48 ›› Issue (7): 124-129.doi: 10.11896/jsjkx.200600096

• Database & Big Data & Data Science • Previous Articles     Next Articles

Social Network User Influence Evaluation Algorithm Integrating Structure Centrality

TAN Qi, ZHANG Feng-li, WANG Ting, WANG Rui-jin, ZHOU Shi-jie   

  1. School of Information and Software Engineering(Software Engineering),University of Electronic Science and Technology of China,Chengdu 610054,China
  • Received:2020-06-16 Revised:2020-12-04 Online:2021-07-15 Published:2021-07-02
  • About author:TAN Qi,born in 1996,postgraduate,is a member of China Computer Federation.Her main research interests include machine learning,data mining and cascading forecasting.(tanqi1012more@163.com)
    ZHANG Feng-li,born in 1963,Ph.D,professor,doctoral supervisor,is a member of China Computer Federation.Her main research interests include network security and network engineering,cloud computing and big data,and machine learning.
  • Supported by:
    National Natural Science Foundation of China(61802033,61472064,61602096),Sichuan Regional Innovation Cooperation Project(2020YFQ0018),Science and Technology Project of Sichuan Province(2018GZ0087,2019YJ0543),Postdoctoral Fund Project(2018M643453),State Key Laboratory Project of Guangdong Province(2017B030314131) and Network and Data Security Key Laboratory of Sichuan Province(NDSMS201606).

Abstract: In social networks,the transmission process of information can be controlled macro by tracking a small number of strongly influential users,but user influence is a kind of posterior information that cannot be predicted and can only be determined by relevant characteristics.Therefore,this paper proposes a social network user influence evaluation algorithm that integrates structural degree centrality to identify users with strong influence.As an evaluation algorithm for social network user influence,SDRank is developed based on an improved PageRank algorithm,which introduces structural degree centrality,combines the re-gulatory factor of join time and average forward number,and then calculates the user’s influence.Compared to other existing algorithms,SDRank is applicable to a broader set of scenarios from a user behavior perspective,for it doesn’t require specific information(such as personal tags,fans) that have potential forgery risks or default possibilities,and doesn’t have to exploit the under-lying information of disseminated content.This paper takes the cascade forwarding dataset of Weibo users as the experimental object,makes a visual analysis of the average forwarding number of top-K users and other relevant results,and discusses the role of user forwarding behavior in information transmission in social network.During the experiment,its accuracy,recall rate and F1-measure value are greatly improved compared with PageRank and TrustRank,and the effectiveness of SDRank algorithm is verified.

Key words: Degree centrality, Social network, User behavior, User influence

CLC Number: 

  • TP391
[1]ILIE V,TUREL O.Manipulating user resistance to large-scale information systems through influence tactics[J].Information &Management,2019,57(3):103178.
[2]ZAREIE A,SHEIKHAHMADI A,JALILI M.Identification of influential users in social networks based on users’ interest[J].Information Sciences,2019,493:217-231.
[3]HUANG X Y,YANG A Z,LIU X Y,et al.An Improved In-fluence assessment algorithm for Weibo users[J].Computer Engineering,2019,45(12):294-299.
[4]JU C H,ZHAO K D,BAO F G.Influence Strength Calculation Model of Social Network Users integrating Closeness Centrality and Credit[J].Chinese Journal of Intelligence,2019,38(2):170-177.
[5]CHENG S,JIANG C,REN K.The Influence of the Central Path Media Blog Post Information Characteristics on User Behavior[C]//Institute of Management Science and Industrial Enginee-ring:Computer Science and Electronic Technology International Society.2019:8.
[6]WEI J M,HE H.Research on user Behavior and Influence Assessment Algorithm in Social Network[J].Intelligent Computer and Application,2019,9(2):162-167.
[7]ZHANG C,TANG K,PENG Y B.Fuzzy Comprehensive Evalua-tion of social Network Users’ Influence[J].Computer System Application,2017,26(12):18-24.
[8]WANG Z F,ZHU J Y,ZHENG Z Y,et al.Influence analysis of Users in Weibo Community based on RC Model[J].Computer Science,2017,44(3):254-258,282.
[9]XING Y F,WANG X W,HAN X W,et al.Research on in-fluence of network nodes in new media environment based on information entropy-case study of WeChat public account[J].Books and Intelligence Work,2018,62(5):76-86.
[10]ZHANG J D,YANG Y.Research on influence MeasurementModel of Mobile Social Network Users based on interactive behavior and emotional tendency[J].Intelligence Theory and Practice,2019,42(1):112.
[11]HAN Z M,MAO R,ZHENG C Y,et al.An effective dynamic network Node influence model[J].Computer Application Research,2019(7):1960-1964.
[12]PAGE L,BRIN S,MOTWANI R,et al.The pagerank citation ranking:Bringing order to the web[R].Stanford InfoLab,1999.
[13]KWAK H,LEE C,PARK H,et al.What Is Twitter,a SocialNetwork or a News Media?[C]//Proceedings of the 19th International Conference on World Wide Web.2010.
[14]SU S Q,YANG K,ZHANG N.Comparative Study of Leader-Rank and PageRank Algorithms[J].Information Technology,2015(4):8-11.
[15]WEI J D,QIN X Z,JIA Z H,et al.User Influence Evaluation Model based on user behavior and Structural hole[J].Modern Electronic Technology,2019(5):39.
[16]WANG J,YU W,HU Y H,et al.Social Network InfluenceMaximization Algorithm based on 3-Layer Centrality[J].Computer Science,2014,41(1):59-63.
[17]CHEN X L.Research on Social Network Influence Maximization Algorithm and Its Propagation Model[D].Harbin:Harbin Engineering University,2016:20-22.
[18]YANG S X,LIANG W,ZHU K L.Influence measurementmethod of nodes in complex network based on three-level neighbors [J].Journal of Electronics and Information Technology,2020,42.
[19]BACHA R E,ZIN T T.A Survey on Influence and Information Diffusion in Twitter Using Big Data Analytics[C]//Internatio-nal Conference on Big Data Analysis and Deep Learning Applications.Singapore:Springer,2018:39-47.
[20]YU J.Empirical Analysis on the Characteristics of Users’ in-fluence in the Process of Microblog communication [J].Journal of Intelligence,2013(8):61-65.
[21]LOU S,ZHOU M,QU Q.Analysis of User Influence of Social Investment Platform-Taking Snowball Network as an Example[J].Service Science and Mangement,2019,8(6):251-262.
[22]CAO Q,SHEN H W,CEN K T,et al.DeepHawkes:Bridgingthe Gap between Prediction and Understanding of Information Cascades[C]//CIKM 2017.2017:1149-1158.
[23]ZHANG N,RAO J,ZHANG S Q,et al.Power-law distribution phenomenon of sina weibo forwarding number[J].Computer Age,2015(3):33-35.
[24]GYONGYI Z,GARCIAMOLINA H,PEDERSEN J.Combating web spam with trustrank[C]//Proceedings of the 2004 International Conference on Very Large Data Bases (VLDB).Toronto,2004:576-587.
[25]ZHAO J Q,GUI X L,TIAN F.A New Method of Identifying Influential Users in the Micro-Blog Networks[J].IEEE Access,2017,5:3008-3015.
[1] CHEN Yong-quan, JIANG Ying. Analysis Method of APP User Behavior Based on Convolutional Neural Network [J]. Computer Science, 2022, 49(8): 78-85.
[2] WANG Jian, PENG Yu-qi, ZHAO Yu-fei, YANG Jian. Survey of Social Network Public Opinion Information Extraction Based on Deep Learning [J]. Computer Science, 2022, 49(8): 279-293.
[3] WEI Peng, MA Yu-liang, YUAN Ye, WU An-biao. Study on Temporal Influence Maximization Driven by User Behavior [J]. Computer Science, 2022, 49(6): 119-126.
[4] YU Ai-xin, FENG Xiu-fang, SUN Jing-yu. Social Trust Recommendation Algorithm Combining Item Similarity [J]. Computer Science, 2022, 49(5): 144-151.
[5] CHANG Ya-wen, YANG Bo, GAO Yue-lin, HUANG Jing-yun. Modeling and Analysis of WeChat Official Account Information Dissemination Based on SEIR [J]. Computer Science, 2022, 49(4): 56-66.
[6] ZUO Yuan-lin, GONG Yue-jiao, CHEN Wei-neng. Budget-aware Influence Maximization in Social Networks [J]. Computer Science, 2022, 49(4): 100-109.
[7] GUO Lei, MA Ting-huai. Friend Closeness Based User Matching [J]. Computer Science, 2022, 49(3): 113-120.
[8] SHAO Yu, CHEN Ling, LIU Wei. Maximum Likelihood-based Method for Locating Source of Negative Influence Spreading Under Independent Cascade Model [J]. Computer Science, 2022, 49(2): 204-215.
[9] WANG Jian, WANG Yu-cui, HUANG Meng-jie. False Information in Social Networks:Definition,Detection and Control [J]. Computer Science, 2021, 48(8): 263-277.
[10] ZHANG Ren-zhi, ZHU Yan. Malicious User Detection Method for Social Network Based on Active Learning [J]. Computer Science, 2021, 48(6): 332-337.
[11] BAO Zhi-qiang, CHEN Wei-dong. Rumor Source Detection in Social Networks via Maximum-a-Posteriori Estimation [J]. Computer Science, 2021, 48(4): 243-248.
[12] ZHANG Shao-jie, LU Xu-dong, GUO Wei, WANG Shi-peng, HE Wei. Prevention of Dishonest Behavior in Supply-Demand Matching [J]. Computer Science, 2021, 48(4): 303-308.
[13] ZHANG Hao-chen, CAI Ying, XIA Hong-ke. Delivery Probability Based Routing Algorithm for Vehicular Social Network [J]. Computer Science, 2021, 48(3): 289-294.
[14] YUAN De-yu, CHEN Shi-cong, GAO Jian, WANG Xiao-juan. Intervention Algorithm for Distorted Information in Online Social Networks Based on Stackelberg Game [J]. Computer Science, 2021, 48(3): 313-319.
[15] TAN Qi, ZHANG Feng-li, ZHANG Zhi-yang, CHEN Xue-qin. Modeling Methods of Social Network User Influence [J]. Computer Science, 2021, 48(2): 76-86.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!