计算机科学 ›› 2024, Vol. 51 ›› Issue (1): 99-112.doi: 10.11896/jsjkx.230500127
王宇辰1, 高超1, 王震1,2
WANG Yuchen1, GAO Chao1, WANG Zhen1,2
摘要: 信息的传播扩散可以建模为在潜在传播网络上发生的随机过程。由于在实际应用场景中,潜在的传播网络拓扑结构和清晰的传播过程往往是不可见的,因此根据观测到的传播结果,如节点感染时间、状态等信息,推断传播网络拓扑结构,对于分析与理解传播过程、跟踪传播路径以及预测未来传播事件起着重要作用。近年来,传播网络推断问题吸引了众多研究者的目光。文中对近年来的信息传播网络推断工作进行系统性的介绍和总结,为传播网络推断提供一个新视角。
中图分类号:
[1]FANG D,CHEN B.Ecological network analysis for a virtual water network[J].Environmental Science & Technology,2015,49(11):6722-6730. [2]HUANG I B,KEISLER J,LINKOV I.Multi-criteria decisionanalysis in environmental sciences:Ten years of applications and trends[J].Science of the Total Environment,2011,409(19):3578-3594. [3]SPORNS O.Contributions and challenges for network models in cognitive neuroscience[J].Nature Neuroscience,2014,17(5):652-660. [4]PARK J Y,CHOI J,CHOI J Y.Network analysis in systemsepidemiology[J].Journal of Preventive Medicine and Public Health,2021,54(4):259. [5]KUMAR P,SINHA A.Information diffusion modeling and ana-lysis for socially interacting networks[J].Social Network Ana-lysis and Mining,2021,11(1):1-18. [6]HETHOTE H W.The mathematics of infectious diseases[J].SIAM Review,2000,42(4):599-653. [7]ADAR E,ADAMIC L A.Tracking information epidemics inblogspace[C]//The 2005 IEEE/WIC/ACM International Conference on Web Intelligence(WI’05).IEEE,2005:207-214. [8]ZHOU J,LIU Z,LI B.Influence of network structure on rumor propagation[J].Physics Letters A,2007,368(6):458-463. [9]TANG J,SUN J,WANG C,et al.Social influence analysis in large-scale networks[C]//Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.2009:807-816. [10]SUN J,TANG J.A survey of models and algorithms for social influence analysis[C]//Proceedings of the Sixth ACM International Conference on Web Search and Data Mining(WSDM’13).2011:177-214. [11]SADRI A M,UKKUSURI S V,AHMED M A.Review of social influence in crisis communications and evacuation decision-ma-king[J].Transportation Research Interdisciplinary Perspectives,2021,9:100325. [12]LESKOVEC J,ADAMIC L A,HUBERMAN B A.The dyna-mics of viral marketing[J].ACM Transactions on the Web(TWEB),2007,1(1):5-es. [13]BHATTACHARYA S,GAURAV K,GHOSH S.Viral marke-ting on social networks:An epidemiological perspective[J].Phy-sica A:Statistical Mechanics and its Applications,2019,525:478-490. [14]WANG X,ZHU X,TAO X,et al.Anomalous role of information diffusion in epidemic spreading[J].Physical Review Research,2021,3(1):013157. [15]ZHU L,YANG F,GUAN G,et al.Modeling the dynamics of rumor diffusion over complex networks[J].Information Sciences,2021,562:240-258. [16]VAN DER LINDEN S.Misinformation:susceptibility,spread,and interventions to immunize the public[J].Nature Medicine,2022,28(3):460-467. [17]ZAREIE A,SAKELLARIOU R.Minimizing the spread of misinformation in online social networks:A survey[J].Journal of Network and Computer Applications,2021,186:103094. [18]PENG S,ZHOU Y,CAO L,et al.Influence analysis in social networks:A survey[J].Journal of Network and Computer Applications,2018,106:17-32. [19]WANG J,WANG Y C,HUANG M J.False information in social networks:Definition,detection and control[J].Computer Science,2021,48:263-277. [20]ADAR E,ADAMIC L A.Tracking information epidemics inblogspace[C]//The 2005 IEEE/WIC/ACM International Conference on Web Intelligence(WI’05).IEEE,2005:207-214. [21]GOMEZ-RODRIGUEZ M,LESKOVEC J,KRAUSE A.Inferring networks of diffusion and influence[J].ACM Transactions on Knowledge Discovery from Data(TKDD),2012,5(4):1-37. [22]MYERS S,LESKOVEC J.On the convexity of latent social network inference[J].Advances in Neural Information Processing Systems,2010:1741-1749. [23]LI H,XIA C,WANG T,et al.Capturing dynamics of information diffusion in SNS:A survey of methodology and techniques[J].ACM Computing Surveys(CSUR),2021,55(1):1-51. [24]GUILLE A,HACID H,FAVRE C,et al.Information diffusion in online social networks:A survey[J].ACM Sigmod Record,2013,42(2):17-28. [25]LI M,WANG X,GAO K,et al.A survey on information diffusion in online social networks:Models and methods[J].Information,2017,8(4):118. [26]PASTOR-SATORRAS R,VESPIGNANI A.Epidemic sprea-ding in scale-free networks[J].Physical Review Letters,2001,86(14):3200. [27]LIU D,YIN Y W,SONG M.Microblog information diffusion:Simulation based on sir model[J].Journal of Beijing University of Posts and Telecommunications(Social Sciences Edition),2014,16(3):28. [28]NAZEMIAN A,TAGHIYAREH F.Influence maximization inindependent cascade model with positive and negative word of mouth[C]//6th International Symposium on Telecommunications(IST).IEEE,2012:854-860. [29]LI S,KONG F,TANG K,et al.Online influence maximizationunder linear threshold model[J].Advances in Neural Information Processing Systems,2020,33:1192-1204. [30]ZHOU F,JIAO J R,LEI B.A linear threshold-hurdle model for product adoption prediction incorporating social network effects[J].Information Sciences,2015,307:95-109. [31]TRIVEDI N,SINGH A.Efficient influence maximization in social-networks under independent cascade model[J].Procedia Computer Science,2020,173:315-324. [32]KEMPE D,KLEINBERG J,TARDOSÉ.Maximizing the spread of influence through a social network[C]//Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.2003:137-146. [33]GRANOVETTER M.Threshold models of collective behavior[J].American Journal of Sociology,1978,83(6):1420-1443. [34]SERRANO E,IGLESIAS C Á,GARIJO M.A novel agent-based rumor spreading model in twitter[C]//Proceedings of the 24th International Conference on World Wide Web.2015:811-814. [35]RODRIGUEZ M G,SCHÖLKOPF B.Submodular inference ofdiffusion networks from multiple trees[J].arXiv:1205.1671,2012. [36]GRAY C,MITCHIELL L,ROUGHAN M.Bayesian inferenceof network structure from information cascades[J].IEEE Transactions on Signal and Information Processing over Networks,2020,6:371-381. [37]GHALEBI E,MIRZASOLEIMAN B,GROSU R,et al.Dynamic network model from partial observations[C]//Proceedings of the 32nd International Conference on Neural Information Processing Systems(NIPS’18).2018:9884-9894. [38]DJOLONGA J,KRAUSE A.Learning implicit generative mo-dels using differentiable graph tests[J].arXiv:1709.01006,2017. [39]HAO X,LI X.Network topology inference with estimated node importance[J].Europhysics Letters,2021,134(5):58001. [40]XU S,SMITH D.Contrastive training for models of information cascades[C]//Proceedings of the AAAI Conference on Artificial Intelligence.2018. [41]DOU P,SONG G,ZHAO T.Network topology inference from incomplete observation data[J].Science China Information Sciences,2018,61(2):028102:1-028102:3. [42]KONG L,GAO C,PENG S.Clustering-Based Network Infe-rence with Submodular Maximization[C]//Pacific Rim International Conference on Artificial Intelligence.2022:118-131. [43]RODRIGUEZ M G,BALDUZZI D,SCHÖLKOPF B.Uncovering the temporal dynamics of diffusion networks[J].arXiv:1105.0697,2011. [44]GOMEZ-RODRIGUEZ M,SONG L,DANESHMAND H,et al.Estimating diffusion networks:Recovery conditions,sample complexity & soft-thresholding algorithm[J].The Journal of Machine Learning Research,2016,17(1):3092-3120. [45]GOMEZ-RODRIGUEZ M,LESKOVVEC J,SCHÖLKOPF B.Structure and dynamics of information pathways in online media[C]//Proceedings of the Sixth ACM International Conference on Web Search and Data Mining.2013:23-32. [46]DU N,SONG L,YUAN M,et al.Learning networks of heterogeneous influence[C]//Proceedings of the 25th International Conference on Neural Information Processing Systems(NIPS’12).2012:2780-2788. [47]WANG S,HU X,YU P S,et al.MMRate:inferring multi-aspect diffusion networks with multi-pattern cascades[C]//Procee-dings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.2014:1246-1255. [48]TAN Q,LIU Y,LIU J.Motif-aware diffusion network inference[J].International Journal of Data Science and Analytics,2020,9(4):375-387. [49]ZHAO T,SONG G,HE X.Inferring diffusion networks with life stage heterogeneity[J].Science China Information Sciences,2018,61:1-16. [50]GAO C,WANG Y,WANG Z,et al.Pairwise-interactions-based Bayesian Inference of Network Structure from Information Cascades[C]//Proceedings of the ACM Web Conference 2023.2023:102-110. [51]ESLAMI M,RABIEE H R,SALEHI M.Dne:A method for extracting cascaded diffusion networks from social networks[C]//2011 IEEE Third International Conference on Privacy,Security,Risk and Trust and 2011 IEEE Third International Conference on Social Computing.IEEE,2011:41-48. [52]RAMEZANI M,RABIEE H R,TAHANI M,et al.Dani:A fast diffusion aware network inference algorithm[J].arXiv:1706.00941,2017. [53]FOROUTAIN N,HAMZEH A.Discovering the hidden struc-ture of a social network:A semi supervised approach[J].IEEE Transactions on Computational Social Systems,2017,4(1):14-25. [54]CRAWFORD F W.Hidden network reconstruction from information diffusion[C]//2015 18th International Conference on Information Fusion(Fusion).IEEE,2015:180-185. [55]TAHANI M,HEMMATYAR A M A,RABIEE H R,et al.Inferring dynamic diffusion networks in online media[J].ACM Transactions on Knowledge Discovery from Data(TKDD),2016,10(4):1-22. [56]BOURIGAULT S,LAGNIER C,LAMPRIER S,et al.Learning social network embeddings for predicting information diffusion[C]//Proceedings of the 7th ACM International Conference on Web Search and Data Mining.2014:393-402. [57]HU Q,XIE S,LIN S,et al.Clustering embedded approaches for efficient information network inference[J].Data Science and Engineering,2016,1(1):29-40. [58]BOURIGAULT S,LAMPRIER S,GALLINARI P.Representation learning for information diffusion through social networks:an embedded cascade model[C]//Proceedings of the Ninth ACM International Conference on Web Search and Data Mi-ning.2016:573-582. [59]KURASHIMA T,IWATA T,TAKAYA N,et al.Probabilistic latent network visualization:Inferring and embedding diffusion networks[C]//Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.2014:1236-1245. [60]ZHANG Y,LYU T,ZHANG Y.Cosine:Community-preserving social network embedding from information diffusion cascades[C]//Proceedings of the AAAI Conference on Artificial Intelligence.2018,32(1). [61]ZHUO W,ZHAO Y,ZHAN Q,et al.DiffusionGAN:Networkembedding for information diffusion prediction with generative adversarial nets[C]//2019 IEEE International Conference on Parallel & Distributed Processing with Applications,Big Data &Cloud Computing,Sustainable Computing & Communications,Social Computing & Networking(ISPA/BDCloud/SocialCom/SustainCom).IEEE,2019:808-816. [62]RONG Y,ZHU Q,CHENG H.A model-free approach to infer the diffusion network from event cascade[C]//Proceedings of the 25th ACM International on Conference on Information and Knowledge Management.2016:1653-1662. [63]HU S,CAUTIS B,CHEN Z,et al.Model-free inference of diffusion networks using RKHS embeddings[J].Data Mining and Knowledge Discovery,2019,33(2):499-525. [64]LAMPRIER S,BOURIGAULT S,GALLINARI P.Extracting diffusion channels from real-world social data:a delay-agnostic learning of transmission probabilities[C]//Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015.2015:178-185. [65]GRIPON V,RANNAT M.Reconstructing a graph from pathtraces[C]//2013 IEEE International Symposium on Information Theory.IEEE,2013:2488-2492. [66]AMIN K,HEIDARI H,KEARNS M.Learning from contagion(without timestamps)[C]//International Conference on Machine Learning.PMLR,2014:1845-1853. [67]HUANG H,YAN Q,GAN T,et al.Learning diffusions without timestamps[C]//Proceedings of the AAAI Conference on Artificial Intelligence.2019:582-589. [68]HUANG H,YAN Q,CHEN L,et al.Statistical inference of diffusion networks[J].IEEE Transactions on Knowledge and Data Engineering,2019,33(2):742-753. [69]HAN K,TIAN Y,ZHANG Y,et al.Statistical estimation of diffusion network topologies[C]//2020 IEEE 36th International Conference on Data Engineering(ICDE).IEEE,2020:625-636. [70]GAN T,HAN K,HUANG H,et al.Diffusion Network Infe-rence from Partial Observations[C]//Proceedings of the AAAI Conference on Artificial Intelligence.2021,35(9):7493-7500. [71]SUN Y,ZHANG Y,YAN Q,et al.Fast inference algorithm of diffusion networks without infection temporal information[J].Journal of Frontiers of Computer Science & Technology,2019,13(4):541. [72]WANG L,ERMON S,HOPCROFT J E.Feature-enhancedprobabilistic models for diffusion network inference[C]//Joint European Conference on Machine Learning and Knowledge Discovery in Databases.Berlin,Heidelberg:Springer,2012:499-514. [73]DU N,SONG L,WOO H,et al.Uncover topic-sensitive information diffusion networks[C]//Artificial Intelligence and Statistics.PMLR,2013:229-237. [74]ZHOU D H,HAN W B,WANG Y J,et al.Information diffusion network inferring and pathway tracking[J].Science China Information Sciences,2015,58(9):1-15. [75]MANCO G,RITACCO E,BARBIERI N.A Factorization Approach for Survival Analysis on Diffusion Networks[J].IEEE Transactions on Knowledge and Data Engineering,2019,33(1):1-13. [76]ULLMAN J B,BENTLER P M.Structural equation modeling[M]//Handbook of Psychology,Second Edition,2012,2. [77]BAINGANA B,MATEOS G,GIANNAKIS G B.Proximal-gradient algorithms for tracking cascades over social networks[J].IEEE Journal of Selected Topics in Signal Processing,2014,8(4):563-575. [78]BAINGANA B,GIANNAKIS G B.Tracking switched dynamic network topologies from information cascades[J].IEEE Transa-ctions on Signal Processing,2016,65(4):985-997. [79]SHEN Y,BAINGAGA B,GIANNAKIS G B.Tensor decompositions for identifying directed graph topologies and tracking dynamic networks[J].IEEE Transactions on Signal Processing,2017,65(14):3675-3687. [80]GAO S,PANG H,GALLINAR P,et al.A novel embeddingmethod for information diffusion prediction in social network big data[J].IEEE Transactions on Industrial Informatics,2017,13(4):2097-2105. [81]WANG D,ZHOU W,ZHENG J X,et al.Who spread to whom? Inferring online social networks with user features[C]//2018 IEEE International Conference on Communications(ICC).IEEE,2018:1-6. [82]YANG X,DONG M,CHEN X,et al.Recommender system-based diffusion inferring for open social networks[J].IEEE Transactions on Computational Social Systems,2019,7(1):24-34. [83]ERDO″S P,RÉNYI A.On the evolution of random graphs[J].Publications of the Mathematical Institute of the Hungarian Academy of Sciences,1960,5(1):17-60. [84]BORGATII S P,EVERETT M G.Models of core/peripherystructures[J].Social Networks,2000,21(4):375-395. [85]CLAUSET A,MOORE C,NEWMAN M E J.Hierarchicalstructure and the prediction of missing links in networks[J].Nature,2008,453(7191):98-101. [86]LESKOVEC J,KLEINBERG J,FALOUTSOS C.Graphs overtime:densification laws,shrinking diameters and possible explanations[C]//Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery in Data Mining.2005:177-187. [87]LANCICHINETTI A,FORTUNATO S,RADICCHI F.Benchmark graphs for testing community detection algorithms[J].Physical Review E,2008,78(4):046110. [88]LESKOVEC J,FALOUTSOS C.Scalable modeling of realgraphs using kronecker multiplication[C]//Proceedings of the 24th International Conference on Machine Learning.2007:497-504. [89] LESKOVEC J,KLEINBERG J,FALOUTSO C.Graph evolution:Densification and shrinking diameters[J].ACM transactions on Knowledge Discovery from Data(TKDD),2007,1(1):2-es. [90]CHEN W,YUAN Y,ZHANG L.Scalable influence maximization in social networks under the linear threshold model[C]//2010 IEEE International Conference on Data Mining.IEEE,2010:88-97. [91]PEEL L,PEIXOTO T P,DE DOMENICO M.Statistical infe-rence links data and theory in network science[J].Nature Communications,2022,13(1):1-15. [92]PEIXOTO T P.Reconstructing networks withunknown and he-terogeneous errors[J].Physical Review X,2018,8(4):041011. [93]ZHOU F,XU X,TRAJCEVSKI G,et al.A survey of information cascade analysis:Models,predictions,and recent advances[J].ACM Computing Surveys(CSUR),2021,54(2):1-36. [94]GAO X,CAO Z,LI S,et al.Taxonomy and evaluation for microblog popularity prediction[J].ACM Transactions on Know-ledge Discovery from Data(TKDD),2019,13(2):1-40. [95]LI Y,FAN J,WANG Y,et al.Influence maximization on social graphs:A survey[J].IEEE Transactions on Knowledge and Data Engineering,2018,30(10):1852-1872. [96]JIANG J,WEN S,YU S,et al.Identifying propagation sources in networks:State-of-the-art and comparative studies[J].IEEE Communications Surveys & Tutorials,2016,19(1):465-481. |
|