计算机科学 ›› 2026, Vol. 53 ›› Issue (4): 143-154.doi: 10.11896/jsjkx.250300147
张雪芹1,2, 王智能1, 李晋生1, 陆一松1, 罗飞1
ZHANG Xueqin1,2, WANG Zhineng1, LI Jinsheng1, LU Yisong1, LUO Fei1
摘要: 社交网络是信息传播的主要渠道,识别社交网络中的关键节点对发现信息传播枢纽、进行信息传播控制等具有重要意义。现实社交网络具有时变性,合理建模时序网络,并对节点的空间和时间关系进行全面描述和深度挖掘,是准确识别网络关键节点的重要因素。为了提高关键节点识别的精度,提出了一种基于深度学习和多特征融合的时序社交网络关键节点识别方法MCNN(Multidimensional CNN)。该方法首先将时序网络建模为基于快照的多维关系网络,对于一个节点,在每个快照,分别从空间结构、时间耦合和三类时空传播关系,提取节点的空间、时间和时空上下文,并构建节点特征矩阵。为了深度分析节点在每个快照中的时空关系,使用卷积神经网络CNN分别提取3类节点特征,并使用自注意力机制融合形成节点快照特征。为了捕捉节点行为在快照间的演变,组合所有快照的节点快照特征作为时间序列,采用长短期记忆网络LSTM挖掘快照序列特征。最后,使用全连接层预测节点的影响力。在6个真实时序社交网络上的实验结果表明,MCNN在时序社交网络关键节点识别方面优于基线方法。
中图分类号:
| [1]WEI P C,ZHOU J H,YAN B,et al.ENIMNR:Enhanced node influence maximization through node representation in social networks[J].Chaos,Solitons & Fractals,2024,186:115192. [2]MENG L,XU G Q,DONG C,et al.Modeling information propagation for target user groups in online social networks based on guidance and incentive strategies[J].Information Sciences,2025,691:121628. [3]FOROOZANI A,EBRAHIMI M.Nonlinear anomalous information diffusion model in social networks[J].Communications in Nonlinear Science and Numerical Simulation,2021,103:106019. [4]ZHOU Y M,WANG G Z,HAO J K,et al.A fast tri-individual memetic search approach for the distance-based critical node problem[J].European Journal of Operational Research,2023,308(2):540-554. [5]AN Z Y,HU X H,JIANG R X,et al.A novel method for identifying key nodes in multi-layer networks based on dynamic influence range and community importance[J].Knowledge-Based Systems,2024,305:112639. [6]HU Q,JIANG J T,XU H F,et al.IMNE:Maximizing influence through deep learning-based node embedding in social network[J].Swarm and Evolutionary Computation,2024,88:101609. [7]WU J,QIU T,CHEN G.A general deep-learning approach tonode importance identification[J].Chaos,Solitons & Fractals,2024,188:115501. [8]ZHAO M,YE J H,LI J Y,et al.NRD:A node importance eva-luation algorithm based on neighborhood reliance degree for power networks[J].Physica A:Statistical Mechanics and Its Applications,2023,624:128941. [9]ZHAO S Y,SUN S W.Identification of node centrality based on Laplacian energy of networks[J].Physica A:Statistical Mechanics and its Applications,2023,609:128353. [10]YANG P L,MENG F Y,ZHAO L J,et al.AOGC:An improved gravity centrality based on an adaptive truncation radius and omni-channel paths for identifying key nodes in complex networks[J].Chaos,Solitons & Fractals,2023,166:112974. [11]XU G Q,DONG C.CAGM:A communicability-based adaptivegravity model for influential nodes identification in complex networks[J].Expert Systems with Applications,2024,235:121154. [12]SAUMYA S,KUMAR A,SINGH J P.Filtering offensive language from multilingual social media contents:A deep learning approach[J].Engineering Applications of Artificial Intelligence,2024,133:108159. [13]ZHANG M,WANG X J,JIN L,et al.A new approach forevaluating node importance in complex networks via deep lear-ning methods[J].Neurocomputing,2022,497:13-27. [14]KOU J H,JIA P,LIU J Y,et al.Identify influential nodes in social networks with graph multi-head attention regression model[J].Neurocomputing,2023,530:23-36. [15]KUMAR S,MALLIK A,PANDA B S.Influence maximizationin social networks using transfer learning via graph-based LSTM[J].Expert Systems with Applications,2023,212:118770. [16]ACOSTA A,CARDENAS N C,IMBACUAN C,et al.Modelling control strategies against classical swine fever:Influence of tra-ders and markets using static and temporal networks in Ecuador[J].Preventive Veterinary Medicine,2022,205:105683. [17]KIM H,ANDERSON R.Temporal node centrality in complex networks[J].Physical Review E,2012,85:026107. [18]YE Z H,ZHAN X X,ZHOU Y Z,et al.Identifying vital nodes on temporal networks:An edge-based k-shell decomposition[C]//Proceedings of the 36th Chinese Control Conference(CCC 2017).New York:IEEE,2017:1402-1407. [19]BI J L,JIN J,QU C Q,et al.Temporal gravity model for important node identification in temporal networks[J].Chaos,Solitons & Fractals,2021,147:110934. [20]TAO L,KONG S Z,HE L Z,et al.A sequential-path tree-based centrality for identifying influential spreaders in temporal networks[J].Chaos,Solitons & Fractals,2022,165:112766. [21]TAYLOR D,MYERS S A,CLAUSET A,et al.Eigenvector-based centrality measures for temporal networks[J].Multiscale Modeling & Simulation,2017,15(1):537-574. [22]YIN R R,GUO Q,YANG J N,et al.Inter-layer similarity-based eigenvector centrality measures for temporal networks[J].Physica A:Statistical Mechanics and Its Applications,2018,512:165-173. [23]JIANG J L,FANG H,LI S Q,et al.Identifying important nodes for temporal networks based on the ASAM model[J].Physica A:Statistical Mechanics and Its Applications,2022,586:126455. [24]QU C Q,ZHAN X X,WANG G H,et al.Temporal information gathering process for node ranking in time-varying networks[J].Chaos:An Interdisciplinary Journal of Nonlinear Science,2019,29(3):033116. [25]SONG Q,ZONG B,WU Y H,et al.Tgnet:Learning to ranknodes in temporal graphs[C]//Proceedings of the 27th ACM International Conference on Information and Knowledge Ma-nagement.New York:ACM,2018:97-106. [26]YU E Y,FU Y,CHEN X,et al.Identifying critical nodes in temporal networks by network embedding[J].Scientific Reports,2020,10:12494. [27]YU E Y,FU Y,ZHOU J L,et al.Predicting critical nodes in temporal networks by dynamic graph convolutional networks[J].Applied Sciences,2023,13(12):7272. [28]YAN M X,HAN Y X,WANG B.NFI-SGAT:Node feature initialization-based streaming graph learning model with graph attention network for critical node identification in temporal networks[J].Neurocomputing,2025,630:129679. [29]AHMAD W,WANG B.A neural diffusion model for identifying influential nodes in complex networks[J].Chaos,Solitons & Fractals,2024,189:115682. [30]DONG X F,YE L T,LIAN Y.Who has dominated information spreading on social media during the early stage of COVID-19 pandemic in China? A temporal network analysis[J].International Journal of Disaster Risk Reduction,2024,107:104493. [31]LI H Y,ZHANG T,ZHANG Y K,et al.A maximum flow algorithm based on storage time aggregated graph for delay-tolerant networks[J].Ad Hoc Networks,2017,59:63-70. [32]GUNTURI V M V,SHEKHAR S,JOSEPH K,et al.Scalable computational techniques for centrality metrics on temporally detailed social network[J].Machine Learning,2017,106:1133-1169. [33]HAFIENE N,KAROUI W,ROMDHANE L B.Influentialnodes detection in dynamic social networks:A survey[J].Expert Systems with Applications,2020,159:113642. [34]WU H H,CHENG J,HUANG S L,et al.Path problems in temporal graphs[J].Proceedings of the VLDB Endowment,2014,7(9):721-732. [35]MA Z H,LI L Y,HEMPHILL L,et al.Investigating disaster response for resilient communities through social media data and the Susceptible-Infected-Recovered(SIR) model:A case study of 2020 Western U.S.wildfire season[J].Sustainable Cities and Society,2024,106:105362. [36]ZHANG H G,ZHANG D P,WAN Y,et al.Multiplex network influence maximization based on representation learning method[J].Applied Soft Computing,2025,174:112956. [37]YU E Y,WANG Y P,FU Y,et al.Identifying critical nodes in complex networks via graph convolutional networks[J].Knowledge-Based Systems,2020,198:105893. [38]ZHAO G H,JIA P,ZHOU A M,et al.InfGCN:Identifying influential nodes in complex networks with graph convolutional networks[J].Neurocomputing,2020,414:18-26. [39]MA T H,WANG H M,ZHANG L J,et al.Graph classification based on structural features of significant nodes and spatial convolutional neural networks[J].Neurocomputing,2021,423:639-650. [40]CHEN J F,XIE H D,CAI S H,et al.GCN-MHSA:A novel malicious traffic detection method based on graph convolutional neural network and multi-head self-attention mechanism[J].Computers & Security,2024,147:104083. [41]AHMED I,AHMAD M,CHEHRI A,et al.A heterogeneousnetwork embedded medicine recommendation system based on LSTM[J].Future Generation Computer Systems,2023,149:1-11. [42]OU Y,GUO Q,XING J L,et al.Identification of spreading influence nodes via multi-level structural attributes based on the graph convolutional network[J].Expert Systems with Applications,2022,203:117515. [43]TOCINO A,SERRANO D H,HERNANDEZ-SERRANO J,et al.A stochastic simplicial SIS model for complex networks[J].Communications in Nonlinear Science and Numerical Simulation,2023,120:107161. [44]GALLO L,LACASA L,LATORA V,et al.Higher-order correlations reveal complex memory in temporal hypergraphs[J].Nature Communications,2024,15:4754. [45]NEUHAUSER L,SCHOLKEMPER M,TUDISCO F,et al.Learning the effective order of a hypergraph dynamical system[J].Science Advances,2024,10(19):adh4053. [46]WU J Y,HE L Z,JIA T,et al.Temporal link prediction based on node dynamics[J].Chaos,Solitons & Fractals,2023,170:113402. [47]CENCETTI G,LUCCHINI L,SANTIN G,et al.Temporal clustering of social interactions trades-off disease spreading and knowledge diffusion[J].Journal of The Royal Society Interface,2024,21(210):20230471. [48]OUACHENE N,KIESSÉ T S,CORSON M S.Using conditional Kendall’s tau estimation to assess interactions among variables in dairy-cattle systems[J].Agricultural Systems,2024,220:104089. [49]YANG Y,WU J,SONG X M,et al.Data-driven quasi-convex method for hit rate optimization of process product quality in digital twin[J].Journal of Industrial Information Integration,2024,41:100610. [50]TSERKIS S,ASSAD S M,LAM P K,et al.Quantifying total correlations in quantum systems through the Pearson correlation coefficient[J].Physics Letters A,2025,543:130432. [51]CAO C P,LIAO Z N,YANG Y L.Maximizing Influence in Multilayer Networks Based on Node Ideology Combined with Invisible Community Detection[J].Journal of Chinese Computer Systems,2025,46(9):2283-2290. |
| [1] | 高泰, 任艳璋, 王会青, 李颖, 王彬. KGMamba:基于Kolmogorov-Arnold网络优化图卷积网络和Mamba的基因调控网络预测模型 KGMamba:Gene Regulatory Network Prediction Model Based on Kolmogorov-Arnold Network Optimizing Graph Convolutional Network and Mamba 计算机科学, 2026, 53(4): 101-111. https://doi.org/10.11896/jsjkx.250500097 |
| [2] | 辜波凯, 刘盾, 孙扬. STWD-DLFRD:基于序贯三支决策与深度学习的多粒度虚假评论检测方法 STWD-DLFRD:Multi-granularity Fake Review Detection via Sequential Three-way Decisions and Deep Learning 计算机科学, 2026, 53(4): 188-196. https://doi.org/10.11896/jsjkx.250500088 |
| [3] | 郑诚, 班晴晴. 知识辅助和强化句法驱动的方面级情感分析 Knowledge-assisted and Reinforced Syntax-driven for Aspect-based Sentiment Analysis 计算机科学, 2026, 53(4): 406-414. https://doi.org/10.11896/jsjkx.250600117 |
| [4] | 尹创, 刘建毅, 张茹. 跨模态融合的少样本勒索软件分类器:基于预训练模型的多模态编码 Cross-modal Fusion Few-sample Ransomware Classifier:Multimodal Encoding Based on Pre-trained Models 计算机科学, 2026, 53(4): 435-444. https://doi.org/10.11896/jsjkx.250500078 |
| [5] | 付昱凯, 李庆珍, 董志学, 师冬丽, 赵鹏. 基于少量目标数据和深度学习的行人重识别方法 Pedestrian Re-identification Methods Based on Limited Target Data and Deep Learning 计算机科学, 2026, 53(3): 287-294. https://doi.org/10.11896/jsjkx.260100073 |
| [6] | 喻定, 李章维. 基于Transformer架构的RNA二级结构预测方法 Prediction Method of RNA Secondary Structure Based on Transformer Architecture 计算机科学, 2026, 53(3): 375-382. https://doi.org/10.11896/jsjkx.250100005 |
| [7] | 杜剑彤, 管泽礼, 薛哲. 基于多任务学习的眼科视频特征融合与多维画像 Multi-task Learning-based Ophthalmic Video Feature Fusion and Multi-dimensional Profiling 计算机科学, 2026, 53(3): 383-391. https://doi.org/10.11896/jsjkx.260200058 |
| [8] | 苏睿韬, 任炯炯, 陈少真. 基于深度学习的GIFT-128与ASCON算法神经差分区分器研究 Deep Learning-based Neural Differential Distinguishers for GIFT-128 and ASCON 计算机科学, 2026, 53(3): 453-458. https://doi.org/10.11896/jsjkx.250600176 |
| [9] | 赵正彪, 卢涵宇, 丁红发. 基于节点影响力的图遗忘学习近似最差遗忘集构造算法 Node-influence Based Construction Algorithm of Approximate Worst-case Forgetting Set for Graph Unlearning 计算机科学, 2026, 53(3): 64-77. https://doi.org/10.11896/jsjkx.250700094 |
| [10] | 李泽群, 丁飞. 基于双分支融合与分段域适应迁移学习的疲劳驾驶检测 Fatigue Driving Detection Based on Dual-branch Fusion and Segmented Domain AdaptationTransfer Learning 计算机科学, 2026, 53(3): 78-87. https://doi.org/10.11896/jsjkx.250500025 |
| [11] | 黄靖, 王腾, 刘健, 胡凯, 彭鑫, 黄亚敏, 文元桥. 多模态水声图像目标视觉检测 Multimodal Visual Detection for Underwater Sonar Target Images 计算机科学, 2026, 53(2): 227-235. https://doi.org/10.11896/jsjkx.241200082 |
| [12] | 刘晨红, 李凤莲, 阳佳, 王夙喆, 陈桂军. 聚焦边界和多尺度特征融合的脑卒中病灶分割 Boundary-focused Multi-scale Feature Fusion Network for Stroke Lesion Segmentation 计算机科学, 2026, 53(2): 264-272. https://doi.org/10.11896/jsjkx.250300137 |
| [13] | 席鹏晖, 吴夏祯, 蒋文聪, 方良达, 贺超波, 官全龙. 个性化教育资源推荐综述 Review of Personalized Educational Resource Recommendations 计算机科学, 2026, 53(2): 1-15. https://doi.org/10.11896/jsjkx.250700184 |
| [14] | 黄苗苗, 王慧颖, 王梅霞, 王业江, 赵宇海. 图嵌入学习研究综述:从简单图到复杂图 Review of Graph Embedding Learning Research:From Simple Graph to Complex Graph 计算机科学, 2026, 53(1): 58-76. https://doi.org/10.11896/jsjkx.250300081 |
| [15] | 王成, 金城. 基于KAN的无监督多元时间序列异常检测网络 KAN-based Unsupervised Multivariate Time Series Anomaly Detection Network 计算机科学, 2026, 53(1): 89-96. https://doi.org/10.11896/jsjkx.241200190 |
|
||