Computer Science ›› 2026, Vol. 53 ›› Issue (4): 143-154.doi: 10.11896/jsjkx.250300147

• Database & Big Data & Data Science • Previous Articles     Next Articles

Key Node Identification in Temporal Social Networks Based on Deep Learning and Multi-feature Fusion

ZHANG Xueqin1,2, WANG Zhineng1, LI Jinsheng1, LU Yisong1, LUO Fei1   

  1. 1 Department of Information Science and Engineering, East China University of Science and Technology, Shanghai 200237, China
    2 Shanghai Key Laboratory of Computer Software Testing & Evaluating, Shanghai 201112, China
  • Received:2025-03-27 Revised:2025-06-12 Online:2026-04-15 Published:2026-04-08
  • About author:ZHANG Xueqin,born in 1972,professor.Her main research interests include information security,complex network and artificial intelligence.
    WANG Zhineng,born in 2000,master.His main research interests include information security and complex network.
  • Supported by:
    Major Program of the National Social Science Fundation of China(23&ZD142).

Abstract: Social network is the main channel of information dissemination,and identifying key nodes in social networks is important for discovering information dissemination hubs and performing information dissemination control.Realistic social networks are time-varying,and reasonable modeling of temporal networks with comprehensive description and deep mining of the spatial and temporal relationships of nodes is an important factor for accurately identifying key nodes in the network.In order to improve the accuracy of key node identification,a deep learning and multi-feature fusion based method MCNN(Multidimensional CNN) for key node identification in temporal social networks is proposed.The method firstly models the temporal network as a multidimensional relational network based on snapshots,and for a node,in each snapshot,the spatial,temporal,and spatio-temporal contexts of the node are extracted from the spatial structure,temporal coupling,and three types of spatio-temporal propagation relations,respectively,and the node feature matrix is constructed.In order to deeply analyze the spatio-temporal relationships of nodes in each snapshot,three types of node features are extracted using CNN,respectively,and fused to form the node snapshot features using the self-attention mechanism.To capture the evolution of node behaviors between snapshots,node snapshot features of all snapshots are combined as a time sequence,and LSTM is used to mine the snapshot sequence features.Finally,the influence of nodes is predicted using a fully connected layer.Experiments on six real temporal social networks show that MCNN outperforms the baseline approaches for key node identification in temporal social networks.

Key words: Temporal social network, Node influence, Network representation, Spatio-temporal characteristics, Deep learning

CLC Number: 

  • TP181
[1]WEI P C,ZHOU J H,YAN B,et al.ENIMNR:Enhanced node influence maximization through node representation in social networks[J].Chaos,Solitons & Fractals,2024,186:115192.
[2]MENG L,XU G Q,DONG C,et al.Modeling information propagation for target user groups in online social networks based on guidance and incentive strategies[J].Information Sciences,2025,691:121628.
[3]FOROOZANI A,EBRAHIMI M.Nonlinear anomalous information diffusion model in social networks[J].Communications in Nonlinear Science and Numerical Simulation,2021,103:106019.
[4]ZHOU Y M,WANG G Z,HAO J K,et al.A fast tri-individual memetic search approach for the distance-based critical node problem[J].European Journal of Operational Research,2023,308(2):540-554.
[5]AN Z Y,HU X H,JIANG R X,et al.A novel method for identifying key nodes in multi-layer networks based on dynamic influence range and community importance[J].Knowledge-Based Systems,2024,305:112639.
[6]HU Q,JIANG J T,XU H F,et al.IMNE:Maximizing influence through deep learning-based node embedding in social network[J].Swarm and Evolutionary Computation,2024,88:101609.
[7]WU J,QIU T,CHEN G.A general deep-learning approach tonode importance identification[J].Chaos,Solitons & Fractals,2024,188:115501.
[8]ZHAO M,YE J H,LI J Y,et al.NRD:A node importance eva-luation algorithm based on neighborhood reliance degree for power networks[J].Physica A:Statistical Mechanics and Its Applications,2023,624:128941.
[9]ZHAO S Y,SUN S W.Identification of node centrality based on Laplacian energy of networks[J].Physica A:Statistical Mechanics and its Applications,2023,609:128353.
[10]YANG P L,MENG F Y,ZHAO L J,et al.AOGC:An improved gravity centrality based on an adaptive truncation radius and omni-channel paths for identifying key nodes in complex networks[J].Chaos,Solitons & Fractals,2023,166:112974.
[11]XU G Q,DONG C.CAGM:A communicability-based adaptivegravity model for influential nodes identification in complex networks[J].Expert Systems with Applications,2024,235:121154.
[12]SAUMYA S,KUMAR A,SINGH J P.Filtering offensive language from multilingual social media contents:A deep learning approach[J].Engineering Applications of Artificial Intelligence,2024,133:108159.
[13]ZHANG M,WANG X J,JIN L,et al.A new approach forevaluating node importance in complex networks via deep lear-ning methods[J].Neurocomputing,2022,497:13-27.
[14]KOU J H,JIA P,LIU J Y,et al.Identify influential nodes in social networks with graph multi-head attention regression model[J].Neurocomputing,2023,530:23-36.
[15]KUMAR S,MALLIK A,PANDA B S.Influence maximizationin social networks using transfer learning via graph-based LSTM[J].Expert Systems with Applications,2023,212:118770.
[16]ACOSTA A,CARDENAS N C,IMBACUAN C,et al.Modelling control strategies against classical swine fever:Influence of tra-ders and markets using static and temporal networks in Ecuador[J].Preventive Veterinary Medicine,2022,205:105683.
[17]KIM H,ANDERSON R.Temporal node centrality in complex networks[J].Physical Review E,2012,85:026107.
[18]YE Z H,ZHAN X X,ZHOU Y Z,et al.Identifying vital nodes on temporal networks:An edge-based k-shell decomposition[C]//Proceedings of the 36th Chinese Control Conference(CCC 2017).New York:IEEE,2017:1402-1407.
[19]BI J L,JIN J,QU C Q,et al.Temporal gravity model for important node identification in temporal networks[J].Chaos,Solitons & Fractals,2021,147:110934.
[20]TAO L,KONG S Z,HE L Z,et al.A sequential-path tree-based centrality for identifying influential spreaders in temporal networks[J].Chaos,Solitons & Fractals,2022,165:112766.
[21]TAYLOR D,MYERS S A,CLAUSET A,et al.Eigenvector-based centrality measures for temporal networks[J].Multiscale Modeling & Simulation,2017,15(1):537-574.
[22]YIN R R,GUO Q,YANG J N,et al.Inter-layer similarity-based eigenvector centrality measures for temporal networks[J].Physica A:Statistical Mechanics and Its Applications,2018,512:165-173.
[23]JIANG J L,FANG H,LI S Q,et al.Identifying important nodes for temporal networks based on the ASAM model[J].Physica A:Statistical Mechanics and Its Applications,2022,586:126455.
[24]QU C Q,ZHAN X X,WANG G H,et al.Temporal information gathering process for node ranking in time-varying networks[J].Chaos:An Interdisciplinary Journal of Nonlinear Science,2019,29(3):033116.
[25]SONG Q,ZONG B,WU Y H,et al.Tgnet:Learning to ranknodes in temporal graphs[C]//Proceedings of the 27th ACM International Conference on Information and Knowledge Ma-nagement.New York:ACM,2018:97-106.
[26]YU E Y,FU Y,CHEN X,et al.Identifying critical nodes in temporal networks by network embedding[J].Scientific Reports,2020,10:12494.
[27]YU E Y,FU Y,ZHOU J L,et al.Predicting critical nodes in temporal networks by dynamic graph convolutional networks[J].Applied Sciences,2023,13(12):7272.
[28]YAN M X,HAN Y X,WANG B.NFI-SGAT:Node feature initialization-based streaming graph learning model with graph attention network for critical node identification in temporal networks[J].Neurocomputing,2025,630:129679.
[29]AHMAD W,WANG B.A neural diffusion model for identifying influential nodes in complex networks[J].Chaos,Solitons & Fractals,2024,189:115682.
[30]DONG X F,YE L T,LIAN Y.Who has dominated information spreading on social media during the early stage of COVID-19 pandemic in China? A temporal network analysis[J].International Journal of Disaster Risk Reduction,2024,107:104493.
[31]LI H Y,ZHANG T,ZHANG Y K,et al.A maximum flow algorithm based on storage time aggregated graph for delay-tolerant networks[J].Ad Hoc Networks,2017,59:63-70.
[32]GUNTURI V M V,SHEKHAR S,JOSEPH K,et al.Scalable computational techniques for centrality metrics on temporally detailed social network[J].Machine Learning,2017,106:1133-1169.
[33]HAFIENE N,KAROUI W,ROMDHANE L B.Influentialnodes detection in dynamic social networks:A survey[J].Expert Systems with Applications,2020,159:113642.
[34]WU H H,CHENG J,HUANG S L,et al.Path problems in temporal graphs[J].Proceedings of the VLDB Endowment,2014,7(9):721-732.
[35]MA Z H,LI L Y,HEMPHILL L,et al.Investigating disaster response for resilient communities through social media data and the Susceptible-Infected-Recovered(SIR) model:A case study of 2020 Western U.S.wildfire season[J].Sustainable Cities and Society,2024,106:105362.
[36]ZHANG H G,ZHANG D P,WAN Y,et al.Multiplex network influence maximization based on representation learning method[J].Applied Soft Computing,2025,174:112956.
[37]YU E Y,WANG Y P,FU Y,et al.Identifying critical nodes in complex networks via graph convolutional networks[J].Knowledge-Based Systems,2020,198:105893.
[38]ZHAO G H,JIA P,ZHOU A M,et al.InfGCN:Identifying influential nodes in complex networks with graph convolutional networks[J].Neurocomputing,2020,414:18-26.
[39]MA T H,WANG H M,ZHANG L J,et al.Graph classification based on structural features of significant nodes and spatial convolutional neural networks[J].Neurocomputing,2021,423:639-650.
[40]CHEN J F,XIE H D,CAI S H,et al.GCN-MHSA:A novel malicious traffic detection method based on graph convolutional neural network and multi-head self-attention mechanism[J].Computers & Security,2024,147:104083.
[41]AHMED I,AHMAD M,CHEHRI A,et al.A heterogeneousnetwork embedded medicine recommendation system based on LSTM[J].Future Generation Computer Systems,2023,149:1-11.
[42]OU Y,GUO Q,XING J L,et al.Identification of spreading influence nodes via multi-level structural attributes based on the graph convolutional network[J].Expert Systems with Applications,2022,203:117515.
[43]TOCINO A,SERRANO D H,HERNANDEZ-SERRANO J,et al.A stochastic simplicial SIS model for complex networks[J].Communications in Nonlinear Science and Numerical Simulation,2023,120:107161.
[44]GALLO L,LACASA L,LATORA V,et al.Higher-order correlations reveal complex memory in temporal hypergraphs[J].Nature Communications,2024,15:4754.
[45]NEUHAUSER L,SCHOLKEMPER M,TUDISCO F,et al.Learning the effective order of a hypergraph dynamical system[J].Science Advances,2024,10(19):adh4053.
[46]WU J Y,HE L Z,JIA T,et al.Temporal link prediction based on node dynamics[J].Chaos,Solitons & Fractals,2023,170:113402.
[47]CENCETTI G,LUCCHINI L,SANTIN G,et al.Temporal clustering of social interactions trades-off disease spreading and knowledge diffusion[J].Journal of The Royal Society Interface,2024,21(210):20230471.
[48]OUACHENE N,KIESSÉ T S,CORSON M S.Using conditional Kendall’s tau estimation to assess interactions among variables in dairy-cattle systems[J].Agricultural Systems,2024,220:104089.
[49]YANG Y,WU J,SONG X M,et al.Data-driven quasi-convex method for hit rate optimization of process product quality in digital twin[J].Journal of Industrial Information Integration,2024,41:100610.
[50]TSERKIS S,ASSAD S M,LAM P K,et al.Quantifying total correlations in quantum systems through the Pearson correlation coefficient[J].Physics Letters A,2025,543:130432.
[51]CAO C P,LIAO Z N,YANG Y L.Maximizing Influence in Multilayer Networks Based on Node Ideology Combined with Invisible Community Detection[J].Journal of Chinese Computer Systems,2025,46(9):2283-2290.
[1] GAO Tai, REN Yanzhang, WANG Huiqing, LI Ying, WANG Bin. KGMamba:Gene Regulatory Network Prediction Model Based on Kolmogorov-Arnold Network Optimizing Graph Convolutional Network and Mamba [J]. Computer Science, 2026, 53(4): 101-111.
[2] GU Bokai, LIU Dun, SUN Yang. STWD-DLFRD:Multi-granularity Fake Review Detection via Sequential Three-way Decisions and Deep Learning [J]. Computer Science, 2026, 53(4): 188-196.
[3] ZHENG Cheng, BAN Qingqing. Knowledge-assisted and Reinforced Syntax-driven for Aspect-based Sentiment Analysis [J]. Computer Science, 2026, 53(4): 406-414.
[4] YIN Chuang, LIU Jianyi, ZHANG Ru. Cross-modal Fusion Few-sample Ransomware Classifier:Multimodal Encoding Based on Pre-trained Models [J]. Computer Science, 2026, 53(4): 435-444.
[5] ZHAO Zhengbiao, LU Hanyu, DING Hongfa. Node-influence Based Construction Algorithm of Approximate Worst-case Forgetting Set for Graph Unlearning [J]. Computer Science, 2026, 53(3): 64-77.
[6] LI Zequn, DING Fei. Fatigue Driving Detection Based on Dual-branch Fusion and Segmented Domain AdaptationTransfer Learning [J]. Computer Science, 2026, 53(3): 78-87.
[7] FU Yukai, LI Qingzhen, DONG Zhixue, SHI Dongli, ZHAO Peng. Pedestrian Re-identification Methods Based on Limited Target Data and Deep Learning [J]. Computer Science, 2026, 53(3): 287-294.
[8] YU Ding, LI Zhangwei. Prediction Method of RNA Secondary Structure Based on Transformer Architecture [J]. Computer Science, 2026, 53(3): 375-382.
[9] DU Jiantong, GUAN Zeli, XUE Zhe. Multi-task Learning-based Ophthalmic Video Feature Fusion and Multi-dimensional Profiling [J]. Computer Science, 2026, 53(3): 383-391.
[10] SU Ruitao, REN Jiongjiong, CHEN Shaozhen. Deep Learning-based Neural Differential Distinguishers for GIFT-128 and ASCON [J]. Computer Science, 2026, 53(3): 453-458.
[11] HUANG Jing, WANG Teng, LIU Jian, HU Kai, PENG Xin, HUANG Yamin, WEN Yuanqiao. Multimodal Visual Detection for Underwater Sonar Target Images [J]. Computer Science, 2026, 53(2): 227-235.
[12] LIU Chenhong, LI Fenglian, YANG Jia, WANG Suzhe, CHEN Guijun. Boundary-focused Multi-scale Feature Fusion Network for Stroke Lesion Segmentation [J]. Computer Science, 2026, 53(2): 264-272.
[13] XI Penghui, WU Xiazhen, JIANG Wencong, FANG Liangda, HE Chaobo, GUAN Quanlong. Review of Personalized Educational Resource Recommendations [J]. Computer Science, 2026, 53(2): 1-15.
[14] HUANG Miaomiao, WANG Huiying, WANG Meixia, WANG Yejiang , ZHAO Yuhai. Review of Graph Embedding Learning Research:From Simple Graph to Complex Graph [J]. Computer Science, 2026, 53(1): 58-76.
[15] WANG Cheng, JIN Cheng. KAN-based Unsupervised Multivariate Time Series Anomaly Detection Network [J]. Computer Science, 2026, 53(1): 89-96.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!