Computer Science ›› 2021, Vol. 48 ›› Issue (2): 76-86.doi: 10.11896/jsjkx.191200102
• Database & Big Data & Data Science • Previous Articles Next Articles
TAN Qi, ZHANG Feng-li, ZHANG Zhi-yang, CHEN Xue-qin
CLC Number:
[1] ALLCOTT H,BRAGHIERI L,EICHMEYER S,et al.The welfare effects of social media[R].National Bureau of Economic Research,2019. [2] BLEVINS D P,RAGOZZINO R.On social media and the formation of organizationalreputation:How social media are increasing cohesion between organizational reputation and traditional media for stakeholders[J].Academy of Management Review,2019,44(1):219-222. [3] ALLCOTT H,GENTZKOW M,YU C.Trends in the diffusion of misinformation onsocial media[J].Research & Politics,2019,6(2):2053168019848554. [4] YU S,LIU M,DOU W,et al.Networking for big data:A survey[J].IEEE Communications Surveys & Tutorials,2016,19(1):531-549. [5] PENG S,WANG G,XIE D.Social Influence Analysis in Social Networking Big Data:Opportunities and Challenges[J].IEEE Network,2016,PP(99):12-18. [6] HAN Z M,CHEN Y,LIU W,et al.Influence analysis of social network nodes[J].Journal of Software,2017,28(1):84-104. [7] PENG S,ZHOU Y,CAO L,et al.Influence analysis in social networks:A survey[J].Journal of Network and Computer Applications,2018,106:17-32. [8] LI X,CHENG X,SU S,et al.A hybrid collaborative filteringmodel for social influence prediction in event-based social networks[J].Neurocomputing,2017,230:197-209. [9] LU M,WANG Z,YE D.Topic Influence Analysis Based onUser Intimacy and Social Circle Difference[J].IEEE Access,2019,7:101665-101680. [10] CHEN J,YING P,ZOU M.Improving music recommendation by incorporating social influence[J].Multimedia Tools and Applications,2019,78(3):2667-2687. [11] WANG P.Evaluation of influence of social network nodes based on emotion analysis[D].Shanghai:Donghua University,2016. [12] WEI J D,TAN X Z,JIA Z H,et al.User influence evaluation model based on user behavior andstructural hole[J].Modern Electronic Technology,2019(5):39. [13] LUCERI L,BRAUN T,GIORDANO S.Analyzing and inferring human real-life behavior through online social networks with social influence deep learning[J].Applied Network Science,2019,4(1):34. [14] CHUNG W,ZENG D.Dissecting emotion and user influence in social media communities:An interaction modeling approach[J].Information & Management,2020,57(1):103108. [15] MENG Y,HAN C,ZHANG Y,et al.Image RecommendationWith Reciprocal Social Influence[J].IEEE Access,2019,7:132279-132285. [16] WANG P,LI L,YU Y,et al.Social Influence-based Attentive Mavens Mining and Aggregative Representation Learning for Group Recommendation[J].arXiv:1909.01079,2019. [17] ZHANG J,WANG B,SHENG J,et al.Identifying Influential Nodes in Complex Networks Based on Local Effective Distance[J].Information,2019,10(10):311. [18] KEMPE D,KLEINBERG J,TARDOS É.Maximizing the spread of influence through a social network[C]//Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.ACM,2003:137-146. [19] GOYAL A,BONCHI F,LAKSHMANAN L V S.Learning influence probabilities in social networks[C]//Proceedings of the Third ACM International Conference on Web Search and Data Mining.ACM,2010:241-250. [20] HOSSEINI-POZVEH M,ZAMANIFAR K,NAGHSH-NILCHI A R.Assessing information diffusion models for influence maximization in signed social networks[J].Expert Systems with Applications,2019,119:476-490. [21] CUOMO S,COLECCHIA G,PICCIALLI F,et al.Traditional and Deep Learning Approaches to Information and Influence Propagation in Social Networks[C]//2018 14th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS).IEEE,2018:480-484. [22] PIKOREC M,MUC T,IKI M.Disentangling sources of influence in online social networks[J].IEEE Access,2019,PP(99):1-1. [23] RAZIS G,ANAGNOSTOPOULOS I,ZEADALLY S.Modeling Influence with Semantics in Social Networks:a Survey[J].ar-Xiv:1801.09961,2018. [24] CERCEL D C,TRAUSAN-MATU S.Opinion propagation inonline social networks:A survey[C]//Proceedings of the 4th International Conference on Web Intelligence,Mining and Semantics (WIMS14).ACM,2014:11. [25] KUMAR N,GUO R,ALEALI A,et al.An empirical evaluation of social influence metrics[C]//2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mi-ning(ASONAM).IEEE,2016:1329-1336. [26] YU L,CUI P,WANG F,et al.From micro to macro:Uncovering and predicting information cascading process with behavioral dynamics[C]//2015 IEEE International Conference on Data Mi-ning.IEEE,2015:559-568. [27] ZHANG J,TANG J,LI J,et al.Who influenced you? predicting retweet via social influence locality[J].ACM Transactions on Knowledge Discovery from Data (TKDD),2015,9(3):25. [28] LIU S,ZHENG H,SHEN H,et al.Learning Concise Representations of Users' Influences through Online Behaviors[C]//IJCAI.2017:2351-2357. [29] ZHANG J D,YANG Y.Research on user influence measurement model of mobile social network based on interactivebeha-vior and emotional tendency[J].Intelligence Theory and Practice,2019,42(1):112. [30] GUO Y,WANG X W,LI S M,et al.Research on the influence model of social network users based on emotion analysis[J].Acta Sinica Sinica,2017,36(11):1139-1147. [31] ZHANG J,LIU B,TANG J,et al.Social influence locality for modeling retweeting behaviors[C]//Twenty-Third International Joint Conference on Artificial Intelligence.2013. [32] PEI S,MUCHNIK L,ANDRADE J J S,et al.Searching for super spreaders of information in real-world social media[J].Scientific Reports,2014,4:5547. [33] WANG J,ZHENG V W,LIU Z,et al.Topological recurrentneural network for diffusion prediction[C]//2017 IEEE International Conference on Data Mining (ICDM).IEEE,2017:475-484. [34] NIEPERT M,AHMED M,KUTZKOV K.Learning convolu-tional neural networks for graphs[C]//International Conference on Machine Learning.2016:2014-2023. [35] QIU J,TANG J,MA H,et al.Deepinf:Social influence prediction with deep learning[C]//Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining.ACM,2018:2110-2119. [36] LI P,NIE H,YIN F,et al.Modeling and Estimating User Influence in Social Networks[J].IEEE Access,2020:1-1. [37] TU C,ZENG X,WANG H,et al.A unified framework for community detection and network representation learning[J].IEEE Transactions on Knowledge and Data Engineering,2018,31(6):1051-1065. [38] ZHANG C,TANG K,PENG Y B.Fuzzy comprehensive evaluation of the influence of social network users[J].Computer System Application,2017,26(12):18-24. [39] HAN Z M,MAO R,ZHENG C Y,et al.An effective dynamic network node influence model[J].Computer Application Research,2019(7):1960-1964. [40] OYIBO K,VASSILEVA J.The relationship between personality traits and susceptibility to social influence[J].Computers in Human Behavior,2019,98:174-188. [41] MOHAMMADINEJAD A,FARAHBAKHSH R,CRESPI N.Consensus Opinion Model in Online Social Networks Based on Influential Users[J].IEEE Access,2019,7:28436-28451. [42] CHEN C,WEI J J,LIAO X W,et al.Analysis of social influence based on user perspective[J].Chinese Journal of Information Technology,2017,31(4):191-198. [43] JU C H,ZHAO K D,BAO F G.Calculation model of user in-fluence intensity of social network with integrationcentrality and credit[J].Acta Sinica Sinica,2019,38(2):170-177. [44] WANG Z F,ZHU J Y,ZHENG Z Y,et al.Influence analysis of weibo community users based on RC model[J].Computer Science,2017,44(3):254-258,282. [45] ZAREIE A,SHEIKHAHMADI A,JALILI M.Identification of influential users in social networks based on users' interest[J].Information Sciences,2019,493:217-231. [46] YOU Q.Analysis method of network community influencebased on interactive relationship[D].Beijing:University of Chinese Academy of Sciences,2016. [47] WEI J M,HE H.Research on user behavior and influence evaluation algorithm in social network[J].Intelligent Computer and Application,2019,9(2):162-167. [48] LUCERI L,BRAUN T,GIORDANO S.Social influence (deep) learning for human behavior prediction[C]//International Workshop on Complex Networks.Springer,Cham,2018:261-269. [49] ZHU Y Q,QI L F.Research on the relationship between user Posting behavior,user types and interest groups[J].Intelligence Exploration,2019,257(3):22-30. [50] DUC F.Measurement of network node influence based on k-shell and information entropy redundancy[J].Mobile Communications,2017,41(24):24-28. [51] XING Y F,WANG X W,HAN X W,et al.Influence of network nodes in new media environment based on information entropy -- a case study of WeChat public account[J].Library and Information Work,2018,62(5):76-86. [52] BHOWMICK A K,GUEUNING M,DELVENNE J C,et al.Temporal Sequence of Retweets Help to Detect Influential Nodes in Social Networks[J].IEEE Transactions on Computational Social Systems,2019:1-15. [53] GUO R,SHAKARIAN P.A comparison of methods for cascade prediction[C]//Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.IEEE Press,2016:591-598. [54] LYU L,CHEN D,REN X L,et al.Vital nodes identification in complex networks[J].Physics Reports,2016,650:1-63. [55] CHANG F,ZHOU G,TIAN C,et al.Identification of influential nodes in multi-layer mapping service network for high-endmanu-facturing equipment[C]//2018 IEEE 15th International Confe-rence on Networking,Sensing and Control (ICNSC).IEEE,2018:1-6. [56] ZHANG W,YANG J,DING X,et al.Groups make nodespowerful:Identifying influential nodes in social networks based on social conformity theory and community features[J].Expert Systems with Applications,2019,125:249-258. [57] SHAO Z,LIU S,ZHAO Y,et al.Identifying influential nodes in complex networks based on Neighbours and edges[J].Peer-to-Peer Networking and Applications,2019,12(6):1528-1537. [58] WANG Y,SHEN H W,LIU S,et al.Learning user-specific latent influence and susceptibility from information cascades[J].arXiv:1310.3911,2013. [59] HOGG T,LERMAN K.Social dynamics of digg[J].EPJ Data Science,2012,1(1):5. [60] DEDOMENICO M,LIMA A,MOUGEL P,et al.The anatomy of a scientific rumor[J].Scientific Reports,2013,3:2980. [61] LIU X,HE Q,TIAN Y,et al.Event-based social networks:lin-king the online and offline social worlds[C]//Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.ACM,2012:1032-1040. [62] BAO J,ZHENG Y,MOKBEL M F.Location-based and prefe-rence-aware recommendation using sparse geo-social networking data[C]//Proceedings of the 20th International Conference on Advances in Geographic Information Systems.ACM,2012:199-208. [63] JAQUES N,LAZARIDOU A,HUGHES E,et al.Social In-fluence as Intrinsic Motivation for Multi-Agent Deep Reinforcement Learning[C]//International Conference on Machine Learning.2019:3040-3049. [64] ULLAH H,ULLAH M,UZAIR M.A hybrid social influencemodel for pedestrian motion segmentation[J].Neural Computing and Applications,2019,31(11):7317-7333. [65] PICCOLI V,CARNAGHI A,GRASSI M,et al.Cyberbullying through the lens of social influence:Predicting cyberbullying perpetration from perceived peer-norm,cyberspace regulations and ingroup processes[J].Computers in Human Behavior,2020,102:260-273. [66] GARCIA D.Privacy beyond the individual[J].Nature Human Behaviour,2019,3(2):112. [67] BAGROW J P,LIU X,MITCHELL L.Information flow reveals prediction limits in online social activity[J].Nature Human Behaviour,2019,3(2):122. |
[1] | WANG Jian, PENG Yu-qi, ZHAO Yu-fei, YANG Jian. Survey of Social Network Public Opinion Information Extraction Based on Deep Learning [J]. Computer Science, 2022, 49(8): 279-293. |
[2] | WEI Peng, MA Yu-liang, YUAN Ye, WU An-biao. Study on Temporal Influence Maximization Driven by User Behavior [J]. Computer Science, 2022, 49(6): 119-126. |
[3] | YU Ai-xin, FENG Xiu-fang, SUN Jing-yu. Social Trust Recommendation Algorithm Combining Item Similarity [J]. Computer Science, 2022, 49(5): 144-151. |
[4] | CHANG Ya-wen, YANG Bo, GAO Yue-lin, HUANG Jing-yun. Modeling and Analysis of WeChat Official Account Information Dissemination Based on SEIR [J]. Computer Science, 2022, 49(4): 56-66. |
[5] | ZUO Yuan-lin, GONG Yue-jiao, CHEN Wei-neng. Budget-aware Influence Maximization in Social Networks [J]. Computer Science, 2022, 49(4): 100-109. |
[6] | GUO Lei, MA Ting-huai. Friend Closeness Based User Matching [J]. Computer Science, 2022, 49(3): 113-120. |
[7] | SHAO Yu, CHEN Ling, LIU Wei. Maximum Likelihood-based Method for Locating Source of Negative Influence Spreading Under Independent Cascade Model [J]. Computer Science, 2022, 49(2): 204-215. |
[8] | WANG Jian, WANG Yu-cui, HUANG Meng-jie. False Information in Social Networks:Definition,Detection and Control [J]. Computer Science, 2021, 48(8): 263-277. |
[9] | TAN Qi, ZHANG Feng-li, WANG Ting, WANG Rui-jin, ZHOU Shi-jie. Social Network User Influence Evaluation Algorithm Integrating Structure Centrality [J]. Computer Science, 2021, 48(7): 124-129. |
[10] | ZHANG Ren-zhi, ZHU Yan. Malicious User Detection Method for Social Network Based on Active Learning [J]. Computer Science, 2021, 48(6): 332-337. |
[11] | BAO Zhi-qiang, CHEN Wei-dong. Rumor Source Detection in Social Networks via Maximum-a-Posteriori Estimation [J]. Computer Science, 2021, 48(4): 243-248. |
[12] | ZHANG Shao-jie, LU Xu-dong, GUO Wei, WANG Shi-peng, HE Wei. Prevention of Dishonest Behavior in Supply-Demand Matching [J]. Computer Science, 2021, 48(4): 303-308. |
[13] | ZHANG Hao-chen, CAI Ying, XIA Hong-ke. Delivery Probability Based Routing Algorithm for Vehicular Social Network [J]. Computer Science, 2021, 48(3): 289-294. |
[14] | YUAN De-yu, CHEN Shi-cong, GAO Jian, WANG Xiao-juan. Intervention Algorithm for Distorted Information in Online Social Networks Based on Stackelberg Game [J]. Computer Science, 2021, 48(3): 313-319. |
[15] | YU You-qin, LI Bi-cheng. Microblog User Interest Recognition Based on Multi-granularity Text Feature Representation [J]. Computer Science, 2021, 48(12): 219-225. |
|