Kai Li, Tong Xu, Shuai Feng, Li-Sheng Qiao, Hua-Wei Shen, Tian-Yang Lv, Xue-Qi Cheng, En-Hong Chen. The Propagation Background in Social Networks: Simulating and Modeling. International Journal of Automation and Computing, vol. 17, no. 3, pp.353-363, 2020. https://doi.org/10.1007/s11633-020-1227-2
Citation: Kai Li, Tong Xu, Shuai Feng, Li-Sheng Qiao, Hua-Wei Shen, Tian-Yang Lv, Xue-Qi Cheng, En-Hong Chen. The Propagation Background in Social Networks: Simulating and Modeling. International Journal of Automation and Computing, vol. 17, no. 3, pp.353-363, 2020. https://doi.org/10.1007/s11633-020-1227-2

The Propagation Background in Social Networks: Simulating and Modeling

doi: 10.1007/s11633-020-1227-2
More Information
  • Author Bio:

    Kai Li received the B. Sc. and M. Sc. degrees in computer science from the Yan-Shan University and Ji-Lin University, China in 2000 and 2003, respectively. He is now a Ph. D. degree candidate at School of Computer Science and Technology, University of Science and Technology of China (USTC), under the supervision of professor En-Hong Chen. He also visited the Institute of Computing Technology, Chinese Academy of Sciences, China, as a research assistant under the supervision of professor Xue-Qi Cheng from August 2017 to December 2019. His research interests include social network analysis and human dynamics. E-mail: marvin77@mail.ustc.edu.cn ORCID iD: 0000-0002-6227-7158

    Tong Xu received the Ph. D. degree in computer science from University of Science and Technology of China, China in 2016. He is currently working as an associate researcher of the Anhui Province Key Laboratory of Big Data analysis and Application, USTC. He has authored more than 40 journal and conference papers in the fields of social network and social media analysis, including IEEE Transactions on Knowledge and Data Engineering, IEEE Transactions on Mobile Computing, KDD, AAAI, ICDM, SDM, etc. He was a recipient of the ACM(Hefei) Doctoral Dissertation Award, 2016. His research interests include social network analysis and data mining. E-mail: tongxu@ustc.edu.cn

    Shuai Feng received the M. Sc. degree in computer science from the Northeast University, China in 2014. He is currently an engineer of the IT center of Chinese National Audit Office. His research interests includes complex network and audit technology. E-mail: 18301638625@163.com

    Li-Sheng Qiao received the M. Sc. degrees in electric power system & automation from Southwest Jiaotong University, China in 2009. He is now a Ph. D. degree candidate at School of Computer Science and Technology, University of Science and Technology of China, under the supervision of professor En-Hong Chen. His research interests include deep learning and data mining. E-mail: lsqiaoa@mail.ustc.edu.cn

    Hua-Wei Shen received the B. Sc. degree in electronic information from the Xi′an Institute of Posts and Telecommunications, China in 2003, and the Ph. D. degree in information security from the Institute of Computing Technology, Chinese Academy of Sciences (ICT-CAS), China in 2010. He is currently a professor in ICT-CAS. He has published more than 20 papers in prestigious journals and top international conferences, including Physical Review E, Journal of Statistical Mechanics, Physica A, WWW, CIKM, and IJCAI. He is a member of the Association of Innovation Promotion for Youth of CAS. He received the Top 100 Doctoral Thesis Award of CAS in 2011 and the Grand Scholarship of the President of CAS in 2010. His research interests include network science, information recommendation, user behaviour analysis, machine learning, and social network. E-mail: shenhuawei@ict.ac.cn

    Tian-Yang Lv received the Ph. D. degree in computer science from Jilin University, China in 2007. He is currently a senior engineer of IT center of Chinese National Audit Office. His research interests include complex networks and audit technology. E-mail: raynor1979@163.com

    Xue-Qi Cheng received the Ph. D. degree in computer science from the Institute of Computing Technology, Chinese Academy of Sciences, China in 2006. He is a professor in ICT-CAS, and the director of the Research Center of Web Data Science & Engineering (WDSE), ICT-CAS. He has published more than 100 publications in prestigious journals and conferences, including the IEEE Transactions on Information Theory, IEEE Transactions on Knowledge and Data Engineering, Journal of Statistics Mechanics: Theory and Experiment, Physical Review E., ACM SIGIR, WWW, ACM CIKM, WSDM, IJCAI, ICDM, He has won the Best Paper Award in CIKM (2011) and the Best Student Paper Award in SIGIR (2012). He is currently serving on the editorial board of Journal of Computer Science and Technology, Journal of Computer, etc. He received the China Youth Science and Technology Award, 2011, the Young Scientist Award of Chinese Academy of Sciences, 2010, CVIC Software Engineering Award, 2008, the second prize for the National Science and Technology Progress, 2004, etc. He is a member of the IEEE. His research interests include network science, web search and data mining, big data processing and distributed computing architecture. E-mail: cxq@ict.ac.cn

    En-Hong Chen received the Ph. D. degree from University of Science and Technology of China, China in 1996. He is a professor and vice dean of School of Computer Science, USTC. He has published more than 150 papers in refereed conferences and journals, including IEEE Transactions on Knowledge and Data Engineering, IEEE Transactions on Industrial Electronics, KDD, ICDM, NIPS, and CIKM. He was on program committees of numerous conferences including KDD, ICDM, and SDM. He received the Best Application Paper Award on KDD, 2008, the Best Research Paper Award on ICDM, 2011, and the Best of SDM, 2015. His research is supported by the National Science Foundation for Distinguished Young Scholars of China. He is a senior member of the IEEE. His research interests include data mining and machine learning, social network analysis, and recommend systems. E-mail: cheneh@ustc.edu.cn (Corresponding author) ORCID iD: 0000-0002-4835-4102

  • Received Date: 2019-08-09
  • Accepted Date: 2020-02-05
  • Publish Online: 2020-04-05
  • Publish Date: 2020-06-04
  • Recent years have witnessed the booming of online social network and social media platforms, which leads to a state of information explosion. Though extensive efforts have been made by publishers to struggle for the limited attention of audiences, still, only a few of information items will be received and digested. Therefore, for simulating the information propagation process, competition among propagating items should be considered, which has been largely ignored by prior works on propagation modeling. One possible reason may be that, it is almost impossible to identify the influence of propagation background from real diffusion data. To that end, in this paper, we design a comprehensive framework to simulate the propagation process with the characteristics of user behaviors and network topology. Specifically, we propose a propagation background simulating (PBS) algorithm to simulate the propagation background by using users′ behavior dynamics and out-degree. Along this line, an ICPB (independent cascade with propagation background) model is adapted to relieve the impact of propagation background by using users′ in-degree. Extensive experiments on kinds of synthetic and real networks have demonstrated the effectiveness of our methods.

     

  • 1http://snap.stanford.edu/data/
  • loading
  • [1]
    J. J. Li, L. R. Wu, J. Y. Qi, Q. Yan. Research on information dissemination in online social network based on human dynamics. Journal of Electronics &Information Technology, vol. 39, no. 4, pp. 785–793, 2017. DOI: 10.11999/JEIT160940. (in Chinese)
    [2]
    B. Chang, T. Xu, Q. Liu, E. H. Chen. Study on information diffusion analysis in social networks and its applications. International Journal of Automation and Computing, vol. 15, no. 4, pp. 377–401, 2018. DOI: 10.1007/s11633-018-1124-0.
    [3]
    A. Tselykh, V. Vasilev, L. Tselykh. Management of control impacts based on maximizing the spread of influence. International Journal of Automation and Computing, vol. 16, no. 3, pp. 341–353, 2019. DOI: 10.1007/s11633-018-1167-2.
    [4]
    T. Y. Jin, T. Xu, H. Zhong, E. H. Chen, Z. F. Wang, Q. Liu. Maximizing the effect of information adoption: A general framework. In Proceedings of SIAM International Conference on Data Mining, San Diego, USA, pp. 693–701, 2018.
    [5]
    B. Chang, E. H. Chen, F. D. Zhu, Q. Liu, T. Xu, Z. F. Wang. Maximum a posteriori > estimation for information source detection. IEEE Transactions on Systems, Man, and Cybernetics: Systems, to be published.
    [6]
    T. Xu, H. S. Zhu, H. Zhong, G. N. Liu, H. Xiong, E. H. Chen. Exploiting the dynamic mutual influence for predicting social event participation. IEEE Transactions on Knowledge and Data Engineering, vol. 31, no. 6, pp. 1122–1135, 2019. DOI: 10.1109/TKDE.2018.2851222.
    [7]
    K. Li, G.Y. Lv, Z. F. Wang, Q. Liu, E. H. Chen, L. S. Qiao. Understanding the mechanism of social tie in the propagation process of social network with communication channel. Frontiers of Computer Science, vol. 13, no. 6, pp. 1296–1308, 2019. DOI: 10.1007/s11704-018-7453-x.
    [8]
    C. Orellana-Rodriguez, M. K. Keane. Attention to news and its dissemination on Twitter: A survey. Computer Science Review, vol. 29, pp. 74–94, 2018. DOI: 10.1016/j.cosrev.2018.07.001.
    [9]
    H. A. Simon. Designing organizations for an information-rich world. Communication, and the Public Interest, M. Greenberger, Ed., Baltimore, MD, USA: The Johns Hopkins Press, pp. 40–41, 1971.
    [10]
    F. Wu, B. A. Huberman. Novelty and collective attention. Proceedings of the National Academy of Sciences of the United States of America, vol. 104, no. 45, pp. 17599–17601, 2007. DOI: 10.1073/pnas.0704916104.
    [11]
    R. Crane, D. Sornette. Robust dynamic classes revealed by measuring the response function of a social system. Proceedings of the National Academy of Sciences of the United States of America, vol. 105, no. 41, pp. 15649–15653, 2008. DOI: 10.1073/pnas.0803685105.
    [12]
    J. Leskovec, L. Backstrom, J. Kleinberg. Meme-tracking and the dynamics of the news cycle. In Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM, Paris, France, pp. 497–506, 2009. DOI: 10.1145/1557019.1557077.
    [13]
    S. Asur, B. A. Huberman, G. Szabo, C. Y. Wang. Trends in social media: Persistence and decay. In Proceedings of the 5th International AAAI Conference on Weblogs and Social Media, Barcelona, Spain, pp. 434–437, 2011.
    [14]
    J. Goldenberg, B. Libai, E. Muller. Talk of the network: A complex systems look at the underlying process of word-of-mouth. Marketing Letters, vol. 12, no. 3, pp. 211–223, 2001. DOI: 10.1023/A:1011122126881.
    [15]
    M. Granovetter. Threshold models of collective behavior. American Journal of Sociology, vol. 83, no. 6, pp. 1420–1443, 1978. DOI: 10.1086/226707.
    [16]
    S. S. Feng, X. F. Chen, G. Cong, Y. F. Zeng, Y. M. Chee, Y. P. Xiang. Influence maximization with novelty decay in social networks. In Proceedings of the 28th AAAI Conference on Artificial Intelligence, Quebec City, Canada, pp. 37–43, 2014.
    [17]
    N. Barbieri, F. Bonchi, G. Manco. Topic-aware social influence propagation models. Knowledge and Information Systems, vol. 37, no. 3, pp. 555–584, 2013. DOI: 10.1007/s10115-013-0646-6.
    [18]
    S. Petrovic, M. Osborne, V. Lavrenko. RT to win! predicting message propagation in twitter. In Proceedings of the 5th International AAAI Conference on Weblogs and Social Media, Barcelona, Spain, pp. 586–589, 2011.
    [19]
    M. M. Wang, W. L. Zuo, Y, Wang. A multidimensional nonnegative matrix factorization model for retweeting behavior prediction. Mathematical Problems in Engineering, vol. 2015, Article number 936397, 2015. DOI: 10.1155/2015/936397.
    [20]
    L. Weng, A. Flammini, A. Vespignani, F. Menczer. Competition among memes in a world with limited attention. Scientific Reports, vol. 2, Article number 335, 2012. DOI: 10.1038/srep00335.
    [21]
    X. Y. Qiu, D. F. M. Oliveira, A. S. Shirazi, A. Flammini, F. Menczer. Limited individual attention and online virality of low-quality information. Nature Human Behaviour, vol. 1, no. 7, Article number 0132, 2017. DOI: 10.1038/s41562-017-0132.
    [22]
    J. P. Gleeson, J. A. Ward, K. P. O′Sullivan, W. T. Lee. Competition-induced criticality in a model of meme popularity. Physical Review Letters, vol. 112, no. 4, Article number 048701, 2014. DOI: 10.1103/PhysRevLett.112.048701.
    [23]
    R. Fan, K. Xu, J. C. Zhao. An agent-based model for emotion contagion and competition in online social media. Physica A:Statistical Mechanics and its Applications, vol. 495, pp. 245–259, 2018. DOI: 10.1016/j.physa.2017.12.086.
    [24]
    D. Notarmuzi, C. Castellano. Analytical study of quality-biased competition dynamics for memes in social media. EPL (Europhysics Letters), vol. 122, no. 2, Article number 28002, 2018. DOI: 10.1209/0295-5075/122/28002.
    [25]
    Q. Su, J. J. Huang, X. D. Zhao. An information propagation model considering incomplete reading behavior in microblog. Physica A:Statistical Mechanics and its Applications, vol. 419, pp. 55–63, 2015. DOI: 10.1016/j.physa.2014.10.042.
    [26]
    O. Toubia, A. T. Stephen. Intrinsic vs. image-related utility in social media: Why do people contribute content to twitter? Marketing Science, vol. 32, no. 3, pp. 368–392, 2013. DOI: 10.1287/mksc.2013.0773.
    [27]
    H. Kwak, C. Lee, H. Park, S. Moon. What is twitter, a social network or a news media? In Proceedings of the 19th International Conference on World Wide Web, ACM, New York, USA, pp. 591–600. 2010.
    [28]
    K. Li, T. Y. Lv, H. W. Shen, L. S. Qiao, E. H. Chen, X. Q. Cheng, Z. Sun. An empirical analysis on the behavioral differentia of the “Elite-Civilian” users in Sina microblog. Physica A:Statistical Mechanics and its Applications, vol. 539, Article number 122974, 2020. DOI: 10.1016/j.physa.2019.122974.
    [29]
    Q. Yan, L. R. Wu, L. Zheng. Social network based microblog user behavior analysis. Physica A:Statistical Mechanics and Its Applications, vol. 392, no. 7, pp. 1712–1723, 2013. DOI: 10.1016/j.physa.2012.12.008.
    [30]
    C. X. Wang, X. H. Guan, T. Qin, T. Yang. Modeling heterogeneous and correlated human dynamics of online activities with double Pareto distributions. Information Sciences, vol. 330, pp. 186–198, 2016. DOI: 10.1016/j.ins.2015.09.016.
    [31]
    A. Clauset, C. R. Shalizi, M. E. J. Newman. Power-law distributions in empirical data. SIAM Review, vol. 51, no. 4, pp. 661–703, 2009. DOI: 10.1137/070710111.
    [32]
    T. G. Lewis. Network Science: Theory and Applications, Hoboken, USA: John Wiley & Sons, pp. 97–216, 2011.
    [33]
    A. Lancichinetti, S. Fortunato. Benchmarks for testing community detection algorithms on directed and weighted graphs with overlapping communities. Physical Review E, vol. 80, no. 1, Article number 016118, 2009. DOI: 10.1103/PhysRevE.80.016118.
    [34]
    Y. Yang, J. Tang, C. W. K. Leung, Y. Z. Sun, Q. C. Chen, J. Z. Li, Q. Yang. RAIN: Social role-aware information diffusion. In Proceedings of the 29th AAAI Conference on Artificial Intelligence, Austin, USA, pp. 367–373, 2015.
    [35]
    Y. Yang, J. Jia, B. Y. Wu, J. Tang. Social role-aware emotion contagion in image social networks. In Proceedings of the 30th AAAI Conference on Artificial Intelligence, Phoenix, USA, pp. 65–71, 2016.
    [36]
    N. Du, Y. Y. Liang, M. F. Balcan, L. Song. Influence function learning in information diffusion networks. In Proceedings of the 31st International Conference on Machine Learning, Beijing, China, pp. 2016–2024, 2014.
    [37]
    S. Brin, L. Page. The anatomy of a large-scale hypertextual web search engine. Computer Networks and ISDN Systems, vol. 30, no. 1–7, pp. 107–117, 1998. DOI: 10.1016/S0169-7552(98)00110-X.
    [38]
    R. S. Burt. Structural Holes: The Social Structure of Competition, Cambridge, Massachusetts, USA: Harvard University Press, pp. 51–64, 1992.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(4)  / Tables(2)

    Article Metrics

    Article views (699) PDF downloads(80) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return