DiffRank: A novel algorithm for information diffusion detection in social networks

被引:0
作者
Zhou, Dong-Hao [1 ,2 ]
Han, Wen-Bao [2 ,3 ]
机构
[1] College of Computer, National University of Defense Technology
[2] State Key Laboratory of Mathematical Engineering and Advanced Computing
[3] PLA Information Engineering University
来源
Jisuanji Xuebao/Chinese Journal of Computers | 2014年 / 37卷 / 04期
关键词
Diffusion detection; Information diffusion; Random walk model; Social computing; Social networks;
D O I
10.3724/SP.J.1016.2014.00884
中图分类号
学科分类号
摘要
Given a social network, information diffusion detection can be modeled as selecting a set of nodes as observations to detect the spreading of information or rumors as quickly as possible. It can be well applied to fields like opinion leader detection, rumor detection, and public security. Incorporating network structure, node attribute and history information cascades, we propose a random walk based algorithm DiffRank to sort nodes according to their diffusion ability, then choose the top-k nodes on the list as observations to detect information diffusion. Experiments on real dataset of Sina Weibo show that DiffRank outperforms other algorithms with respect to information cascades coverage ratio, detection time and reduction of infected population. Besides, DiffRank can be implemented easily in distributed or parallel computing environment, achieving good scalability.
引用
收藏
页码:884 / 893
页数:9
相关论文
共 19 条
[1]  
Weng J., Lim E., Jiang J., Et al., Twitterrank: Finding topic-sensitive influential twitterers, Proceedings of the 4th ACM International Conference on Web Search and Data Mining, pp. 261-270, (2010)
[2]  
Liu L., Tang J., Han J., Et al., Mining topic-level influence in heterogeneous networks, Proceedings of International Conference on Information and Knowledge Management, pp. 199-208, (2010)
[3]  
Tian J.-T., Wang Y.-T., Feng X.-J., A new hybrid algorithm for influence maximization in social networks, Chinese Journal of Computers, 34, 10, pp. 1956-1965, (2011)
[4]  
Pinto P., Thiran P., Vetterli M., Locating the source of diffusion in large scale network, Physical Review Letters, 109, 6, (2012)
[5]  
Bakshy E., Karrer B., Adamic L.A., Social influence and the diffusion of user-created content, Proceedings of the 10th ACM Conference on Electronic Commerce, pp. 325-334, (2009)
[6]  
Saez-Trumper D., Comarela G., Almeida V., Et al., Finding trendsetters in information networks, Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1014-1022, (2012)
[7]  
Leskovec J., Krause A., Guestrin C., Et al., Cost-effective outbreak detection in networks, Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 420-429, (2007)
[8]  
Kleinberg J.M., Authoritative sources in a hyperlinked environment, Journal of the ACM, 46, 5, pp. 604-632, (1999)
[9]  
Brin S., Page L., The anatomy of a large-scale hypertextual web search engine, Computer Networks and ISDN Systems, 30, 1, pp. 107-117, (1998)
[10]  
Zheng W., Wang C.-K., Liu Z., Wang J.-M., A multi-label classification algorithm based on random walk model, Chinese Journal of Computers, 33, 8, pp. 1418-1426, (2010)