Advertisement

Information Diffusion

  • Jiawei Zhang
  • Philip S. Yu
Chapter
  • 297 Downloads

Abstract

In the real world, social information can widely spread among people, and information exchange has become one of the most important social activities. The creation of the Internet and online social networks has rapidly facilitated the communication among people. Via the interactions among users in online social networks, information can easily be propagated from one user to other users. For instance, in recent years, online social networks have become the most important social occasion for news acquisition, and many outbreaking social events can get widely spread in the online social networks at a very fast speed. People as the multi-functional “sensors” can detect different kinds of event signals happening in the real world, and write posts to report their discoveries via the online social networks.

References

  1. 1.
    D. Bertsekas, Constrained Optimization and Lagrange Multiplier Methods (Optimization and Neural Computation Series) (Athena Scientific, Nashua, 1996)Google Scholar
  2. 2.
    S. Bharathi, D. Kempe, M. Salek, Competitive influence maximization in social networks, in Internet and Network Economics. WINE 2007 (Springer, Berlin, 2007)Google Scholar
  3. 3.
    T. Carnes, R. Nagarajan, S. Wild, A. Zuylen, Maximizing influence in a competitive social network: a follower’s perspective, in Proceedings of the Ninth International Conference on Electronic Commerce (ICEC ’07) (ACM, New York, 2007)CrossRefGoogle Scholar
  4. 4.
    W. Chen, A. Collins, R. Cummings, T. Ke, Z. Liu, D. Rincon, X. Sun, Y. Wang, W. Wei, Y. Yuan, Influence maximization in social networks when negative opinions may emerge and propagate – Microsoft research, in Proceedings of the Eleventh SIAM International Conference on Data Mining (SDM 2011), 2011.Google Scholar
  5. 5.
    S. Datta, A. Majumder, N. Shrivastava, Viral marketing for multiple products, in 2010 IEEE International Conference on Data Mining (IEEE, Piscataway, 2010)Google Scholar
  6. 6.
    J.S. deCani, R.A. Stine, A note on deriving the information matrix for a logistic distribution. Am. Stat. 40(3), 220–222 (1986)MathSciNetGoogle Scholar
  7. 7.
    P. Domingos, M. Richardson, Mining the network value of customers, in Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD ’01) (ACM, New York, 2001)Google Scholar
  8. 8.
    R. Ghosh, K. Lerman, Non-conservative diffusion and its application to social network analysis. arXiv preprint arXiv:1102.4639 (2011)Google Scholar
  9. 9.
    J. Goldenberg, B. Libai, E. Muller, Talk of the network: a complex systems look at the underlying process of word-of-mouth. Mark. Lett. 12(3), 211–223 (2001)CrossRefGoogle Scholar
  10. 10.
    M. Granovetter, Threshold models of collective behavior. Am. J. Sociol. 83(6), 1420–1443 (1978)CrossRefGoogle Scholar
  11. 11.
    A. Guille, H. Hacid, C. Favre, D. Zighed, Information diffusion in online social networks: a survey. SIGMOD Rec. 42(2), 17–28 (2013)CrossRefGoogle Scholar
  12. 12.
    H. Hethcote, Three Basic Epidemiological Models (Springer, Berlin, 1989)CrossRefGoogle Scholar
  13. 13.
    D. Kempe, J. Kleinberg, É. Tardos, Maximizing the spread of influence through a social network, in Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD ’03) (ACM, New York, 2003)Google Scholar
  14. 14.
    D. Kempe, J. Kleinberg, É. Tardos, Influential nodes in a diffusion model for social networks, in Proceedings of the 32nd International Conference on Automata, Languages and Programming (ICALP’05) (Springer, Berlin, 2005)Google Scholar
  15. 15.
    W. Kermack, A. McKendrick, A contribution to the mathematical theory of epidemics. Proc. Roy. Soc. Lond. A Math. Phys. Eng. Sci. 115(772), 700–721 (1927)CrossRefGoogle Scholar
  16. 16.
    J. Kleinberg, The small-world phenomenon: an algorithmic perspective, in Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing (STOC ’00) (ACM, New York, 2000)CrossRefGoogle Scholar
  17. 17.
    J. Leskovec, D. Huttenlocher, J. Kleinberg, Predicting positive and negative links in online social networks, in Proceedings of the 19th International Conference on World Wide Web (WWW ’10) (ACM, New York, 2010)Google Scholar
  18. 18.
    J. Leskovec, D. Huttenlocher, J. Kleinberg, Signed networks in social media, in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’10) (ACM, New York, 2010)Google Scholar
  19. 19.
    Y. Li, W. Chen, Y. Wang, Z. Zhang, Influence diffusion dynamics and influence maximization in social networks with friend and foe relationships, in Proceedings of the Sixth ACM International Conference on Web Search and Data Mining (WSDM ’13) (ACM, New York, 2013)Google Scholar
  20. 20.
    D. Li, Z. Xu, N. Chakraborty, A. Gupta, K. Sycara, S. Li, Polarity related influence maximization in signed social networks. PLoS One 9(7), e102199 (2014)CrossRefGoogle Scholar
  21. 21.
    J. Lienhard, A Heat Transfer Textbook: Fourth Edition (Dover Civil and Mechanical Engineering. Dover Publications, New York, 2013)zbMATHGoogle Scholar
  22. 22.
    S. Lin, F. Wang, Q. Hu, P. Yu, Extracting social events for learning better information diffusion models, in Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD ’13) (ACM, New York, 2013)Google Scholar
  23. 23.
    S. Myers, C. Zhu, J. Leskovec, Information diffusion and external influence in networks, in Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD ’12) (ACM, New York, 2012)Google Scholar
  24. 24.
    R. Narayanam, A. Nanavati, Viral marketing for product cross-sell through social networks, in Machine Learning and Knowledge Discovery in Databases (ECML PKDD 2012) (Springer, Berlin, 2012)Google Scholar
  25. 25.
    D. Nguyen, H. Zhang, S. Das, M. Thai, T. Dinh, Least cost influence in multiplex social networks: model representation and analysis, in 2013 IEEE 13th International Conference on Data Mining (IEEE, Piscataway, 2013)Google Scholar
  26. 26.
    R. Pastor-Satorras, C. Castellano, P. Mieghem, A. Vespignani, Epidemic processes in complex networks. CoRR, abs/1408.2701 (2014)Google Scholar
  27. 27.
    D. Peleg, Local majority voting, small coalitions and controlling monopolies in graphs: a review, in Proceedings 3rd Colloquium on Structural Information and Communication Complexity (Carleton University Press, Siena, 1996)Google Scholar
  28. 28.
    M. Richardson, P. Domingos, Mining knowledge-sharing sites for viral marketing, in Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD ’02) (ACM, New York, 2002)Google Scholar
  29. 29.
    D. Shah, T. Zaman, Rumors in a network: who’s the culprit? IEEE Trans. Inf. Theory 57(8), 5163–5181 (2011)MathSciNetCrossRefGoogle Scholar
  30. 30.
    Y. Sun, J. Han, X. Yan, P. Yu, T. Wu, PathSim: meta path-based top-k similarity search in heterogeneous information networks, in Proceedings of the VLDB Endowment (2011)Google Scholar
  31. 31.
    J. Tang, Y. Chang, C. Aggarwal, H. Liu, A survey of signed network mining in social media. ACM Computing Surveys, to appear, CoRR abs/1511.07569 (2015)Google Scholar
  32. 32.
    H. Tong, C. Faloutsos, J.-Y. Pan, Fast random walk with restart and its applications (2006)Google Scholar
  33. 33.
    T. Turner, P. Qvarfordt, J. Biehl, G. Golovchinsky, M. Back, Exploring the workplace communication ecology, in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’10) (ACM, New York, 2010)Google Scholar
  34. 34.
    R. West, H. Paskov, J. Leskovec, C. Potts, Exploiting social network structure for person-to-person sentiment analysis. Trans. Assoc. Comput. Linguist. 2, 297–310 (2014)CrossRefGoogle Scholar
  35. 35.
    K. Wilcox, A. T. Stephen, Are close friends the enemy? Online social networks, self-esteem, and self-control. J. Consum. Res. 40(1), 90–103 (2012)CrossRefGoogle Scholar
  36. 36.
    Y. Yao, H. Tong, X. Yan, F. Xu, J. Lu, Matri: a multi-aspect and transitive trust inference model. in Proceedings of the 22nd International Conference on World Wide Web (ACM, New York, 2013)Google Scholar
  37. 37.
    J. Ye, H. Cheng, Z. Zhu, M. Chen, Predicting positive and negative links in signed social networks by transfer learning, in Proceedings of the 22nd International Conference on World Wide Web (WWW ’13) (ACM, New York, 2013)Google Scholar
  38. 38.
    Q. Zhan, J. Zhang, S. Wang, P. Yu, J. Xie, Influence maximization across partially aligned heterogeneous social networks, in Pacific-Asia Conference on Knowledge Discovery and Data Mining (Springer, Cham, 2015)Google Scholar
  39. 39.
    Q. Zhan, J. Zhang, X. Pan, P. Yu, Discover tipping users for cross network influencing, in 2016 IEEE 17th International Conference on Information Reuse and Integration (IRI) (IEEE, Piscataway, 2016)Google Scholar
  40. 40.
    Q. Zhan, J. Zhang, P. Yu, S. Emery, J. Xie, Inferring social influence of anti-tobacco mass media campaigns, in 2016 IEEE International Conference on Bioinformatics and Biomedicine (BIBM) (IEEE, Piscataway, 2016)Google Scholar
  41. 41.
    Q. Zhan, J. Zhang, P. Yu, J. Xie, Viral marketing through aligned networks (2018)Google Scholar
  42. 42.
    J. Zhang, Social network fusion and mining: a survey (2018)Google Scholar
  43. 43.
    J. Zhang, P. Yu, Community detection for emerging networks, in 2015 SIAM International Conference on Data Mining (2015)Google Scholar
  44. 44.
    J. Zhang, Y. Lv, P. Yu, Enterprise social link recommendation, in Proceedings of the 24th ACM International on Conference on Information and Knowledge Management (CIKM ’15) (ACM, New York, 2015)Google Scholar
  45. 45.
    J. Zhang, P. Yu, Y. Lv, Organizational chart inference, in Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD ’15) (ACM, New York, 2015)Google Scholar
  46. 46.
    J. Zhang, S. Wang, Q. Zhan, P. Yu, Intertwined viral marketing in social networks, in 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) (IEEE, Piscataway, 2016)Google Scholar
  47. 47.
    J. Zhang, P. Yu, Y. Lv, Q. Zhan, Information diffusion at workplace, in Proceedings of the 25th ACM International on Conference on Information and Knowledge Management (CIKM ’16) (ACM, New York, 2016)Google Scholar
  48. 48.
    J. Zhang, Q. Zhan, L. He, C. Aggarwal, P. Yu, Trust hole identification in signed networks, in Machine Learning and Knowledge Discovery in Databases (ECML PKDD 2016) (Springer, Cham, 2016)Google Scholar
  49. 49.
    H. Zhang, D. Nguyen, H. Zhang, M. Thai, Least cost influence maximization across multiple social networks. IEEE ACM Trans. Netw. 24(2), 929–939 (2016)CrossRefGoogle Scholar
  50. 50.
    J. Zhang, C. Aggarwal, P. Yu, Rumor initiator detection in infected signed networks, in 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS) (IEEE, Piscataway, 2017)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Jiawei Zhang
    • 1
  • Philip S. Yu
    • 2
  1. 1.Department of Computer ScienceFlorida State UniversityTallahasseeUSA
  2. 2.Department of Computer ScienceUniversity of IllinoisChicagoUSA

Personalised recommendations