JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2018, Vol. 53 ›› Issue (3): 1-12.doi: 10.6040/j.issn.1671-9352.0.2017.371

    Next Articles

User influence analysis of social media with temporal characteristics

LIAO Xiang-wen1,2, ZHANG Ling-ying1,2, WEI Jing-jing3, GUI Lin1,2*, CHENG Xue-qi4, CHEN Guo-long1,2   

  1. 1. College of Mathematics and Computer Science, Fuzhou University, Fuzhou 350116, Fujian, China;
    2. Fujian Provincial Key Laboratory of Networking Computing and Intelligent Information Processing, Fuzhou University, Fuzhou 350116, Fujian, China;
    3. College of Electronics and Information Science, Fujian Jiangxia University, Fuzhou 350108, Fujian, China;
    4. Key Laboratory of Network Data Science and Technology, Chinese Academy of Sciences, Beijing 100190, China
  • Received:2017-07-31 Online:2018-03-20 Published:2018-03-13

Abstract: Since both the temporal characteristics and online learning are not fully considered in exsiting tensor influence models, a novel method with temporal characteristics is proposed in this paper. This method constructs tensor with users opinion, activity and network centrality information. Then, a factorizes tensor with stochastic gradient descent algorithm which is constrained by temporal characteristics matrix is deployed in our model. Base on these two steps above, this method calculates user influence by combining different slices of tensor in the end. The advantages of this method are that it can decompose tensor efficiently and satisfy the need of online learning. Experimental results show that the average accuracy of the proposed method is 2% to 6% better than the baseline method such as TwitterRank, OOLAM and constrained nonnegative tensor factorization method. Besides, the running time of the proposed method is only 30% to 50% of constrained nonnegative tensor factorization method.

Key words: Temporal Characteristics, Social Influence, Tensor

CLC Number: 

  • TP391
[1] 吴信东, 李毅, 李磊. 在线社交网络影响力分析[J]. 计算机学报, 2014, 37(4): 735-752.
[2] WENG J, LIM E P, JIANG J, et al. TwitterRank: finding topic-sensitive influential twitterers[C] //International Conference on Web Search and Web Data Mining. New York: ACM, 2010: 261-270.
[3] BADASHIAN A S, STROULIA E. Measuring user influence in GitHub: the million follower fallacy[C] //Proceedings of the 3rd International Workshop on CrowdSourcing in Software Engineering. New York: ACM, 2016: 15-21.
[4] LEE R K-W, LIM E P. Measuring user influence, susceptibility and cynicalness in sentiment diffusion[C] //Advances in Information Retrieval-37th European Conference on IR Research. Cham: Springer International Publishing, 2015: 411-422.
[5] LI D, TANG J, DING Y, et al. Topic-level opinion influence model(TOIM): An investigation using tencent microblogging[J]. Computer Science, 2015, 6(12): 2657-2673.
[6] CHEN C, GAO D, LI W, et al. Inferring topic-dependent influence roles of Twitter users[C] //Proceedings of the 37th international ACM SIGIR conference on Research & development in information retrieval. New York: ACM, 2014: 1203-1206.
[7] 魏晶晶, 陈畅, 廖祥文, 等. 基于受限非负张量分解的用户社会影响力分析[J]. 通信学报, 2016, 37(6): 154-162.
[8] EMBAR V R, BHATTACHARYA I, PANDIT V, et al. Online topic-based social influence analysis for the wimbledon championships[C] //Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York: ACM, 2015: 1759-1768.
[9] WANG J, LIU Z, ZHAO H. Topic oriented user influence analysis in social networks[C] //IEEE/Wic/ACM International Conference on Web Intelligence and Intelligent Agent Technology. Washington, DC: IEEE Computer Society, 2015: 123-126.
[10] ZAMPARAS V, KANAVOS A, MAKRIS C. Real time analytics for measuring user influence on twitter[C] //IEEE International Conference on TOOLS with Artificial Intelligence. Washington, DC: IEEE Computer Society, 2015: 591-597.
[11] 毛佳昕, 刘奕群, 张敏, 等. 基于用户行为的微博用户社会影响力分析[J]. 计算机学报, 2014, 37(4): 791-800.
[12] HU X, TANG L, TANG J, et al. Exploiting social relations for sentiment analysis in microblogging[C] //Proceedings of the sixth ACM international conference on Web search and data mining. New York: ACM, 2013: 537-546.
[13] KEMPE D, KLEINBERG J, TARDOS É. Maximizing the spread of influence through a social network[J]. Progressive Research, 2008:137-146.
[14] CAI K, BAO S, YANG Z, et al. OOLAM: an opinion oriented link analysis model for influence persona discovery[C] //Proceedings of the fourth ACM international conference on Web search and data mining. New York: ACM, 2011: 645-654.
[15] CUI P, WANG F, YANG S, et al. Item-level social influence prediction with probabilistic hybrid factor matrix factorization[C] //AAAI Conference on Artificial Intelligence. Menlo Park, CA: AAAI Press, 2011.
[16] RODRIGUEZ M G, LESKOVEC J, KRAUSE A. Inferring networks of diffusion and influence[C] //Acm Knowledge Discovery & Data Mining. New York: ACM, 2011: 1019-1028.
[17] KOLDA T G, BADER B W. Tensor decompositions and applications[J]. Siam Review, 2005, 66(4): 294-310.
[18] MAEHARA T, HAYASHI K, KAWARABAYASHI K-I. Expected tensor decomposition with stochastic gradient descent[C] //Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence. Menlo Park, CA: AAAI Press, 2016: 1919-1925.
[19] ACAR E, DUNLAVY D M, KOLDA T G. A scalable optimization approach for fitting canonical tensor decompositions[J]. Journal of Chemometrics, 2011, 25(2): 67-86.
[20] ZEILER M D. ADADELTA: an adaptive learning rate method[J]. CoRR, 2012, abs/1212.5701(1): 1-6.
[1] YU Jin-biao, REN Yong-qiang, CAO Wei-dong, LU Tong-chao, CHENG Ai-jie, DAI tao. Expanded mixed finite element method for compressible miscible displacement in heterogeneous porous media [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(8): 25-34.
[2] XING Hai-yun, ZHAO Jian-li. Formulation of networked evolutionary games with variation mechanism [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(12): 103-107.
[3] GE Mei-xia, LI Ying, ZHAO Jian-li, XING Hai-yun. Strategy consensus of networked evolutionary games [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(11): 113-118.
[4] DENG Lei, ZHAO Jian-li, LIU Hua, LI Ying. Controllability and observability of k-valued control networks [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(04): 27-35.
[5] ZHAO Na. E-singular values of a real partially symmetric rectangular tensor [J]. J4, 2012, 47(10): 34-37.
[6] CHENG Daizhan, ZHAO Yin, XU Xiangru. Mix-valued logic and its applications [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2011, 46(10): 32-44.
[7] SUN Yun1, TANG Xu-bing1, HUANG Shi-zhong2. The matrix elements of Zeeman Hamiltonian in |3PJMJ〉 scheme [J]. J4, 2011, 46(1): 56-66.
[8] BI Xiao-Dong. Tensor product of left quasinormal bands [J]. J4, 2009, 44(8): 39-41.
[9] SONG Cai-Qin, DIAO Jian-Li, WANG Xiao-Dong. Reverse order law for the weighted Moore-Penrose inverse of a triple left matrix semitensor product [J]. J4, 2009, 44(10): 80-86.
[10] SONG Cai-qin,ZHAO Jian-li,LI Dong-fang . The reverse order law for (T,S,2)-inverse of a matrix semi-tensor product [J]. J4, 2008, 43(6): 71-76 .
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!