Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Social Network Monitoring for Bursty Cascade Detection

Published: 16 April 2018 Publication History

Abstract

Social network services have become important and efficient platforms for users to share all kinds of information. The capability to monitor user-generated information and detect bursts from information diffusions in these social networks brings value to a wide range of real-life applications, such as viral marketing. However, in reality, as a third party, there is always a cost for gathering information from each user or so-called social network sensor. The question then arises how to select a budgeted set of social network sensors to form the data stream for burst detection without compromising the detection performance. In this article, we present a general sensor selection solution for different burst detection approaches. We formulate this problem as a constraint satisfaction problem that has high computational complexity. To reduce the computational cost, we first reduce most of the constraints by making use of the fact that bursty cascades are rare among the whole population. We then transform the problem into an Linear Programming (LP) problem. Furthermore, we use the sub-gradient method instead of the standard simplex method or interior-point method to solve the LP problem, which makes it possible for our solution to scale up to large social networks. Evaluating our solution on millions of real information cascades, we demonstrate both the effectiveness and efficiency of our approach.

References

[1]
Foteini Alvanaki, Sebastian Michel, Krithi Ramamritham, and Gerhard Weikum. 2012. See what’s enBlogue: Real-time emergent topic identification in social media. In Proceedings of the15th International Conference on Extending Database Technology (EDBT’12). 336--347.
[2]
Rodrigo A. S. Alves, Renato Martins Assunção, and Pedro Olmo Stancioli Vaz de Melo. 2016. Burstiness scale: A parsimonious model for characterizing random series of events. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 1405--1414.
[3]
Stephen Boyd and Lieven Vandenberghe. 2004. Convex Optimization. Cambridge University Press.
[4]
Wei Chen, Yajun Wang, and Siyu Yang. 2009. Efficient influence maximization in social networks. In Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 199--208.
[5]
Nicholas A Christakis and James H Fowler. 2010. Social network sensors for early detection of contagious outbreaks. PloS One 5, 9 (2010), e12948.
[6]
George Bernard Dantzig. 1998. Linear Programming and Extensions. Princeton University press.
[7]
Rina Dechter. 2003. Constraint Processing. Morgan Kaufmann.
[8]
Qiming Diao, Jing Jiang, Feida Zhu, and Ee-Peng Lim. 2012. Finding bursty topics from microblogs. In Proceedings of the Conference of the 50th Annual Meeting of the Association for Computational Linguistics, Volume 1: Long Papers, 536--544.
[9]
Nan Du, Mehrdad Farajtabar, Amr Ahmed, Alexander J. Smola, and Le Song. 2015. Dirichlet-hawkes processes with applications to clustering continuous-time document streams. In Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 219--228.
[10]
Scott L. Feld. 1991. Why your friends have more friends than you do. American Journal of Sociology 96, 6 (1991), 1464--1477.
[11]
Manuel García-Herranz, Esteban Moro Egido, Manuel Cebrián, Nicholas A. Christakis, and James H. Fowler. 2014. Using friends as sensors to detect global-scale contagious outbreaks. PloS one 9, 4 (2014), e92413. http://arxiv.org/abs/1211.6512.
[12]
Dan He and Douglas Stott Parker Jr. 2010. Topic dynamics: An alternative model of bursts in streams of topics. In Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 443--452.
[13]
David Kempe, Jon M. Kleinberg, and Éva Tardos. 2003. Maximizing the spread of influence through a social network. In Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 24--27, 137--146.
[14]
Samir Khuller, Anna Moss, and Joseph Naor. 1999. The budgeted maximum coverage problem. Information Processing Letters 70, 1 (1999), 39--45.
[15]
J. Kleinberg. 2003. Bursty and hierarchical structure in streams. Data Mining and Knowledge Discovery 7, 4 (2003), 373--397.
[16]
Andreas Krause and Carlos Guestrin. 2011. Submodularity and its applications in optimized information gathering. ACM TIST 2, 4 (2011), 32.
[17]
Jure Leskovec, Andreas Krause, Carlos Guestrin, Christos Faloutsos, Jeanne M. VanBriesen, and Natalie S. Glance. 2007. Cost-effective outbreak detection in networks. In Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 420--429.
[18]
Michel Minoux. 1978. Accelerated greedy algorithms for maximizing submodular set functions. In Optimization Techniques. Springer, 234--243.
[19]
Huy Nguyen and Rong Zheng. 2013. On budgeted influence maximization in social networks. IEEE Journal on Selected Areas in Communications 31, 6 (2013), 1084--1094.
[20]
R. Tyrrell Rockafellar. 1970. Convex Analysis, volume 28 of Princeton Mathematics Series. (1970).
[21]
Takeshi Sakaki, Makoto Okazaki, and Yutaka Matsuo. 2010. Earthquake shakes twitter users: Real-time event detection by social sensors. In Proceedings of the 19th International Conference on World Wide Web (WWW’10). 851--860.
[22]
Alexander Schrijver. 2003. Combinatorial Optimization: Polyhedra and Efficiency. Vol. 24. Springer Science 8 Business Media.
[23]
Erich Schubert, Michael Weiler, and Hans-Peter Kriegel. 2014. SigniTrend: Scalable detection of emerging topics in textual streams by hashed significance thresholds. In The 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD’14). 871--880.
[24]
Huijuan Shao, K. S. M. Tozammel Hossain, Hao Wu, Maleq Khan, Anil Vullikanti, B. Aditya Prakash, Madhav V. Marathe, and Naren Ramakrishnan. 2016. Forecasting the flu: Designing social network sensors for epidemics. arXiv preprint arXiv:1602.06866. http://arxiv.org/abs/1602.06866.
[25]
Lijun Sun, Kay W. Axhausen, Der-Horng Lee, and Manuel Cebrián. 2014. Efficient detection of contagious outbreaks in massive metropolitan encounter networks. CoRR abs/1401.2815 (2014). http://arxiv.org/abs/1401.2815.
[26]
Yusuke Takahashi, Takehito Utsuro, Masaharu Yoshioka, Noriko Kando, Tomohiro Fukuhara, Hiroshi Nakagawa, and Yoji Kiyota. 2012. Applying a burst model to detect bursty topics in a topic model. In Advances in Natural Language Processing -- 8th International Conference on NLP (JapTAL’12). 239--249.
[27]
Johan Ugander, Brian Karrer, Lars Backstrom, and Cameron Marlow. 2011. The anatomy of the facebook social graph. arXiv preprint arXiv:1111.4503. http://arxiv.org/abs/1111.4503.
[28]
Wei Xie, Feida Zhu, Jing Jiang, Ee-Peng Lim, and Ke Wang. 2016. TopicSketch: Real-time bursty topic detection from twitter. IEEE Transactions on Knowledge and Data Engineering 28, 8 (2016), 2216--2229.
[29]
Junzhou Zhao, John C. S. Lui, Donald F. Towsley, and Xiaohong Guan. 2014. Whom to follow: Efficient followee selection for cascading outbreak detection on online social networks. Computer Networks 75 (2014), 544--559.

Cited By

View all
  • (2024)IMVis: Visual analytics for influence maximization algorithm evaluation in hypergraphsVisual Informatics10.1016/j.visinf.2024.04.0068:2(13-26)Online publication date: Jun-2024
  • (2021)Transformer-based identification of stochastic information cascades in social networks using text and image similarityApplied Soft Computing10.1016/j.asoc.2021.107413108(107413)Online publication date: Sep-2021
  • (2020)Influence Analysis in Evolving Networks: A SurveyIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2019.2934447(1-1)Online publication date: 2020
  • Show More Cited By

Index Terms

  1. Social Network Monitoring for Bursty Cascade Detection

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Knowledge Discovery from Data
    ACM Transactions on Knowledge Discovery from Data  Volume 12, Issue 4
    August 2018
    354 pages
    ISSN:1556-4681
    EISSN:1556-472X
    DOI:10.1145/3208362
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 16 April 2018
    Accepted: 01 December 2017
    Revised: 01 December 2017
    Received: 01 April 2017
    Published in TKDD Volume 12, Issue 4

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Social network sensors
    2. linear programming
    3. sub-gradient method

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Funding Sources

    • Prime Minister's Office, Singapore
    • Pinnacle Lab for Analytics @ Singapore Management University
    • International Research Centres in Singapore Funding Initiative
    • National Research Foundation

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)9
    • Downloads (Last 6 weeks)3
    Reflects downloads up to 20 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)IMVis: Visual analytics for influence maximization algorithm evaluation in hypergraphsVisual Informatics10.1016/j.visinf.2024.04.0068:2(13-26)Online publication date: Jun-2024
    • (2021)Transformer-based identification of stochastic information cascades in social networks using text and image similarityApplied Soft Computing10.1016/j.asoc.2021.107413108(107413)Online publication date: Sep-2021
    • (2020)Influence Analysis in Evolving Networks: A SurveyIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2019.2934447(1-1)Online publication date: 2020
    • (2020)A Prototype Deep Learning Paraphrase Identification Service for Discovering Information Cascades in Social Networks2020 IEEE International Conference on Multimedia & Expo Workshops (ICMEW)10.1109/ICMEW46912.2020.9106044(1-4)Online publication date: Jul-2020

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media