Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Learning to Infer Competitive Relationships in Heterogeneous Networks

Published: 13 February 2018 Publication History

Abstract

Detecting and monitoring competitors is fundamental to a company to stay ahead in the global market. Existing studies mainly focus on mining competitive relationships within a single data source, while competing information is usually distributed in multiple networks. How to discover the underlying patterns and utilize the heterogeneous knowledge to avoid biased aspects in this issue is a challenging problem. In this article, we study the problem of mining competitive relationships by learning across heterogeneous networks. We use Twitter and patent records as our data sources and statistically study the patterns behind the competitive relationships. We find that the two networks exhibit different but complementary patterns of competitions. Overall, we find that similar entities tend to be competitors, with a probability of 4 times higher than chance. On the other hand, in social network, we also find a 10 minutes phenomenon: when two entities are mentioned by the same user within 10 minutes, the likelihood of them being competitors is 25 times higher than chance. Based on the discovered patterns, we propose a novel Topical Factor Graph Model. Generally, our model defines a latent topic layer to bridge the Twitter network and patent network. It then employs a semi-supervised learning algorithm to classify the relationships between entities (e.g., companies or products). We test the proposed model on two real data sets and the experimental results validate the effectiveness of our model, with an average of +46% improvement over alternative methods. Besides, we further demonstrate the competitive relationships inferred by our proposed model can be applied in the job-hopping prediction problem by achieving an average of +10.7% improvement.

References

[1]
Shenghua Bao, Rui Li, Yong Yu, and Yunbo Cao. 2008. Competitor mining with the web. IEEE Trans. Knowl. Data Eng. 20 (2008), 1297--1310.
[2]
David M. Blei, Andrew Y. Ng, and Michael I. Jordan. 2003. Latent Dirichlet allocation. JMLR 3 (2003), 993--1022.
[3]
Chih-Chung Chang and Chih-Jen Lin. 2011. LIBSVM: A library for support vector machines. ACM TIST 2, 3 (2011), 27:1--27:27.
[4]
Xin Chen and Yi-Fang Brook Wu. 2005. Web mining from competitors’ websites. In Proceedings of the 11th ACM SIGKDD International Conference on Knowledge Discovery in Data Mining (KDD’05). 550--555.
[5]
Yi-Ling Chen, Ming-Syan Chen, and S. Yu Philip. 2015. Ensemble of diverse sparsifications for link prediction in large-scale networks. In Proceedings of the 2015 IEEE International Conference on Data Mining (ICDM). IEEE, 51--60.
[6]
Aron Culotta, Nirmal Ravi Kumar, and Jennifer Cutler. 2015. Predicting the demographics of twitter users from website traffic data. In Proceedings of AAAI. 72--78.
[7]
Christopher P. Diehl, Galileo Namata, and Lise Getoor. 2007. Relationship identification for social network discovery. In Proceedings Of The National Conference On Artificial Intelligence. Vol. 22. AAAI Press; MIT Press, Menlo Park, CA; Cambridge, MA, London, 1999, 546.
[8]
Holger Ernst. 2003. Patent information for strategic technology management. World Patent Information 25, 3 (September 2003), 233--242.
[9]
Tao-yang Fu, Zhen Lei, and Wang-Chien Lee. 2015. Patent citation recommendation for examiners. In Proceedings of the 2015 IEEE International Conference on Data Mining (ICDM). IEEE, 751--756.
[10]
F. Heider. 1946. Attitudes and cognitive organization. Journal of Psychology 21, 2 (1946), 107--112.
[11]
Thomas Hofmann. 1999. Probabilistic latent semantic indexing. In Proceedings of SIGIR’99. 50--57.
[12]
John E. Hopcroft, Tiancheng Lou, and Jie Tang. 2011. Who will follow you back? Reciprocal relationship prediction. In Proceedings of CIKM’11.
[13]
Bernardo A. Huberman, Daniel M. Romero, and Fang Wu. 2009. Social networks that matter: Twitter under the microscope. First Monday 14, 1 (2009), 1--5.
[14]
Xin Jin, Scott Spangler, Ying Chen, Keke Cai, Rui Ma, Li Zhang, Xian Wu, and Jiawei Han. 2011. Patent maintenance recommendation with patent information network model. In Proceedings of ICDM’11.
[15]
Jalil Khavand Kar and Ehsan Khavandkar. 2013. Intellectual Capital: Managing Development and Measurement Models. MSRT.
[16]
Kas Kasravi and Maria Risov. 2007. Patent mining - Discovery of business value from patent repositories. In Proceedings of Hawaii International Conference on System Sciences. 54b.
[17]
Angelos Kremyzas, Norman Jaklin, and Roland Geraerts. 2016. Towards social behavior in virtual-agent navigation. Sci. China Inform. Sci. 59, 11 (2016), 112102.
[18]
Frank R. Kschischang, Brendan J. Frey, and Hans Andrea Loeliger. 2001. Factor graphs and the sum-product algorithm. IEEE TOIT 47, 2 (2001), 498--519.
[19]
Haewoon Kwak, Changhyun Lee, Hosung Park, and Sue B. Moon. 2010. What is twitter, a social network or a news media? In Proceedings of WWW. 591--600.
[20]
Paul F. Lazarsfeld and Robert K. Merton. 1954. Friendship as a Social Process: A Substantive and Methodological Analysis. Vol. 18. Van Nostrand, 18--66.
[21]
Jure Leskovec, Daniel P. Huttenlocher, and Jon M. Kleinberg. 2010. Predicting positive and negative links in online social networks. In Proceedings of WWW’10. 641--650.
[22]
Shasha Li, Chin-Yew Lin, Young-In Song, and Zhoujun Li. 2010. Comparable entity mining from comparative questions. In Proceedings of the 48th AMACL (ACL’10). 650--658.
[23]
Bing Liu, Yiming Ma, and Philip S. Yu. 2001. Discovering unexpected information from your competitors’ web sites. In Proceedings of KDD. 144--153.
[24]
J. Maddocks and M. Beaney. 2002. See the invisible and intangible. Knowl. Manag. 3 (2002), 16--17.
[25]
Michael Mathioudakis and Nick Koudas. 2010. TwitterMonitor: Trend detection over the twitter stream. In Proceedings of SIGMOD’10. 1155--1158.
[26]
Qiaozhu Mei, Deng Cai, Duo Zhang, and ChengXiang Zhai. 2008. Topic modeling with network regularization. In Proceedings of WWW’08. 101--110.
[27]
Kevin P. Murphy, Yair Weiss, and Michael I. Jordan. 1999. Loopy belief propagation for approximate inference: An empirical study. In Proceedings of UAI’99. 467--475.
[28]
Michael E. Porter. 1998. Competitive Strategy: Techniques for Analyzing Industries and Competitors (1 ed.). Free Press.
[29]
Andrew Rodriguez, Byunghoon Kim, Jae-Min Lee, Byoung-Yul Coh, and Myong K. Jeong. 2015. Graph kernel based measure for evaluating the influence of patents in a patent citation network. Expert Syst. Appl. 42, 3 (2015), 1479--1486.
[30]
Jian-Tao Sun, Xuanhui Wang, Dou Shen, Hua-Jun Zeng, and Zheng Chen. 2006. CWS: A comparative web search system. In Proceedings of WWW’06. 467--476.
[31]
Chenhao Tan, Jie Tang, Jimeng Sun, Quan Lin, and Fengjiao Wang. 2010. Social action tracking via noise tolerant time-varying factor graphs. In Proceedings of KDD’10. 1049--1058.
[32]
Jie Tang, Tiancheng Lou, and Jon Kleinberg. 2012. Inferring social ties across heterogenous networks. In Proceedings of WSDM’12. 743--752.
[33]
Jie Tang, Jimeng Sun, Chi Wang, and Zi Yang. 2009. Social influence analysis in large-scale networks. In Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 807--816.
[34]
Jie Tang, Bo Wang, Yang Yang, Po Hu, Yanting Zhao, Xinyu Yan, Bo Gao, Minlie Huang, Peng Xu, Weichang Li, and Adam K. Usadi. 2012. PatentMiner: Topic-driven patent analysis and mining. In Proceedings of KDD’2012.
[35]
Wenbin Tang, Honglei Zhuang, and Jie Tang. 2011. Learning to infer social ties in large networks. In Proceedings of ECML/PKDD (3)’11. 381--397.
[36]
Hanghang Tong, Christos Faloutsos, and Yehuda Koren. 2007. Fast direction-aware proximity for graph mining. In Proceedings of KDD’07. 747--756.
[37]
Hanghang Tong, Christos Faloutsos, and Jia-Yu Pan. 2006. Fast random walk with restart and its applications. In Proceedings of ICDM’06. 613--622.
[38]
Chi Wang, Jiawei Han, Yuntao Jia, Jie Tang, Duo Zhang, Yintao Yu, and Jingyi Guo. 2010. Mining advisor-advisee relationships from research publication networks. In Proceedings of KDD’10. ACM, 203--212.
[39]
Xiangyu Wang, Dayu He, Danyang Chen, and Jinhui Xu. 2015. Clustering-based collaborative filtering for link prediction. In Proceedings of AAAI. 332--338.
[40]
Wei Wei, Kenneth Joseph, Huan Liu, and Kathleen M. Carley. 2016. Exploring characteristics of suspended users and network stability on Twitter. Social Network Analysis and Mining 6, 1 (2016), 51.
[41]
Jianshu Weng, Ee-Peng Lim, Jing Jiang, and Qi He. 2010. TwitterRank: Finding topic-sensitive influential twitterers. In Proceedings of WSDM, Brian D. Davison, Torsten Suel, Nick Craswell, and Bing Liu (Eds.). 261--270.
[42]
Seon Yang and Youngjoong Ko. 2011. Extracting comparative entities and predicates from texts using comparative type classification. In Proceedings of the 49th AMACL (HLT’11). 1636--1644.
[43]
Yang Yang, Jie Tang, Jacklyne Keomany, Yanting Zhao, Juanzi Li, Ying Ding, Tian Li, and Liangwei Wang. 2012. Mining competitive relationships by learning across heterogeneous networks. In Proceedings of CIKM’12. ACM, 1432--1441.
[44]
Xiaojin Zhu and John Lafferty. 2005. Harmonic mixtures: Combining mixture models and graph-based methods for inductive and scalable semi-supervised learning. In Proceedings of ICML’05. 1052--1059.

Cited By

View all
  • (2023)A Multisource Data Fusion-based Heterogeneous Graph Attention Network for Competitor PredictionACM Transactions on Knowledge Discovery from Data10.1145/362510118:2(1-20)Online publication date: 13-Nov-2023
  • (2023)TechPat: Technical Phrase Extraction for Patent MiningACM Transactions on Knowledge Discovery from Data10.1145/359660317:9(1-31)Online publication date: 15-Jun-2023
  • (2022)Point-of-Interest Recommendation for Users-Businesses With Uncertain Check-insIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2021.306081834:12(5925-5938)Online publication date: 1-Dec-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Transactions on Knowledge Discovery from Data
ACM Transactions on Knowledge Discovery from Data  Volume 12, Issue 1
Special Issue (IDEA) and Regular Papers
February 2018
363 pages
ISSN:1556-4681
EISSN:1556-472X
DOI:10.1145/3178542
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 February 2018
Accepted: 01 February 2017
Revised: 01 July 2016
Received: 01 September 2015
Published in TKDD Volume 12, Issue 1

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Social network
  2. competitive relationship
  3. heterogeneous network

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

  • Natural Science Foundation of China
  • Royal Society-Newton Advanced Fellowship Award
  • MSRA
  • Chinese National Key Foundation Research

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)23
  • Downloads (Last 6 weeks)3
Reflects downloads up to 28 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2023)A Multisource Data Fusion-based Heterogeneous Graph Attention Network for Competitor PredictionACM Transactions on Knowledge Discovery from Data10.1145/362510118:2(1-20)Online publication date: 13-Nov-2023
  • (2023)TechPat: Technical Phrase Extraction for Patent MiningACM Transactions on Knowledge Discovery from Data10.1145/359660317:9(1-31)Online publication date: 15-Jun-2023
  • (2022)Point-of-Interest Recommendation for Users-Businesses With Uncertain Check-insIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2021.306081834:12(5925-5938)Online publication date: 1-Dec-2022
  • (2022)Competitor identificationInternational Journal of Information Management: The Journal for Information Professionals10.1016/j.ijinfomgt.2022.10250765:COnline publication date: 15-Jun-2022
  • (2021)Mining Fraudsters and Fraudulent Strategies in Large-Scale Mobile Social NetworksIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2019.292443133:1(169-179)Online publication date: 1-Jan-2021
  • (2019)Harnessing the Power of the General Public for Crowdsourced Business Intelligence: A SurveyIEEE Access10.1109/ACCESS.2019.2901027(1-1)Online publication date: 2019
  • (2019)Mobile APP User Attribute Prediction by Heterogeneous Information Network ModelingDependability in Sensor, Cloud, and Big Data Systems and Applications10.1007/978-981-15-1304-6_23(294-303)Online publication date: 5-Nov-2019

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media