Journal of Applied Sciences ›› 2020, Vol. 38 ›› Issue (3): 353-366.doi: 10.3969/j.issn.0255-8297.2020.03.002
• Big Data • Previous Articles Next Articles
JIANG Qinyin1,2, ZHANG Xi1,2
Received:
2019-10-17
Online:
2020-05-31
Published:
2020-06-11
CLC Number:
JIANG Qinyin, ZHANG Xi. Topic-Specific Assessment Approach for Social Network Influence Evaluation[J]. Journal of Applied Sciences, 2020, 38(3): 353-366.
[1] Weng J S, Lim E P, Jiang J, et al. TwitterRank:finding topic-sensitive influential Twitterers[C]//Proceedings of the 2010 ACM International Conference on Web Search and Data Mining, New York, USA, 2010:261-270. [2] 毛佳昕,刘奕群,张敏,等.基于用户行为的微博用户社会影响力分析[J].计算机学报,2014, 37(4):791-800. Mao J X, Liu Y Q, Zhang M, et al. Social influence analysis for micro-blog user based on user behavior[J]. Chinese Journal of Computers, 2014, 37(4):791-800(in Chinese) [3] 周东浩,韩文报. DiffRank:一种新型社会网络信息传播检测算法[J].计算机学报,2014, 37(4):884-893. Zhou D H, Han W B. DiffRank:a novel algorithm for information diffusion detection in social networks[J]. Chinese Journal of Computers, 2014, 37(4):884-893.(in Chinese) [4] Wu J, Sha Y, Li R, et al. Identification of influential users based on topic-behavior influence tree in social networks[C]//Proceedings of the 6th Conference on Nature Language Processing and Chinese Computing, 2017:477-489. [5] 刘威,张明新,安德智.面向微博话题的用户影响力分析算法[J].计算机应用,2019, 39(1):213-219. Liu W, Zhang M X, An D Z. User influence analysis algorithm for Weibo topics[J]. Journal of Computer Applications, 2019, 39(1):213-219.(in Chinese) [6] Su S, Wang Y K, Zhang Z B, et al. Identifying and tracking topic-level influencers in the microblog streams[J]. Machine Learning, 2017, 107(3):551-578. [7] Welcome to Guided LDA's documentation[CP/OL].[2019-10-17] https://guidedlda.readthedocs.io/en/latest/. [8] Wang C, Cao L B, Wang M C, et al. Coupled nominal similarity in unsupervised learning[C]//Proceedings of the 20th ACM International Conference on Information and Knowledge Management. ACM, 2011:973-978. [9] Zhang J, Liu B, Tang J, et al. Social influence locality for modeling retweeting behaviors[C]//Proceedings of the 23rd International Joint Conference on Artificial Intelligence (IJCAI013), Beijing, China, 2013:2761-2767. [10] Zhao X W, Jiang J, Weng J S, et al. Comparing twitter and traditional media using topic models[C]//Advances in Information Retrieval-33rd European Conference on IR Research, ECIR 2011, Dublin, Ireland:Springer-Verlag, 2011:338-349. [11] Hu M T, Hang G, Zhou J M, et al. A method for measuring social influence of micro-blog based on user operations[C]//Proceedings of the 2017 International Conference information Technology and Applications, Sydney, ICITA, 2017:82-87. [12] Kempe D, Kleinberg J, Tardos A. Maximizing the spread of influence through a social network[C]//Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, USA, 2003:137-146. [13] Pal A, Counts S. Identifying topical authorities in microblogs[C]//Proceedings of the 4th ACM International Conference on Web Search and Data Mining, Hong Kong, China, 2011:45-54. [14] Pang X W, Wan B S, Li H F, et al. MR-LDA:an efficient topic model for classification of short text in big social data[J]. International Journal of Grid and High Performance Computing, 2016, 8(4):100-113. [15] Gotez M, Leskovec J, Mcglohom M. Modeling blog dynamics[C]//Proceedings of the 2009 International Conference on Weblogs and Social Media, Menlo Park, CA:AAAI Press, 2009:26-33. [16] Li Z, Li M, Ji W. Modelling the public opinion transmission on social networks under opinion leaders[C]//AEECE 2017:Proceedings of the 20173rd International Conference on Advances in Energy, Environment and Chemical Engineering, Bristol:IOP Publishing, 2017:012215. [17] Chen Z, Taylor K. Modeling the spread of influence for independent cascade diffusion process in social networks[C]//Proceedings of the 2017 International Conference on Distributed Computing Systems Workshops. Piscataway, NJ, USA, 2017:151-156. [18] Luarn P, Yang J C, Chiu Y P. The network effect on information dissemination on social network sites[J]. Computers in Human Behavior, 2014, 37(37):1-8. [19] Bakshy E, Hofman J M, Mason W A, et al. Everyone's an influencer:quantifying influence on Twitter[C]//Proceedings of the 4th ACM International Conference on Web Search and Data Mining, Hong Kong, China, 2011:65-74. [20] Heinz D C, Chang C I. Fully constrained least squares linear spectral mixture analysis method for material quantification in hyperspectral imagery[J]. IEEE Transactions on Geoscience and Remote Sensing, 2001, 39(3):529-545. [21] Zhang J, Tang J, Li J Z, et al. Who influenced you?Predicting retweet via social influence locality[J]. ACM Transactions on Knowledge Discovery from Data, 2015, 9(3):1-26. |
[1] | YAO Rujing, YANG Lei, YANG Tao, HU Yingxin, TIAN Qiang, WU Ou. Analysis for Psychological Scale Big Data Based on Improved Ising Model [J]. Journal of Applied Sciences, 2020, 38(3): 339-352. |
[2] | ZHANG Tongtong, DONG Junyu, ZHAO Haoran, LI Qiong, SUN Xin. Lightweight Phytoplankton Detection Network Based on Knowledge Distillation [J]. Journal of Applied Sciences, 2020, 38(3): 367-376. |
[3] | WEI Ziyang, ZHAO Zhihong, ZHAO Jingjiao. Improved Faster R-CNN Algorithm and Its Application on Vehicle Detection [J]. Journal of Applied Sciences, 2020, 38(3): 377-387. |
[4] | SUN Ronghai, SHI Linfu, YU Chunqiang, LAO Huan, TANG Zhenjun. Random Interpolation Method for Data Hiding in Encrypted Images [J]. Journal of Applied Sciences, 2020, 38(3): 419-430. |
[5] | WANG Daqian, CUI Rongyi, JIN Jingxuan. Text Detection in Natural Scene Based on Visual Attention Model and Multi-scale MSER [J]. Journal of Applied Sciences, 2020, 38(3): 496-506. |
[6] | YANG Gaoqiang, LI Sheng, ZHANG Xinpeng. Altered Fingerprint Detection Based on Orientation Field [J]. Journal of Applied Sciences, 2019, 37(6): 775-782. |
[7] | YU Shuzhen, OU Qiaofeng, XIONG Bangshu, CHEN Yaofeng. A Calibration Method Based on Defocused Image for Stereo Vision Sensor with Large FOV [J]. Journal of Applied Sciences, 2019, 37(6): 795-805. |
[8] | CUI Sanshuai, MAO Maoyu, LIN Xiaodan, KANG Xiangui. Survey on Analysis and Applications of Electric Network Frequency (ENF) Signals in Image and Video [J]. Journal of Applied Sciences, 2019, 37(5): 573-589. |
[9] | LIU Wei, ZHANG Wanling, XIANG Shijun. Face Anti-spoofing Based on LBP, Multilayer DCT and CNN [J]. Journal of Applied Sciences, 2019, 37(5): 609-617. |
[10] | QU Lingfeng, CHEN fan, HE Hongjie, YUAN yuan. Security Analysis of Image Encryption Algorithm Based on Bit Plane-Pixel Block Scrambling [J]. Journal of Applied Sciences, 2019, 37(5): 631-642. |
[11] | ZHAO Yan, ZHOU Xiaowei, SHEN Qi. Compact Image Hashing Algorithm Based on Opposite Color and Salient Region [J]. Journal of Applied Sciences, 2019, 37(5): 691-703. |
[12] | ZHANG Yongsheng, TIAN Huawei, XIAO Yanhui, HAO Xinze, ZHANG Mingwang. PRNU Extraction Algorithm Based on Trilateral Weighted Sparse Coding Model [J]. Journal of Applied Sciences, 2019, 37(5): 704-710. |
[13] | ZHU Yiming, CHEN Fan, HE Hongjie, CHEN Hongyou. Orthogonal GAN Information Hiding Model Based on Secret Information Driven [J]. Journal of Applied Sciences, 2019, 37(5): 721-732. |
[14] | WANG Junxiang, MAO Ningxiong, ZHAO Yi, WANG Chuntao. Large Color Image Based High-Performance Reversible Data Hiding Hcheme for Various Capacities [J]. Journal of Applied Sciences, 2019, 37(5): 744-760. |
[15] | QIN Zhen, DAI Xiubin, XIE Lizhe. Anatomical Landmark Localization in Lateral Cephalograms by Using Two-Layer Regression Forests [J]. Journal of Applied Sciences, 2019, 37(4): 481-489. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||