Understanding Information Diffusion under Interactions

Information diffusion in online social networks has attracted substantial research effort. Although recent models begin to incorporate interactions among contagions, they still don't consider the comprehensive interactions involving users and contagions as a whole. Moreover, the interactions obtained in previous work are modeled as latent factors and thus are difficult to understand and interpret. In this paper, we investigate the contagion adoption behavior by incorporating various types of interactions into a coherent model, and propose a novel interaction-aware diffusion framework called IAD. IAD exploits the social network structures to distinguish user roles, and uses both structures and texts to categorize contagions. Experiments with large-scale Weibo dataset demonstrate that IAD outperforms the state-of-art baselines in terms of F1-score and accuracy, as well as the runtime for learning. In addition, the interactions obtained through learning reveal interesting findings, e.g., food-related contagions have the strongest capability to suppress other contagions' propagation, while advertisement-related contagions have the weakest capability.

[1]  Xin Rong,et al.  Diffusion of innovations revisited: from social network to innovation network , 2013, CIKM.

[2]  Yizhou Sun,et al.  RAIN: Social Role-Aware Information Diffusion , 2015, AAAI.

[3]  Mark E. J. Newman,et al.  The Structure and Function of Complex Networks , 2003, SIAM Rev..

[4]  Herbert W. Hethcote,et al.  The Mathematics of Infectious Diseases , 2000, SIAM Rev..

[5]  Isabel Valera,et al.  Modeling Adoption and Usage of Competing Products , 2014, 2015 IEEE International Conference on Data Mining.

[6]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.

[7]  Éva Tardos,et al.  Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..

[8]  Mark E. J. Newman,et al.  Competing epidemics on complex networks , 2011, Physical review. E, Statistical, nonlinear, and soft matter physics.

[9]  Jure Leskovec,et al.  Clash of the Contagions: Cooperation and Competition in Information Diffusion , 2012, 2012 IEEE 12th International Conference on Data Mining.

[10]  Avrim Blum,et al.  The Bottleneck , 2021, Monopsony Capitalism.

[11]  Weili Wu,et al.  CSI: Charged System Influence Model for Human Behavior Prediction , 2013, 2013 IEEE 13th International Conference on Data Mining.

[12]  Xiaokui Xiao,et al.  Influence Maximization in Near-Linear Time: A Martingale Approach , 2015, SIGMOD Conference.

[13]  Juan-Zi Li,et al.  Social Influence Locality for Modeling Retweeting Behaviors , 2013, IJCAI.

[14]  Michele Coscia,et al.  Competition and Success in the Meme Pool: A Case Study on Quickmeme.com , 2013, ICWSM.

[15]  Rajeev Motwani,et al.  The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.

[16]  Jacob Goldenberg,et al.  Talk of the Network: A Complex Systems Look at the Underlying Process of Word-of-Mouth , 2001 .

[17]  A. Vespignani,et al.  Competition among memes in a world with limited attention , 2012, Scientific Reports.

[18]  Edith Cohen,et al.  Sketch-based Influence Maximization and Computation: Scaling up with Guarantees , 2014, CIKM.

[19]  Jaideep Srivastava,et al.  A Generalized Linear Threshold Model for Multiple Cascades , 2010, 2010 IEEE International Conference on Data Mining.

[20]  Christos Faloutsos,et al.  Winner takes all: competing viruses or ideas on fair-play networks , 2012, WWW.

[21]  Michael I. Jordan,et al.  Latent Dirichlet Allocation , 2001, J. Mach. Learn. Res..

[22]  Le Song,et al.  Scalable Influence Estimation in Continuous-Time Diffusion Networks , 2013, NIPS.