Abstract
Nowadays, we rely increasingly on mobile applications and social networking websites to organize group events and/or search events to participate. Most existing services and platforms focus on distributing event invitations based on user profiles thus neglecting the fact that event attendees can significantly affect each other’s degree of satisfaction. To address this issue, we propose a reinforcement learning based group event invitation algorithm that can track relationships of users and use response rate and post-event reviews as feedback to guide invitation receiver selection process. Experimental results indicate that our proposed algorithm achieves better performance in term of satisfaction and connectivity of users when k-core algorithm and greedy search algorithm are compared.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
How many smartphones are in the world (2020). https://www.bankmycell.com/blog/how-many-phones-are-in-the-world
Most popular social networks worldwide as of April 2020, ranked by number of active users (2020). https://www.statista.com/statistics/272014/global-social-networks-ranked-by-number-of-users/
Ai, C., Han, M., Wang, J., Yan, M.: An efficient social event invitation framework based on historical data of smart devices. In: 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), Social Computing and Networking (SocialCom), Sustainable Computing and Communications (SustainCom) (BDCloud-SocialCom-SustainCom), pp. 229–236 (2016)
Ai, C., Zhong, W., Yan, M., Gu, F.: Partner matching applications of social networks. In: Cai, Z., Zelikovsky, A., Bourgeois, A. (eds.) COCOON 2014. LNCS, vol. 8591, pp. 647–656. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-08783-2_56
Ai, C., Zhong, W., Yan, M., Gu, F.: A partner-matching framework for social activity communities. Comput. Soc. Netw. 1(1), 1–12 (2014). https://doi.org/10.1186/s40649-014-0005-0
Cai, J.L.Z., Yan, M., Li, Y.: Using crowdsourced data in location-based social networks to explore influence maximization. In: The 35th Annual IEEE International Conference on Computer Communications (INFOCOM 2016) (2016)
Cai, Z., He, Z., Guan, X., Li, Y.: Collective data-sanitization for preventing sensitive information inference attacks in social networks. IEEE Trans. Dependable Secur. Comput. 15(4), 577–590 (2018)
Derhami, V., Majd, V.J., Ahmadabadi, M.N.: Exploration and exploitation balance management in fuzzy reinforcement learning. Fuzzy Sets Syst. 161(4), 578–595 (2010). http://www.sciencedirect.com/science/article/pii/S0165011409002450, theme: Forecasting, Classification, and Learning
Han, M., Yan, M., Cai, Z., Li, Y.: An exploration of broader influence maximization in timeliness networks with opportunistic selection. J. Netw. Comput. Appl. 63, 39–49 (2016)
Han, M., Yan, M., Cai, Z., Li, Y., Cai, X., Yu, J.: Influence maximization by probing partial communities in dynamic online social networks. Trans. Emerg. Telecommun. Technol. pp. n/a-n/a (2016). ett.3054
He, Z., Cai, Z., Wang, X.: Modeling propagation dynamics and developing optimized countermeasures for rumor spreading in online social networks. In: 2015 IEEE 35th International Conference on Distributed Computing Systems (ICDCS), pp. 205–214, June 2015
He, Z., Cai, Z., Yu, J.: Latent-data privacy preserving with customized data utility for social network data. IEEE Trans. Veh. Technol. 67(1), 665–673 (2018)
He, Z., Cai, Z., Yu, J., Wang, X., Sun, Y., Li, Y.: Cost-efficient strategies for restraining rumor spreading in mobile social networks. IEEE Trans. Veh. Technol. PP(99), 1–1 (2016)
Kumar, R., Novak, J., Tomkins, A.: Structure and evolution of online social networks. In: Yu, P.S., Han, J., Faloutsos, C. (eds.) Link Mining: Models, Algorithms, and Applications, pp. 337–357. Springer, New York (2010). https://doi.org/10.1007/978-1-4419-6515-8_13
Liu, X., He, Q., Tian, Y., Lee, W.C., Mcpherson, J., Han, J.: Event-Based Social Networks: Linking the Online and Offline Social Worlds (2012)
Peyravi, F., Derhami, V., Latif, A.: Reinforcement learning based search (RLS) algorithm in social networks. In: 2015 The International Symposium on Artificial Intelligence and Signal Processing (AISP), pp. 206–210 (2015)
Szell, M., Lambiotte, R., Thurner, S.: Multirelational organization of large-scale social networks in an online world. Proc. Natl. Acad. Sci. 107(31), 13636–13641 (2010)
Tong, W., Buglass, S., Li, J., Chen, L., Ai, C.: Smart and private social activity invitation framework based on historical data from smart devices. In: EAI, December 2017. https://doi.org/10.4108/eai.13-7-2017.2270271
Watkins, C.J., Dayan, P.: Q-learning. Mach. Learn. 8(3–4), 279–292 (1992)
Xiang, R., Neville, J., Rogati, M.: Modeling relationship strength in online social networks. In: Proceedings of the 19th International Conference on World Wide Web, WWW 2010, pp. 981–990. ACM, New York (2010)
Zhang, L., Cai, Z., Wang, X.: Fakemask: a novel privacy preserving approach for smartphones. IEEE Trans. Netw. Serv. Manage. 13(2), 335–348 (2016)
Acknowledgement
This work is partially supported by the National Natural Science Foundation of China under Grant No.61977044, the Key R&D Program of Shaanxi Province under grant No.2020GY-221, 2020ZDLGY10-05, the Natural Science Basis Research Plan in Shaanxi Province of China under Grant No.2020JM-303, 2020JM-302), the Fundamental Research Funds for the Central Universities of China under Grant No.GK201903090.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Ai, C., Zhong, W., Guo, L. (2020). Reinforcement Learning Based Group Event Invitation Algorithm. In: Yu, D., Dressler, F., Yu, J. (eds) Wireless Algorithms, Systems, and Applications. WASA 2020. Lecture Notes in Computer Science(), vol 12384. Springer, Cham. https://doi.org/10.1007/978-3-030-59016-1_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-59016-1_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-59015-4
Online ISBN: 978-3-030-59016-1
eBook Packages: Computer ScienceComputer Science (R0)