Skip to main content

Reinforcement Learning Based Group Event Invitation Algorithm

  • Conference paper
  • First Online:
Wireless Algorithms, Systems, and Applications (WASA 2020)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 12384))

  • 2522 Accesses

Abstract

Nowadays, we rely increasingly on mobile applications and social networking websites to organize group events and/or search events to participate. Most existing services and platforms focus on distributing event invitations based on user profiles thus neglecting the fact that event attendees can significantly affect each other’s degree of satisfaction. To address this issue, we propose a reinforcement learning based group event invitation algorithm that can track relationships of users and use response rate and post-event reviews as feedback to guide invitation receiver selection process. Experimental results indicate that our proposed algorithm achieves better performance in term of satisfaction and connectivity of users when k-core algorithm and greedy search algorithm are compared.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. How many smartphones are in the world (2020). https://www.bankmycell.com/blog/how-many-phones-are-in-the-world

  2. Most popular social networks worldwide as of April 2020, ranked by number of active users (2020). https://www.statista.com/statistics/272014/global-social-networks-ranked-by-number-of-users/

  3. Ai, C., Han, M., Wang, J., Yan, M.: An efficient social event invitation framework based on historical data of smart devices. In: 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), Social Computing and Networking (SocialCom), Sustainable Computing and Communications (SustainCom) (BDCloud-SocialCom-SustainCom), pp. 229–236 (2016)

    Google Scholar 

  4. Ai, C., Zhong, W., Yan, M., Gu, F.: Partner matching applications of social networks. In: Cai, Z., Zelikovsky, A., Bourgeois, A. (eds.) COCOON 2014. LNCS, vol. 8591, pp. 647–656. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-08783-2_56

    Chapter  Google Scholar 

  5. Ai, C., Zhong, W., Yan, M., Gu, F.: A partner-matching framework for social activity communities. Comput. Soc. Netw. 1(1), 1–12 (2014). https://doi.org/10.1186/s40649-014-0005-0

    Article  Google Scholar 

  6. Cai, J.L.Z., Yan, M., Li, Y.: Using crowdsourced data in location-based social networks to explore influence maximization. In: The 35th Annual IEEE International Conference on Computer Communications (INFOCOM 2016) (2016)

    Google Scholar 

  7. Cai, Z., He, Z., Guan, X., Li, Y.: Collective data-sanitization for preventing sensitive information inference attacks in social networks. IEEE Trans. Dependable Secur. Comput. 15(4), 577–590 (2018)

    Google Scholar 

  8. Derhami, V., Majd, V.J., Ahmadabadi, M.N.: Exploration and exploitation balance management in fuzzy reinforcement learning. Fuzzy Sets Syst. 161(4), 578–595 (2010). http://www.sciencedirect.com/science/article/pii/S0165011409002450, theme: Forecasting, Classification, and Learning

  9. Han, M., Yan, M., Cai, Z., Li, Y.: An exploration of broader influence maximization in timeliness networks with opportunistic selection. J. Netw. Comput. Appl. 63, 39–49 (2016)

    Article  Google Scholar 

  10. Han, M., Yan, M., Cai, Z., Li, Y., Cai, X., Yu, J.: Influence maximization by probing partial communities in dynamic online social networks. Trans. Emerg. Telecommun. Technol. pp. n/a-n/a (2016). ett.3054

    Google Scholar 

  11. He, Z., Cai, Z., Wang, X.: Modeling propagation dynamics and developing optimized countermeasures for rumor spreading in online social networks. In: 2015 IEEE 35th International Conference on Distributed Computing Systems (ICDCS), pp. 205–214, June 2015

    Google Scholar 

  12. He, Z., Cai, Z., Yu, J.: Latent-data privacy preserving with customized data utility for social network data. IEEE Trans. Veh. Technol. 67(1), 665–673 (2018)

    Article  Google Scholar 

  13. He, Z., Cai, Z., Yu, J., Wang, X., Sun, Y., Li, Y.: Cost-efficient strategies for restraining rumor spreading in mobile social networks. IEEE Trans. Veh. Technol. PP(99), 1–1 (2016)

    Google Scholar 

  14. Kumar, R., Novak, J., Tomkins, A.: Structure and evolution of online social networks. In: Yu, P.S., Han, J., Faloutsos, C. (eds.) Link Mining: Models, Algorithms, and Applications, pp. 337–357. Springer, New York (2010). https://doi.org/10.1007/978-1-4419-6515-8_13

    Chapter  Google Scholar 

  15. Liu, X., He, Q., Tian, Y., Lee, W.C., Mcpherson, J., Han, J.: Event-Based Social Networks: Linking the Online and Offline Social Worlds (2012)

    Google Scholar 

  16. Peyravi, F., Derhami, V., Latif, A.: Reinforcement learning based search (RLS) algorithm in social networks. In: 2015 The International Symposium on Artificial Intelligence and Signal Processing (AISP), pp. 206–210 (2015)

    Google Scholar 

  17. Szell, M., Lambiotte, R., Thurner, S.: Multirelational organization of large-scale social networks in an online world. Proc. Natl. Acad. Sci. 107(31), 13636–13641 (2010)

    Article  Google Scholar 

  18. Tong, W., Buglass, S., Li, J., Chen, L., Ai, C.: Smart and private social activity invitation framework based on historical data from smart devices. In: EAI, December 2017. https://doi.org/10.4108/eai.13-7-2017.2270271

  19. Watkins, C.J., Dayan, P.: Q-learning. Mach. Learn. 8(3–4), 279–292 (1992)

    MATH  Google Scholar 

  20. Xiang, R., Neville, J., Rogati, M.: Modeling relationship strength in online social networks. In: Proceedings of the 19th International Conference on World Wide Web, WWW 2010, pp. 981–990. ACM, New York (2010)

    Google Scholar 

  21. Zhang, L., Cai, Z., Wang, X.: Fakemask: a novel privacy preserving approach for smartphones. IEEE Trans. Netw. Serv. Manage. 13(2), 335–348 (2016)

    Article  Google Scholar 

Download references

Acknowledgement

This work is partially supported by the National Natural Science Foundation of China under Grant No.61977044, the Key R&D Program of Shaanxi Province under grant No.2020GY-221, 2020ZDLGY10-05, the Natural Science Basis Research Plan in Shaanxi Province of China under Grant No.2020JM-303, 2020JM-302), the Fundamental Research Funds for the Central Universities of China under Grant No.GK201903090.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chunyu Ai .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ai, C., Zhong, W., Guo, L. (2020). Reinforcement Learning Based Group Event Invitation Algorithm. In: Yu, D., Dressler, F., Yu, J. (eds) Wireless Algorithms, Systems, and Applications. WASA 2020. Lecture Notes in Computer Science(), vol 12384. Springer, Cham. https://doi.org/10.1007/978-3-030-59016-1_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-59016-1_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-59015-4

  • Online ISBN: 978-3-030-59016-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics