Skip to main content

Entropy-Based Social Influence Evaluation in Mobile Social Networks

  • Conference paper
  • First Online:
Algorithms and Architectures for Parallel Processing (ICA3PP 2015)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9528))

Abstract

How to evaluate social influence of one user on other users in mobile social networks becomes increasingly important. It can help to identify the influential users in mobile social networks. In addition, it can also provide important insights into the design of social platforms and applications, such as viral marketing, domain expert finding, and advertising. In this paper, we present a framework to quantitatively measure social influence in mobile social networks. In the proposed framework, social influence is a measure of uncertainty with its value represented by entropy. We establish a social relationship graph based on the social network theory that addresses the basic understanding of social influence. Based on the social relationship graph, we present an evaluation model on social influence using information entropy to describe the complexity and uncertainty of social influence. We evaluate the performance of our solution using a customized program based on a real-world SMS/MMS-based communication data set. The numerical simulations and analysis show that the proposed influence evaluation strategies can characterize the social influence of mobile social networks effectively and efficiently.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Peng, S., Wu, M., Wang, G., Yu, S.: Containing smartphone worm propagation with an influence maximization algorithm. Comput. Netw. 74, 103–113 (2014)

    Article  Google Scholar 

  2. Chen, M., Mao, S., Liu, Y.: Big data: a survey. Mob. Netw. Appl. 19, 171–209 (2014)

    Article  Google Scholar 

  3. Wang, G., Jiang, W., Wu, J., Xiong, Z.: Fine-grained feature-based social influence evaluation in online social networks. IEEE Trans. Parallel Distrib. Syst. 25, 2286–2296 (2014)

    Article  Google Scholar 

  4. Peng, S., Wang, G., Xie, D.: Social influence analysis in social networking big data: opportunities and challenges. In: IEEE Network (2015, to appear)

    Google Scholar 

  5. Domingos, P., Riehardson, M.: Mining the network value of customers. In: 7th ACM Conference on Knowledge Discovery and Data Mining, pp. 57–66. ACM Press, New York (2001)

    Google Scholar 

  6. Dietz, L., Bickel, S., Scheffer, T.: Unsupervised prediction of citation influences. In: 24th International Conference on Machine Learning (2007)

    Google Scholar 

  7. Anagnostopoulos, A., Kumar, R., Mahdian, M.: Influence and correlation in social networks. In: 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 7–15. ACM Press, New York (2008)

    Google Scholar 

  8. Tang, J., Sun, J., Wang, C., Yang, Z.: Social influence analysis in large-scale networks. In: 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 807–816. ACM Press, New York (2009)

    Google Scholar 

  9. Pal, A., Scott, C.: Identifying topical authorities in microblogs. In: 4th ACM International Conference on Web Search and Data Mining, pp. 45–54. ACM Press, New York (2011)

    Google Scholar 

  10. Rodriguez, M.G., Leskovec, J., Krause, A.: Inferring networks of diffusion and influence. In: 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1019–1028. ACM Press, New York (2010)

    Google Scholar 

  11. Xiang, R., Neville, J., Rogati, M.: Modeling relationship strength in online social networks. In: 19th International World Wide Web Conference, pp. 981–990. ACM Press, New York (2010)

    Google Scholar 

  12. Liu, L., Tang, J., Han, J., Yang, S.: Learning influence from heterogeneous social networks. Data Min. Knowl. Dis. 25, 511–544 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  13. Weng, J., Lim, E.-P., Jiang, J., He, Q.: Twitterrank: finding topic-sensitive influential twitterers. In: 3rd ACM International Conference on Web Search and Data Mining, pp. 261–270. ACM Press, New York (2010)

    Google Scholar 

  14. Ding, Z., Jia, Y., Zhou, B., Han, Y.: Mining topical influencers based on the multi-relational network in micro-blogging sites. China Commun. 10, 93–104 (2013)

    Google Scholar 

  15. Li, D., Shuai, X., Sun, G., Yang, J., Ding, Y., Luo, Z.: Mining topic-level opinion influence in microblog. In: 21st ACM International Conference on Information and Knowledge Management, pp. 1562–1566. ACM Press, New York (2012)

    Google Scholar 

  16. Tang, X., Yang, C.C.: Ranking user influence in healthcare social media. ACM Trans. Intell. Syst. Technol. 3, Article No. 74 (2012)

    Article  Google Scholar 

  17. Peng, S., Wang, G., Yu, S.: Mining mechanism of top-k influential nodes based on voting algorithm in mobile social networks. In: The 11th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC 2013), pp. 2194–2199, IEEE Press (2013)

    Google Scholar 

  18. Sang, J., Xu, C.: Social influence analysis and application on multimedia sharing websites. ACM Trans. Multimed. Comput. Commun. Appl. 9, Article No. 53 (2013)

    Article  Google Scholar 

  19. Tang, J., Wu, S., Sun, J.: Confluence: conformity influence in large social networks. In: 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 347–355. ACM Press, New York (2013)

    Google Scholar 

  20. Huang, J., Cheng, X., Shen, H., Zhou, T., Jin, X.: Exploring social influence via posterior effect of word-of-mouth recommendations. In: 5th ACM International Conference on Web Search and Data Mining, pp. 573–582. ACM Press, New York (2012)

    Google Scholar 

  21. He, S., Zheng, X., Zeng, D., Cui, K., Zhang, Z., Luo, C.: Identifying peer influence in online social networks using transfer entropy. In: Wang, G.A., Zheng, X., Chau, M., Chen, H. (eds.) PAISI 2013. LNCS, vol. 8039, pp. 47–61. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  22. Lee, C., Kwak, H., Park, H., Moon, S.: Finding influentials based on the temporal order of information adoption in Twitter. In: 19th International World Wide Web Conference, pp. 1137–1138. ACM Press, New York (2010)

    Google Scholar 

  23. Motahari, S., Ziavras, S., Jones, Q.: Online anonymity protection in computer-mediated communication. IEEE Trans. Inf. Forensics Secur. 5(3), 570–580 (2010)

    Article  Google Scholar 

  24. Sandoval Jr., L.: Structure of a global network of financial companies based on transfer entropy. Entropy 16, 4443–4482 (2014)

    Article  Google Scholar 

  25. Peng, S., Wu, M., Wang, G., Yu, S.: Propagation model of smartphone worms based on semi-Markov process and social relationship graph. Comput. Secur. 44, 92–103 (2014)

    Article  Google Scholar 

Download references

Acknowledgments

This work is supported by the National Natural Science Foundation of China under Grant No. 61379041.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Jian Li or Aimin Yang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Peng, S., Li, J., Yang, A. (2015). Entropy-Based Social Influence Evaluation in Mobile Social Networks. In: Wang, G., Zomaya, A., Martinez, G., Li, K. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2015. Lecture Notes in Computer Science(), vol 9528. Springer, Cham. https://doi.org/10.1007/978-3-319-27119-4_44

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-27119-4_44

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-27118-7

  • Online ISBN: 978-3-319-27119-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics