Skip to main content
Log in

A continuous-time diffusion model for inferring multi-layer diffusion networks

  • Published:
Applied Intelligence Aims and scope Submit manuscript

Abstract

Inferring multilayer diffusion networks from observed cascades is both crucial and realistic. To infer multilayer diffusion networks, constructing continuous-time diffusion models that capture diffusion dynamics is a prerequisite. However, developing such models faces two main challenges: (1) reducing the number of learnable parameters for precise optimization with limited cascades while effectively modeling for accurate inference and (2) adapting the models to more realistic scenarios. In this paper, we propose a novel continuous-time diffusion model, namely the Embedding-based Continuous-time Diffusion (ECD) model, which employs an embedding method while modeling symmetric relationship strength, asymmetric relationship strength, and trust strength. Specifically, by leveraging the embedding method, the number of learnable parameters is significantly reduced compared with previous models. Then, by modeling symmetric relationship strength, our model can be used in scenarios where the relationships between nodes are symmetric. Subsequently, the trust strength can be inferred by our proposed efficient heuristic algorithm, making our model suitable for scenarios where time information is unavailable. Furthermore, we develop an optimization algorithm to optimize the proposed model and infer multilayer diffusion networks. The experimental results on synthetic and real datasets show that our model and algorithms outperform the comparison methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Algorithm 1
Algorithm 2
Algorithm 3
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Data Availability and Access

Some of data are available at http://www.isi.edu/~lerman/downloads/digg2009.html and http://memetracker.org/data/memetracker9.html. Some of data that support the findings of this study are available from the corresponding author upon reasonable request.

References

  1. Sharma K, He X, Seo S, Liu Y (2021) Network inference from a mixture of diffusion models for fake news mitigation. In: ICWSM, pp 668–679

  2. Wang S, Zhang H, Zhang J, Zhang X, Yu PS, Li Z (2015) Inferring diffusion networks with sparse cascades by structure transfer. In: Database systems for advanced applications: 20th international conference, DASFAA 2015, Hanoi, Vietnam, April 20-23, 2015, Proceedings, Part I 20, pp 405–421. Springer

  3. Wang J, Wang X, Wu J (2018) Inferring metapopulation propagation network for intra-city epidemic control and prevention. In: Proceedings of the 24th ACM SIGKDD international conference on knowledge discovery & data mining, pp 830–838

  4. Chen W, Sun X, Zhang J, Zhang Z (2021) Network inference and influence maximization from samples. In: International conference on machine learning, pp 1707–1716. PMLR

  5. Du N, Song L, Woo H, Zha H (2013) Uncover topic-sensitive information diffusion networks. In: Artificial intelligence and statistics, pp 229–237. PMLR

  6. Wang S, Hu X, Yu PS, Li Z (2014) Mmrate: inferring multi-aspect diffusion networks with multi-pattern cascades. In: Proceedings of the 20th ACM SIGKDD international conference on knowledge discovery and data mining, pp 1246–1255

  7. Yang M-H, Chou C-K, Chen M-S (2014) Cluster cascades: infer multiple underlying networks using diffusion data. In: 2014 IEEE/ACM international conference on advances in social networks analysis and mining (ASONAM 2014), pp 281–284. IEEE

  8. Liao P-L, Chou C-K, Chen M-S (2016) Uncovering multiple diffusion networks using the first-hand sharing pattern. In: Proceedings of the 2016 SIAM international conference on data mining, pp 63–71. SIAM

  9. Xia Y, Chen THY, Kivelä M (2022) Limits of multilayer diffusion network inference in social media research. In: Proceedings of the international AAAI conference on web and social media, vol 16, pp 1145–1156

  10. Bourigault S, Lamprier S, Gallinari P (2016) Representation learning for information diffusion through social networks: an embedded cascade model. In: Proceedings of the Ninth ACM international conference on web search and data mining, pp 573–582

  11. Razzaq S, Malik AK, Raza B, Khattak HA, Zegarra GM, Zelada YFD (2022) Research collaboration influence analysis using dynamic co-authorship and citation networks. IJIMAI 7(3):103–116

    Article  Google Scholar 

  12. Eagle N, Pentland A, Lazer D (2009) Inferring friendship network structure by using mobile phone data. Proc Nat Acad Sci 106(36):15274–15278

    Article  Google Scholar 

  13. Myers S, Leskovec J (2010) On the convexity of latent social network inference. Advances in neural information processing systems, vol 23

  14. Rodriguez MG, Balduzzi D, Schölkopf B (2011) Uncovering the temporal dynamics of diffusion networks. arXiv:1105.0697

  15. Wang L, Ermon S, Hopcroft JE (2012) Feature-enhanced probabilistic models for diffusion network inference. In: Joint European conference on machine learning and knowledge discovery in databases, pp 499–514. Springer

  16. Du N, Song L, Yuan M, Smola A (2012) Learning networks of heterogeneous influence. Advances in neural information processing systems, vol 25

  17. Zhou K, Zha H, Song L (2013) Learning social infectivity in sparse low-rank networks using multi-dimensional hawkes processes. In: Artificial intelligence and statistics, pp 641–649. PMLR

  18. Pouget-Abadie J, Horel T (2015) Inferring graphs from cascades: a sparse recovery framework. In: International conference on machine learning, pp 977–986. PMLR

  19. Vajdi A, Scoglio CM (2018) Identification of missing links using susceptible-infected-susceptible spreading traces. IEEE Trans Netw Sci Eng 6(4):917–927

    Article  MathSciNet  Google Scholar 

  20. Kalimeris D, Singer Y, Subbian K, Weinsberg U (2018) Learning diffusion using hyperparameters. In: Proceedings of the 35th international conference on machine learning, pp 2420–2428

  21. He S, Zha H, Ye X (2020) Network diffusions via neural mean-field dynamics. Adv Neural Inf Process Syst 33:2171–2183

    Google Scholar 

  22. Gao C, Wang Y, Wang Z, Li X, Li X (2023) Pairwise-interactions-based bayesian inference of network structure from information cascades. In: Proceedings of the ACM web conference 2023, pp 102–110

  23. Ramezani M, Ahadinia A, Bideh AZ, Rabiee HR (2023) Joint inference of diffusion and structure in partially observed social networks using coupled matrix factorization. ACM Trans Knowl Discov Data

  24. Huang H, Han K, Xu B, Gan T (2023) Multi-aspect diffusion network inference. In: Proceedings of the ACM web conference 2023, pp 82–90

  25. Xie Y, Yu B, Lv S, Zhang C, Wang G, Gong M (2021) A survey on heterogeneous network representation learning. Pattern Recognit 116:107936

    Article  Google Scholar 

  26. Wang Z, Chen C, Li W (2019) Information diffusion prediction with network regularized role-based user representation learning. ACM Trans Knowl Discov Data (TKDD) 13(3):1–23

    Article  Google Scholar 

  27. Feng S, Zhao K, Fang L, Feng K, Wei W, Li X, Shao L (2022) H-diffu: hyperbolic representations for information diffusion prediction. IEEE Trans Knowl Data Eng

  28. Khattak MI, Al-Hasan M, Jan A, Saleem N, Verdu E, Khurshid N (2021) Automated detection of covid-19 using chest x-ray images and ct scans through multilayer-spatial convolutional neural networks

  29. Guo Z, Yu K, Jolfaei A, Li G, Ding F, Beheshti A (2022) Mixed graph neural network-based fake news detection for sustainable vehicular social networks. IEEE Trans Intell Transp Syst

  30. Jan A, Khan GM (2023) Real world anomalous scene detection and classification using multilayer deep neural networks

  31. Zhang C, Li W, Wei D, Liu Y, Li Z (2022) Network dynamic gcn influence maximization algorithm with leader fake labeling mechanism. IEEE Trans Comput Soc Syst

  32. Wang Y, Wang X, Ran Y, Michalski R, Jia T (2022) Casseqgcn: combining network structure and temporal sequence to predict information cascades. Expert Syst Appl 206:117693

    Article  Google Scholar 

  33. Wang D, Wei L, Yuan C, Bao Y, Zhou W, Zhu X, Hu S (2022) Cascade-enhanced graph convolutional network for information diffusion prediction. In: International conference on database systems for advanced applications, pp 615–631. Springer

  34. Christakis NA, Fowler JH (2009) Connected: the surprising power of our social networks and how they shape our lives. Little, Brown Spark, ???

  35. Lei W, Yang Q, Wang H (2016) Positive influence maximization algorithm based on three degrees of influence. In: Yin H, Gao Y, Li B, Zhang D, Yang M, Li Y, Klawonn F, Tallón-Ballesteros AJ (eds) Intelligent data engineering and automated learning - IDEAL 2016. Springer, Cham, pp 503–514

    Chapter  Google Scholar 

  36. Li C, Zhou B, Lin W, Tang Z, Tang Y, Zhang Y, Cao J (2023) A personalized explainable learner implicit friend recommendation method. Data Sci Eng 8(1):23–35

    Article  Google Scholar 

  37. Qin Y, Ma J, Gao S (2017) Efficient influence maximization under tscm: a suitable diffusion model in online social networks. Soft Comput 21:827–838

    Article  Google Scholar 

  38. Ma L, Liu Y (2019) Maximizing three-hop influence spread in social networks using discrete comprehensive learning artificial bee colony optimizer. Appl Soft Comput 83:105606

    Article  Google Scholar 

  39. Zhang T, Ma L, Shi M (2020) Evolutionary optimization of three-degree influence spread in social networks based on discrete bacterial foraging optimization algorithm. In: Bio-inspired computing: theories and applications: 14th international conference, BIC-TA 2019, Zhengzhou, China, November 22–25, 2019, Revised Selected Papers, Part I 14, pp 77–87. Springer

  40. Zhao X, Liu F, Xing S, Wang Q (2019) Tsscm: a synergism-based three-step cascade model for influence maximization on large-scale social networks. PLoS One 14(9):0221271

    Article  Google Scholar 

  41. Li W, Fan Y, Mo J, Liu W, Wang C, Xin M, Jin Q (2020) Three-hop velocity attenuation propagation model for influence maximization in social networks. World Wide Web 23:1261–1273

    Article  Google Scholar 

  42. Adali S, Escriva R, Goldberg MK, Hayvanovych M, Magdon-Ismail M, Szymanski BK, Wallace WA, Williams G (2010) Measuring behavioral trust in social networks. In: 2010 IEEE international conference on intelligence and security informatics, pp 150–152. IEEE

  43. Hogg T, Lerman K (2012) Social dynamics of digg. EPJ Data Sci 1(1):1–26

    Article  Google Scholar 

  44. Zhou H, Xu S, Fu Z, De Melo G, Zhang Y, Kapadia M (2020) Hid: hierarchical multiscale representation learning for information diffusion. In: International joint conference on artificial intelligence

  45. Leskovec J, Backstrom L, Kleinberg J (2009) Meme-tracking and the dynamics of the news cycle. In: Proceedings of the 15th ACM SIGKDD international conference on knowledge discovery and data mining, pp 497–506

  46. Huang H, Han K, Xu B, Gan T (2022) Reconstructing diffusion networks from incomplete data. In: Proceedings of the 31st international joint conference on artificial intelligence (IJCAI 2022), pp 3085–3091

  47. Gomez Rodriguez M, Leskovec J, Schölkopf B (2013) Structure and dynamics of information pathways in online media. In: Proceedings of the sixth ACM international conference on web search and data mining, pp 23–32

Download references

Acknowledgements

This work is financially supported by Shenzhen Science and Technology Program under Grant No. GXWD20220817124827001 and No.JCYJ20210324132406016.

Author information

Authors and Affiliations

Authors

Contributions

Yunpeng Zhao: Investigation, conceptualization, methodology, algorithm design, theory proof, and draft writing. Xiaopeng Yao: Figure generation, algorithm improvement, time complexity and algorithm optimization, and paper revision. Hejiao Huang: Put forward ideas, discuss and optimize algorithm and method,and paper revision.

Corresponding author

Correspondence to Hejiao Huang.

Ethics declarations

Competing Interests

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Ethical and Informed Consent for Data Used

Data used in the study are available and do not involve ethical issues.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhao, Y., Yao, X. & Huang, H. A continuous-time diffusion model for inferring multi-layer diffusion networks. Appl Intell 54, 8200–8223 (2024). https://doi.org/10.1007/s10489-024-05620-w

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10489-024-05620-w

Keywords