{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T23:48:25Z","timestamp":1773704905326,"version":"3.50.1"},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,11,26]],"date-time":"2019-11-26T00:00:00Z","timestamp":1574726400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,11,26]],"date-time":"2019-11-26T00:00:00Z","timestamp":1574726400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Netw Sci"],"published-print":{"date-parts":[[2019,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Social networks have become widely used platforms for their users to share information. Learning the information diffusion process is essential for successful applications of viral marketing and cyber security in social media networks. This paper proposes two learning models that are aimed at learning person-to-person influence in information diffusion from historical cascades based on the threshold propagation model. The first model is based on the linear threshold propagation model. In addition, by considering multi-step information propagation in one time period, this paper proposes a learning model for multi-step diffusion influence between pairs of users based on the idea of random walk. Mixed integer programs (MIP) have been used to learn these models by minimizing the prediction errors, where decision variables are estimations of the diffusion influence between pairs of users. For large-scale networks, this paper develops approximate methods for those learning models by using artificial neural networks to learn the pairwise influence. Extensive computational experiments using both synthetic data and real data have been conducted to demonstrate the effectiveness of the proposed models and methods.<\/jats:p>","DOI":"10.1007\/s41109-019-0215-3","type":"journal-article","created":{"date-parts":[[2019,11,26]],"date-time":"2019-11-26T08:03:01Z","timestamp":1574755381000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":31,"title":["Model-based learning of information diffusion in social media networks"],"prefix":"10.1007","volume":"4","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6124-3047","authenticated-orcid":false,"given":"Zhecheng","family":"Qiang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Eduardo L.","family":"Pasiliao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Qipeng P.","family":"Zheng","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2019,11,26]]},"reference":[{"key":"215_CR1","volume-title":"Nonlinear programming: analysis and methods","author":"M Avriel","year":"2003","unstructured":"Avriel, M (2003) Nonlinear programming: analysis and methods. Courier Corporation, Mineola."},{"key":"215_CR2","volume-title":"Pattern recognition and machine learning","author":"CM Bishop","year":"2006","unstructured":"Bishop, CM (2006) Pattern recognition and machine learning. Springer, New York."},{"key":"215_CR3","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1145\/1963405.1963499","volume-title":"Proceedings of the 20th International Conference on World Wide Web","author":"C Budak","year":"2011","unstructured":"Budak, C, Agrawal D, El Abbadi A (2011) Limiting the spread of misinformation in social networks In: Proceedings of the 20th International Conference on World Wide Web, 665\u2013674.. ACM, New York."},{"issue":"4","key":"215_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2200\/S00527ED1V01Y201308DTM037","volume":"5","author":"W Chen","year":"2013","unstructured":"Chen, W, Lakshmanan LV, Castillo C (2013) Information and influence propagation in social networks. Synth Lect Data Manag 5(4):1\u2013177.","journal-title":"Synth Lect Data Manag"},{"issue":"1","key":"215_CR5","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MIS.2005.16","volume":"20","author":"P Domingos","year":"2005","unstructured":"Domingos, P (2005) Mining social networks for viral marketing. IEEE Intell Syst 20(1):80\u201382.","journal-title":"IEEE Intell Syst"},{"key":"215_CR6","volume-title":"Deep learning","author":"I Goodfellow","year":"2016","unstructured":"Goodfellow, I, Bengio Y, Courville A (2016) Deep learning. MIT press, Cambridge."},{"key":"215_CR7","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1145\/1718487.1718518","volume-title":"Proceedings of the Third ACM International Conference on Web Search and Data Mining","author":"A Goyal","year":"2010","unstructured":"Goyal, A, Bonchi F, Lakshmanan LV (2010) Learning influence probabilities in social networks In: Proceedings of the Third ACM International Conference on Web Search and Data Mining, 241\u2013250.. ACM, New York."},{"issue":"6","key":"215_CR8","doi-asserted-by":"publisher","first-page":"1420","DOI":"10.1086\/226707","volume":"83","author":"M Granovetter","year":"1978","unstructured":"Granovetter, M (1978) Threshold models of collective behavior. Am J Sociol 83(6):1420\u20131443.","journal-title":"Am J Sociol"},{"key":"215_CR9","unstructured":"Friesen, AL, Domingos P (2017) Deep learning as a mixed convex-combinatorial optimization problem. arXiv preprint arXiv:1710.11573."},{"key":"215_CR10","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1145\/956750.956769","volume-title":"Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. KDD \u201903","author":"D Kempe","year":"2003","unstructured":"Kempe, D, Kleinberg J, Tardos E (2003) Maximizing the spread of influence through a social network In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. KDD \u201903, 137\u2013146.. ACM, New York. https:\/\/doi.org\/10.1145\/956750.956769. http:\/\/doi.acm.org\/10.1145\/956750.956769."},{"issue":"2","key":"215_CR11","first-page":"9","volume":"3","author":"M Kimura","year":"2009","unstructured":"Kimura, M, Saito K, Motoda H (2009) Blocking links to minimize contamination spread in a social network. ACM Trans Knowl Disc Data (TKDD) 3(2):9.","journal-title":"ACM Trans Knowl Disc Data (TKDD)"},{"key":"215_CR12","first-page":"1371","volume-title":"AAAI, vol. 7","author":"M Kimura","year":"2007","unstructured":"Kimura, M, Saito K, Nakano R (2007) Extracting influential nodes for information diffusion on a social network In: AAAI, vol. 7, 1371\u20131376.. AAAI Publication, Palo Alto, California."},{"key":"215_CR13","volume-title":"Fourth International AAAI Conference on Weblogs and Social Media","author":"K Lerman","year":"2010","unstructured":"Lerman, K, Ghosh R (2010) Information contagion: An empirical study of the spread of news on digg and twitter social networks In: Fourth International AAAI Conference on Weblogs and Social Media.. AAAI Publication, Palo Alto, California."},{"key":"215_CR14","unstructured":"Rodriguez, MG, Balduzzi D, Sch\u00f6lkopf B (2011) Uncovering the temporal dynamics of diffusion networks. arXiv preprint arXiv:1105.0697."},{"key":"215_CR15","first-page":"322","volume-title":"Asian Conference on Machine Learning","author":"K Saito","year":"2009","unstructured":"Saito, K, Kimura M, Ohara K, Motoda H (2009) Learning continuous-time information diffusion model for social behavioral data analysis In: Asian Conference on Machine Learning, 322\u2013337.. Springer, New York."},{"key":"215_CR16","first-page":"67","volume-title":"International Conference on Knowledge-Based and Intelligent Information and Engineering Systems","author":"K Saito","year":"2008","unstructured":"Saito, K, Nakano R, Kimura M (2008) Prediction of information diffusion probabilities for independent cascade model In: International Conference on Knowledge-Based and Intelligent Information and Engineering Systems, 67\u201375.. Springer, New York."}],"container-title":["Applied Network Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41109-019-0215-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s41109-019-0215-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41109-019-0215-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,25]],"date-time":"2020-11-25T00:58:15Z","timestamp":1606265895000},"score":1,"resource":{"primary":{"URL":"https:\/\/appliednetsci.springeropen.com\/articles\/10.1007\/s41109-019-0215-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,26]]},"references-count":16,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["215"],"URL":"https:\/\/doi.org\/10.1007\/s41109-019-0215-3","relation":{},"ISSN":["2364-8228"],"issn-type":[{"value":"2364-8228","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,26]]},"assertion":[{"value":"7 March 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 September 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 November 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"111"}}