{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T09:55:24Z","timestamp":1770285324561,"version":"3.49.0"},"reference-count":29,"publisher":"SAGE Publications","issue":"6","license":[{"start":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T00:00:00Z","timestamp":1558310400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2019,6,11]]},"abstract":"<jats:p>High influential users are playing an important role in promoting information propagation in social media. Thus, it has been a very interesting problem to identify influential users in social media, and attracted numerous researchers. A great deal of research work has been devoted to solving this problem. However, the existing methods mainly focus on the network topology, ignoring users\u2019 behaviors. In this paper, we propose an High Influential Users Detection (HIUD) algorithm by analyzing users\u2019 behaviors. To evaluate the performance of our algorithm, we carry out extensive experiments on Sina and Tencent microblogging data sets, and compare it with other methods. The experimental results have shown that the HIUD achieves the best performance. Furthermore, we also make a spatial analysis on those high influential users with thermodynamic map.<\/jats:p>","DOI":"10.3233\/jifs-182512","type":"journal-article","created":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T15:39:09Z","timestamp":1558453149000},"page":"6207-6218","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":8,"title":["Identifying High Influential Users in Social Media by Analyzing Users\u2019 Behaviors"],"prefix":"10.1177","volume":"36","author":[{"given":"Zhongying","family":"Zhao","sequence":"first","affiliation":[{"name":"College of Computer Science and Engineering, Shandong Province Key laboratory of Wisdom Mine Information Technology, Shandong University of Science and Technology, Qingdao, China"},{"name":"Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, Shenzhen, China"}]},{"given":"Hui","family":"Zhou","sequence":"additional","affiliation":[{"name":"College of Computer Science and Engineering, Shandong Province Key laboratory of Wisdom Mine Information Technology, Shandong University of Science and Technology, Qingdao, China"}]},{"given":"Bijun","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Engineering, Shandong Province Key laboratory of Wisdom Mine Information Technology, Shandong University of Science and Technology, Qingdao, China"}]},{"given":"Fujiao","family":"Ji","sequence":"additional","affiliation":[{"name":"College of Computer Science and Engineering, Shandong Province Key laboratory of Wisdom Mine Information Technology, Shandong University of Science and Technology, Qingdao, China"}]},{"given":"Chao","family":"Li","sequence":"additional","affiliation":[{"name":"College of Computer Science and Engineering, Shandong Province Key laboratory of Wisdom Mine Information Technology, Shandong University of Science and Technology, Qingdao, China"}]}],"member":"179","published-online":{"date-parts":[[2019,5,20]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2005.16"},{"key":"e_1_3_2_3_2","first-page":"137","article-title":"\u013a\u0119va Tardos, Maximizing the spread of influence through a social network","author":"Kempe D.","year":"2015","unstructured":"KempeD., KleinbergJ., \u013a\u0119va Tardos, Maximizing the spread of influence through a social network, in: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2015, pp. 137\u2013146.","journal-title":"ACM SIGKDD International Conference on Knowledge Discovery and Data Mining"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835935"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2280436"},{"key":"e_1_3_2_6_2","unstructured":"MikolovT. ChenK. CorradoG. DeanJ. Efficient estimation of word representations in vector space CoRR abs\/1301.3781."},{"issue":"27","key":"e_1_3_2_7_2","first-page":"22","article-title":"Improved canopy-kmeans algorithm based on mapreduce","volume":"48","author":"Dianhui M.","year":"2012","unstructured":"DianhuiM., Improved canopy-kmeans algorithm based on mapreduce, Computer Engineering and Applications 48(27) (2012), 22\u201326.","journal-title":"Computer Engineering and Applications"},{"key":"e_1_3_2_8_2","first-page":"1","article-title":"The pagerank citation ranking: Bringing order to the web","author":"Page L.","year":"1999","unstructured":"PageL., BrinS., MotwaniR., WinogradT., The pagerank citation ranking: Bringing order to the web, Stanford InfoLab (1999), 1\u201314.","journal-title":"Stanford InfoLab"},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v4i1.14033"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772751"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1038\/nphys1746"},{"key":"e_1_3_2_12_2","first-page":"497","article-title":"Modelling influence in a social network: Metrics and evaluation","author":"Hajian B.","year":"2011","unstructured":"HajianB., WhiteT., Modelling influence in a social network: Metrics and evaluation, IEEE Third International Conference on Privacy, Security, Risk and Trust, 2011, pp. 497\u2013500.","journal-title":"IEEE Third International Conference on Privacy, Security, Risk and Trust"},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-8462-3_7"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935845"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/2480362.2480726"},{"key":"e_1_3_2_16_2","doi-asserted-by":"crossref","unstructured":"JabeurL.B. TamineL. BoughanemM. Active microbloggers: Identifying influencers leaders and discussers in microblogging networks 2012 pp. 111\u2013117.","DOI":"10.1007\/978-3-642-34109-0_12"},{"key":"e_1_3_2_17_2","first-page":"20","article-title":"ACQR: A novel framework to identify and predict influential users in micro-blogging","author":"Chai W.","year":"2013","unstructured":"ChaiW., XuW., ZuoM., WenX., ACQR: A novel framework to identify and predict influential users in micro-blogging, in: 17th Pacific Asia Conference on Information Systems, 2013, pp. 20.","journal-title":"17th Pacific Asia Conference on Information Systems"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2016.7405737"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1177\/0165551515605217"},{"key":"e_1_3_2_20_2","first-page":"767","article-title":"Trank: Ranking twitter users according to specific topics","author":"Montangero M.","year":"2015","unstructured":"MontangeroM., FuriniM., Trank: Ranking twitter users according to specific topics, in: Consumer Communications and Networking Conference, 2015, pp. 767\u2013772.","journal-title":"Consumer Communications and Networking Conference"},{"issue":"5","key":"e_1_3_2_21_2","first-page":"405","article-title":"Finding news-topic oriented influential twitter users based on topic related hashtag community detection","volume":"13","author":"Xiao F.","year":"2014","unstructured":"XiaoF., NoroT., TokudaT., Finding news-topic oriented influential twitter users based on topic related hashtag community detection, Journal of Web Engineering 13(5&6) (2014), 405\u2013429.","journal-title":"Journal of Web Engineering"},{"key":"e_1_3_2_22_2","first-page":"1012","article-title":"Topical influential user analysis with relationship strength estimation in twitter","author":"Liu X.","year":"2015","unstructured":"LiuX., ShenH., MaF., LiangW., Topical influential user analysis with relationship strength estimation in twitter, in: IEEE International Conference on Data Mining Workshop, 2015, pp. 1012\u20131019.","journal-title":"IEEE International Conference on Data Mining Workshop"},{"key":"e_1_3_2_23_2","first-page":"3122","article-title":"Identifying domain-dependent influential microblog users: A post-feature based approach","author":"Liu N.","year":"2014","unstructured":"LiuN., LiL., XuG., YangZ., Identifying domain-dependent influential microblog users: A post-feature based approach, in: Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014, pp. 3122\u20133123.","journal-title":"Twenty-Eighth AAAI Conference on Artificial Intelligence"},{"key":"e_1_3_2_24_2","first-page":"2282","article-title":"Klout score: Measuring influence across multiple social networks","author":"Rao A.","year":"2015","unstructured":"RaoA., SpasojevicN., LiZ., DsouzaT., Klout score: Measuring influence across multiple social networks, in: IEEE International Conference on Big Data, 2015, pp. 2282\u20132289.","journal-title":"IEEE International Conference on Big Data"},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1504\/IJMIC.2013.053540"},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2013.6457533"},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/2740908.2742472"},{"key":"e_1_3_2_28_2","first-page":"372","article-title":"An influence strength measurement via time-aware probabilistic generative model for microblogs","author":"Ding Z.","year":"2013","unstructured":"DingZ., JiaY., ZhouB., ZhangJ., HanY., YuC., An influence strength measurement via time-aware probabilistic generative model for microblogs, in: Asia-Pacific Web Conference, 2013, pp. 372\u2013383.","journal-title":"Asia-Pacific Web Conference"},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1509\/jmkr.47.4.643"},{"key":"e_1_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.08.033"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-182512","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-182512","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-182512","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T19:56:08Z","timestamp":1770234968000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-182512"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,20]]},"references-count":29,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2019,6,11]]}},"alternative-id":["10.3233\/JIFS-182512"],"URL":"https:\/\/doi.org\/10.3233\/jifs-182512","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,5,20]]}}}