Loading [MathJax]/jax/element/mml/optable/BasicLatin.js
Research article

Influence maximization in social networks using role-based embedding

  • Received: 18 May 2023 Revised: 18 June 2023 Accepted: 05 July 2023 Published: 19 July 2023
  • Influence maximization (IM), a central issue in optimizing information diffusion on social platforms, aims to spread posts or comments more widely, rapidly, and efficiently. Existing studies primarily focus on the positive effects of incorporating heuristic calculations in IM approaches. However, heuristic models fail to consider the potential enhancements that can be achieved through network representation learning techniques. Some recent work is keen to use representation learning to deal with IM issues. However, few in-depth studies have explored the existing challenges in IM representation learning, specifically regarding the role characteristics and role representations. This paper highlights the potential advantages of combining heuristic computing and role embedding to solve IM problems. First, the method introduces role granularity classification to effectively categorize users into three distinct roles: opinion leaders, structural holes and normal nodes. This classification enables a deeper understanding of the dynamics of users within the network. Second, a novel role-based network embedding (RbNE) algorithm is proposed. By leveraging the concept of node roles, RbNE captures the similarity between nodes, allowing for a more accurate representation of the network structure. Finally, a superior IM approach, named RbneIM, is recommended. RbneIM combines heuristic computing and role embedding to establish a fusion-enhanced IM solution, resulting in an improved influence analysis process. Exploratory outcomes on six social network datasets indicate that the proposed approach outperforms state-of-the-art seeding algorithms in terms of maximizing influence. This finding highlights the effectiveness and efficacy of the proposed method in achieving higher levels of influence within social networks. The code is available at https://github.com/baiyazi/IM2.

    Citation: Xu Gu, Zhibin Wang, Xiaoliang Chen, Peng Lu, Yajun Du, Mingwei Tang. Influence maximization in social networks using role-based embedding[J]. Networks and Heterogeneous Media, 2023, 18(4): 1539-1574. doi: 10.3934/nhm.2023068

    Related Papers:

    [1] Sergei Avdonin, Julian Edward . An inverse problem for quantum trees with observations at interior vertices. Networks and Heterogeneous Media, 2021, 16(2): 317-339. doi: 10.3934/nhm.2021008
    [2] Travis G. Draper, Fernando Guevara Vasquez, Justin Cheuk-Lum Tse, Toren E. Wallengren, Kenneth Zheng . Matrix valued inverse problems on graphs with application to mass-spring-damper systems. Networks and Heterogeneous Media, 2020, 15(1): 1-28. doi: 10.3934/nhm.2020001
    [3] Robert Carlson . Dirichlet to Neumann maps for infinite quantum graphs. Networks and Heterogeneous Media, 2012, 7(3): 483-501. doi: 10.3934/nhm.2012.7.483
    [4] Kirill D. Cherednichenko, Alexander V. Kiselev, Luis O. Silva . Functional model for extensions of symmetric operators and applications to scattering theory. Networks and Heterogeneous Media, 2018, 13(2): 191-215. doi: 10.3934/nhm.2018009
    [5] Arnaud Ducrot, Michel Langlais, Pierre Magal . Multiple travelling waves for an $SI$-epidemic model. Networks and Heterogeneous Media, 2013, 8(1): 171-190. doi: 10.3934/nhm.2013.8.171
    [6] Franco Cardin, Alberto Lovison . Finite mechanical proxies for a class of reducible continuum systems. Networks and Heterogeneous Media, 2014, 9(3): 417-432. doi: 10.3934/nhm.2014.9.417
    [7] Iryna Pankratova, Andrey Piatnitski . Homogenization of convection-diffusion equation in infinite cylinder. Networks and Heterogeneous Media, 2011, 6(1): 111-126. doi: 10.3934/nhm.2011.6.111
    [8] Kun-Peng Jin, Can Liu . RETRACTED ARTICLE: Decay estimates for the wave equation with partial boundary memory damping. Networks and Heterogeneous Media, 2024, 19(3): 1402-1423. doi: 10.3934/nhm.2024060
    [9] Feiyang Peng, Yanbin Tang . Inverse problem of determining diffusion matrix between different structures for time fractional diffusion equation. Networks and Heterogeneous Media, 2024, 19(1): 291-304. doi: 10.3934/nhm.2024013
    [10] Hyeontae Jo, Hwijae Son, Hyung Ju Hwang, Eun Heui Kim . Deep neural network approach to forward-inverse problems. Networks and Heterogeneous Media, 2020, 15(2): 247-259. doi: 10.3934/nhm.2020011
  • Influence maximization (IM), a central issue in optimizing information diffusion on social platforms, aims to spread posts or comments more widely, rapidly, and efficiently. Existing studies primarily focus on the positive effects of incorporating heuristic calculations in IM approaches. However, heuristic models fail to consider the potential enhancements that can be achieved through network representation learning techniques. Some recent work is keen to use representation learning to deal with IM issues. However, few in-depth studies have explored the existing challenges in IM representation learning, specifically regarding the role characteristics and role representations. This paper highlights the potential advantages of combining heuristic computing and role embedding to solve IM problems. First, the method introduces role granularity classification to effectively categorize users into three distinct roles: opinion leaders, structural holes and normal nodes. This classification enables a deeper understanding of the dynamics of users within the network. Second, a novel role-based network embedding (RbNE) algorithm is proposed. By leveraging the concept of node roles, RbNE captures the similarity between nodes, allowing for a more accurate representation of the network structure. Finally, a superior IM approach, named RbneIM, is recommended. RbneIM combines heuristic computing and role embedding to establish a fusion-enhanced IM solution, resulting in an improved influence analysis process. Exploratory outcomes on six social network datasets indicate that the proposed approach outperforms state-of-the-art seeding algorithms in terms of maximizing influence. This finding highlights the effectiveness and efficacy of the proposed method in achieving higher levels of influence within social networks. The code is available at https://github.com/baiyazi/IM2.



    This paper concerns inverse problems for differential equations on quantum graphs. Under quantum graphs or differential equation networks (DENs) we understand differential operators on geometric graphs coupled by certain vertex matching conditions. Network-like structures play a fundamental role in many problems of science and engineering. The range for the applications of DENs is enormous. Here is a list of a few.

    Structural Health Monitoring. {DENs, classically, arise in the study of stability, health, and oscillations of flexible structures that are made of strings, beams, cables}, and struts. Analysis of these networks involve DENs associated with heat, wave, or beam equations whose parameters inform the state of the structure, see, e.g., [44].

    Water, Electricity, Gas, and Traffic Networks. An important example of DENs is the Saint-Venant system of equations, which model hydraulic networks for water supply and irrigation, see, e.g., [33]. Other important examples of DENs include the telegrapher equation for modeling electric networks, see, e.g., [3], the isothermal Euler equations for describing the gas flow through pipelines, see, e.g., [21], and the Aw-Rascle equations for describing road traffic dynamics, see e.g., [29].

    Nanoelectronics and Quantum Computing. Mesoscopic quasi-one-dimensional structures such as quantum, atomic, and molecular wires are the subject of extensive experimental and theoretical studies, see, e.g., [37], the collection of papers in [38,39,40]. The simplest model describing conduction in quantum wires is the Schrödinger operator on a planar graph. For similar models appear in nanoelectronics, high-temperature superconductors, quantum computing, and studies of quantum chaos, see, e.g., [42,41,45].

    Material Science. DENs arise in analyzing hierarchical materials like ceramic and metallic foams, percolation networks, carbon and graphene nano-tubes, and gra-phene ribbons, see, e.g., [1,46,47].

    Biology. Challenging problems involving ordinary and partial differential equations on graphs arise in signal propagation in dendritic trees, particle dispersal in respiratory systems, species persistence, and biochemical diffusion in delta river systems, see, e.g., [7,24,48].

    Quantum graph theory gives rise to numerous challenging problems related to many areas of mathematics from combinatoric graph theory to PDE and spectral theories. A number of surveys and collections of papers on quantum graphs appeared in previous years; we refer to the monograph by Berkolaiko and Kuchment, [25], for a complete reference list. The inverse theory of network-like structures is an important part of a rapidly developing area of applied mathematics---analysis on graphs. Being tremendously important for all aforementioned applications these theories have not been, however, sufficiently developed. To date, there are relatively few results related to inverse problems on graphs, and almost exclusively they concern trees, i.e. graphs without cycles.

    The first question to be asked when studying inverse problems is how to establish the uniqueness result, i.e. to characterize spectral, or scattering, or dynamical data ensuring uniques solution of the inverse problem. It was shown that inverse boundary spectral and scattering problems for differential equations on graphs with cycles do not have in general a unique solution [41,34,43]. The results on stable identification are known only for trees, and only for the case of boundary inputs (controls) and observations. It was proved that a DEN is identifiable if the actuators and sensors are placed at all or all but one boundary vertices.

    There are two groups of uniqueness results in this direction: for trees with a priori known topology and lengths of the edges [28,49,32] and for trees with unknown topology [22,23,11,13]. The most significant result of the last two cited papers is developing a constructive and robust procedure for the recovery tree's parameters, which became known as the leaf peeling method. This method was extended to boundary inverse problems for various types of PDEs on trees in a series of our subsequent papers [7,15,20].

    The boundary control method in inverse theory demonstrates [11,23] that inverse (identification) problems for DENs are closely related to control and observation problems for PDEs on graphs. The latter problems were studied in numerous papers, see, e.g. [5,16,30,35,44,50] and references therein.

    In this paper, we solve a non-standard dynamical inverse problem for the wave equation on a metric tree graph. Let Ω={V,E} be a finite compact and connected metric tree (i.e. graph without cycles), where V is a set of vertices and E is a set of edges. We recall that a graph is called a metric graph if every edge ejE,j=1,,N, is identified with an interval (a2j1,a2j) of the real line with a positive length j. We denote the set of boundary vertices (i.e. vertices of degree one) by Γ={γ0,...,γm}, and the set of interior vertices (whose degree is at least two) by {vm+1,....,vN}. The vertices can be regarded as equivalence classes of the edge end points aj. For each vertex vk, denote its degree by Υk. We write jJ(v) if ejE(v), where E(v) is the set of edges incident to v.

    The graph Ω determines naturally the Hilbert space of square integrable functions H=L2(Ω). We define its subspace H1 as the space of continuous functions y on Ω such that y|eH1(e) for every eE and y|Γ=0, and let H1 be the dual space to H1. When convenient, we will denote the restriction of a function y on Ω to ej by yj. For any vertex vk and function y(x) on the graph, we denote by yj(vk) the derivative of yj at vk in the direction pointing away from the vertex.

    We will assume that for each internal vertex vk, a mass Mk0 is placed at vk. Our system is described by the following initial boundary value problem (IBVP):

    uttuxx+qu=0, (x,t)(ΩV)×[0,T], (1)
    u|t=0=ut|t=0=0, xΩ (2)
    ui(vk,t)uj(vk,t)=0, i,jJ(vk), vkVΓ, t[0,T], (3)
    jJ(vk)uj(vk,t)=Mkutt(vk,t), vkVΓ, t[0,T], (4)
    u(γ0,t)=f(t), t[0,T], (5)
    u(γk,t)=0, k=1,,m, t[0,T]. (6)

    Here T is an arbitrary positive number, qjCN([a2j1,a2j]) for all j, and fL2(0,T). In what follows, we will refer to γ0 as the root of Ω and f as the control. The well-posedness of this system is discussed in Section 2, see Theorem 2.8, where it is proved that ufC([0,T];H)C([0,T];H1). In the absence of any masses, and for sufficiently regular q, it was discussed in several papers, see, e.g. [44,19,15,16]. In the presence of masses, the function u will have more regularity properties, see Section 2 and [2,36].

    Inverse Problem 1. Assume an observer knows the topology of the tree, i.e. the number of boundary vertices and interior vertices, the adjacency relations for this tree, i.e. for each pair of vertices, whether or not there is an edge joining them. Assume the observer also knows the boundary condition (5), and that (6) holds at the other boundary vertices. The unknowns are the lengths {j}, the masses Mk, and the function q. We wish to determine these quantities with a set of measurements that we describe now.

    Let v1 be the interior vertex adjacent to γ0 and let e1 be the edge joining the two, see Figure 1. Our first measurement is then the following measurement at γ0:

    (R01f)(t):=uf1(γ0,t). (7)
    Figure 1.  A metric tree.

    Physically, this corresponds to applying a Dirichlet control and placing a tension sensor, both at γ0. In what follows, we will refer to R01 as the "root response operator".

    Theorem 1.1. From operator R01 one can recover the following data: 1,q1, Υ1, and M1.

    The proof of this, appearing in Section 2, is an adaptation of an argument well known for the massless case, M1=0, see [11].

    We now define the other measurements required for the inverse problem. For interior vertex vk we list the incident edges by {ekj: j=1,...,Υk}. Here ek1 is chosen to be the edge lying on the unique path from γ0 to vk, and the remaining edges are labeled randomly, see Figure 2. Then the tension sensors, represented by arrows in Figure 2, measure

    (Rkjf)(t):=ufj(vk,t), j=2,...,Υk1. (8)
    Figure 2.  Sensors at vertex v1 marked by arrows.

    We remark in passing that because the control and sensors are at different places, Theorem 1.1 does not apply. We will show that it is not required to measure ufj(vk,t) for j=1 or Υk. Thus for the whole graph, the total number of sensors needed is 1+Nm1k=1(Υk2). It is easy to check that this number is equal to |Γ|1. We denote by RT, which we call the "total response operator", the (|Γ|1)-tuple (R01,R12,R13,....) acting on L2(0,T).

    Let be equal to the maximum distance between γ0 and any other boundary vertex. In our first main result, we solve Inverse Problem 1.

    Theorem 1.2. Assume qjCN([a2j1,a2j]) for all j. Suppose T>2. Then from RT one can determine q, the point masses and the lengths of the edges.

    Placement of internal sensors has been considered in the engineering and computer science literature, see, e.g. [26,27]. We are unaware of any mathematical works treating the inverse problem on general tree graphs with measurements at the internal vertices, except for [8] where the interior vertices are assumed to satisfy delta-prime matching conditions instead of (3), (4). Internal measurements might have advantages in situations where some boundary vertices are inaccessible. In future work, we will study inverse problems of graphs with cycles, in which case both boundary and internal observations appear to be necessary. For a discussion on inverse problems for graphs with cycles see [4] and references therein.

    We briefly mention some of the ideas used in the proof of Theorem 1.2. Denote by Ωkj the unique subtree of Ω having vk as root with incident edge ekj, see Figure 3. In Section 3, we will define the operator ˜Rkj, analogously to our definition of R01, as the root response operator associated to Ωkj. Assume for now k=1 and fix j>1. We will show that ˜R1j can be determined by using our knowledge of R01 and R1j. This will be achieved using two ingredients. The first ingredient is an identity relating the Schwartz kernels of ˜R1j and R1j, using general properties of wave propagation on graphs. The second is our knowledge of the data associated with the edge e1. Having determined ˜R1j, we apply Theorem 1.1 to determine the data associated to e1j. Similarly we will determine the data associated to all edges incident to v1. Then using this newly determined data together with the appropriate components of RT, we then determine the data for all edges incident to the neighbors of v1. The argument can then be iterated until the data associated with each edge are determined.

    Figure 3.  Ω and subtree Ωkj.

    The iterative nature of our solution actually allows us to solve what at first glance seems to be a much harder inverse problem.

    Inverse Problem 2. Assume an observer knows Ω is a tree, that the boundary condition (5) holds, and that (6) holds at the other boundary vertices. All other data are unknowns. The problem then is to use RT to determine the topology, the lengths {j}, the masses Mk, and the function q.

    To solve this inverse problem, for PN, define ΩP to be the subgraph of Ω covered by paths in Ω starting at γ0 and containing (P+1) vertices. Define RTP to be the vector consisting of elements Rkj of RT such that vkΩP. Then we have the following refinement of Theorem 1.2.

    Theorem 1.3. Assume qjCN([a2j1,a2j]) for all j. Suppose T>2. Then for any PN, one can determine from RT(P1) the following: a) the topology of ΩP, b) Mk, Υk for all vkΩP, and c) for each ejΩP, the length of ej and qj.

    We remark that in the theorem, Υk should be interpreted as the degree of vk as an element of Ω. Evidently, this theorem will allow one to solve Inverse Problem 2 by choosing P large enough. It will be clear that the proof of Theorem 1.2 actually proves Theorem 1.3.

    In an engineering setting, Inverse Problem 2 could be solved using the following process. One begins with only the control and sensor at γ0. Once these are used to determine Υ1, one transports (Υ12) sensors to edges incident to v1, perhaps by robots along e1. Then the arguments of this paper allow one to determine ˜R1j, and thus the data associated with those edges including the degrees of the vertices adjacent to v1. Mathematically, this will be equivalent to having derived the conclusions of Theorem 1.3 for Ω1. Then more sensors would be transported to those vertices, enabling the next steps in our iterative process to proceed to solve for Ω2. Clearly this process could be continued until the graph is exhausted. It will be clear that our proof of Theorem 1.2 actually tracks this process.

    We now compare our paper with the literature. All papers referred to in this paragraph assume all controls and measurements take place at boundary vertices. In [11], the authors consider trees with no masses, and assume that controls and measurements are placed at (|Γ|1) boundary vertices. The authors use an iterative method called "leaf peeling'', where the response operator on Ω is used first to determine the data on the edges adjacent to the boundary, and then to determine the response operator associated to a proper subgraph. The leaf peeling argument includes spectral methods that require knowing RT for all T. The tools used in our paper mostly closely resemble those in [20,17], where an iterative dynamical argument, called "dynamical leaf peeling", is developed for a tree with no masses and with response operators at all but one boundary vertices, allowing for the solution of the inverse problem for finite T sufficiently large. The arguments in the present paper differ from those papers in two main ways: (a) the presence of masses in our paper complicates the underlying analysis, and (b) our use of interior measurements makes the proofs somewhat simpler. In [2], the methods of [11] are extended to the case where masses are placed at internal vertices, see also [6]; however these methods still require knowledge of RT for all T. Also in [2], it is proven that that for a single string of length with N attached masses and T>2, RT01 is sufficient to solve the inverse problem.

    In the present paper we develop a new version of the dynamical leaf peeling method. A special feature of our paper is that we use only one control together internal observations. This may be useful in some physical settings where some or most boundary points are inaccessible, or where use of more than one control might be difficult. The extension of dynamical leafing peeling to systems with attached masses, for which the underlying analysis is more complicated than in the mass-free setting, should also be of interest. Another potential advantage of the method presented here is that we recover all parameters of the graphs, including its topology, from the (|Γ|1)-tuple response operator acting on L2(0,T). In previous papers, the authors recovered the graph topology from a larger number of measurements: the (|Γ|1)×(|Γ|1) matrix (boundary) response operator or, equivalently, from (|Γ|1)×(|Γ|1) Titchmarsh–Weyl matrix function. In [12], the inverse problems on a star graph for the wave equation with general self-adjoint matching conditions was solved by the (|Γ|1)×(|Γ|1) matrix boundary response operator.

    In this section, we prove well-posedness of our IBVP for a star shape graph. We also derive representations of both the solution and the Schwartz kernel of the components of the response operator. The representations will be used in Section 3 to solve the inverse problem. We then indicate how these results can be extended from star graphs to arbitrary trees.

    In what follows, it will convenient to denote

    Fn={fHn(R): f(t)=0 if t0},

    where Hn(R) are the standard Sobolev spaces. We define the Heaviside function by H(t)=1 for t>0, and H(t)=0 for t<0. Then define HnFn as the unique solution to

    dndtnHn=H;

    at times we will use H1(t), resp. H2(t) for δ(t), resp. δ(t). In this section and those that follow, we will drop the superscript T from RT when convenient.

    Consider a star shaped graph with edges e1,...,eN. For each j, we identify ej with the interval (0,j) and the central vertex with x=0, see Figure 4.

    Figure 4.  Star with coordinate system: ej identified with [0,j].

    Recall the notation qj=q|ej, and uj(,t)=u(,t)|ej. We consider the case where a point mass M0 is attached at the central vertex. Thus we consider the system

    2ut22ux2+qu=0, xej, j=1,...,N, t×[0,T], (9)
    u|t=0=ut|t=0=0, (10)
    u(0,t)=ui(0,t)=uj(0,t), ij, t[0,T], (11)
    Nj=1uj(0,t)=M2ut2(0,t), t[0,T], (12)
    u1(1,t)=f(t), t[0,T], (13)
    uj(j,t)=0, j=2,...,N, t[0,T]. (14)

    Let uf solve (9)-(14), and set

    g(t)=uf(0,t). (15)

    For (10), it is standard that the waves have unit speed of propagation on the interval, so g(t)=0 for t<1. It will be useful first to consider the vibrating string on an interval.

    We will use a representation of uf(x,t) developed in [16]. For the reader's convenience, we recall facts proven in that work. Fix j{1,...,N}. We extend qj to (0,) as follows: first evenly with respect to x=j, and then periodically. Thus qj(2nj±x)=qj(x) for all positive integers n.

    Define wj to be the solution to the Goursat problem

    {w2t2(x,s)w2x2(x,s)+qj(x)w(x,s)=0, 0<x<s<,w(0,s)=0, w(x,x)=12x0qj(η)dη, x>0.

    A proof of solvability of the Goursat problem can be found in [14].

    Consider the IBVP on the interval (0,j):

    ˜utt˜uxx+qj(x)˜u=0, 0<x<j, t(0,T), (16)
    ˜u(x,0)=˜ut(x,0)=0, 0<x<j,˜u(0,t)=h(t),˜u(j,t)=0, t>0. (17)

    Then the solution to (16)-(17) on ej can be written as

    ˜uh(x,t)=n0: 02nj+xt(h(t2njx)+t2nj+xwj(2nj+x,s)h(ts)ds)
    n1: 02njxt(h(t2nj+x)+t2njxwj(2njx,s)h(ts)ds). (18)

    Setting h(t)=g(t), with g given by (15), we get a representation of the solution uf to (9)-(14) on e2,...,eN.

    Define the "reduced response operator" on ej, with j2, by

    (˜R0jh)(t)=˜uj(0,t),  t[0,T],

    associated to the IBVP (16)-(17). From (18) we immediately obtain:

    Lemma 2.1. For j=2,...,N, and any hC0(R+), we have

    (˜R0jh)(t)=t0˜R0j(s)h(ts)ds,

    with

    ˜R0j(s)=δ(s)2n1δ(s2nj)2n1wj(2nj,2nj)δ(s2nj)+˜r0j(s).

    and ˜r0j=wj(0,s)+2n1H(s2nj)wj(2nj,s). If T is finite, the sums above are finite.

    In what follows we will refer to ˜R0j(s) as the "response function".

    It will be useful also to represent the solution of a wave equation on an interval when the control is on the right end. Thus consider the IBVP:

    vttvxx+q1(x)v=0, 0<x<1, t>0,v(x,0)=vt(x,0)=0, 0<x<1,v(0,t)=0,v(1,t)=f(t), t>0. (19)

    Set ˜q1(x)=q1(1x), and extend ˜q1 to [0,) by ˜q1(2n1±x)=˜q1(x). Define ωj to be the solution to the Goursat problem

    {ω2t2(x,s)ω2x2(x,s)+˜qj(x)ω(x,s)=0, 0<x<s,ω(0,s)=0, ω(x,x)=12x0˜qj(η)dη, x<j.

    By changing coordinates in (18), we get

    vf(x,t)= f(t1+x)+t1xω1(1x,s)f(ts)dsf(t1x)t1+xω1(1+x,s)f(ts)ds+f(t31+x)+t31xω1(31x,s)f(ts)dsf(t31x)t31+xω1(31+x,s)f(ts)ds (20)

    We begin section by proving an analog of Lemma 2.1 for R01(t), and also R1j(t) in the case of a positive mass at the central vertex. As a corollary, we recover the data associated to the edge e1. The case of a massless central vertex requires a modified analysis, and will be covered in the next subsection.

    Lemma 2.2. The response function for RT01 has the form

    R01(s)=r01(s)+n0(anδ(s2n1)+bnδ(s2n1)).

    Here r01 is a piecewise continuous function, an and bn are real constants,

    a1=2and,b1=2ω1(21,21)+4/M. (21)

    If T is finite, then the sum is finite.

    Proof. We see that on e1, the solution to (9)-(14) is given by

    uf(x,t)=vf(x,t)+˜ug(x,t). (22)

    Thus by (18) with h=g and (20),

    (R01)f(t)=ufx(1,t)=vfx(1,t)˜ugx(1,t)
    =f(t)2n1f(t2n1)2n1ω1(2n1,2n1)f(t2n1)+t0ω1(0,s)f(ts)ds
    +2n1t2n1ω1(2n1,s)f(ts)ds+2n0g(t(2n+1)1)
    +2n0w1((2n+1)1,(2n+1)1)g(t(2n+1)1)
    2n0t(2n+1)1w1((2n+1)1,s)g(ts)ds. (23)

    Next, we study the structure of g. Using the equation uf(0,t)=g(t), along with (12), (18) with h=g, and (20), we have

    Mg(t)+Ng(t)=2n0f(t(2n+1)1)+2n0ω1((2n+1)l,(2n+1)1)f(t(2n+1)1)2n0t(2n+1)1ω1((2n+1)1,s)f(ts)ds+Nj=1t0wj(0,s)g(ts)ds+2Nj=1n1[g(t2nj)wj(2nj,2nj)g(t2nj)+2t2njwj(2nj,s)g(ts)ds]. (24)

    In what follows, we will assume t<T for some positive T, so the sums above are all finite. Adapting the argument in [11], we let f(t)=δ(t). In what follows, it will be useful to note that by the uniqueness of the solution of the wave equation, we have for p=p(t)

    up(x,t)=(puδ)(x,t)=ts=0p(ts)uδ(x,s)ds.

    As a consequence, (R01p)(t)=(puδx)(1,t), so R01(s)=uδx(1,s).

    For g(t)=uδ(0,t), we claim g will have the structure:

    g(t)=m0cmH(t(2m+1)1)+tmH1(tβm)+˜a(t1). (25)

    Here ˜aF2, {βn} is a discrete, increasing set of positive constants with β0=1, and cn and tn are constants. In what follows, we will solve for these various unknowns, thereby justifying the claim. Assuming the claim for the moment and inserting f(t)=δ(t) and (25) into (23), the lemma follows except (21) which we will prove below.

    We will now justify the claim. Substituting (25) into (24), and matching the δ terms, we get

    Mm0cmδ(t(2m+1)l1)=2n0δ(t(2n+1)1), t[0,T]. (26)

    We conclude that cm=2/M for all m. This equation together with (25) and (23) imply the equalities in (21). In what follows we denote cm as c. Matching the δ terms in (25) and (24),

    M(m0tmδ(tβm))=Nc(m0δ(t(2m+1)l1))2cNj=1n1m0δ(t2nj(2m+1)1)+2n0ω1((2n+1)1,(2n+1)1)δ(t(2n+1)1). (27)

    We can solve for {βm} by matching β0<β1<β2<... with the set

    {2nj+(2m+1)1: m0; n0; j=1,2,...,N}.

    Next, for any given m, we solve for tm as follows. First, inspection of (27) gives

    β0=1, t0=2(ω1(1,1)/MN/M2). (28)

    For larger m, inspection of (27) gives three cases.

    Case 1. βm=(2n+1)1 and βm2n0j+(2m0+1)1 for any m0,n0,jN. Then tm=1M(Nc+2ω1((2n+1)1,(2n+1)1)).

    Case 2. For some positive integer L and any l=1,...,L, we have βm(2n+1)1 and βm=2nljl+(2ml+1)1. Then tm=1M(2Lc).

    Case 3. For some positive integer L and any l=1,...,L, we have βm=(2n+1)1=2nljl+(2ml+1)1. Then

    tm=NcM2LcM+2ω1((2nl+1)1,(2nl+1)1)M.

    Accounting for these cases, we thus solve for tm of each m.

    Next, we solve for ˜a, which by (24) and (25) satisfies:

    M˜a(t1)+N˜a(t1)+2Nj=1n1˜a(t12nj)
    =˜b0(t)+Nj=1t0wj(0,s)˜a(ts1)ds
    +2Nj=1n1[wj(2nj,2nj)˜a(t2nj1)+2t2njwj(2nj,s)˜a(ts1)ds],

    where ˜b0L2. We will assume ˜aF2 (an assumption later justified). Since ˜a(0)=0, integrating the equation above gives

    M˜a(t1)+N˜a(t1)+2Nj=1n1˜a(t2nj1)
    =˜b1(t1)+ts=1(Nj=1s0wj(0,r)˜a(sr1)dr
    +2Nj=1n1wj(2nj,2nj)˜a(s2nj1)
    +2s2njwj(2nj,r)˜a(sr1)dr) ds, (29)

    with ˜b1F1. We solve for ˜a by an iterative argument. For simplicity of presentation, assume β1=1+22, β2=1+23, and 3<min; the other cases can be treated similarly. Then for we have for all , so (29) simplifies to an equation that we can integrate to

    with . It is not hard to show that this is a Volterra equation of the second kind, and we can thus uniquely solve for for for . Next, we consider the interval , so for . We claim the term has already been determined. To see this, note that by the construction of the set together with our assumption for , we have . Hence for , we have , so has been determined as claimed. We can absorb this known term into in the right hand side of (29). We then integrate (29) to get

    Again we solve this Volterra equation to determine for . Iterating this procedure, we can solve for for any large . Since the right hand side of (29) is in , it follows that . This completes the proof of the lemma.

    Lemma 2.3. Let be given by (24). Then

    (30)

    where

    (31)

    Furthermore, for all , and , and are constants.

    Proof. Since , we have . The formula (31) follows from (25).

    Proposition 1. Let and . From one can determine and .

    Proof. One can determine immediately from Lemma 2.2 because . Then a well known argument (see, eg. [11]) shows that one can recover from . Having determined one can solve the Goursat problem to determine , and then one gets from (21). To find we observe that near , setting , we can extract from (23)

    where are constants, is a function that has been explicitly determined, and is continuous. Thus we can distinguish the coefficient . Also, can be determined from , and so we solve for hence (see (28)).

    Lemma 2.4. Label the central vertex , and let be an incident edge other than . Assume . Let , and let be associated with (9)-(14), defined by . The response function for has the form

    Here , and the sequence is positive and strictly increasing, and are constants.. If is finite then the sums are finite.

    Proof. the lemma follows immediately from Lemmas 2.2 and 2.3; the details are left to the reader.

    We can adapt the methods of the previous subsection to the case the internal vertex is massless (also see [11] for a proof of the results below). Here we will only mention the modifications necessary. In Subsection 2.3, the argument carries through word for word until (24), which becomes a first order integral-differential equation, since . As a consequence, the function will be less regular, because its singularities are not mollified when transmitted across vertices. Instead of(25) and Lemma 2.3 we have:

    Lemma 2.5. Let be given by (24) with . Then

    (32)

    where

    (33)

    Here is a increasing positive sequence, and are constants. Furthermore, , and .

    Inserting and (32) into (23), we obtain the following analog of Lemma 2.2:

    Lemma 2.6. The response function for has the form

    Here is a increasing positive sequence with , , and are constants. Function is piecewise continuous. If is finite, then the sum is finite.

    Proposition 2. Let . From one can determine and .

    The reader is referred to [11] for a proof of this.

    We conclude this section with the following lemma, whose proof is similar to that of Lemma 2.4 and is left to the reader.

    Lemma 2.7. Label the central vertex , and let be an incident edge other than . Assume . Let , and let be associated with (9)-(14), The response function for has the form

    Here , and the sequence is positive and strictly increasing, and are constants. If is finite then the sums are finite.

    This lemma should be compared with Lemma 2.4. For this lemma, the lead singularity is of the form , compared with in the case ; this reflects the mollifying effect of the mass.

    In this subsection, we extend some of the previous results to trees. The extensions will be used in Section 3 in solving the inverse problem on trees.

    We begin by discussing the wellposed of the system (1)-(6). Let be the minimum number of nonzero masses on the path from edge to the boundary vertex .

    Theorem 2.8. If then Furthermore, for each

    The proof of the theorem is based on the analysis of the waves incoming to, transmitted through and reflected from an interior vertex, and the waves reflected from the boundary vertices. The details are left to the reader; also see [6].

    Theorem 2.9. Let solve the system (1)-(6), and define by (7). Let be the vertex adjacent to , with connecting edge labeled , as in Figure 5. Then

    Figure 5.  Star as part of larger tree.

    a) The response function for has the form

    Here , and the sequence is positive and strictly increasing, and are constants. If is finite then the sums are finite, and

    b) from one can determine and .

    Proof. We sketch this proof, leaving the details to the reader. The key point is the waves propagate at unit speed. Hence for and sufficiently small, the response operator will not "feel'' the vertices for , regardless of whether they are boundary or interior vertices. Thus by Propositions 1 and 2, , and can be determined. Having established , one determines as in the proof of 1.

    For an internal vertex , let be the number of positive masses on the path from to , including . We have the following generalization to a tree of Lemmas 2.4 and 2.7.

    Lemma 2.10. Let , and let be defined by (3)-(6) and (8). The response function for has the form

    Here , and the sequence is positive and strictly increasing, and are constants. If is finite then the sums are finite.

    Proof. The proof follows from the proof of Lemma 2.2, together with the transmission and reflection properties of waves at interior vertices, and reflection properties at boundary vertices. The details are left to the reader; see also [11]- where, however, the formula analogous to Lemma 2.2 should have the terms of the form .

    In this section we prove Theorem 1.2. In the first subsection, we establish some notation, and give an outline of the solution method, Steps 1-3. Then in Subsection 3.2, we present the technical heart of our argument, using the equation

    and the expansions for and derived in the previous section to solve for . Then, in Subsection 3.3, we show how to compute . From the proof there, it will be evident that we can compute for general .

    We begin by establishing some notation. Let be some fixed interior vertex. We list the incident edges by . Denote . Let satisfy . Denote by as in the introduction, see Figure 3, and let the vertices of be denoted .

    We will define an associated response operator as follows. Suppose solves the following IBVP: for ,

    (34)
    (35)
    (36)
    (37)
    (38)

    and initial conditions

    (39)

    Then we define an associated reduced response operator

    with associated response function .

    We have the following important result is essentially a restatement of Theorem 2.9.

    Theorem 3.1. For vertex and incident edge , suppose is the other vertex on . Then from one can determine the data: and

    In this section we will present an iterative method to determine the operator from the -tuple of operators, , for arbitrary . By Theorem 3.1, this allows us to solve the inverse problem. We now sketch our method for solving for . Fix . In what follows, we will repeatedly refer to Figure 6.

    Figure 6.  and subtree .

    Step 1. Let be the vertex adjacent to the root , with connecting edge labeled . By Theorem 3.1, we can use to recover , , , and .

    Step 2. Consider . In the next subsection, we will show how to solve for given our knowledge of and . Thus applying Theorem 3.1, we can solve for the data , , , and . Because for are known , the data associated to these edges can be solved for in the same way. We now consider the edge . In the next subsection, we will also show that is also determined. Furthermore, by assumption we know for . Hence by (4), is also determined, with it the data associated to that edge.

    Step 3. In Subsection 3.3, we will solve for determine for all . It will be clear at that point that the same argument can be used to solve for all .

    Proposition 3. The function can be determined from and .

    The rest of this subsection will be devoted to proving this proposition.

    Let , and let be the solution of (1)-(6). Since we know and , we can solve the wave equation on with known boundary data. We identify as the interval with corresponding to . Then , restricted to , solves the following Cauchy problem, where we view as the "time" variable:

    Since the operator is known, we can thus uniquely determine and . Since , it follows that is a known quantity. We now show how and can be used to determine . A key ingredient is the following equation, which relates with .

    This follows from the definition of the response operators for any , in particular We rewrite this equation:

    (40)

    Below, we will use (40) to determine To this end, we now insert representations of and that were derived in the previous section.

    Since is the root of , the following equation is essentially an restatement Theorem 3.1.

    (41)

    Here , and , and is piecewise continuous and vanishes for . In what follows, we will for readability rewrite as .

    We now must separately consider the cases and .

    Case A.

    In what follows, it will be convenient to extend as zero for . By Lemma 2.10 and by an adaptation of Lemma 2.3 to general trees, we have the following expansions:

    (42)
    (43)

    Here and , and and are positive and increasing. Clearly , are known because we assume knowledge of and , whereas for now and the sets , , are unknown. In what follows, we mimick an iterative argument in [20]. Both sides of (40) are a linear combination of , Heavyside, and continuous functions. We will split the rather intricate argument solving for the unknowns in (40) into three lemmas. In the first, we match the delta functions on each side of (40).

    Lemma 3.2. The sets , can be determined by and .

    Proof. By (40), (41), (42), and (43), we get by matching delta functions:

    (44)

    Step 1. We solve for . Since the sequences are all strictly increasing, clearly we have , so that , and so and . We represent that the set determines the set by

    Step 2. We solve for . We match the term with its counterpart on the right hand side of (44). There are three possible cases.

    Case 1. .

    In this case, we must have , hence

    Case 2a. and Note that the last inequality can be verified by an observer at this stage, because we have determined . We conclude and and hence

    Case 2b. and Then . Note we have not yet solved for . In this case, we now repeat the matching coefficient argument just used with .

    Again there are three cases:

    Case 2bⅰ. . Note all of these terms are known, so this inequality can be verified. In this case, , so and .

    Case 2bⅱ. and . Then , and . Thus and .

    Case 2bⅲ. and . Then , and we will need to continue our procedure with .

    Repeating this procedure as necessary, say for a total of times, we solve for . We represent this process as

    We must have finite by (44) and the finiteness of the graph.

    Step . we solve for

    Iterating the procedure above, suppose for we have

    Here is chosen to be minimal, and so . We wish to solve for .

    We can again distinguish three cases:

    Case 1. Note that we know and , so these inequalities are verifiable. In this case, we must have and , so we have determined and in this case.

    Case 2. There exists an integer and pairs , with , such that

    Note that all the numbers have been determined, so these equations can be all verified. In this case, we have either

    Case 2ⅰ. It follows then that , and

    We thus solve for .

    Case 2ⅱ. It follows then that , and we have to repeat this process with .

    Repeating the reasoning in Case 2ii as often as necessary, we will eventually solve for . Thus,

    Hence we can solve for for any positive integer given knowledge of for sufficiently large.

    Lemma 3.3. The sets , can be determined by and .

    Proof. We identify the Heavyside functions in (40). By (41), (42), and (43), we get

    Since the left hand side is known, we can argue as in Lemma 3.2 to solve for . The details are left to the reader.

    Lemma 3.4. The function can be determined by and .

    Proof. We solve for with an iterative integral equation argument. By (40), we have

    Hence by (41), (42), and (43), we calculate

    We set and use that for to obtain

    (45)

    Setting for convenience, we introduce the number

    Since we will be choosing finite and , we have . The integral equation for can be solved by an iterative argument with a finite number of steps.

    1) For , we have .

    2) Suppose we have solved for for , . We will now suppose

    and identify terms in (45) that we already know. We have for

    For and we have

    so

    (46)

    Similarly, for we have , so

    (47)

    Combining (46) and (47) with (45), we get

    This is a Volterra equation of the second kind, and thus we solve for for in

    Iterating this argument finitely many times, we will have solved for , and hence , on the interval for any .

    Case B: .

    In this case, we must replace (42), (43) by

    with piecewise continuous and continuous, piecewise function . The argument is then a straightforward adaptation of Case A; the details are left to the reader.

    Careful reading of Steps 2, 3 shows that we can choose any .

    The purpose of this subsection is to determine . Mimicking the previous subsection, let solve (1)-(6), let and let . We have the following formula holding by the definition of response operators:

    Of course is assumed to be known. We determine as follows. We have from Step 2 that is known. We identify as the interval with corresponding to . Then arises as a solution to the following Cauchy problem on , where we view as the "time" variable:

    Since and are all known, we can thus determine .

    The rest of the argument here is a straightforward adaptation of the previous subsection. The details are left to the reader.

    We would like to thank the referee for his many suggestions that improved the exposition in this paper.



    [1] J. Gu, G. Li, N. D. Vo, J. J. Jung, Contextual Word2Vec model for understanding chinese out of vocabularies on online social media, Int. J. Semant. Web. Inf. Syst., 18 (2022), 1–14. https://doi.org/10.4018/ijswis.309428 doi: 10.4018/ijswis.309428
    [2] G. Manal, Social media data for the conservation of historic urban landscapes: Prospects and challenges, in Culture and Computing. Design Thinking and Cultural Computing (eds. M. Rauterberg), Springer, (2021), 209–223. https://doi.org/10.1007/978-3-030-77431-8_13
    [3] J. Zhao, L. Yang, X. Yang, Maximum profit of viral marketing: An optimal control approach, in Proceedings of the 2019 4th International Conference on Mathematics and Artificial Intelligence, Association for Computing Machinery, (2019), 209–214. https://doi.org/10.1145/3325730.3325767
    [4] D. Pedro, R. Matt, Mining the network value of customers, in Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining, Association for Computing Machinery, (2001), 57–66. https://doi.org/10.1145/502512.502525
    [5] X. Song, B. L. Tseng, C. Lin, M. Sun, Personalized recommendation driven by information flow, in Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrieval, Association for Computing Machinery, (2006), 509–516. https://doi.org/10.1145/1148170.1148258
    [6] Y. Li, D. Zhang, K. Tan, Real-time targeted influence maximization for online advertisements, Proc. VLDB Endow., 8 (2015), 1070–1081. https://doi.org/10.14778/2794367.2794376 doi: 10.14778/2794367.2794376
    [7] L. Simone, M. Diego, R. Giuseppe, M. Maurizio, Mining micro-influencers from social media posts, in Proceedings of the 35th Annual ACM Symposium on Applied Computing, Association for Computing Machinery, (2020), 867–874. https://doi.org/10.1145/3341105.3373954
    [8] X. Zhou, S. Li, Z. Li, W. Li, Information diffusion across cyber-physical-social systems in smart city: a survey, Neurocomputing, 444 (2021), 203–213. https://doi.org/10.1016/j.neucom.2020.08.089 doi: 10.1016/j.neucom.2020.08.089
    [9] V. Soroush, M. Mostafa, R. Deb, Rumor gauge: predicting the veracity of rumors on Twitter, ACM Trans. Knowl. Discov. Data, 11 (2017), 1–36. https://doi.org/10.1145/3070644 doi: 10.1145/3070644
    [10] S. R. Sahoo, B. B. Gupta, Multiple features based approach for automatic fake news detection on social networks using deep learning, Appl. Soft Comput., 100 (2021), 106983. https://doi.org/10.1016/j.asoc.2020.106983 doi: 10.1016/j.asoc.2020.106983
    [11] D. Kempe, J. Kleinberg, E. Tardos, Maximizing the spread of influence through a social network, in Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Association for Computing Machinery, (2003), 137–146. https://doi.org/10.1145/956750.956769
    [12] A. G. Cecilia, B. Manuel, T. M. Valentina, An agent-based social simulation for citizenship competences and conflict resolution styles, Int. J. Semant. Web Inf. Syst., 18 (2022), 1–23. https://doi.org/10.4018/IJSWIS.306749 doi: 10.4018/IJSWIS.306749
    [13] Y. Rong, Q. Zhu, H. Cheng, A model-free approach to infer the diffusion network from event cascade, in Proceedings of the 25th ACM International on Conference on Information and Knowledge Management, Association for Computing Machinery, (2016), 1653–1662. https://doi.org/10.1145/2983323.2983718
    [14] S. Galhotra, A. Arora, S. Virinchi, S. Roy, Asim: A scalable algorithm for influence maximization under the independent cascade model, in Proceedings of the 24th International Conference on World Wide Web, Association for Computing Machinery, (2015), 35–36. https://doi.org/10.1145/2740908.2742725
    [15] A. Cetto, M. Klier, A. Richter, J. F. Zolitschka, "Thanks for sharing"—Identifying users' roles based on knowledge contribution in Enterprise Social Networks, Comput. Net., 135 (2018), 275–288. https://doi.org/10.1016/j.comnet.2018.02.012 doi: 10.1016/j.comnet.2018.02.012
    [16] L. Sopjani, J. J. Stier, S. Ritzén, M. Hesselgren, P. Georén, Involving users and user roles in the transition to sustainable mobility systems: The case of light electric vehicle sharing in Sweden, Transp. Res. Part D: Transp. Environ., 71 (2019), 207–221. https://doi.org/10.1016/j.trd.2018.12.011 doi: 10.1016/j.trd.2018.12.011
    [17] L. B. Jeppesen, K. Laursen, The role of lead users in knowledge sharing, Res. Policy, 38 (2009), 1582–1589. https://doi.org/10.1016/j.respol.2009.09.002 doi: 10.1016/j.respol.2009.09.002
    [18] I. Singh, N. Kumar, S. K. G., T. Sharma, V. Kumar, S. Singhal, Database intrusion detection using role and user behavior based risk assessment, J. Inf. Secur. Appl., 55 (2020), 102654. https://doi.org/10.1016/j.jisa.2020.102654 doi: 10.1016/j.jisa.2020.102654
    [19] D. Kempe, J. M. Kleinberg, E. Tardos, Maximizing the spread of influence through a social network, in Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, Association for Computing Machinery, (2003), 137–146. https://doi.org/10.1145/956750.956769
    [20] P. Shakarian, A. Bhatnagar, A. Aleali, E. Shaabani, R. Guo, The independent cascade and linear threshold models, in Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Association for Computing Machinery, (2015), 177–184. https://doi.org/10.1007/978-3-319-23105-1_4
    [21] M. Richardson, P. Domingos, Mining knowledge-sharing sites for viral marketing, in Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining, Association for Computing Machinery, (2002), 61–70. https://doi.org/10.1145/775047.775057
    [22] D. Oriedi, C. de Runz, Z. Guessoum, A. A. Nyongesa, Influence maximization through user interaction modeling, in Proceedings of the 35th Annual ACM Symposium on Applied Computing, Association for Computing Machinery, (2020), 1888–1890. https://doi.org/10.1145/3386901.3388999
    [23] L. Sun, A. Chen, P. S. Yu, W. Chen, Influence maximization with spontaneous user adoption, in Proceedings of the 13th International Conference on Web Search and Data Mining, Association for Computing Machinery, (2020), 573–581. https://doi.org/10.1145/3336191.3371785
    [24] J. Guo, W. Wu, Adaptive influence maximization: if influential node unwilling to be the seed, ACM Trans. Knowl. Discov. Data, 15 (2021), 1–23. https://doi.org/10.1145/3447396 doi: 10.1145/3447396
    [25] J. Luo, X. Liu, X. Kong, Competitive opinion maximization in social networks, in Proceedings of the 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Association for Computing Machinery, (2019), 250–257. https://doi.org/10.1145/3341161.3342899
    [26] Y. Zhang, Y. Zhang, Top-K influential nodes in social networks: A game perspective, in Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval, Association for Computing Machinery, (2017), 1029–1032. https://doi.org/10.1145/3077136.3080709
    [27] X. Liu, X. Kong, P. S. Yu, Active ppinion maximization in social networks, Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, Association for Computing Machinery, (2018), 1840–1849. https://doi.org/10.1145/3219819.3220061
    [28] P. Banerjee, W. Chen, L. V.S. Lakshmanan, Maximizing welfare in social networks under a utility driven influence diffusion model, in Proceedings of the 2019 International Conference on Management of Data, Association for Computing Machinery, (2019), 1078–1095. https://doi.org/10.1145/3299869.3319879
    [29] M. M. Keikha, M. Rahgozar, M. Asadpour, M. F. Abdollahi, Influence maximization across heterogeneous interconnected networks based on deep learning, Expert Syst. Appl., 140 (2020). https://doi.org/10.1016/j.eswa.2019.112905 doi: 10.1016/j.eswa.2019.112905
    [30] Q. Zhan, W. Zhuo, Y. Liu, Social influence maximization for public health campaigns, IEEE Access, 7 (2019), 151252–151260. https://doi.org/10.1109/ACCESS.2019.2946391 doi: 10.1109/ACCESS.2019.2946391
    [31] S. Tian, S. Mo, L. Wang, Z. Peng, Deep reinforcement learning-based approach to tackle topic-aware influence maximization, Data Sci. Engineer., 5 (2020), 1–11. https://doi.org/10.1007/s41019-020-00117-1 doi: 10.1007/s41019-020-00117-1
    [32] D. Li, J. Liu, J. Jeon, S. Hong, T. Le, D. Lee, et al., Large-scale data-rriven airline market influence maximization, in Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining, Association for Computing Machinery, (2021), 914–924. https://doi.org/10.1145/3447548.3467365
    [33] C. Zhang, W. Li, D. Wei, Y. Liu, Z. Li, Network dynamic GCN influence maximization algorithm with leader fake labeling mechanism, IEEE Trans. Comput. Soc. Syst., (2022), 1–9. https://doi.org/10.1109/TCSS.2022.3193583 doi: 10.1109/TCSS.2022.3193583
    [34] W. Li, Z. Li, A. M. Luvembe, C. Yang, Influence maximization algorithm based on Gaussian propagation model, Inf. Sci., 568 (2021), 386–402. https://doi.org/10.1016/j.ins.2021.04.061 doi: 10.1016/j.ins.2021.04.061
    [35] W. Li, Y. Li, W. Liu, C. Wang, An influence maximization method based on crowd emotion under an emotion-based attribute social network, Inf. Process. Manage., 59 (2022), 102818. https://doi.org/10.1016/j.ipm.2021.102818 doi: 10.1016/j.ipm.2021.102818
    [36] W. Li, Y. Hu, C. Jiang, S. Wu, Q. Bai, E. M. K. Lai, ABEM: an adaptive agent-based evolutionary approach for influence maximization in dynamic social networks, Appl. Soft Comput., 136 (2023), 110062. https://doi.org/10.1016/j.asoc.2023.110062 doi: 10.1016/j.asoc.2023.110062
    [37] H. Cai, V. W. Zheng, K. C. Chang, A comprehensive survey of graph embedding: Problems, techniques, and applications, IEEE Trans. Knowl. Data Engineer., 30 (2018), 1616–1637. https://doi.org/10.1109/TKDE.2018.2807452 doi: 10.1109/TKDE.2018.2807452
    [38] B. Perozzi, R. Al-Rfou, S. Skiena, Deepwalk: online learning of social representations, in Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining, Association for Computing Machinery, (2014), 701–710. https://doi.org/10.1145/2623330.2623732
    [39] J. Tang, M. Qu, M. Wang, M. Zhang, J. Yan, Q. Mei, Line: large-scale information network embedding, in Proceedings of the 24th international conference on World Wide Web, Association for Computing Machinery, (2015), 1067–1077. https://doi.org/10.1145/2736277.2741093
    [40] A. Grover, J. Leskovec, node2vec: scalable feature learning for networks, in Proceedings of the 22nd ACM SIGKDD international conference on Knowledge discovery and data mining, Association for Computing Machinery, (2016), 855–864. https://doi.org/10.1145/2939672.2939754
    [41] C. McCormick, Word2vec tutorial-the skip-gram model, 2016. Available from: http://mccormickml.com/2016/04/19/word2vec-tutorial-the-skip-gram-model.
    [42] M. M. Keikha, M. Rahgozar, M. Asadpour, Community aware random walk for network embedding, Knowledge-Based Syst., 148 (2018), 47–54. https://doi.org/10.1016/j.knosys.2018.02.028 doi: 10.1016/j.knosys.2018.02.028
    [43] T. Lou, J. Tang, Mining structural hole spanners through information diffusion in social networks, in Proceedings of the 22nd international conference on World Wide Web, Association for Computing Machinery, (2013), 825–836. https://doi.org/10.1145/2488388.2488461
    [44] R. S. Burt, Structural holes and good ideas, Am. J. Soc., 110 (2004), 349–399. https://doi.org/10.1086/421787 doi: 10.1086/421787
    [45] S. Wu, J. M. Hofman, W. A. Mason, D. J. Watts, Who says what to whom on Twitter, in Proceedings of the 20th International Conference on World Wide Web, WWW 2011, Association for Computing Machinery, (2011). https://doi.org/10.1145/1963405.1963504
    [46] T. Mikolov, K. Chen, G. Corrado, J. Dean, Efficient estimation of word representations in vector space, 2013. Available from: http://arXiv.org/abs/1301.3781.
    [47] D. Lusseau, K. Schneider, O. J. Boisseau, P. Haase, E. Slooten, S. M. Dawson, The bottlenose dolphin community of Doubtful Sound features a large proportion of long-lasting associations, Behav. Ecol. Soc., 54 (2003), 396–405. https://doi.org/10.1007/s00265-003-0651-y doi: 10.1007/s00265-003-0651-y
    [48] A. L. Traud, P. J. Mucha, M. A. Porter, Social structure of Facebook networks, Phys. A, 391 (2012), 4165–4180. https://arXiv.org/1102.2166
    [49] M. J. Newman, Finding community structure in networks using the eigenvectors of matrices, Phys. Rev. E, 74 (2006), 036104. https://arXiv.org/abs/physics/0605087v3
    [50] J. Leskovec, J. Kleinberg, C. Faloutsos, Graph evolution: Densification and shrinking diameters, ACM Trans. Knowl. Discovery Data, 1 (2007). https://doi.org/10.1145/1217299.1217301 doi: 10.1145/1217299.1217301
    [51] B. Rozemberczki, R. Davies, R. Sarkar, C. Sutton, Gemsec: graph embedding with self clustering, in Proceedings of the 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2019, Association for Computing Machinery, (2019), 65–72. https://doi.org/10.1145/3341161.3342890
    [52] J. Zhang, Y. Luo, Degree centrality, betweenness centrality, and closeness centrality in social network, in Proceedings of the 2017 2nd International Conference on Modelling, Simulation and Applied Mathematics (MSAM2017), 132 (2017), 300–303. https://doi.org/10.2991/msam-17.2017.68
    [53] M. E. J. Newman, A measure of betweenness centrality based on random walks, Soc. Net., 27 (2005), 39–54. https://doi.org/10.1016/j.socnet.2004.11.009 doi: 10.1016/j.socnet.2004.11.009
    [54] D. F. Gleich, PageRank beyond the Web, SIAM Rev., 57 (2015), 321–363. https://doi.org/10.1137/140976649 doi: 10.1137/140976649
  • This article has been cited by:

    1. Satoru Iwasaki, Initial state estimation from limited observations of the heat equation in metric graphs, 2022, 38, 0266-5611, 035007, 10.1088/1361-6420/ac4afc
    2. Xiao Xuan Feng, Mahyar Mahinzaeim, Gen Qi Xu, Spectral analysis of a viscoelastic tube conveying fluid with generalized boundary conditions, 2022, 149, 0022-2526, 657, 10.1111/sapm.12516
    3. S. Avdonin, J. Edward, Y. Zhao, Shape, velocity, and exact controllability for the wave equation on a graph with cycle, 2024, 35, 1061-0022, 1, 10.1090/spmj/1791
    4. Z. A. Sobirov, Inverse Source Problem for the Subdiffusion Equation on a Metric Star Graph with Integral Overdetermination Condition, 2023, 44, 1995-0802, 5426, 10.1134/S1995080223120326
    5. R. R. Ashurov, Z. A. Sobirov, A. A. Turemuratova, Inverse Source Problem for the Space-Time Fractional Parabolic Equation on a Metric Star Graph with an Integral Overdetermination Condition, 2024, 116, 0001-4346, 892, 10.1134/S0001434624110026
  • Reader Comments
  • © 2023 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(2123) PDF downloads(222) Cited by(3)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog