4.5 Article

An approach of Bursty event detection in social networks based on topological features

期刊

APPLIED INTELLIGENCE
卷 52, 期 6, 页码 6503-6521

出版社

SPRINGER
DOI: 10.1007/s10489-021-02729-0

关键词

Event detection; Bursty event; Social networks; Topological features; Network evolution

资金

  1. National Social Science Foundation of China [17XFX013]

向作者/读者索取更多资源

This paper investigates using changes in network structure to identify bursty events, which is more sensitive and widely applicable compared to text-based methods.
User relations and information propagation on social networks can reflect events in real society. Online detection of bursty events is of great significance to studying the evolution of social networks and cyberspace security. Current research works focus on building an event recognition model based on text information and then utilizing clustering or topic model methods to extract features from the data stream and then detect events that have not existed before. The text-based method is designed for specific content, and it does not consider the features of network dynamic evolution. It is restricted by the type and quality of text in social networks, limiting its practical application scenarios. However, there exist remarkable correlations between the occurrence of events and the evolution of the network. In this paper, we consider mining the network structure changes to identify bursty events, the superiority which is that it is sensitive and widely used. We integrate snapshot network topology indexes to quantify its structural features. Then we can judge whether there is a burst event by investigating the change degree of the network structure features of the adjacent snapshots. The effectiveness and efficiency of our approach are further confirmed by experimental studies on four real social network data sets. In addition, we also discuss the salient features of the bursty events and compare the impact of the bursty events on the network structure with that of the scheduled events.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据