Detection of key figures in social networks by combining harmonic modularity with community structure-regulated network embedding

YaJun Du,Qiaoyu Zhou,JiaXing Luo,XianYong Li,JinRong Hu
DOI: https://doi.org/10.1016/j.ins.2021.04.081
IF: 8.1
2021-09-01
Information Sciences
Abstract:There are three types of social network users: ordinary users, opinion leaders, and structural hole (SH) spanners. Opinion leaders and SH spanners are key circulators of information. SH spanners are the key figures of cross-community information propagation. By contrast, opinion leaders are more important to intra-community information dissemination. Moreover, according to the two-step flow theory, users prefer to connect with opinion leaders rather than ordinary users when connecting with users in other communities. Therefore, the detection of key figures should consider both the community structure and the relationship between opinion leaders and SH spanners. In this paper, we propose three algorithms. The first is an improved harmonic modularity algorithm based on Q-modularity gain (Q-HAM), which can infer community partitions and rank SH nodes. The second proposal is a model of social rank and community structure-regulated network embedding (RaComNE), which is based on the two-step flow theory and relies on the SH spanner ranks and community assignments to guide network representation learning and social rank inference in a supervised manner. Finally, we propose a key figure detection algorithm (KFDA), which integrates both Q-HAM and RaComNE into a single framework by adding a fine-tuning step. In addition to its usual outputs, KFDA outputs community assignments and network embeddings, which are convenient for visualization. Extensive experimentation demonstrated that Q-HAM and RaComNE improved key figure detection relative to state-of-the-art methods. Additionally, the KFDA experiments showed that integrating the two-step theory into the framework significantly improves both SH spanners and opinion leaders detection.
computer science, information systems
What problem does this paper attempt to address?