2019
DOI: 10.1155/2019/6902027
|View full text |Cite
|
Sign up to set email alerts
|

Mining the Hidden Link Structure from Distribution Flows for a Spatial Social Network

Abstract: This study aims at developing a non-(semi-)parametric method to extract the hidden network structure from the {0,1}-valued distribution flow data with missing observations on the links between nodes. Such an input data type widely exists in the studies of information propagation process, such as the rumor spreading through social media. In that case, a social network does exist as the media of the spreading process, but its link structure is completely unobservable; therefore, it is important to make inference… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
11
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(11 citation statements)
references
References 54 publications
0
11
0
Order By: Relevance
“…We remark that Equation (1) is a counting‐process version of the susceptible–infected–susceptible (SIS) model in Shen et al (2014) and Zhang et al (2018) and of the susceptible–infected (SI) model in Zheng et al (2019). All three models in Shen et al (2014), Zhang et al (2018), and Zheng et al (2019) rely on a binary infection status variable to reconstruct the hidden networks, the difference being that Shen et al (2014) consider only discrete‐time diffusion and apply the compressive sensing algorithm to reconstruct the network, while Zheng et al (2019) deal with continuous‐time diffusion and reconstruct the network via the maximum likelihood procedure.…”
Section: Methodsmentioning
confidence: 99%
See 4 more Smart Citations
“…We remark that Equation (1) is a counting‐process version of the susceptible–infected–susceptible (SIS) model in Shen et al (2014) and Zhang et al (2018) and of the susceptible–infected (SI) model in Zheng et al (2019). All three models in Shen et al (2014), Zhang et al (2018), and Zheng et al (2019) rely on a binary infection status variable to reconstruct the hidden networks, the difference being that Shen et al (2014) consider only discrete‐time diffusion and apply the compressive sensing algorithm to reconstruct the network, while Zheng et al (2019) deal with continuous‐time diffusion and reconstruct the network via the maximum likelihood procedure.…”
Section: Methodsmentioning
confidence: 99%
“…We remark that Equation (1) is a counting‐process version of the susceptible–infected–susceptible (SIS) model in Shen et al (2014) and Zhang et al (2018) and of the susceptible–infected (SI) model in Zheng et al (2019). All three models in Shen et al (2014), Zhang et al (2018), and Zheng et al (2019) rely on a binary infection status variable to reconstruct the hidden networks, the difference being that Shen et al (2014) consider only discrete‐time diffusion and apply the compressive sensing algorithm to reconstruct the network, while Zheng et al (2019) deal with continuous‐time diffusion and reconstruct the network via the maximum likelihood procedure. Zhang et al (2018) also deal with the diffusion with a binary status variable and discrete time, but both directions of the transition between the two statuses rely on the mean field determined by the network, and the classical expectation‐maximization algorithm combined with the maximum likelihood procedure is applied to reconstruct the hidden network.…”
Section: Methodsmentioning
confidence: 99%
See 3 more Smart Citations