Identifying Spreading Sources and Influential Nodes of Hot Events on Social Networks

Nan Zhou, Xiuxiu Zhan, Qiang Ma, Song Lin, Jun Zhang, Zi-Ke Zhang

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

2 Citations (Scopus)
39 Downloads (Pure)


The rapid development of World Wide Web accelerates information spreading in various ways. Thanks to the emergence of multiple social platforms, some events which are not much attractive in the past can become social hot spots nowadays. In this paper, we study the information diffusion process of “IP MAN3 box office fraud”, which is widely diffused in the largest Chinese microblogging system, namely Sina Weibo, in March 2016. Based on the temporal metric we have proposed, we succeed in finding out the sources of the information, and constructing the panorama of the diffusion process. In addition, a portion of nodes that promote the diffusion are identified by using the node importance algorithms. Finally, the users with abnormal behaviors in the process of event development are identified.

Original languageEnglish
Title of host publicationComplex Networks and Their Applications VI
Subtitle of host publicationProceedings of Complex Networks 2017 (The 6th International Conference on Complex Networks and Their Applications)
EditorsC. Cherifi, H. Cherifi, M. Karsai, M. Musolesi
Place of PublicationCham
Number of pages9
ISBN (Electronic)978-3-319-72150-7
ISBN (Print)978-3-319-72149-1
Publication statusPublished - 2018
EventCOMPLEX NETWORKS 2017: 6th International Conference on Complex Networks and their Applications - Lyon, France
Duration: 29 Nov 20171 Dec 2017

Publication series

NameStudies in Computational Intelligence
ISSN (Print)1860-949X



Bibliographical note

Green Open Access added to TU Delft Institutional Repository ‘You share, we take care!’ – Taverne project
Otherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public.


  • Critical nodes identification
  • Information diffusion
  • Source tracing


Dive into the research topics of 'Identifying Spreading Sources and Influential Nodes of Hot Events on Social Networks'. Together they form a unique fingerprint.

Cite this