DOI : https://doi.org/10.5281/zenodo.19511591
- Open Access
- Authors : Prapti Pandey, Vivek Shukla
- Paper ID : IJERTV15IS030616
- Volume & Issue : Volume 15, Issue 03 , March – 2026
- Published (First Online): 11-04-2026
- ISSN (Online) : 2278-0181
- Publisher Name : IJERT
- License:
This work is licensed under a Creative Commons Attribution 4.0 International License
Detection of Cascade Behavior on Social Media Networks: A Comparative Analysis
Prapti Pandey
PhD Scholar, Department of Computer Science and Engineering, Dr C V Raman University, Kota, Bilaspur Chhattisgarh, 495113-India.
Vivek Shukla
Head, Department of Computer Science and Engineering, Dr C V Raman University, Kota, Bilaspur Chhattisgarh, 495113-India.
Abstract – This study systematically reviews and compares techniques for detecting cascade behavior in social media networks, emphasizing their underlying modeling paradigms. We categorize these into five main approaches: feature-based methods, deep learning methods (including Graph Neural Networks), real-time diffusion analysis methods, point process-based methods (particularly Hawkes processes), and hybrid methods. Feature-based techniques, while enabling popularity prediction, are limited by their reliance on domain expertise for feature engineering and static representations. Deep learning methods offer advantages in learning latent representations and capturing complex structural and sequential information without extensive feature engineering, but often face challenges with interpretability, computational cost, and handling imbalanced data. Real-time diffusion analysis excels in processing high-velocity data streams for immediate insights into unfolding cascades, crucial for rapid response applications, yet struggles with the inherent noise and complexity of real-world social data. Point process-based methods, especially Hawkes processes, are highly effective for modeling inter-dependent events over continuous time and capturing the rich get richer phenomenon in diffusion, although they can be limited by strong assumptions and difficulties in exploiting long-term dependencies. Hybrid methods combine the strengths of these individual techniques, enhancing accuracy and robustness by fusing complementary information modalities. The findings indicate an evolution towards deep learning integrations, such as Hawkes process-based networks and graph representation learning, promising improved handling of temporal dynamics and more precise predictions. Future research should prioritize scalable hybrid architectures incorporating continuous-time dynamic graph neural networks to enhance real-time cascade detection while maintaining interpretability and developing multi-task learning frameworks for comprehensive prediction and influence estimation.
Keywords: Cascade Behaviour, Social Media Networks, Cascade detection techniques, Comparison.
INTRODUCTION
The proliferation of online social media platforms has revolutionized information dissemination, enabling rapid and widespread sharing of content, ideas, and behaviors. This phenomenon has given rise to cascade behavior, where information or actions propagate through a network of connected individuals. The individuals are connecting through social ties, thereby forming the structural backbone for the emergence and propagation of cascade behavior in social media networks [1], [2]. A cascade effect in social networks refers to the sequential activation or adoption of an item (e.g., a piece of information, a trend, or a behavior) by individuals, where each adoption is influenced by previous adoptions within the network . This can be conceptualized as a directed graph where nodes represent users and edges represent relationships, with activation spreading from one user to their inactive neighbors [3]. Such cascades are often represented as rooted, directed, time-stamped trees that record the spread of a single diffusion event [4]. Information cascades are characterized by their temporal evolution, where the state of nodes changes over time from inactive to activated (e.g., retweeting a message) [5]. The structure of these cascades, which can include loops and reciprocal edges, provides valuable insights into the diffusion process [6]. These diffusion processes are ubiquitous in self- organized social systems, facilitating news propagation, the dissemination of innovative technologies, and even the spread of epidemics.
The generation of cascade effects in social media is a complex interplay of various endogenous and exogenous factors. A fundamental mechanism involves users sharing content with their contacts, leading to a multiplicative spread that can reach a vast number of people, often distant from the original source [7]. This user-driven re-sharing can be triggered by social influence, where individuals are motivated by the actions of their peers, or by external influences such as burst events [8]. Some cascades exhibit a broadcast pattern, where a single node accounts for a large portion of the diffusion, akin to a breadth-first search. In contrast, viral cascades are driven by word-of-mouth mechanisms, resembling a depth-first search, where each node contributes a smaller fraction to the overall spread [9]. Factors such as the contents novelty, emotional appeal, and the characteristics of the spreading users (e.g., follower count, past engagement) significantly influence the likelihood and extent of a cascade [10], [11],
[12]. The diffusion protocolsthe social exchanges that enable information transmissionalso play a crucial role in how cascades grow. These protocols can range from simple reshares to more complex interactions, with the effort required to participate impacting a cascades growth [13]. Network structure, along with nodal activity, has been shown to influence the cascade threshold and the spreading capacity of social media [14].Detecting cascade behavior in social networks is critical for a broad range of real-world applications and holds significant importance in understanding online dynamics [8]. One primary application is the early detection of rumors and misinformation. Identifying viral rumors allows for crisis management and the implementation of mitigation strategies to prevent their widespread impact, especially when the information is false [15]. This is particularly relevant in scenarios like pandemics, where misinformation can hinder effective public health responses and cause widespread confusion [16]. Beyond mitigating negative impacts, cascade detection is vital for influence prediction, enabling the evaluation of information strategies and identification of content likely to achieve significant user engagement. This has direct applications in viral marketing and advertising, where understanding what makes content go viral can inform campaign design [8], [12]. Moreover, analyzing cascade patterns can provide insights into behavioral patterns and the propagation of ideas, which is valuable for areas like humanitarian efforts and public policy [12], [17]. The ability to predict cascade outcomes, such as their size and reach, can help in identifying hot information, optimizing resource allocation, and even minimizing destructive cascades or keeping them within specified ranges [6], [13], [18], [19]. The increasing scale and speed of information diffusion on social media make cascade prediction and detection an essential tool for navigating the complexities of the digital information landscape [4].
The cascade behaviour on social networks is detected by employing a variety of techniques, and each technique represents a distinct approach to modeling and identifying the propagation patterns of information diffusion across social networks. its essential to screen these techniques systematically to assess their efficacy, scalability, and applicability across diverse social media contexts, thereby enabling informed selection for specific detection scenarios.The present study was conducted to provide a comprehensive comarison of techniques employed for detecting cascade behavior on social media networks, with a particular emphasis on the role of diffusion protocols and multi-scale graph-based approaches in capturing diverse propagation patterns.
OBJECTIVES OF STUDY
The present study was conducted under following objectives;
-
To examine the existing techniques for detecting cascade behavior in social networks.
-
To categorize the cascade detection techniques based on their underlying modeling paradigms, such as feature-based, graph neural network-driven, and real-time diffusion analysis approaches.
-
To provide the weakness of each technique in terms of computational efficiency, handling of temporal dynamics, and robustness to sparse network data.
Research Methodology
This study employs a secondary data-based research methodology, specifically a systematic literature review, to provide a comprehensive comparison of techniques utilized for detecting cascade behavior on social media networks. The initial phase involved a comprehensive literature search across multiple academic databases to identify relevant studies focusing on cascade detection techniques in social media. Key databases included, but were not limited to, IEEE Xplore, ScienceDirect, Springer, ACM Digital Library, and Scopus, chosen for their extensive coverage of computer science, information systems, and social science research [20], [21], [22].
A carefully constructed search string was utilized, combining keywords and Boolean operators to maximize the retrieval of pertinent studies. The core keywords encompassed terms such as information cascade,cascade detection,cascade prediction,social media,social networks,diffusion models,propagation,algorithms,techniques, and comparison. The search was further refined by prioritizing recent publications to ensure currency, and restricting results to peer-reviewed journal articles and conference proceedings published in English[22]. Backward snowballing, wherein references from existing systematic reviews and highly cited papers were examined, was also employed to identify additional relevant primary studies.
To ensure the relevance and quality of the selected literature, specific inclusion and exclusion criteria were applied during the screening process:
-
Inclusion Criteria:
-
Studies presenting novel techniques or comparative analyses for detecting, predicting, or modeling information cascades in social media or online networks.
-
Papers discussing the theoretical underpinnings, empirical evaluations, or practical applications of such techniques.
-
Studies published in peer-reviewed journals, reputable conference proceedings, or as comprehensive survey articles (e.g., [8]).
-
Research clearly defining the methodology, datasets used, and evaluation metrics for cascade detection or prediction.
-
-
Exclusion Criteria:
-
Studies not directly related to cascade behavior or social media.
-
Short papers, editorials, opinion pieces, or masters/doctoral theses (unless they were subsequently published in a peer-reviewed venue).
-
Studies primarily focused on general social network analysis without specific emphasis on cascade detection or prediction [23], [24].
-
Duplicate publications.
From each selected study, relevant information was systematically extracted and recorded. This included:
-
Bibliographic Details: Author(s), year of publication, title, and venue.
-
Cascade Detection/Prediction Technique: Name, type (e.g., feature-driven, point process-based, deep learning-based), and underlying model [3].
-
Problem Addressed: Specific aspect of cascade behavior the technique aims to solve (e.g., early detection, size prediction, source identification).
-
Dataset Characteristics: Type of social media platform, size, and nature of the data (e.g., text, images, temporal information).
-
Evaluation Metrics: Performance indicators used to assess the technique (e.g., accuracy, precision, recall, F1- score, AUC).
-
Key Findings: Main results, advantages, and contributions of the technique.
-
Limitations: Identified shortcomings, challenges, and areas for improvement.
-
Comparative Aspects: If the paper included a comparison with other techniques, the details of that comparison.
-
-
The extracted data underwent a rigorous analysis and synthesis process to fulfill the objectives of this chapter. A thematic analysis approach was employed to categorize and group similar techniques, identifying common themes, methodologies, and challenges [25]. A comparative analysis was then performed across the identified techniques, evaluating their efficacy, scalability, computational complexity, and applicability across diverse social media contexts and cascade types [26], [27], [28]. This involved assessing strengths and weaknesses, underlying assumptions, and suitability for different application scenarios (e.g., misinformation detection, trend prediction) [23], [29].
RESULTS
The present review presents a systematic categorization of cascade detection techniques based on their underlying modeling paradigms, such as feature-based, graph neural network-driven, and real-time diffusion analysis approaches. In the following subsections the major techniques used for detecting cascade behavior in social media networks are described.
-
Techniques used for detection of cascade behaviour in social networks.
-
Feature Based Methods
Feature-based methods operate by extracting specific, hand-crafted features from raw data associated with information cascades. These features can include structural properties of the cascade graph, temporal attributes (such as publication and observation times), characteristics of users, content features, and network topology [2], [3], [30], [31]. Once extracted, these features are then input into conventional machine learning models, including regression models, regression trees, or Support Vector Machines, to perform tasks such as popularity prediction [32]. A primary limitation of this approach is its heavy reliance on domain expertise for effective feature engineering, which can restrict the generalizability of learned features to new or evolving contexts. Moreover, these methods often employ static feature representations, which struggle to fully capture the inherently dynamic nature of information cascades [3], [8], [30].
-
Deep Learning Methods
Deep learning methods represent a powerful paradigm for modeling and predicting information cascades, offering an alternative to traditional approaches by reducing the need for extensive feature engineering [33], [34]. Graph Neural Networks are particularly prominent within this category, effectively leveraging and learning from the structural information embedded within social graphs [35], [36], [37]. GNN-based models can integrate various node attributes, including user profiles and complex structural features, directly from cascade graphs, thereby capturing both the structural and sequential aspects of propagation paths [16], [38], [39], [40]. Beyond GNNs, deep learning also encompasses other architectures such as recurrent neural networks for modeling sequential cascade data [8], and topological recurrent neural networks designed t handle dynamic directed acyclic graphs to better represent cascade structures [41]. These methods enable the learning of latent representations and can integrate diverse data modalities, including text and network structures, in an end-to-end fashion for cascade prediction [33], [42].
-
Real-time Diffusion Analysis Methods
Real-time diffusion analysis methods are designed to detect and track cascade behavior as it unfolds within social media streams. These approaches often utilize continuous-time diffusion models or stream data mining techniques to analyze temporal irregularities and the dynamic states of users and cascades [2], [43], [44], [45], [46]. The primary objective is to provide early detection of significant events or emerging trends, such as identifying bursty keywords or monitoring the lifecycle of information propagation [44]. Techniques in this category are specifically engineered to handle high-velocity data streams, offering immediate insights into cascade evolution. This capability is crucial for applications demanding rapid responses, including real-time event detection, influence maximization on dynamic social streams, and monitoring viral content [43], [47], [48], [49], [50], [51], [52].
-
Point Process-based Methods
Point process-based methods, especially those employing Hawkes processes, are critical for modeling discrete, inter-dependent events over continuous time, making them highly suitable for understanding information cascades in social media [53], [54], [55]. Hawkes processes are characterized as self-exciting point processes, where the occurrence of a past event increases the likelihood of future events [56], [57]. This self-exciting property effectively captures the rich get richer phenomenon frequently observed in information diffusion, where early adoptions stimulate subsequent ones [54]. These models are employed to predict the final size of a cascade, estimate parameters for social influence, and infer the probability of an inactive node becoming activated [31], [58], [59]. Advanced variations include Network Hawkes processes, which integrate user connection strengths, and dynamic Hawkes process models that capture the evolving states of communities influencing diffusion processes [59], [60]. These methods are particularly effective for accurately modeling the temporal burstiness of events and their intricate interdependencies [59].
-
Hybrid Methods
Hybrid methods combine components from various modeling paradigms to harness their individual strengths and address their respective limitations, ultimately leading to more robust and accurate cascade detection and prediction. For example, some hybrid models integrate traditional machine learning classifiers with ensemble techniques like bagging and boosting to enhance anomaly detection in social networks [61]. Other approaches merge point process-based generative models with deep learning architectures, allowing for the integration of diverse features (e.g., content, network structure, exogenous signals) with sophisticated temporal modeling capabilities [62], [63]. Multi-modal hybrid frameworks can integrate distinct information sources such as fundamental cascade sequences, user social graphs, and sub-cascade graphs, often leveraging transformers or other deep learning models to effectively fuse these disparate clues and improve predictive performance. This integrated approach facilitates a more comprehensive understanding of the cascading process by simultaneously considering structural, temporal, and content- based information [19].
-
-
-
Comparison of techniques used for detection of cascade behaviour in social networks.
Table-1 shows the comparison of deep learning, real-time diffusion, point process-based, and hybrid techniques for cascade detection on the basis of description, mechanism, strength and weakness.This comparative analysis reveals that while individual techniques excel in specific dimensionssuch as the temporal fidelity of point process-based methods or the structural capture of deep learning approacheshybrid methods predominantly mitigate their collective drawbacks by fusing complementary modalities, though they introduce complexities in integration and computational overhead [3], [39], [69]. Future research directions should prioritize scalable hybrid architectures that incorporate continuous-time dynamic graph neural networks to enhance real-time cascade detection while preserving interpretability [3], [19], [70]. Additionally, advancements in multi-task learning frameworks that simultaneously optimize cascade prediction and user classification could further elevate detection efficacy by integrating spatiotemporal data fusion [3]. Such frameworks could also leverage foundational large language models to capture universal propagation patterns and variability in user behaviors, thereby improving generalization across diverse social media platforms [71].
CONCLUSION
The present study aims to provide a comprehensive comparison of cascade detection techniques on social media networks, highlighting their strengths, limitations, and potential for hybrid advancements to inform future methodological developments. The study used secondary data for the justifications of the framed objectives. The study has identified five major techniques which are used for detection cascade behaviour in social networks, they include; feature-based models, deep learning architectures, real- time diffusion analysis, point process-based approaches, and hybrid methods, each offering distinct advantages in capturing structural, temporal, and content-driven aspects of cascade propagation. Nevertheless, the evolution toward deep learning integrations, such as Hawkes process-based networks and graph representation learning, promises enhanced handling of temporal dynamics and cascade uncertainties, fostering more precise predictions of information popularity than other models. The author has revealed that there is a need to prioritize scalable hybrid architectures that incorporate continuous-time dynamic graph neural networks to enhance real-time cascade detection while preserving interpretability. Furthermore, the results confirm that there is a need for multi-task learning frameworks that jointly optimize cascade prediction, user influence estimation, and content virality assessment to bolster robustness against evolving disinformation dynamics on social media platforms.
Table-1: Shows the comparison of techniques used for detection of cascade behaviour in social networks
|
Technique Category |
Description & Mechanisms |
Strengths |
Weaknesses |
|
Feature Based Methods |
Extract specific, hand-crafted features (structural, temporal, user, content, network topology [2], [3], [30], [31]) which are then fed into conventional machine learning models (e.g., regression, SVM) to perform tasks such as popularity prediction [32]. |
Enables popularity prediction [32]. |
Relies heavily on domain expertise for feature engineering, restricting generalizability [3], [8], [30]; uses static feature representations, struggling to capture dynamic cascade nature [3], [8], [30]. |
|
Deep Learning Methods |
Employs deep neural networks, especially Graph Neural Networks [35], [36], [37], to learn latent representations from social graphs, integrating node attributes and complex structural features to capture structural and sequential propagation aspects [16], [38], [39], [40]. Includes RNNs and topological recurrent neural networks for dynamic graphs [8], [41]. |
Reduces the need for extensive feature engineering [33], [34]; effectively leverages and learns fom graph structural information [35], [36], [37]; captures both structural and sequential aspects of propagation paths [16], [38], [39], [40]; enables learning of latent representations and integrates diverse data modalities in an end-to-end fashion for cascade prediction [33], [42]. |
Often models cascades from a singular perspective, overlooking complementary information between modalities [19]; fails to capture topological structure features and dynamic changes of information diffusion [40]; struggles with imbalanced cascade distribution and cascade graph dynamics [39]; lacks supervision for future information prediction, leading to suboptimal performance [19]; suffers from black-box interpretability issues [8]; higher computational cost compared to feature-based and generative models [8]; prone to issues with model tuning, hyper-parameter selection, and overfitting [8]. |
|
Real-time Diffusion Analysis Methods |
Utilizes continuous-time diffusion models or stream data mining techniques to detect and track cascade behavior as it unfolds within social media streams, analyzing temporal irregularities and dynamic states of users and cascades [2], [43], [44], [45], [46]. Aims for early detection of significant events or emerging trends [44]. |
Specifically engineered to handle high- velocity data streams, offering immediate insights into cascade evolution [43], [47], [48], [49], [50], [51], [52]; crucial forapplications demanding rapid responses like real-time event detection and viral content monitoring [43], [47], [48], [49], [50], [51], [52]. |
Processing vast, noisy, unstructured, dynamic, and heterogeneous social data is challenging, leading to methods that are often slow, expensive, and rely on sample sizes with biases [64]; real data reveals phenomena that pose significant challenges to modeling [65]; real-world diffusion data is complex, potentially incomplete, and lacks ground truth, exacerbating analysis challenges [66]. |
|
Point Process-based Methods |
Models discrete, inter-dependent events over continuous time using point processes, primarily Hawkes processes [53], [54], [55]. These self- exciting processes capture how past events increase the likelihood of future ones [56], [57]. |
Highly suitable for understanding information cascades [53], [54], [55]; effectively captures the rich get richer phenomenon [54]; predicts final cascade size, estimates social influence parameters, and infers user activation probability [31], [58], [59]; accurately models temporal burstiness and intricate interdependencies of events [59]; provides interpretable models of |
Often use simple intensity functions and make strong assumptions about diffusion mechanisms [68]; struggle to capture irregular time intervals and event order from discrete- time domains [68]; cannot fully exploit DAG diffusion processes or long-term dependencies due to recurrent model limitations [68]; |
|
underlying diffusion mechanisms [67]. |
may not intrinsically capture trends of short-term outbreaks leading to popularity, and RNN- based models can suffer from error accumulation with large cascades [68]; generative models are often not trained for prediction, leading to suboptimal performance in that regard [67]. |
||
|
Hybrid Methods |
Combines components from various modeling paradigms to leverage individual strengths and address respective limitations for more robust and accurate cascade detection and prediction. Integrates elements like traditional ML classifiers with ensemble techniques [61] or point process generative models with deep learning architectures [62], [63]. |
Aims for more robust and accurate cascade detection and prediction by harnessing individual strengths and addressing limitations [61], [62], [63]; enhances anomaly detection in social networks [61]; integrates diverse features with sophisticated temporal modeling capabilities [62], [63]; facilitates a more comprehensive understanding of the cascading process by simultaneously considering structural, temporal, and content-based information [19]; can improve predictive performance by fusing distinct information sources [19]. |
While designed to address limitations of individual components, the provided text does not explicitly state inherent weaknesses of hybrid methods with citations. |
REFERENCES
-
N. Barbieri, F. Bonchi, and G. Manco, Cascade-based community detection, p. 33, Feb. 2013, doi: 10.1145/2433396.2433403.
-
P. Pandey, V. Shukla, R. Miri, P. Chouksey, D. Agrawal, and A. K. Raja, Unveiling the Dynamics of User Engagement through Cascade Detection in Social Networks. Feb. 2025.
-
H. Zhu, S. Yuan, X. Liu, K. Chen, C. Jia, and Y. Qian, CasCIFF: A Cross-Domain Information Fusion Framework Tailored for Cascade Prediction in Social Networks, Knowledge-Based Systems , vol. 303, p. 112391, Aug. 2024, doi: 10.1016/j.knosys.2024.112391.
-
J. L. Juul and J. Ugander, Comparing information diffusion mechanisms by matching on cascade size, Proceedings of the National Academy of Sciences , vol. 118, no. 46, Nov. 2021, doi: 10.1073/pnas.2100786118.
-
Y. Wang, X. Wang, Y. Ran, R. Michalski, and T. Jia, Casseqgcn: Combining Network Structure and Temporal Sequence to Predict Information Cascades,
SSRN Electronic Journal , Jan. 2022, doi: 10.2139/ssrn.4055231.
-
C. Zang, P. Cui, C. Song, C. Faloutsos, and W. Zhu, Structural patterns of information cascades and their implications for dynamics and semantics, arXiv (Cornell University) , Mar. 2022, doi: 10.48550/arxiv.1708.02377.
-
R. Kobayashi and R. Lambiotte, TiDeH: Time-Dependent Hawkes Process for Predicting Retweet Dynamics, Proceedings of the International AAAI Conference on Web and Social Media , vol. 10, no. 1, p. 191, Aug. 2021, doi: 10.1609/icwsm.v10i1.14717.
-
F. Zhou, X. Xu, G. Trajcevski, and K. Zhang, A Survey of Information Cascade Analysis: Models, Predictions, and Recent Advances, arXiv (Cornell University) , vol. 54, no. 2. Cornell University, p. 1, Mar. 05, 2021. Accessed: Oct. 2025. [Online]. Available: http://arxiv.org/abs/2005.11041
-
Y. Zhang, L. Wang, J. J. H. Zhu, and X. Wang, Viral vs. broadcast: Characterizing the virality and growth of cascades, EPL (Europhysics Letters) , vol. 131, no. 2, p. 28002, Aug. 2020, doi: 10.1209/0295-5075/131/28002.
-
S. Rathje and J. J. V. Bavel, The psychology of virality, Trends in Cognitive Sciences , vol. 29, no. 10. Elsevier BV, p. 914, Jul. 16, 2025. doi: 10.1016/j.tics.2025.06.014.
-
N. Pröllochs and S. Feuerriegel, Mechanisms of True and False Rumor Sharing in Social Media: Wisdom-of-Crowds or Herd Behavior?, arXiv (Cornell University) , Jul. 2022, Accessed: Oct. 2025. [Online]. Available: http://arxiv.org/abs/2207.03020
-
N. Pröllochs, D. Bär, and S. Feuerriegel, Emotions in online rumor diffusion, EPJ Data Science , vol. 10, no. 1, Oct. 2021, doi: 10.1140/epjds/s13688-021- 00307-5.
-
J. Cheng et al. , Do Diffusion Protocols Govern Cascade Growth?, Proceedings of the International AAAI Conference on Web and Social Media , vol. 12, no. 1, Jun. 2018, doi: 10.1609/icwsm.v12i1.15023.
-
J. Xie, F. Meng, J. Sun, X. Ma, G. Yan, and Y. Hu, Detecting and modelling real percolation and phase transitions of information on social media, arXiv (Cornell University) , Feb. 2022, do: 10.48550/arxiv.2103.02804.
-
M. Ramezani, H. Goli, A. Izad, and H. R. Rabiee, Detecting Viral Social Events through Censored Observation with Deep Survival Analysis, arXiv (Cornell University) , Oct. 2024, doi: 10.48550/arxiv.2410.01320.
-
N. Chen, Z. Zhong, and J. Pang, From #Jobsearch to #Mask: Improving COVID-19 Cascade Prediction with Spillover Effects, arXiv (Cornell University) , Feb. 2022, doi: 10.48550/arxiv.2012.07088.
-
M. Starnini et al. , Opinion dynamics: Statistical physics and beyond, arXiv (Cornell University) , Jul. 2025, doi: 10.48550/arxiv.2507.11521.
-
R. Burkholz and J. Quackenbush, Cascade Size Distributions: Why They Matter and How to Compute Them Efficiently, in Proceedings of the AAAI Conference on Artificial Intelligence , Association for the Advancement of Artificial Intelligence, May 2021, p. 6840. doi: 10.1609/aaai.v35i8.16844.
-
F. Zhang, J. Liu, Q. Zhang, X. Zhu, and Z.-J. Zha, Hierarchical Information Enhancement Network for Cascade Prediction in Social Networks, arXiv (Cornell University) , Mar. 2024, doi: 10.48550/arxiv.2403.15257.
-
B. D. Ravichandran and P. Keikhosrokiani, Classification of Covid-19 misinformation on social media based on neuro-fuzzy and neural network: A systematic review, Neural Computing and Applications , vol. 35, no. 1. Springer Science+Business Media, p. 699, Sep. 20, 2022. doi: 10.1007/s00521-022- 07797-y.
-
N. A. Alkathiri and K. Slhoub, Challenges in machine learning-based social bot detection: a systematic review, Discover Artificial Intelligence , vol. 5, no.
-
Springer Nature, Aug. 18, 2025. doi: 10.1007/s44163-025-00448-w.
-
-
C. Doogan, W. Buntine, and H. Linger, A systematic review of the use of topic models for short text social media analysis, Artificial Intelligence Review , vol. 56, no. 12. Springer Science+Business Media, p. 14223, May 01, 2023. doi: 10.1007/s10462-023-10471-x.
-
Z. Duzen, M. Riveni, and M. S. Akta, Analyzing the Spread of Misinformation on Social Networks: A Process and Software Architecture for Detection and Analysis, Computers , vol. 12, no. 11, p. 232, Nov. 2023, doi: 10.3390/computers12110232.
-
D. Camacho, Á. Panizo-LLedot, G. Bello-Orgaz, A. González-Pardo, and E. Cambria, The Four Dimensions of Social Network Analysis: An Overview of Research\n Methods, Applications, and Software Tools, arXiv (Cornell University) , Feb. 2020, doi: 10.48550/arxiv.2002.09485.
-
P. Cui and Y. Dong, Mapping the Intellectual Structure of Social Network Research: A Comparative Bibliometric Analysis, arXiv (Cornell University) , Feb. 2025, doi: 10.48550/arxiv.2502.07412.
-
P.-S. Greau-Hamard, M. DjokoKouam, and Y. Louët, Performance Analysis and Comparison of Sequence Identification Algorithms in IoT Context, HAL (Le Centre pour la Communication Scientifique Directe) , Feb. 2021, Accessed: Oct. 2025. [Online]. Available: https://hal.science/hal-03537524
-
M. Tantardini, F. Ieva, L. Tajoli, and C. Piccardi, Comparing methods for comparing networks, Scientific Reports , vol. 9, no. 1, p. 17557, Nov. 2019, doi: 10.1038/s41598-019-53708-y.
-
C. Rashmi and M. M. Kodabagi, Connecting User Profiles Of Social Networks Using Proximity-Based Clustering, Malaysian Journal of Computer Science , p. 1, Dec. 2022, doi: 10.22452/mjcs.sp2022no2.1.
-
Y. Zhang, J. Luo, X. Gao, and G. Chen, Which is better? A Modularized Evaluation for Topic Popularity Prediction, arXiv (Cornell University) , Mar. 2022, doi: 10.48550/arxiv.1710.05526.
-
X. Jing, Y. Jing, Y. Lu, B. Deng, S. Yang, and D. Yang, On Your Mark, Get Set, Predict! Modeling Continuous-Time Dynamics of Cascades for Information Popularity Prediction, arXiv (Cornell University) , Sep. 2024, doi: 10.48550/arxiv.2409.16623.
-
Y. Zhao and C. Zhong, Cascade Prediction With Self-Exciting Point Process and Local User Influence Measurement, Frontiers in Physics , vol. 10, Jul. 2022, doi: 10.3389/fphy.2022.951729.
-
Q. Li, Z. Wu, L. Yi, K. S. N, H. Qu, and X. Ma, WeSeer: Visual Analysis for Better Information Cascade Prediction of WeChat Articles, arXiv (Cornell University) , Mar. 2022, doi: 10.48550/arxiv.1808.09068.
-
C. Li, X. Guo, and Q. Mei, Joint Modeling of Text and Networks for Cascade Prediction, Proceedings of the International AAAI Conference on Web and Social Media , vol. 12, no. 1, Jun. 2018, doi: 10.1609/icwsm.v12i1.15044.
-
Z. Wang, X. Wang, F. Xiong, and H. Chen, A Survey of Deep Learning-Based Information Cascade Prediction, Symmetry , vol. 16, no. 11, p. 1436, Oct. 2024, doi: 10.3390/sym16111436.
-
A. Han, D. Shi, L. Lin, and J. Gao, From Continuous Dynamics to Graph Neural Networks: Neural Diffusion and Beyond, arXiv (Cornell University) , Oct. 2023, doi: 10.48550/arxiv.2310.10121.
-
A. Gravina, Information propagation dynamics in Deep Graph Networks, arXiv (Cornell University) , Oct. 2024, doi: 10.48550/arxiv.2410.10464.
-
A. Hevapathige, Q. Wang, and A. N. Zehmakan, DeepSN: A Sheaf Neural Framework for Influence Maximization, arXiv (Cornell University) , Dec. 2024, doi: 10.48550/arxiv.2412.12416.
-
Y. Wang, X. Wang, and T. Jia, CCasGNN: Collaborative Cascade Prediction Based on Graph Neural Networks, in 2022 IEEE 25th International Conference on Computer Supported Cooperative Work in Design (CSCWD) , May 2022, p. 810. doi: 10.1109/cscwd54268.2022.9776274.
-
N. Chen, X. Chen, Z. Zhong, and J. Pang, A tale of two roles: exploring topic-specific susceptibility and influence in cascade prediction, Data Mining and Knowledge Discovery , Aug. 2023, doi: 10.1007/s10618-023-00953-5.
-
X. Chen, F. Zhang, F. Zhou, and M. Bonsangue, Multiscale graph capsule with influence attention for information cascades prediction, International Journal of Intelligent Systems , vol. 37, no. 3, p. 2584, Dec. 2021, doi: 10.1002/int.22786.
-
J. Wang, V. W. Zheng, Z. Liu, and K. C. Chang, Topological Recurrent Neural Network for Diffusion Prediction, in 2021 IEEE International Conference on Data Mining (ICDM) , Nov. 2017, p. 475. doi: 10.1109/icdm.2017.57.
-
S. Molaei, H. Zare, and H. Veisi, Deep learning approach on information diffusion in heterogeneous networks, Knowledge-Based Systems , vol. 189, p. 105153, Oct. 2019, doi: 10.1016/j.knosys.2019.105153.
-
M. Raviteja, V. V. V. K. Reddy, S. Aqibuddin, and H. S. N. Nerusu, Real-Time Event Detection in Social Media Streams using Stream Data Mining,
International Journal for Research in Applied Science and Engineering Technology , vol. 11, no. 8, p. 1676, Aug. 2023, doi: 10.22214/ijraset.2023.55328.
-
K. Dey, S. Kaushik, and L. V. Subramaniam, Literature Survey on Interplay of Topics, Information Diffusion and Connections on Social Networks, arXiv (Cornell University) , Mar. 2022, doi: 10.48550/arxiv.1706.00921.
-
X. Lü, S. Ji, L. Yu, L. Sun, B. Du, and T. Zhu, Continuous-Time Graph Learning for Cascade Popularity Prediction, p. 2224, Aug. 2023, doi: 10.24963/icai.2023/247.
-
K. Huang, R. Gao, B. Cautis, and X. Xiao, Scalable Continuous-time Diffusion Framework for Network Inference and Influence Estimation, arXiv (Cornell University) , Mar. 2024, doi: 10.48550/arxiv.2403.02867.
-
X. Tang, D. Liao, W. Huang, J. Xu, L. Zhu, and M. Shen, Fully Exploiting Cascade Graphs for Real-time Forwarding Prediction, in Proceedings of the AAAI Conference on Artificial Intelligence , Association for the Advancement of Artificial Intelligence, May 2021, p. 582. doi: 10.1609/aaai.v35i1.16137.
-
Y. Wang, Q. Fan, Y. Li, and K. Tan, Real-time influence maximization on dynamic social streams, Proceedings of the VLDB Endowment , vol. 10, no. 7,
p. 805, Mar. 2017, doi: 10.14778/3067421.3067429.
-
I. Taxidou and P. M. Fischer, Online analysis of information diffusion in twitter, Apr. 2014, doi: 10.1145/2567948.2580050.
-
A. Angel, N. Sarkas, N. Koudas, and D. Srivastava, Dense subgraph maintenance under streaming edge weight updates for real-time story identification,
Proceedings of the VLDB Endowment , vol. 5, no. 6, p. 574, Feb. 2012, doi: 10.14778/2168651.2168658.
-
W. Xie, F. Zhu, J. Xiao, and J. Wang, Social Network Monitoring for Bursty Cascade Detection, ACM Transactions on Knowledge Discovery from Data , vol. 12, no. 4, p. 1, Apr. 2018, doi: 10.1145/3178048.
-
M. Fedoryszak, B. Frederick, V. Rajaram, and C. Zhong, Real-time Event Detection on Social Data Streams, p. 2774, Jul. 2019, doi: 10.1145/3292500.3330689.
-
J. Malaviya, Survey on Modeling Intensity Function of Hawkes Process Using Neural Models, arXiv (Cornell University) , Feb. 2022, doi: 10.48550/arxiv.2104.11092.
-
Q. Zhao, M. A. Erdogdu, H. Y. He, A. Rajaraman, and J. Leskovec, SEISMIC, Aug. 2015, doi: 10.1145/2783258.2783401.
-
M.-A. Rizoiu, Y. Lee, S. Mishra, and L. Xie, A Tutorial on Hawkes Processes for Events in Social Media, arXiv (Cornell University) , Aug. 2017, doi: 10.48550/arxiv.1708.06401.
-
R. Zhang, C. Walder, M.-A. Rizoiu, and L. Xie, Efficient Non-parametric Bayesian Hawkes Processes, p. 4299, Jul. 2019, doi: 10.24963/ijcai.2019/597.
-
M.-A. Rizoiu, Y. Lee, S. Mishra, and L. Xie, Hawkes processes for events in social media, 2017, p. 191. doi: 10.1145/3122865.3122874.
-
Q. Zhao, M. A. Erdogdu, H. Y. He, A. Rajaraman, and J. Leskovec, SEISMIC: A Self-Exciting Point Process Model for Predicting Tweet Popularity,
arXiv , 2015, doi: 10.48550/ARXIV.1506.02594.
-
S. Bedathur, I. Bhattacharya, J. Choudhari, and A. Dasgupta, Discovering Topical Interactions in Text-based Cascades using Hidden\n Markov Hawkes Processes, arXiv (Cornell University) , Sep. 2018, doi: 10.48550/arxiv.1809.04487.
-
O. Maya, I. Tomoharu, T. Yusuke, T. Hiroyuki, K. Takeshi, and K. Hisashi, Dynamic Hawkes Processes for Discovering Time-evolving Communities States behind Diffusion Processes, p. 1276, Aug. 2021, doi: 10.1145/3447548.3467248.
-
Md. S. Rahman, S. Halder, Md. A. Uddin, and U. K. Acharjee, An efficient hybrid system for anomaly detection in social networks, Cybersecurity , vol. 4, no. 1, Mar. 2021, doi: 10.1186/s42400-021-00074-w.
-
S. Dutta, S. Mittal, D. Das, S. Chakrabarti, and T. Chakraborty, Incomplete Gamma Integrals for Deep Cascade Prediction using Content, Network, and Exogenous Signals, arXiv (Cornell University) , Feb. 2022, doi: 10.48550/arxiv.2106.07012.
-
S. Dutta, S. Mittal, D. Das, S. Chakrabarti, and T. Chakraborty, Incomplete Gamma Integrals for Deep Cascade Prediction using Content, Network, and Exogenous Signals, IEEE Transactions on Knowledge and Data Engineering , vol. 35, no. 6, p. 5991, Aug. 2022, doi: 10.1109/tkde.2022.3174206.
-
V. Dragos, Semantic Frameworks to Enhance Situation Awareness for Defence and Security Applications, HAL (Le Centre pour la Communication Scientifique Directe) , Jun. 2021, Accessed: Sep. 2025. [Online]. Available: https://hal.archives-ouvertes.fr/tel-03347626
-
A. Iamnitchi, L. Hall, S. Horawalavithana, F. Mubang, K. W. Ng, and J. Skvoretz, Modeling information diffusion in social media: data-driven observations, Frontiers in Big Data , vol. 6, May 2023, doi: 10.3389/fdata.2023.1135191.
-
M. DeVerna, F. Pierri, R. Aiyappa, D. Pacheco, J. Bryden, and F. Menczer, Information diffusion assumptions can distort our understanding of social network dynamics, arXiv (Cornell University) , Oct. 2024, doi: 10.48550/arxiv.2410.21554.
-
A. Aravamudan, X. Zhang, and G. C. Anagnostopoulos, Anytime User Engagement Prediction in Information Cascades for Arbitrary Observation Periods, in Proceedings of the AAAI Conference on Artificial Intelligence , Association for the Advancement of Artificial Intelligence, Jun. 2023, p. 4999. doi: 10.1609/aaai.v37i4.25627.
-
Y. Liu, X. Xu, T. Zhong, G. Trajcevski, and F. Zhou, Linking Transformer to Hawkes Process for Information Cascade Prediction (Student Abstract), in Proceedings of the AAAI Conference on Artificial Intelligence , Association for the Advancement of Artificial Intelligence, Jun. 2022, p. 13103. doi: 10.1609/aaai.v36i11.21688.
-
H. Li, C. Xia, T. Wang, S. Wen, C. Chen, and Y. Xiang, Capturing Dynamics of Information Diffusion in SNS: A Survey of Methodology and Techniques,
ACM Computing Surveys , vol. 55, no. 1. Association for Computing Machinery, p. 1, Nov. 23, 2021. doi: 10.1145/3485273.
-
Y. Liu, Y. Liu, and L. Zhao, Enhancing Social Media Rumor Detection: A Semantic and Graph Neural Network Approach for the 2024 Global Election,
arXiv (Cornell University) , Mar. 2025, doi: 10.48550/arxiv.2503.01394.
-
Y. Zheng, C. Gong, R. Sun, J. Zhang, L. Pan, and L. Lv, AutoCas: Autoregressive Cascade Predictor in Social Networks via Large Language Models,
arXiv (Cornell University) , Feb. 2025, doi: 10.48550/arxiv.2502.18040.
