{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T19:38:08Z","timestamp":1775072288248,"version":"3.50.1"},"reference-count":31,"publisher":"MDPI AG","issue":"6","license":[{"start":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T00:00:00Z","timestamp":1559001600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>Online Social Networks (OSNs) have found widespread applications in every area of our life. A large number of people have signed up to OSN for different purposes, including to meet old friends, to choose a given company, to identify expert users about a given topic, producing a large number of social connections. These aspects have led to the birth of a new generation of OSNs, called Multimedia Social Networks (MSNs), in which user-generated content plays a key role to enable interactions among users. In this work, we propose a novel expert-finding technique exploiting a hypergraph-based data model for MSNs. In particular, some user-ranking measures, obtained considering only particular useful hyperpaths, have been profitably used to evaluate the related expertness degree with respect to a given social topic. Several experiments on Last.FM have been performed to evaluate the proposed approach\u2019s effectiveness, encouraging future work in this direction for supporting several applications such as multimedia recommendation, influence analysis, and so on.<\/jats:p>","DOI":"10.3390\/info10060183","type":"journal-article","created":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T11:18:09Z","timestamp":1559042289000},"page":"183","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["A Hypergraph Data Model for Expert-Finding in Multimedia Social Networks"],"prefix":"10.3390","volume":"10","author":[{"given":"Flora","family":"Amato","sequence":"first","affiliation":[{"name":"Information Technology and Electrical Engineering Department (DIETI), University of Naples \u201cFederico\u201d via Claudio 21, 80125 Naples, Italy"}]},{"given":"Giovanni","family":"Cozzolino","sequence":"additional","affiliation":[{"name":"Information Technology and Electrical Engineering Department (DIETI), University of Naples \u201cFederico\u201d via Claudio 21, 80125 Naples, Italy"}]},{"given":"Giancarlo","family":"Sperl\u00ec","sequence":"additional","affiliation":[{"name":"Information Technology and Electrical Engineering Department (DIETI), University of Naples \u201cFederico\u201d via Claudio 21, 80125 Naples, Italy"},{"name":"CINI - ITEM National Lab - via Cinzia, Complesso Universitario Montesantangelo, 80125 Napoli, Italy"}]}],"member":"1968","published-online":{"date-parts":[[2019,5,28]]},"reference":[{"key":"ref_1","unstructured":"Hootsuite (2019, February 28). Digital in 2018: Q3 Global Digital Statshot. Available online: https:\/\/datareportal.com\/reports\/digital-2018-q3-global-digital-statshot."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Schneider, F., Feldmann, A., Krishnamurthy, B., and Willinger, W. (2009, January 4\u20136). Understanding Online Social Network Usage from a Network Perspective. Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement Conference, Chicago, IL, USA.","DOI":"10.1145\/1644893.1644899"},{"key":"ref_3","unstructured":"Dwyer, C., Hiltz, S., and Passerini, K. (2007, January 9\u201312). Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace. Proceedings of the Thirteenth Americas Conference on Information Systems, Keystone, CO, USA."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/s12599-011-0151-y","article-title":"Internet Social Networking - Research State of the Art and Implications for Enterprise 2.0","volume":"3","author":"Richter","year":"2011","journal-title":"Bus. Inf. Syst. Eng."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Amato, F., Moscato, V., Picariello, A., and Sperl\u00ed, G. (2016, January 3\u20135). Multimedia social network modeling: A proposal. Proceedings of the 2016 IEEE Tenth International Conference on Semantic Computing (ICSC), Laguna Hills, CA, USA.","DOI":"10.1109\/ICSC.2016.20"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Amato, F., Moscato, V., Picariello, A., and Sperl\u00ed, G. (August, January 31). Diffusion algorithms in multimedia social networks: A preliminary model. Proceedings of the 2017 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining, Sydney, Australia.","DOI":"10.1145\/3110025.3116207"},{"key":"ref_7","unstructured":"(2019, April 29). INFLUENCE MILLENNIAL GIVING THROUGH SOCIAL MEDIA. Available online: https:\/\/www.timothygroup.com\/influence-millennial-giving-through-social-media\/."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1109\/MCOM.2013.6588663","article-title":"Understanding user behavior in online social networks: A survey","volume":"51","author":"Jin","year":"2013","journal-title":"Commun. Mag."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Kammenhuber, N., Luxenburger, J., Feldmann, A., and Weikum, G. (2006, January 25\u201327). Web Search Clickstreams. Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, Rio de Janeriro, Brazil.","DOI":"10.1145\/1177080.1177110"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ins.2011.12.009","article-title":"Characterizing user navigation and interactions in online social networks","volume":"195","author":"Benevenuto","year":"2012","journal-title":"Inf. Sci."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Albanese, M., Erbacher, R.F., Jajodia, S., Molinaro, C., Persia, F., Picariello, A., Sperl\u00ec, G., and Subrahmanian, V. (2014). Recognizing unexplained behavior in network traffic. Network Science and Cybersecurity, Springer.","DOI":"10.1007\/978-1-4614-7597-2_3"},{"key":"ref_12","unstructured":"Egele, M., Stringhini, G., Kruegel, C., and Vigna, G. (2013, January 24\u201327). COMPA: Detecting Compromised Accounts on Social Networks. Proceedings of the 20th Annual Network & Distributed System Security Symposium (NDSS), San Diego, CA, USA."},{"key":"ref_13","unstructured":"Tan, E., Guo, L., Chen, S., Zhang, X., and Zhao, Y. (2018, January 22\u201326). UNIK: Unsupervised Social Network Spam Detection. Proceedings of the 22nd ACM International Conference on Conference on Information and Knowledge Management, Turin, Italy."},{"key":"ref_14","unstructured":"Wang, G., Konolige, T., Wilson, C., Wang, X., Zheng, H., and Zhao, B.Y. (2013, January 14\u201316). You are how you click: Clickstream analysis for Sybil detection. Proceedings of the 22nd USENIX Conference on Security (SEC), Washington, DC, USA."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1007\/978-3-642-31284-7_27","article-title":"Detecting Social Spam Campaigns on Twitter","volume":"Volume 7341","author":"Bao","year":"2012","journal-title":"Applied Cryptography and Network Security"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Akoglu, L., and Faloutsos, C. (2013, January 4\u20138). Anomaly, Event, and Fraud Detection in Large Network Datasets. Proceedings of the Sixth ACM International Conference on Web Search and Data Mining (WSDM \u201913), Melbourne, Australia.","DOI":"10.1145\/2433396.2433496"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Nayak, J., Naik, B., and Behera, H. (2015). Fuzzy C-means (FCM) clustering algorithm: A decade review from 2000 to 2014. Computational Intelligence in Data Mining-Volume 2, Springer.","DOI":"10.1007\/978-81-322-2208-8_14"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11042-017-5503-2","article-title":"GraphDBLP: A system for analysing networks of computer scientists through graph databases","volume":"77","author":"Mezzanzanica","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"989","DOI":"10.1007\/s11135-011-9578-y","article-title":"Classification of longitudinal career paths","volume":"47","author":"Lovaglio","year":"2013","journal-title":"Qual. Quant."},{"key":"ref_20","unstructured":"Mezzanzanica, M., Boselli, R., Cesarini, M., and Mercorio, F. (2012, January 25\u201327). Data quality sensitivity analysis on aggregate indicators. Proceedings of the International Conference on Data Technologies and Applications (DATA 2012), Rome, Italy."},{"key":"ref_21","unstructured":"Viswanath, B., Bashir, M.A., Crovella, M., Guha, S., Gummadi, K.P., Krishnamurthy, B., and Mislove, A. (2014, January 20\u201322). Towards Detecting Anomalous User Behavior in Online Social Networks. Proceedings of the 23rd USENIX Security Symposium (USENIX Security 14), San Diego, CA, USA."},{"key":"ref_22","unstructured":"Ye, N. (2000, January 6\u20137). A Markov Chain Model of Temporal Behavior for Anomaly Detection. Proceedings of the 2000 IEEE Workshop on Information Assurance and Security, West Point, NY, USA."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1007\/s11416-011-0152-x","article-title":"Graph-based malware detection using dynamic analysis","volume":"7","author":"Anderson","year":"2011","journal-title":"J. Comput. Virol."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1109\/TKDE.2013.33","article-title":"Discovering the Top-k Unexplained Sequences in Time-Stamped Observation Data","volume":"26","author":"Albanese","year":"2014","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Amato, F., Moscato, V., Picariello, A., and Sperl\u00ed, G. (February, January 30). Kira: A system for knowledge-based access to multimedia art collections. Proceedings of the 2017 IEEE 11th International Conference on Semantic Computing (ICSC), Diego, CA, USA.","DOI":"10.1109\/ICSC.2017.59"},{"key":"ref_26","unstructured":"Albanese, M., Moscato, V., Picariello, A., Subrahmanian, V.S., and Udrea, O. (2007, January 6\u201312). Detecting Stochastically Scheduled Activities in Video. Proceedings of the 2007 International Joint Conference on Artificial Intelligence (IJCAI), Hyderabad, India."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Albanese, M., Molinaro, C., Persia, F., Picariello, A., and Subrahmanian, V.S. (2011, January 16\u201322). Finding Unexplained Activities in Video. Proceedings of the 2011 International Joint Conference on Artificial Intelligence (IJCAI), Barcelona, Spain.","DOI":"10.21236\/ADA587505"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"982","DOI":"10.1109\/TMM.2008.2001369","article-title":"A constrained probabilistic petri net framework for human activity detection in video","volume":"10","author":"Albanese","year":"2008","journal-title":"IEEE Trans. Multimed."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"818","DOI":"10.1016\/j.jvlc.2014.11.001","article-title":"Terminological ontology learning and population using latent dirichlet allocation","volume":"25","author":"Colace","year":"2014","journal-title":"J. Vis. Lang. Comput."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/s10844-007-0040-5","article-title":"Context-sensitive queries for image retrieval in digital libraries","volume":"31","author":"Boccignone","year":"2008","journal-title":"J. Intell. Inf. Syst."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"796","DOI":"10.1109\/TMM.2014.2298216","article-title":"Topic-sensitive influencer mining in interest-based social media networks via hypergraph learning","volume":"16","author":"Fang","year":"2014","journal-title":"IEEE Trans. Multimed."}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/10\/6\/183\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T12:54:00Z","timestamp":1760187240000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/10\/6\/183"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,28]]},"references-count":31,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2019,6]]}},"alternative-id":["info10060183"],"URL":"https:\/\/doi.org\/10.3390\/info10060183","relation":{},"ISSN":["2078-2489"],"issn-type":[{"value":"2078-2489","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,5,28]]}}}