1. Introduction
Social network analysis focuses on connections between individuals and has been a popular topic in the contemporary era. The main theme of this paper is the innovative ways of analyzing social networks, and for the sake of simplicity and practicality, the network will be abstracted as a graph, in which nodes and the relationships between individuals are represented by edges connecting nodes. This will enable researchers to use graph representation learning methods to have a closer insight into the graph, particularly the nodes, in terms of the low-dimensional representation vectors [1].
Dynamism has always been a key feature of social networks. The relationships between individuals vary over time as new connections form while some old connections dissolve. Traditional approaches to analyzing social networks involve static embedding methods, in which nodes are mapped into low-dimensional vectors to preserve their structural features. A typical example is Multi-Path Relationship Preserved Social Network Embedding (MPR-SNE). MPR-SNE employs a random walk to uncover multiple social relationship paths between individuals, and the sequences discovered are then used to establish a multi-path relationship between nodes [2]. However, it is also conspicuous that such static embedding approaches could not manage to capture temporal dynamics, which leads to a considerable amount of path degradation.
This paper will focus on the multi-path degradation issue in the dynamic social network embedding and will conduct a comprehensive investigation on approaches to preserve network structures that consist of multi-path relationships under topologies that vary continuously, unpredictably, and sometimes drastically. The edges may change frequently, resulting in rapid walk-based paths obsolescence [2]. Therefore, one of the major objectives is to conduct research on models and algorithms that can update paths in real-time as the edges evolve. This may include an extension of the Erdős–Rényi ML estimation, in which only walks for nodes that are affected by the incidents will be updated.
There is no doubt that dynamic path freshness plays a pivotal role in social network embedding. This paper systematically reviews some limitations of static path methods, as well as more advanced approaches to dynamic social network embedding, followed by a comparison between different algorithms. This paper also offers some critical views regarding how dynamic social network embedding excels in network analysis, as well as some limitations that it may have. Unlike prior surveys, this work systematically compares algorithms not only in terms of path preservation abilities but also in terms of adaptability to heterogeneous structures, overlapping clusters, and other more complicated scenarios.
2. Literature review
2.1. Early research regarding social network embedding
Social network embedding has been constantly scrutinized in recent years, and the following are some of the relatively early research studies conducted on this topic.
Dynamic network embedding offers several significant advantages over static network embedding [3]. This includes the ability to capture temporal information in time which will enhance the accuracy and preciseness of network analysis, the increase in efficiency of updating representation through simply applying a static model from scratch at each time step, and the ability to update representation in a fine-grained granularity of time by representing network as a series of snapshots or new node/edge with timestamp [3]. The Local-First mechanism can handle the issue of overlapping clustering through many innovative approaches, such as local perturbation [4].
2.2. State-of-the-art investigation of dynamic path preservation in embedding
Over the past approximately three years, dynamic path preservation technology has developed at a rapid rate, and the following reviews contain some typical newly developed algorithms for path and relationship preservation.
The cross-social network User Identity Linkage (UIL) has several significant limitations. Still, the cross-social network UIL framework via dynamic embedding and clustering model driven by three-way decision (DECTUIL) is an ideal way of addressing the drawbacks of UIL in terms of extracting and classifying network users’ features in a dynamic way and in terms of mitigating the shortcomings of heterogeneity and pre-aligned resources scarcity [5]. DECTUIL includes the Dynamic Embedding Algorithm (reduces the negative implications of heterogeneity through selecting embedding functions dynamically), the Vector Smoothing Algorithm (leverages neighborhood information to avoid disruption of inconsistent information in different platforms), and Three-Way Decision Driving Clustering (iteratively refines K-Means Clustering through a three-way decision, which will significantly increase the precision of clustering) [5]. High-order memory-guided temporal random walk for dynamic heterogeneous network embedding (HoMo-DYHNE) is an effective algorithm for conducting network embedding [6]. It could avoid the dependency of manually designed high-order structures and, in the meantime, capture networks’ heterogeneous semantics [6].
2.3. Other algorithms to handle real-world issues
Apart from the algorithms above, these are some other algorithms related to social networks and dynamic embedding that could be used to handle an extensive range of social problems.
Algorithms like the Co-evolutionary memetic algorithm (COMA) can effectively identify key influential nodes [7]. The algorithm is constructed such that two types of population evolution, namely diversity direction evolution and influence fitness guided evolution, evolve in two different directions and compete in the selection of individuals based on two different strategies and goals [7]. One of the most striking advantages of this algorithm is that the premature convergence issue will not be an obstacle. Furthermore, the K-Anonymity algorithm can anonymize the graph through an artificial neural network and a support vector machine [8]. It ensures that each record must be identical to at least k-1 other records, which makes sure that all individuals are indistinguishable.
3. Methodology
3.1. Literature search strategy
A keyword-based systematic literature review on dynamic path preservation in social network embedding is conducted. Table 1 illustrates the three major literature retrieval websites across which the research was conducted and the respective search queries.
Website |
Search Query |
URL |
IEEE Xplore |
Dynamic and static path |
Retrieved from https://ieeexplore.ieee.org/Xplore/home.jsp |
ScienceDirect |
Dynamic embedding |
Retrieved from https://www.sciencedirect.com/ |
Google Scholar |
Network users’ analysis algorithms |
Retrieved from https://scholar.google.com |
The articles that are adopted are relatively modern, and they were published between 2019 and 2025.
3.2. Inclusion and exclusion criteria
Among the 27 research papers that are selected initially, some of them are included in the literature review, whilst other is excluded from the literature review based on the following criteria:
Inclusion Criteria includes whether a research paper proposes novel dynamic network embedding algorithms (Adapting creativity and novel algorithms are vital for the absorption of cutting-edge methodologies, which are more likely to be better at capturing network dynamics), whether it addresses path preservation explicitly, and whether it provides good examples of the practical application of social network dynamic embedding, even though it might not address the problem directly.
A research paper is excluded if it lacks authoritative citations (Authoritative sources prevent misinformation, which will prevent the readers from having access to inaccurate or completely erroneous information, thereby reducing the probability of misleading), provides information that is not trustworthy, includes contents are completely irrelevant, or includes theoretical studies without any valid proofs or mathematical interpretations (Only studies with mathematical proofs can verify the fidelity of path preservation rigorously).
3.3. Quality assessment
Table 2 illustrates the evaluation process for each research paper. Papers whose total marks are greater than 20 (out of 30) are selected. As shown in Table 2, six different criteria are considered when evaluating research papers, and varying weights are assigned to these criteria based on their relative importance.
Criteria |
Weights |
3 (out of five) |
5 (out of five) |
Accuracy of information |
20% |
Some information provided cannot be verified |
Almost every information can be verified |
Authority of citation |
20% |
Only some of the resources are obtained from top academic journals |
Most of the resources are obtained from journals |
Rigorousness of mathematical proof or interpretation |
20% |
Lack of academic proofs that are accurate and logical |
Contain rigid mathematical proofs with clear elaborations of limitations |
Practical Application |
10% |
Only show some applications |
Shows a wide range of applications in the real-world scenario |
Ability of algorithms to tackle problems |
25% |
May solve the problem but inevitably contains some obvious defects |
Can solve the problem almost perfectly without conspicuous defects |
Relevance |
5% |
Does not have a strong connection to the topic regarding social network dynamic embedding |
Shows a strong connection to the topic regarding social network dynamic embedding |
4. Results
4.1. Overview of models and algorithms
Table 3 is a summary of the models and algorithms in this research. The summary comprises the core advantage, key feature, relevance to the topic of dynamic network embedding, and application scenario of each model/algorithm.
Algorithms/Models |
Core Advantages |
Relevance to the Topic |
Application Scenarios |
General Dynamic Embedding |
Can capture temporal information |
Strong |
General cases |
Local-First Mechanism |
Can handle overlapping clusters |
Intermediate |
Overlapping structures |
DECTUIL Framework |
Optimize clustering via three-way decisions and vector smoothing |
Strong |
Cross-network UIL and heterogeneous networks |
HoMo-DYHNE |
Capture high-order structures and preserve heterogeneous semantics |
Strong |
Heterogeneous dynamic network |
COMA |
Identify key nodes and prevent premature convergence through co-evolution |
Intermediate |
Diffusion network |
K-Anonymity |
Achieve privacy preservation |
Weak |
Network privacy and graph anonymization |
4.2. Closer insights into models and algorithms
In this section, COMA and K-Anonymity are no longer considered, as they are not particularly helpful for preserving the path. To deepen the understandings of the models and algorithms, and take a further look at how effective they will be to help researches carry on the investigation of path preservation, the rest of the algorithms and models (i.e. General Dynamic Embedding, Local-First Algorithm, DECTUIL Framework, HoMo-DYHNE) will be further scrutinized and their qualities and usefulness will be compared based on their accuracy, runtime efficiency, memory usage, and generality. Table 4 provides more detailed insights into the algorithms and models that will be discussed later.
Models/Algorithms |
Accuracy |
Runtime Efficiency |
Memory Usage |
Generality |
General Dynamic Embedding |
Intermediate |
Low |
High (history snapshots storage is needed) |
High (manage to tackle many general cases) |
Local-First Algorithm |
Superior on overlapping communities |
Intermediate |
Low (overlap structures only) |
Low (overlap structures only) |
DECTUIL Framework |
Relatively good for alignment |
Very low |
Very high (boundary cache required) |
Intermediate (dependent on stable communities) |
HoMo-DYHNE |
Superior on heterogeneous graphs |
Low |
High (heterogeneous features are involved) |
Very low (heavily dependent on meta-path) |
5. Discussion
In Tables 3 and 4, many important algorithms and models in the field of Dynamic Network Embedding (DNE) are systematically and critically reviewed and compared. In this section, the points of view on this topic will be elaborated, particularly the reasons why dynamic embedding outperformed many static methods. There will be a summary of the key findings and some root causes, followed by a reflection on the limitations of this research as well as the possible future research directions of this field.
5.1. Key findings
According to the analysis, the core advantages of DNE models come directly from the ability to capture, construct models, and leverage information as the nodes and edges evolve over time.
Dynamic networks are inevitably and inherently complex, and many issues related to dynamic networks, such as overlapping structures and heterogeneity, cannot be directly addressed by static approaches, as they only involve a single model that aims to solve problems in all circumstances, which often fails to work properly in many cases. Algorithms like Local-First Mechanism, DECTUIL, and HoMo-DYHNE successfully handle the issue of network evolution, which demonstrates the effectiveness of dynamic and adjustable models that are designed for a particular purpose.
It is noteworthy that almost no DNE models or algorithms emphasize high efficiency or generality as their key advantage. This indicates that while those models are in pursuit of the ability to tackle specific issues, computational efficiency and wide applicability may be compromised.
5.2. Why dynamic embedding works
Static embedding is basically a stationary snapshot of the network at an instantaneous moment, which makes it unable to obtain continuous changes in nodes, edges, or the overall structures of the entire network. By comparison, DNE manages to tackle structural complexity through its flexibility. Table 5 provides a brief summary of how each DNE algorithm excels in handling rapidly evolving networks, highlighting the differences between these algorithms and static approaches.
Name of algorithm/model |
How it excels |
Degree of practicality |
Local-First Mechanism |
It is designed for dynamic optimization and can adjust node community assignments in time so as to dynamically adjust to overlap and evolution. |
high |
DECTUIL Framework |
It conducts users’ identifications across multiple platforms and merges information from various sources. It utilizes three-ways decisions effectively. |
high |
HoMo-DYHNE |
It manages to preserve and fuse diverse semantic relationships between individuals in a very heterogeneous network system. It can adjust its representation based on structural changes that it observes, which enables them to tackle extremely complex network with tremendous amounts of node/edge types and drastically- and unpredictably- changing relationships. |
intermediate |
5.3. Limitation
The research paper involves the following limitations.
5.3.1. Lack of efficiency
Due to the fact that DNE requires a significant amount of computational overhead, the efficiency of the processing of large-scale dynamic networks is limited, especially in real-time. For instance, in the DECTUIL Framework, three-way clustering iterations require repetitive complicated calculations, thereby significantly driving up iterative costs. Another example is that in HoMo-DYHNE, parallel processing involves multiple meta paths, which will increase the rate of growth of computational scales exponentially. This study could not quantify the actual computational time, computational costs, or scalability.
5.3.2. Lack of generality
In this study, most models are designed in a scenario-based way. For instance, the Local-First Mechanism is optimized only for overlapping structures, so it will inevitably fail to deal with networks with clear modular boundaries. This will limit the applicability of the models in this research study.
5.4. Further study
These are the directions that should be worked on regarding the field of DNE.
5.4.1. Develop an embedding that is efficient and lightweight
Further research should be conducted to develop dynamic embedding algorithms that are both computationally time- & money- saving and convenient for storage. This may include adapting some more advanced strategies that only perform minor updates on the changed parts, which will avoid large-scale re-computation.
For instance, incremental updates can be included in future models, which will undoubtedly increase the efficiency considerably through enlarging storage and saving a significant amount of computational power. Furthermore, datasets selecting techniques such as sampling optimization can also be merged into models that are developed in the future, because it can divide data into different subgroups and queries different samples iteratively based on the uncertainty of the model, and not only will it increase the speed for a model to be trained, it will also reduce the expenses to store and to compute, allowing an efficient and effective analysis of large datasets.
5.4.2. Construct robust and universal dynamic frameworks to increase generalization
Approaches to reduce model dependency are also a key part of future study. The aim should be to make the models suitable to tackle issues in a wide range of scenarios using a wide range of datasets. This may include the construction of AI models that can adjust the internal structures or parameters automatically based on changes in external inputs. This may also include the exploration of the relationships between relatively stable information structures and rapidly evolving information, which will significantly increase the robustness of the model, as well as the ability of models to transfer between one another.
6. Conclusion
This research paper critically and systematically reviews some important and state-of-the-art dynamic network embedding algorithms and models, including prominent examples such as DECTUIL and HoMo-DYHNE. Results clearly show that such dynamic embedding approaches have the ability to leverage information as the nodes, edges, and entire network structures evolve continuously over time, which are within low-dimensional vector spaces. It can handle the fundamental and major challenges associated with representing a complex network. The strengths of dynamic embedding approaches are revealed in complex network analysis. Notably, the superior performances of the models and algorithms in scenario-specific optimization cases like overlapping structures handling (in which individuals simultaneously belong to multiple clusters) and cross-network alignment (which requires the mapping of individuals across different networks) are explicitly highlighted in the research paper, despite some possible drawbacks associated with a lack of efficiency and generality.
In addition, the study emphasizes that the future of this research area lies in balancing efficiency, scalability, and generalization. While existing methods demonstrate strong capabilities in capturing heterogeneous semantics and dynamic structural changes, their reliance on scenario-specific assumptions limits their broader applicability. By exploring incremental update mechanisms, lightweight embeddings, and robust universal frameworks, researchers may overcome the existing bottlenecks.
Overall, this work not only provides readers with crucial algorithms and practical, evidence-based model selection guidelines but also outlines promising pathways for further innovation. It reinforces the importance of dynamic network embedding as a foundation for analyzing complex evolving systems, and it calls for continued efforts to enhance efficiency and generality while maintaining accuracy and robustness. The insights and recommendations presented here are expected to guide researchers and practitioners in designing more effective models that can adapt to diverse and rapidly changing networked environments.
References
[1]. L. Wu, B. Li, K. Guo, and Q. Zhang, "Capturing Global Structural Features and Temporal Dependencies in Dynamic Social Networks Using Graph Convolutional Networks, " Journal of Social Computing, vol. 6, no. 2, pp. 126-144, Jun. 2025. doi: 10.23919/JSC.2025.0008.
[2]. J. Lin, Y. Zhang, R. Wang, H. Chen, and M. Zhou, "Multi-Path Relationship Preserved Social Network Embedding, " IEEE Access, vol. 7, pp. 26507-26518, 2019. doi: 10.1109/ACCESS.2019.2900920.
[3]. G. Xue, M. Zhong, J. Li, J. Chen, C. Zhai, and R. Kong, "Dynamic Network Embedding Survey, " Neurocomputing, vol. 472, pp. 212-223, Jan. 2022. doi: 10.1016/j.neucom.2021.03.138.
[4]. S. Jeong, J. Park, and S. Lim, "mr2vec: Multiple Role-Based Social Network Embedding, " Pattern Recognition Letters, vol. 176, pp. 140-146, Dec. 2023. doi: 10.1016/j.patrec.2023.11.002.
[5]. Y. Peng et al., "DECTUIL: Cross-Social Network User Identity Linkage via Dynamic Embedding and Clustering Model Driven by Three-Way Decision, " Expert Systems with Applications, vol. 296, no. Part B, p. 129026, Jul. 2026. doi: 10.1016/j.eswa.2025.129026.
[6]. C. Ji, T. Zhao, Q. Sun, X. Fu, and J. Li, "Higher-Order Memory Guided Temporal Random Walk for Dynamic Heterogeneous Network Embedding, " Pattern Recognition, vol. 143, p. 109766, Nov. 2023. doi: 10.1016/j.patcog.2023.109766.
[7]. J. Tang, Y. Li, J. Qu, X. Li, and Y. Yao, "Probing for High Influential Nodes in Social Networks via a Co-Evolutionary Memetic Algorithm, " Physica A: Statistical Mechanics and its Applications, vol. 675, p. 130828, Sep. 2025. doi: 10.1016/j.physa.2025.130828.
[8]. H. Kaur, N. Hooda, and H. Singh, "K-Anonymization of Social Network Data Using Neural Network and SVM: K-NeuroSVM, " Journal of Information Security and Applications, vol. 72, p. 103382, Mar. 2023. doi: 10.1016/j.jisa.2022.103382.
Cite this article
Liu,J. (2025). Dynamic Multi-Path Relationship: Preserved Embedding for Social Network. Theoretical and Natural Science,143,70-78.
Data availability
The datasets used and/or analyzed during the current study will be available from the authors upon reasonable request.
Disclaimer/Publisher's Note
The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of EWA Publishing and/or the editor(s). EWA Publishing and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
About volume
Volume title: Proceedings of CONF-CIAP 2026 Symposium: International Conference on Atomic Magnetometer and Applications
© 2024 by the author(s). Licensee EWA Publishing, Oxford, UK. This article is an open access article distributed under the terms and
conditions of the Creative Commons Attribution (CC BY) license. Authors who
publish this series agree to the following terms:
1. Authors retain copyright and grant the series right of first publication with the work simultaneously licensed under a Creative Commons
Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this
series.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the series's published
version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial
publication in this series.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and
during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See
Open access policy for details).
References
[1]. L. Wu, B. Li, K. Guo, and Q. Zhang, "Capturing Global Structural Features and Temporal Dependencies in Dynamic Social Networks Using Graph Convolutional Networks, " Journal of Social Computing, vol. 6, no. 2, pp. 126-144, Jun. 2025. doi: 10.23919/JSC.2025.0008.
[2]. J. Lin, Y. Zhang, R. Wang, H. Chen, and M. Zhou, "Multi-Path Relationship Preserved Social Network Embedding, " IEEE Access, vol. 7, pp. 26507-26518, 2019. doi: 10.1109/ACCESS.2019.2900920.
[3]. G. Xue, M. Zhong, J. Li, J. Chen, C. Zhai, and R. Kong, "Dynamic Network Embedding Survey, " Neurocomputing, vol. 472, pp. 212-223, Jan. 2022. doi: 10.1016/j.neucom.2021.03.138.
[4]. S. Jeong, J. Park, and S. Lim, "mr2vec: Multiple Role-Based Social Network Embedding, " Pattern Recognition Letters, vol. 176, pp. 140-146, Dec. 2023. doi: 10.1016/j.patrec.2023.11.002.
[5]. Y. Peng et al., "DECTUIL: Cross-Social Network User Identity Linkage via Dynamic Embedding and Clustering Model Driven by Three-Way Decision, " Expert Systems with Applications, vol. 296, no. Part B, p. 129026, Jul. 2026. doi: 10.1016/j.eswa.2025.129026.
[6]. C. Ji, T. Zhao, Q. Sun, X. Fu, and J. Li, "Higher-Order Memory Guided Temporal Random Walk for Dynamic Heterogeneous Network Embedding, " Pattern Recognition, vol. 143, p. 109766, Nov. 2023. doi: 10.1016/j.patcog.2023.109766.
[7]. J. Tang, Y. Li, J. Qu, X. Li, and Y. Yao, "Probing for High Influential Nodes in Social Networks via a Co-Evolutionary Memetic Algorithm, " Physica A: Statistical Mechanics and its Applications, vol. 675, p. 130828, Sep. 2025. doi: 10.1016/j.physa.2025.130828.
[8]. H. Kaur, N. Hooda, and H. Singh, "K-Anonymization of Social Network Data Using Neural Network and SVM: K-NeuroSVM, " Journal of Information Security and Applications, vol. 72, p. 103382, Mar. 2023. doi: 10.1016/j.jisa.2022.103382.