Computer Science ›› 2024, Vol. 51 ›› Issue (6): 161-171.doi: 10.11896/jsjkx.230400006

• Database & Big Data & Data Science • Previous Articles     Next Articles

Continuous Influence Maximization Under Independent Cascade Propagation Model

DENG Ziwei, CHEN Ling, LIU Wei   

  1. College of Information Engineering,Yangzhou University,Yangzhou,Jiangsu 225000,China
  • Received:2023-04-01 Revised:2023-07-29 Online:2024-06-15 Published:2024-06-05
  • About author:DENG Ziwei,born in 1997,postgra-duate.Her main research interests include data mining and complex network.
    CHEN Ling,born in 1951,professor,Ph.D supervisor,is a member of CCF(No.85182M).His main research interests include data mining complex network and artificial intelligence.
  • Supported by:
    National Natural Science Foundation of China(61379066,61702441,61070047,61379064,61472344,61402395,61602202),Natural Science Foundation of Jiangsu Province(BK20130452,BK2012672,BK2012128,BK20140492,BK20160428),Natural Science Foundation of Jiangsu Provincial Department of Education(12KJB520019,13KJB520026,09KJB20013)and Jiangsu Province Postgraduate Trai-ning Innovation Project(CXZZl3_0173).

Abstract: Influence maximization is to seek a group of most influential users in social networks as seed nodes,and spread information through seed nodes to maximize the information spreading.Most of the existing research on influence maximization assume that each node is either a seed or not.While in practical applications,the users’ probability of becoming a seed should be determined according to their influence in the social network,hence maximize the expected range of influence of the seed set obtained according to the probability distribution.This is the problem of continuous influence maximization.A continuous influence maximization algorithm under the independent cascade propagation model is proposed.The algorithm first abstracts the problem into a constrained optimization,then several possible seed sets are sampled.The influence propagation range is estimated for each possible seed set.The gradient descent method is employed to calculate the increment value in each direction according to the estimated propagation range in each iteration.The direction of the maximum increment is taken as the gradient to update the objective function value.By such iterations,the optimal solution of the objective function can be obtained.Experiments on real and virtual data sets show that the proposed algorithm can obtain significantly larger expected range of influence than Random,Degree,UD and CD algorithms.

Key words: Continuous influence maximization, Social networks, Independent cascade propagation model, Gradient descent, Iteration

CLC Number: 

  • TP399
[1]SHAO J H,ZHANG E,XIANG Y,et al.Efficient combinations of dual incentives on social networks to achieve viral spread[J/OL].https://link.springer.com/article/10.1007/s10660-022-09668-z.
[2]HE Q,ZHANG D,WANG X,et al.Graph Convolutional Net-work-Based Rumor Blocking on Social Networks[J].IEEE Transactions on Computational Social Systems,2022,10(5):2244-2253.
[3]REN J,LIU M,LIU Y,et al.Optimal resource allocation with spatiotemporal transmission discovery for effective disease control[J].Infectious Diseases of Poverty,2022,11(1):34.
[4]FERRARA L,MOGLIANI M,SAHUC J G.High-frequencymonitoring of growth at risk[J].International Journal of Forecasting,2022,38(2):582-595.
[5]DOMINGOS P,RICHARDSON M.Mining the network value of customers[C]//Proceedings of the seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mi-ning.2001:57-66.
[6]RICHARDSON M,DOMINGOS P.Mining knowledge-sharingsites for viral marketing[C]//Proceedings of the eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.2002:61-70.
[7]KEMPE D,KLEINBERG J,TARDOS É.Maximizing the spread of influence through a social network[C]//Proceedings of the ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.2003:137-146.
[8]LI Y,FAN J,WANG Y,et al.Influence maximization on social graphs:A survey[J].IEEE Transactions on Knowledge and Data Engineering,2018,30(10):1852-1872.
[9]LESKOVEC J,KRAUSE A,GUESTRIN C,et al.Cost-effective outbreak detection in networks[C]//Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Disco-very and Data Mining.2007:420-429.
[10]LI W M,LI Z,LUVEMBE A M,et al.Influence maximizationalgorithm based on Gaussian propagation model[J].Information Sciences,2021,568:386-402.
[11]KUMAR S,GUPTA A,KHATRI I.CSR:A community based spreaders ranking algorithm for influence maximization in social networks[J].World Wide Web,2022,25(6):2303-2322.
[12]ZHANG J X,CHEN D B,DONG Q,et al.Identifying a set of influential spreaders in complex networks[J].Scientific reports,2016,6(1):27823.
[13]LIU P,LI L,FANG S,et al.Identifying influential nodes in social networks:A voting approach[J].Chaos,Solitons & Fractals,2021,152:111309.
[14]SUN G,CHEN C C.Influence maximization algorithm based on reverse reachable set[J].Mathematical Problems in Enginee-ring,2021,2021:1-12.
[15]ZHU W,HUANG Y,YANG S,et al.A Positive Influence Maximization Algorithm in Signed Social Networks[J].Computers,Materials & Continua,2023,76(2):1977-1994.
[16]ALI J,BABAEI M,CHAKRABORTY A,et al.On the fairness of time-critical influence maximization in social networks[C]//2022 IEEE 38th International Conference on Data Engineering(ICDE).IEEE,2022:1541-1542.
[17]GONG H,GUO C.Influence maximization considering fairness:A multi-objective optimization approach with prior knowledge[J].Expert Systems with Applications,2023,214:119138.
[18]QIN X,ZHONG C,YANG Q.An Influence Maximization Algorithm Based on Community-Topic Features for Dynamic Social Networks[J].IEEE Transactions on Network Science and Engineering,2021,9(2):608-621.
[19]ZHANG X,XU L,XU Z.Influence maximization based on network motifs in mobile social networks[J].IEEE Transactions on Network Science and Engineering,2022,9(4):2353-2363.
[20]GHOSHAL A K,DAS N,DAS S.Influence of community structure on misinformation containment in online social networks[J].Knowledge-Based Systems,2021,213:106693.
[21]LI Y,ZHU J,JIAO J,et al.Competitive Influence Minimization in Multi-Group Social Networks:An Opinion-Based Solution[J].IEEE Transactions on Network Science and Engineering,2022,9(4):2617-2630.
[22]KEMPE D,KLEINBERG J,TARDOS É.Maximizing the Spreadof Influence through a Social Network[J].Theory of Computing,2015,11(1):105-147.
[23]YANG Y,MAO X,PEI J,et al.Continuous influence maximization:What discounts should we offer to social network users?[C]//Proceedings of the 2016 International Conference on Ma-nagement Df data.2016:727-741.
[24]YANG Y,MAO X,PEI J,et al.Continuous influence maximization[J].ACM Transactions on Knowledge Discovery from Data(TKDD),2020,14(3):1-38.
[25]CHEN W,WU R,YU Z.Scalable lattice influence maximization[J].IEEE Transactions on Computational Social Systems,2020,7(4):956-970.
[26]CHEN W,ZHANG W,ZHAO H.Gradient method for continuous influence maximization with budget-saving considerations[C]//Proceedings of the AAAI Conference on Artificial Intelligence.2020,34(1):43-50.
[27]CHEN W,WANG Y,YANG S.Efficient influence maximization in social networks[C]//Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.2009:199-208.
[28]TANG Y,XIAO X,SHI Y.Influence maximization:Near-optimal time complexity meets practical efficiency[C]//Proceedings of the 2014 ACM SIGMOD International Conference on Ma-nagement of Data.2014:75-86.
[1] MIN Lihua, DING Tianzhong, JIN Zhengmeng. Deformable Image Registration Model Based on Weighted Bounded Deformation Function [J]. Computer Science, 2024, 51(6): 206-214.
[2] WANG Zhen, NIE Kai, HAN Lin. Auto-vectorization Cost Model Based on Instruction MKS [J]. Computer Science, 2024, 51(4): 78-85.
[3] YU Jiuyang, ZHANG Dean, DAI Yaonan, HU Tianhao, XIA Wenfeng. Path Planning of Mobile Robot Based on Improved B-RRT* Algorithm [J]. Computer Science, 2023, 50(6A): 220500038-7.
[4] CHEN Shanshan, GAO Jun, MA Zhenyu. GDLIN:A Learned Index By Gradient Descent [J]. Computer Science, 2023, 50(6A): 220600256-6.
[5] CAO Jinxin, XU Weizhong, JIN Di, DING Weiping. Survey of Community Discovery in Complex Networks [J]. Computer Science, 2023, 50(11A): 230100130-11.
[6] LIN Zeyang, LAI Jun, CHEN Xiliang, WANG Jun. UAV Anti-tank Policy Training Model Based on Curriculum Reinforcement Learning [J]. Computer Science, 2023, 50(10): 214-222.
[7] ZONG Di-di, XIE Yi-wu. Model Medial Axis Generation Method Based on Normal Iteration [J]. Computer Science, 2022, 49(6A): 764-770.
[8] WEI Peng, MA Yu-liang, YUAN Ye, WU An-biao. Study on Temporal Influence Maximization Driven by User Behavior [J]. Computer Science, 2022, 49(6): 119-126.
[9] GUO Lei, MA Ting-huai. Friend Closeness Based User Matching [J]. Computer Science, 2022, 49(3): 113-120.
[10] SHAO Yu, CHEN Ling, LIU Wei. Maximum Likelihood-based Method for Locating Source of Negative Influence Spreading Under Independent Cascade Model [J]. Computer Science, 2022, 49(2): 204-215.
[11] XU Yi-fei, XIONG Shu-hua, SUN Wei-heng, HE Xiao-hai, CHEN Hong-gang. HEVC Post-processing Algorithm Based on Non-local Low-rank and Adaptive Quantization Constraint Prior [J]. Computer Science, 2021, 48(5): 155-162.
[12] ZHANG Shao-jie, LU Xu-dong, GUO Wei, WANG Shi-peng, HE Wei. Prevention of Dishonest Behavior in Supply-Demand Matching [J]. Computer Science, 2021, 48(4): 303-308.
[13] YUAN De-yu, CHEN Shi-cong, GAO Jian, WANG Xiao-juan. Intervention Algorithm for Distorted Information in Online Social Networks Based on Stackelberg Game [J]. Computer Science, 2021, 48(3): 313-319.
[14] MA Li-bo, QIN Xiao-lin. Topic-Location-Category Aware Point-of-interest Recommendation [J]. Computer Science, 2020, 47(9): 81-87.
[15] LIANG Jun-bin, ZHANG Min, JIANG Chan. Research Progress of Social Sensor Cloud Security [J]. Computer Science, 2020, 47(6): 276-283.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!