Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3340531.3411886acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
research-article

Selecting Influential Features by a Learnable Content-Aware Linear Threshold Model

Published: 19 October 2020 Publication History

Abstract

Consider a network in which items propagate in a manner determined by their inherent characteristics or features. How should we select such inherent content features of a message emanating from a given set of nodes, so as to engender high influence spread over the network? This influential feature set selection problem has received scarce attention, contrary to its dual, influential node set selection counterpart, which calls to select the initial adopter nodes from which a fixed message emanates, so as to reach high influence. However, the influential feature set selection problem arises in many practical settings, where initial adopters are given, while propagation depends on the perception of certain malleable message features. We study this problem for a diffusion governed by a content-aware linear threshold (CALT) model, by which, once the aggregate weight of influence on a node exceeds a randomly chosen threshold, the item goes through. We show that the influence spread function is not submodular, hence a greedy algorithm with approximation guarantees is inadmissible. We propose a method that learns the parameters of the CALT model and adapt the SimPath diffusion estimation method to build a heuristic for the influential feature selection problem. Our experimental study demonstrates the efficacy and efficiency of our technique over synthetic and real data.

Supplementary Material

MP4 File (3340531.3411886.mp4)
We present (i) an adaptation of the Linear Threshold Model which incorporates the content of messages, (ii) an algorithm to learn the parameters of our Content-Aware Linear Threshold Model and (iii) an efficient and scalable algorithm to select influential features for a message to maximize its spread.

References

[1]
Sinan Aral and Dylan Walker. 2011. Creating Social Contagion Through Viral Product Design: A Randomized Trial of Peer Influence in Networks. Management Science 57, 9 (2011), 1623--1639.
[2]
Nicola Barbieri and Francesco Bonchi. 2014. Influence Maximization with Viral Product Design. In SIAM SDM.
[3]
Nicola Barbieri, Francesco Bonchi, and Giuseppe Manco. 2012. Topic-Aware Social Influence Propagation Models. In ICDM.
[4]
David M. Blei, Andrew Y. Ng, and Michael I. Jordan. 2003. Latent Dirichlet Allocation. J. Mach. Learn. Res. 3 (2003), 993--1022.
[5]
Christian Borgs, Michael Brautbar, Jennifer T. Chayes, and Brendan Lucier. 2014. Maximizing Social Influence in Nearly Optimal Time. In SODA.
[6]
Wei Chen, Chi Wang, and Yajun Wang. 2010. Scalable Influence Maximization for Prevalent Viral Marketing in Large-Scale Social Networks. In KDD.
[7]
Yi-Cheng Chen, Wen-Chih Peng, and Suh-Yin Lee. 2012. Efficient Algorithms for Influence Maximization in Social Networks. Knowl. Inf. Syst. 33, 3 (2012),577--601.
[8]
Irena Pletikosa Cvijikj and Florian Michahelles. 2013. Online engagement factors on Facebook brand pages. Social Netw. Analys. Mining 3, 4 (2013), 843--861.
[9]
Lisette de Vries, Sonja Gensler, and Peter S.H. Leeflang. 2012. Popularity of Brand Posts on Brand Fan Pages: An Investigation of the Effects of Social Media Marketing. Journal of Interactive Marketing 26, 2 (2012), 83--91.
[10]
Amit Goyal, Francesco Bonchi, and Laks V. S. Lakshmanan. 2010. Learning Influence Probabilities in Social Networks. In WSDM.
[11]
Amit Goyal, Francesco Bonchi, and Laks V. S. Lakshmanan. 2011. A Data-Based Approach to Social Influence Maximization. Proc. VLDB Endow. 5, 1 (2011), 73--84.
[12]
Amit Goyal, Wei Lu, and Laks V. S. Lakshmanan. 2011. SIMPATH: An Efficient Algorithm for Influence Maximization under the Linear Threshold Model. In ICDM.
[13]
Petter Holme and Beom Jun Kim. 2002. Growing scale-free networks with tunable clustering. Phys. Rev. E65 (2002), 026107. Issue 2.
[14]
Sergei Ivanov, Konstantinos Theocharidis, Manolis Terrovitis, and Panagiotis Karras. 2017. Content Recommendation for Viral Social Influence. In SIGIR.
[15]
Panagiotis Karras, Artyom Nikitin, Muhammad Saad, Rudrika Bhatt, Denis Antyukhov, and Stratos Idreos. 2016. Adaptive Indexing over Encrypted Numeric Data. In SIGMOD.
[16]
Elihu Katz. 1959. Mass communications research and the study of popular culture: An editorial note on a possible future of this journal.Studies in Public Communication 2 (1959), 1--6.
[17]
David Kempe, Jon Kleinberg, and Éva Tardos. 2003. Maximizing the Spread of Influence through a Social Network. In KDD.
[18]
Ricardo Lage, Peter Dolog, and Martin Leginus. 2013. Vector Space Models for the Classification of Short Messages on Social Network Services. In WEBIST.
[19]
Siyu Lei, Silviu Maniu, Luyi Mo, Reynold Cheng, and Pierre Senellart. 2015. Online Influence Maximization. In KDD.
[20]
Jure Leskovec, Jon M. Kleinberg, and Christos Faloutsos. 2005. Graphs over Time: Densification Laws, Shrinking Diameters and Possible Explanations. In KDD.
[21]
Jianxin Li, Chengfei Liu, Lu Chen, Zhenying He, Amitava Datta, and Feng Xia. 2017. iTopic: Influential Topic Discovery from Information Networks via Keyword Query. In WWW Companion.
[22]
Jianxin Li, Chengfei Liu, Jeffrey Xu Yu, Yi Chen, Timos K. Sellis, and J. Shane Culpepper. 2016. Personalized Influential Topic Search via Social Network Summarization. IEEE TKDE28, 7 (2016), 1820--1834.
[23]
Yuchen Li, Ju Fan, George V. Ovchinnikov, and Panagiotis Karras. 2019. Maximizing Multifaceted Network Influence. In ICDE.
[24]
Yuchen Li, Ju Fan, Yanhao Wang, and Kian-Lee Tan. 2018. Influence Maximization on Social Graphs: A Survey.IEEE TKDE30, 10 (2018), 1852--1872.
[25]
Alvis Logins and Panagiotis Karras. 2019. Content-based Network Influence Probabilities: Extraction and Application. In ICDM Workshops.
[26]
Alvis Logins and Panagiotis Karras. 2019. An Experimental Study on Network Immunization. In EDBT.
[27]
Alvis Logins, Yuchen Li, and Panagiotis Karras. 2020. On the Robustness of Cascade Diffusion under Node Attacks. In The Web Conference.
[28]
George L. Nemhauser, Laurence A. Wolsey, and Marshall L. Fisher. 1978. An Analysis of Approximations for Maximizing Submodular Set Functions--I.Math. Program.14, 1 (1978), 265--294.
[29]
Sadegh Nobari, Panagiotis Karras, Hwee Hwa Pang, and Stéphane Bressan. 2014. L-opacity: Linkage-Aware Graph Anonymization. In EDBT.
[30]
Matei Ripeanu, Adriana Iamnitchi, and Ian T. Foster. 2002. Mapping the Gnutella Network. IEEE Internet Comput.6, 1 (2002), 50--57.
[31]
Peter J. Rousseeuw. 1987. Silhouettes: A Graphical Aid to the Interpretation and Validation of Cluster Analysis.J. Comput. Appl. Math.20, 1 (1987), 53--65.
[32]
Kazumi Saito, Ryohei Nakano, and Masahiro Kimura. 2008. Prediction of Information Diffusion Probabilities for Independent Cascade Model. In Knowledge-Based Intelligent Information and Engineering Systems.
[33]
Youze Tang, Xiaokui Xiao, and Yanchen Shi. 2014. Influence Maximization:Near-Optimal Time Complexity Meets Practical Efficiency. In SIGMOD.
[34]
Guangmo Tong, Ruiqi Wang, Zheng Dong, and Xiang Li. 2020. Time-constrained Adaptive Influence Maximization. (2020). arXiv:2001.01742v2
[35]
Leslie G. Valiant. 1979. The Complexity of Enumeration and Reliability Problems. SIAM J. Comput. 8, 3 (1979), 410--421.
[36]
Mingqiang Xue, Panagiotis Karras, Chedy Raïssi, Panos Kalnis, and Hung KengPung. 2012. Delineating Social Network Data Anonymization via Random Edge Perturbation. In CIKM.

Cited By

View all
  • (2024)Adaptive Content-Aware Influence Maximization via Online Learning to RankACM Transactions on Knowledge Discovery from Data10.1145/365198718:6(1-35)Online publication date: 12-Apr-2024
  • (2023)Identifying and Protecting Cyber-Physical Systems’ Influential Devices for Sustainable CybersecurityIEEE Transactions on Sustainable Computing10.1109/TSUSC.2023.32460878:4(614-626)Online publication date: Oct-2023
  • (2022)A Content Recommendation Policy for Gaining SubscribersProceedings of the 45th International ACM SIGIR Conference on Research and Development in Information Retrieval10.1145/3477495.3531885(2501-2506)Online publication date: 6-Jul-2022

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CIKM '20: Proceedings of the 29th ACM International Conference on Information & Knowledge Management
October 2020
3619 pages
ISBN:9781450368599
DOI:10.1145/3340531
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 19 October 2020

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. content-awareness
  2. influence maximization
  3. linear threshold

Qualifiers

  • Research-article

Funding Sources

  • Danish Council for Independent Research

Conference

CIKM '20
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,861 of 8,427 submissions, 22%

Upcoming Conference

CIKM '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)12
  • Downloads (Last 6 weeks)1
Reflects downloads up to 18 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Adaptive Content-Aware Influence Maximization via Online Learning to RankACM Transactions on Knowledge Discovery from Data10.1145/365198718:6(1-35)Online publication date: 12-Apr-2024
  • (2023)Identifying and Protecting Cyber-Physical Systems’ Influential Devices for Sustainable CybersecurityIEEE Transactions on Sustainable Computing10.1109/TSUSC.2023.32460878:4(614-626)Online publication date: Oct-2023
  • (2022)A Content Recommendation Policy for Gaining SubscribersProceedings of the 45th International ACM SIGIR Conference on Research and Development in Information Retrieval10.1145/3477495.3531885(2501-2506)Online publication date: 6-Jul-2022
  • (2022) Identifying the Top- k Influential Spreaders in Social Networks: a Survey and Experimental Evaluation IEEE Access10.1109/ACCESS.2022.321304410(107809-107845)Online publication date: 2022

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media