Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2939672.2939745acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article

Robust Influence Maximization

Published: 13 August 2016 Publication History

Abstract

In this paper, we address the important issue of uncertainty in the edge influence probability estimates for the well studied influence maximization problem --- the task of finding k seed nodes in a social network to maximize the influence spread. We propose the problem of robust influence maximization, which maximizes the worst-case ratio between the influence spread of the chosen seed set and the optimal seed set, given the uncertainty of the parameter input. We design an algorithm that solves this problem with a solution-dependent bound. We further study uniform sampling and adaptive sampling methods to effectively reduce the uncertainty on parameters and improve the robustness of the influence maximization task. Our empirical results show that parameter uncertainty may greatly affect influence maximization performance and prior studies that learned influence probabilities could lead to poor performance in robust influence maximization due to relatively large uncertainty in parameter estimates, and information cascade based adaptive sampling method may be an effective way to improve the robustness of influence maximization.

Supplementary Material

MP4 File (kdd2016_chen_influence_maximization_01-acm.mp4)

References

[1]
A. Badanidiyuru, R. Kleinberg, and A. Slivkins. Bandits with knapsacks. In FOCS 2013.
[2]
N. Barbieri, F. Bonchi, and G. Manco. Topic-aware social influence propagation models. Knowledge and information systems, 37(3):555--584, 2013.
[3]
A. Ben-Tal and A. Nemirovski. Robust optimization--methodology and applications. Mathematical Programming, 92(3):453--480, 2002.
[4]
C. Borgs, M. Brautbar, J. T. Chayes, and B. Lucier. Maximizing social influence in nearly optimal time. In SODA 2014.
[5]
S. Bubeck, R. Munos, and G. Stoltz. Pure exploration in finitely-armed and continuous-armed bandits. Theoretical Computer Science, 412:1832--1852, 2011.
[6]
C. Budak, D. Agrawal, and A. El Abbadi. Limiting the spread of misinformation in social networks. In WWW 2011.
[7]
S. Chen, T. Lin, I. King, M. R. Lyu, and W. Chen. Combinatorial pure exploration of multi-armed bandits. In NIPS 2014.
[8]
W. Chen, L. V. Lakshmanan, and C. Castillo. Information and influence propagation in social networks. Synthesis Lectures on Data Management, 5(4):1--177, 2013.
[9]
W. Chen, T. Lin, Z. Tan, M. Zhao, and X. Zhou. Robust influence maximization. CoRR, abs/1601.06551, 2016.
[10]
W. Chen, C. Wang, and Y. Wang. Scalable influence maximization for prevalent viral marketing in large-scale social networks. In KDD 2010.
[11]
W. Chen, Y. Wang, and S. Yang. Efficient influence maximization in social networks. In KDD 2009.
[12]
W. Chen, Y. Wang, and Y. Yuan. Combinatorial multi-armed bandit and its extension to probabilistically triggered arms. CoRR, abs/1407.8339, 2014.
[13]
P. Domingos and M. Richardson. Mining the network value of customers. In KDD 2001.
[14]
U. Feige. A threshold of ln n for approximating set cover. Journal of the ACM (JACM), 45(4):634--652, 1998.
[15]
A. Goyal, F. Bonchi, and L. V. Lakshmanan. Learning influence probabilities in social networks. In WSDM 2010.
[16]
A. Goyal, W. Lu, and L. V. Lakshmanan. Celf+: optimizing the greedy algorithm for influence maximization in social networks. In WWW 2011.
[17]
X. He and D. Kempe. Robust influence maximization. In KDD 2016.
[18]
X. He and D. Kempe. Stability of Influence Maximization. ArXiv e-prints, Jan. 2015.
[19]
D. Kempe, J. Kleinberg, and É. Tardos. Maximizing the spread of influence through a social network. In KDD 2003.
[20]
A. Krause, H. B. McMahon, C. Guestrin, and A. Gupta. Robust submodular observation selection. JMLR, 9:2761--2801, 2008.
[21]
S. Lei, S. Maniu, L. Mo, R. Cheng, and P. Senellart. Online influence maximization. In KDD 2015.
[22]
J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. VanBriesen, and N. Glance. Cost-effective outbreak detection in networks. In KDD 2007.
[23]
W. Lu, W. Chen, and L. V. Lakshmanan. From competition to complementarity: comparative influence diffusion and maximization. In VLDB 2015.
[24]
P. Netrapalli and S. Sanghavi. Learning the graph of epidemic cascades. In SIGMETRICS 2012.
[25]
M. G. Rodriguez, D. Balduzzi, and B. Schölkopf. Uncovering the temporal dynamics of diffusion networks. In ICML 2011.
[26]
K. Saito, R. Nakano, and M. Kimura. Prediction of information diffusion probabilities for independent cascade model. In Knowledge-Based Intelligent Information and Engineering Systems, pages 67--75. Springer, 2008.
[27]
J. Tang, J. Sun, C. Wang, and Z. Yang. Social influence analysis in large-scale networks. In KDD 2009.
[28]
Y. Tang, X. Xiao, and Y. Shi. Influence maximization: near-optimal time complexity meets practical efficiency. In SIGMOD 2014.

Cited By

View all
  • (2024)Attacking Social Media via Behavior PoisoningACM Transactions on Knowledge Discovery from Data10.1145/365467318:7(1-27)Online publication date: 27-Mar-2024
  • (2024)Tracking Influencers in Decaying Social Activity Streams With Theoretical GuaranteesIEEE/ACM Transactions on Networking10.1109/TNET.2023.332302832:2(1461-1476)Online publication date: Apr-2024
  • (2024)Finding robust and influential nodes from networks under cascading failures using a memetic algorithmNeurocomputing10.1016/j.neucom.2024.127704589(127704)Online publication date: Jul-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
KDD '16: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
August 2016
2176 pages
ISBN:9781450342322
DOI:10.1145/2939672
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 August 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. influence maximization
  2. information diffusion
  3. robust optimization
  4. social networks

Qualifiers

  • Research-article

Funding Sources

Conference

KDD '16
Sponsor:

Acceptance Rates

KDD '16 Paper Acceptance Rate 66 of 1,115 submissions, 6%;
Overall Acceptance Rate 1,133 of 8,635 submissions, 13%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)163
  • Downloads (Last 6 weeks)21
Reflects downloads up to 22 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Attacking Social Media via Behavior PoisoningACM Transactions on Knowledge Discovery from Data10.1145/365467318:7(1-27)Online publication date: 27-Mar-2024
  • (2024)Tracking Influencers in Decaying Social Activity Streams With Theoretical GuaranteesIEEE/ACM Transactions on Networking10.1109/TNET.2023.332302832:2(1461-1476)Online publication date: Apr-2024
  • (2024)Finding robust and influential nodes from networks under cascading failures using a memetic algorithmNeurocomputing10.1016/j.neucom.2024.127704589(127704)Online publication date: Jul-2024
  • (2024)Robust misinformation prevention with uncertainty on suspicious nodesNeurocomputing10.1016/j.neucom.2024.127344577(127344)Online publication date: Apr-2024
  • (2024)A multi-factor evolutionary algorithm for solving the multi-tasking robust optimization problem on networked systemsApplied Soft Computing10.1016/j.asoc.2024.111470156(111470)Online publication date: May-2024
  • (2024)DGN: influence maximization based on deep reinforcement learningThe Journal of Supercomputing10.1007/s11227-024-06621-981:1Online publication date: 5-Nov-2024
  • (2024)Budget-constrained profit maximization without non-negative objective assumption in social networksJournal of Global Optimization10.1007/s10898-024-01406-zOnline publication date: 14-Aug-2024
  • (2024)Quantifying influential nodes in complex networks using optimization and particle dynamics: a comparative studyComputing10.1007/s00607-023-01244-z106:3(821-864)Online publication date: 19-Jan-2024
  • (2024)A Genetic Algorithm Using Diversity-Concern Principle to Solve Robust Influence Maximization Problem on Urban Transportation NetworksProceedings of the 2023 International Conference on Green Building, Civil Engineering and Smart City10.1007/978-981-99-9947-7_77(771-781)Online publication date: 2-Feb-2024
  • (2023)Market Demand Optimization Model Based on Information Perception ControlMathematics10.3390/math1103078311:3(783)Online publication date: 3-Feb-2023
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media