DOI QR코드

DOI QR Code

Influence Maximization Scheme against Various Social Adversaries

  • Noh, Giseop (Division of Software Convergence, College of Engineering, Cheongju University) ;
  • Oh, Hayoung (DASAN University College in Ajou University) ;
  • Lee, Jaehoon (Department of Computer Science and Engineering, Seoul National University)
  • 투고 : 2018.06.06
  • 심사 : 2018.11.14
  • 발행 : 2018.12.31

초록

With the exponential developments of social network, their fundamental role as a medium to spread information, ideas, and influence has gained importance. It can be expressed by the relationships and interactions within a group of individuals. Therefore, some models and researches from various domains have been in response to the influence maximization problem for the effects of "word of mouth" of new products. For example, in reality, more than two related social groups such as commercial companies and service providers exist within the same market issue. Under such a scenario, they called social adversaries competitively try to occupy their market influence against each other. To address the influence maximization (IM) problem between them, we propose a novel IM problem for social adversarial players (IM-SA) which are exploiting the social network attributes to infer the unknown adversary's network configuration. We sophisticatedly define mathematical closed form to demonstrate that the proposed scheme can have a near-optimal solution for a player.

키워드

E1ICAW_2018_v16n4_213_f0001.png 이미지

Fig. 1. Node connectivity in a graph.

E1ICAW_2018_v16n4_213_f0002.png 이미지

Fig. 2. A graphical example with three social players.

E1ICAW_2018_v16n4_213_f0003.png 이미지

Fig. 3. An example of local bridges (satisfying strong triadic closure property as mentioned previously [27] with strong ties (black solid lines) and weak ties (black dotted lines). The promoter (c1) knows his region c1 but does not know about the number of nodes are in the adversary region (c2) and how the nodes in c2 are configured.

E1ICAW_2018_v16n4_213_f0004.png 이미지

Fig. 4. GHC algorithm with two given inputs (l, f), where l is the cardinality of the seed set and f is the function of an information cascading model.

E1ICAW_2018_v16n4_213_f0005.png 이미지

Fig. 5. GHC-A exploiting local bridges with node characteristics (BC and CC).

E1ICAW_2018_v16n4_213_f0006.png 이미지

Fig. 6. The number of activated nodes in the adversary cluster as a function of the increasing number of Γ.

참고문헌

  1. D. Kempe, J. Kleinberg, and E. Tardos, "Maximizing the spread of influence through a social network," in Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, pp. 137-146, 2003. DOI: 10.1145/956750.956769.
  2. M. McPherson, L. Smith-Lovin, and J. M. Cook, "Birds of a feather: homophily in social networks," Annual Review of Sociology, vol. 27, no. 1 pp. 415-444, 2001. DOI: 10.1146/annurev.soc.27.1.415.
  3. R. M. Heeler and T. P. Hustad, "Problems in predicting new product growth for consumer durables," Management Science, vol. 26, no. 10, pp. 1007-1020, 1980. DOI: 10.1287/mnsc.26.10.1007.
  4. J. Johnson Brown and P. H. Reingen, "Social ties and word-of-mouth referral behavior," Journal of Consumer Research, vol. 14, no. 3, pp. 350-362, 1987. DOI: 10.1086/209118.
  5. V. Mahajan, E. Muller, and F. M. Bass, "New product diffusion models in marketing: a review and directions for research," Journal of Marketing, vol. 54, no. 1, pp. 1-26, 1990. DOI: 10.1177/002224299005400101.
  6. W. Chen, Y. Wang, and S. Yang, "Efficient influence maximization in social networks," in Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, pp. 199-208, 2009. DOI: 10.1145/1557019.1557047.
  7. K. Saito, R. Nakano, and M. Kimura, "Prediction of information diffusion probabilities for independent cascade model," in Knowledge-Based and Intelligent Information and Engineering Systems. Heidelberg: Springer, pp. 67-75, 2008. DOI: 10.1007/978-3-540-85567-5_9.
  8. J. Goldenberg, B. Libai, and E. Muller, "Talk of the network: a complex systems look at the underlying process of word-of-mouth," Marketing Letters, vol. 12, no. 3, pp. 211-223, 2001. DOI: 10.1023/A:1011122126881.
  9. D. Gruhl, R. Guha, D. Liben-Nowell, and A. Tomkins, "Information diffusion through blogspace," in Proceedings of the 13th conference on World Wide Web, New York, NY, pp. 491-501, 2004. DOI: 10.1145/988672.988739.
  10. W. Chen, Y. Yuan, and L. Zhang, "Scalable influence maximization in social networks under the linear threshold model," in Proceedings of 2010 IEEE International Conference on Data Mining, Sydney, Australia, pp. 88-97, 2010. DOI: 10.1109/ICDM.2010.118.
  11. M. W. Macy, "Chains of cooperation: threshold effects in collective action," American Sociological Review, vol. 56, no. 6, pp. 730-747, 1991. DOI: 10.2307/2096252.
  12. J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. VanBriesen, and N. Glance, "Cost-effective outbreak detection in networks," in Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Jose, CA, pp. 420-429, 2007. DOI: 10.1145/1281192.1281239.
  13. Y. Wang, G. Cong, G. Song, and K. Xie, "Community-based greedy algorithm for mining top-k influential nodes in mobile social networks," in Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, pp. 1039-1048, 2010. DOI: 10.1145/1835804.1835935.
  14. S. Bhagat, A. Goyal, and L. V. Lakshmanan, "Maximizing product adoption in social networks," in Proceedings of the 5th ACM International Conference on Web Search and Data Mining, Seattle, WA, pp. 603-612, 2012. DOI: 10.1145/2124295.2124368.
  15. Y. Li, W. Chen, Y. Wang, and Z. L. Zhang, "Influence diffusion dynamics and influence maximization in social networks with friend and foe relationships," in Proceedings of the 6th ACM International Conference on Web Search and Data Mining, Rome, Italy, pp. 657-666, 2013. DOI: 10.1145/2433396.2433478.
  16. A. Borodin, Y. Filmus, and J. Oren, "Threshold models for competitive influence in social networks," Internet and Network Economics. Heidelberg: Springer, pp. 539-550, 2010. DOI: 10.1007/978-3-642-17572-5_48.
  17. X. He, G. Song, W. Chen, and Q. Jiang, "Influence blocking maximization in social networks under the competitive linear threshold model," Proceedings of the 2012 SIAM International Conference on Data Mining, Anaheim, CA, pp. 463-474, 2012. DOI: 10.1137/1.9781611972825.40.
  18. S. Bharathi, D. Kempe, and M. Salek, "Competitive influence maximization in social networks," in Internet and Network Economics. Heidelberg: Springer, pp. 306-311, 2007. DOI: 10.1007/978-3-540-77105-0_31.
  19. S. Shirazipourazad, B. Bogard, V. Vachhani, A. Sen, and P. Horn, "Influence propagation in adversarial setting: how to defeat competition with least amount of investment," in Proceedings of the 21st ACM International Conference on Information and Knowledge Management, Maui, HI, pp. 585-594, 2012. DOI: 10.1145/2396761.2396837.
  20. Y. Yu, T. Y. Berger-Wolf, and J. Saia, "Finding spread blockers in dynamic networks," in Advances in Social Network Mining and Analysis. Heidelberg: Springer, pp. 55-76, 2010. DOI: 10.1007/978-3-642-14929-0_4.
  21. T. Carnes, C. Nagarajan, S. M. Wild, and A. van Zuylen, "Maximizing influence in a competitive social network: a follower's perspective," in Proceedings of the 9th International Conference on Electronic Commerce, Minneapolis, MN, pp. 351-360, 2007. DOI: 10.1145/1282100.1282167.
  22. M. A. Nowak, C. E. Tarnita, and T. Antal, "Evolutionary dynamics in structured populations," Philosophical Transactions of the Royal Society B: Biological Sciences, vol. 365, no. 1537, pp. 19-30, 2009. DOI: 10.1098/rstb.2009.0215.
  23. M. E. Newman, "A measure of betweenness centrality based on random walks," Social Networks, vol. 27, no. 1, pp. 39-54, 2005. DOI: 10.1016/j.socnet.2004.11.009.
  24. Y. Boshmaf, K. Beznosov, and M. Ripeanu, "Graph-based Sybil detection in social and information systems," in Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Niagara, Canada, pp. 466-473, 2013. DOI: 10.1145/2492517.2492568.
  25. D. J. Watts and S. H. Strogatz, "Collective dynamics of 'smallworld' networks," Nature, vol. 393, no. 6684, pp. 440-442, 1998. DOI: 10.1038/30918.
  26. P. G. Lind, M. C. Gonzalez, and H. J. Herrmann, "Cycles and clustering in bipartite networks," Physical Review E, vol. 72, no. 5, article no. 056127, 2005. DOI: 10.1103/PhysRevE.72.056127.
  27. D. Easley and J. Kleinberg, Networks, Crowds, and Markets: Reasoning about a Highly Connected World. New York, NY: Cambridge University Press, 2010.
  28. A. Rapoport, "Spread of information through a population with socio-structural bias. I. Assumption of transitivity," The Bulletin of Mathematical Biophysics, vol. 15, no. 4, pp. 523-533, 1953. DOI: 10.1007/BF02476440.
  29. V. Gripon and M. Rabbat, "Reconstructing a graph from path traces," in Proceedings of 2013 IEEE International Symposium on Information Theory, Istanbul, Turkey, pp. 2488-2492, 2013. DOI: 10.1109/ISIT.2013.6620674.
  30. M. S. Granovetter, "The strength of weak ties," American Journal of Sociology, vol. 78, no. 6, pp. 1360-1380, 1973. DOI: 10.1086/225469.