Abstract
Social networks are important mediums for spreading information, ideas, and influences among individuals. Most of existing research works of social networks focus on understanding the characteristics of social networks and spreading information through the “word of mouth” effect. However, most of them ignore negative influences among individuals and groups. Motivated by alleviating social problems, such as drinking, smoking, gambling, and influence spreading problems such as promoting new products, we take both positive and negative influences into consideration and propose a new optimization problem, named the Minimum-sized Positive Influential Node Set (MPINS) selection, to identify the minimum set of influential nodes, such that every node in the network can be positively influenced by these selected nodes no less than a threshold \(\theta \). Our contributions are threefold. First, we prove that, under the independent cascade model considering both positive and negative influences, MPINS is APX-hard. Subsequently, we present a greedy approximation algorithm to address the MPINS selection problem. Finally, to validate the proposed greedy algorithm, extensive simulations and experiments are conducted on random Graphs and seven different real-world data sets representing small, medium, and large scale networks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
A vertex cover is defined as a subset of nodes in a graph \(\mathcal {G}\) such that each edge of the graph is incident to at least one vertex of the set.
- 3.
MIS can be defined formally as follows: given a graph \(G = (V,E)\), an Independent Set (IS) is a subset \(I \subset V\) such that for any two vertex \(v_{1}, v_{2} \in I\), they are not adjacent, i.e., \((v_{1}, v_{2}) \notin E\). An IS is called an MIS if we add one more arbitrary node to this subset, the new subset will not be an IS any more.
- 4.
If there is a tie on the \(f(\mathcal {I})\) value, we use the node ID to break the tie.
- 5.
References
Kempe, D., Kleinberg, J., Tardos, É.: Maximizing the spread of influence through a social network. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 137–146. ACM (2003)
Saito, K., Kimura, M., Motoda, H.: Discovering influential nodes for sis models in social networks. In: Gama, J., Costa, V.S., Jorge, A.M., Brazdil, P.B. (eds.) DS 2009. LNCS, vol. 5808, pp. 302–316. Springer, Heidelberg (2009). doi:10.1007/978-3-642-04747-3_24
Li, Y., Chen, W., Wang, Y., Zhang, Z.-L.: Influence diffusion dynamics and influence maximization in social networks with friend and foe relationships. In: Proceedings of the sixth ACM International Conference on Web Search and Data Mining, pp. 657–666. ACM (2013)
Han, M., Yan, M., Cai, Z., Li, Y., Cai, X., Yu, J.: Influence maximization by probing partial communities in dynamic online social networks. Trans. Emerging Telecommun. Technol
He, X., Song, G., Chen, W., Jiang, Q.: Influence blocking maximization in social networks under the competitive linear threshold model. In: Proceedings of the 2012 SIAM International Conference on Data Mining, pp. 463–474. SIAM (2012)
Lu, W., Bonchi, F., Goyal, A., Lakshmanan, L.V.: The bang for the buck: fair competitive viral marketing from the host perspective. In: Proceedings of the 19th SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 928–936. ACM (2013)
Selcuk Uluagac, A., Beyah, R., Ji, S., He, J. (Selena), Li, Y.: Cell-based snapshot and continuous data collection in wireless sensor networks. ACM Trans. Sensor Networks (TOSN) 9(4)
He, J. (Selena), Ji, S., Li, Y.: Genetic-algorithm-based construction of load-balanced cdss in wireless sensor networks. MILCOM 9(4)
Albinali, H., Han, M., Wang, J., Gao, H., Li, Y.: The roles of social network mavens. In: The 12th International Conference on Mobile Ad-hoc and Sensor Networks
Goyal, A., Bonchi, F., Lakshmanan, L.V.: Learning influence probabilities in social networks. In: Proceedings of the third ACM International Conference on Web Search and Data Mining, pp. 241–250. ACM (2010)
Han, M., Yan, M., Li, J., Ji, S., Li, Y.: Generating uncertain networks based on historical network snapshots. In: Du, D.-Z., Zhang, G. (eds.) COCOON 2013. LNCS, vol. 7936, pp. 747–758. Springer, Heidelberg (2013). doi:10.1007/978-3-642-38768-5_68
Goyal, A., Lu, W., Lakshmanan, L.V.: Celf++: optimizing the greedy algorithm for influence maximization in social networks. In: Proceedings of the 20th International Conference Companion on World Wide Web, pp. 47–48. ACM (2011)
Han, M., Yan, M., Cai, Z., Li, Y.: An exploration of broader influence maximization in timeliness networks with opportunistic selection. J. Netw. Comput. Appl. 63, 39–49 (2016)
Wang, C., Chen, W., Wang, Y.: Scalable influence maximization for independent cascade model in large-scale social networks. Data Mining Know. Discovery 25(3), 545 (2012)
Han, M., Duan, Z., Ai, C., Lybarger, F.W., Li, Y., Bourgeois, A.G.: Time constraint influence maximization algorithm in the age of big data. Int. J. Comput. Sci. Eng
Tang, J., Wu, S., Sun, J.: Confluence: conformity influence in large social networks. In: Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 347–355. ACM (2013)
Saito, K., Nakano, R., Kimura, M.: Prediction of information diffusion probabilities for independent cascade model. In: Lovrek, I., Howlett, R.J., Jain, L.C. (eds.) KES 2008. LNCS, vol. 5179, pp. 67–75. Springer, Heidelberg (2008). doi:10.1007/978-3-540-85567-5_9
Tang, J., Sun, J., Wang, C., Yang, Z.: Social influence analysis in large-scale networks. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 807–816. ACM (2009)
Han, M., Yan, M., Li, J., Ji, S., Li, Y.: Neighborhood-based uncertainty generation in social networks. J. Comb. Optim. 28(3), 561–576 (2014)
Wang, C., Tang, J., Sun, J., Han, J.: Dynamic social influence analysis through time-dependent factor graphs. In: 2011 International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 239–246. IEEE (2011)
Wang, F., Camacho, E., Xu, K.: Positive influence dominating set in online social networks. In: Du, D.-Z., Hu, X., Pardalos, P.M. (eds.) COCOA 2009. LNCS, vol. 5573, pp. 313–321. Springer, Heidelberg (2009). doi:10.1007/978-3-642-02026-1_29
Wang, F., Du, H., Camacho, E., Xu, K., Lee, W., Shi, Y., Shan, S.: On positive influence dominating sets in social networks. Theoret. Comput. Sci. 412(3), 265–269 (2011)
Zhu, X., Yu, J., Lee, W., Kim, D., Shan, S., Du, D.-Z.: New dominating sets in social networks. J. Global Optim. 48(4), 633–642 (2010)
He, J.S., Ji, S., Beyah, R., Cai, Z.: Minimum-sized influential node set selection for social networks under the independent cascade model. In: Proceedings of the 15th ACM International Symposium on Mobile ad hoc Networking and Computing, pp. 93–102. ACM (2014)
Kaur, H., He, J.S.: Blocking negative influential node set in social networks: from host perspective. Trans. Emerg. Telecommun. Technol. (ETT) 28(4)
Kempe, D., Kleinberg, J., Tardos, É.: Influential nodes in a diffusion model for social networks. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 1127–1138. Springer, Heidelberg (2005). doi:10.1007/11523468_91
Leskovec, J., Krause, A., Guestrin, C., Faloutsos, C., VanBriesen, J., Glance, N.: Cost-effective outbreak detection in networks. In: Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 420–429. ACM (2007)
Chen, W., Yuan, Y., Zhang, L.: Scalable influence maximization in social networks under the linear threshold model. In: 2010 IEEE 10th International Conference on Data Mining (ICDM), pp. 88–97. IEEE (2010)
Han, M., Li, J., Cai, Z., Qilong, H.: Privacy reserved influence maximization in gps-enabled cyber-physical and online social networks. SocialCom 2016, 284–292 (2016)
Han, M., Han, Q., Li, L., Li, J., Li, Y.: Maximizing influence in sensed heterogenous social network with privacy preservation. Int. J. Sens. Netw
Du, D.-Z., Ko, K.-I.: Theory of Computational Complexity, vol. 58. Wiley, Hoboken (2011)
Technical report. http://ksuweb.kennesaw.edu/~jhe4/Research/MPINS
Leskovec, J., Adamic, L.A., Huberman, B.A.: The dynamics of viral marketing. ACM Trans. Web (TWEB) 1(1) (2007). 5
Leskovec, J., Huttenlocher, D., Kleinberg, J.: Predicting positive and negative links in online social networks. In: Proceedings of the 19th International Conference on World Wide Web, pp. 641–650. ACM (2010)
Tang, J., Zhang, J., Yao, L., Li, J., Zhang, L., Su, Z.: Arnetminer: extraction and mining of academic social networks. In: Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 990–998. ACM (2008)
Hopcroft, J., Lou, T., Tang, J.: Who will follow you back?: reciprocal relationship prediction. In: Proceedings of the 20th ACM International Conference on Information and Knowledge Management, pp. 1137–1146. ACM (2011)
Lou, T., Tang, J., Hopcroft, J., Fang, Z., Ding, X.: Learning to predict reciprocity and triadic closure in social networks. ACM Trans. Know. Discov. from Data (TKDD) 7(2) (2013). 5
Wang, C., Chen, W., Wang, Y.: Scalable influence maximization for independent cascade model in large-scale social networks. Data Min. Know. Disc. 25(3)
Acknowledgment
This research is funded in part by the Kennesaw State University College of Science and Mathematics Interdisciplinary Research Opportunities (IDROP) Program, the Provincial Key Research and Development Program of Zhejiang, China under No. 2016C01G2010916, the Fundamental Research Funds for the Central Universities, the Alibaba-Zhejiang University Joint Research Institute for Frontier Technologies (A.Z.F.T.) under Program No. XT622017000118, and the CCF-Tencent Open Research Fund under No. AGR20160109.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
He, J.(., Xie, Y., Du, T., Ji, S., Li, Z. (2017). Influence Spread in Social Networks with both Positive and Negative Influences. In: Cao, Y., Chen, J. (eds) Computing and Combinatorics. COCOON 2017. Lecture Notes in Computer Science(), vol 10392. Springer, Cham. https://doi.org/10.1007/978-3-319-62389-4_51
Download citation
DOI: https://doi.org/10.1007/978-3-319-62389-4_51
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-62388-7
Online ISBN: 978-3-319-62389-4
eBook Packages: Computer ScienceComputer Science (R0)