Skip to main content

Influence Spread in Social Networks with both Positive and Negative Influences

  • Conference paper
  • First Online:
Computing and Combinatorics (COCOON 2017)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 10392))

Included in the following conference series:

Abstract

Social networks are important mediums for spreading information, ideas, and influences among individuals. Most of existing research works of social networks focus on understanding the characteristics of social networks and spreading information through the “word of mouth” effect. However, most of them ignore negative influences among individuals and groups. Motivated by alleviating social problems, such as drinking, smoking, gambling, and influence spreading problems such as promoting new products, we take both positive and negative influences into consideration and propose a new optimization problem, named the Minimum-sized Positive Influential Node Set (MPINS) selection, to identify the minimum set of influential nodes, such that every node in the network can be positively influenced by these selected nodes no less than a threshold \(\theta \). Our contributions are threefold. First, we prove that, under the independent cascade model considering both positive and negative influences, MPINS is APX-hard. Subsequently, we present a greedy approximation algorithm to address the MPINS selection problem. Finally, to validate the proposed greedy algorithm, extensive simulations and experiments are conducted on random Graphs and seven different real-world data sets representing small, medium, and large scale networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    This model is reasonable since many empirical studies have analyzed the social influence probabilities between nodes [10, 17, 20].

  2. 2.

    A vertex cover is defined as a subset of nodes in a graph \(\mathcal {G}\) such that each edge of the graph is incident to at least one vertex of the set.

  3. 3.

    MIS can be defined formally as follows: given a graph \(G = (V,E)\), an Independent Set (IS) is a subset \(I \subset V\) such that for any two vertex \(v_{1}, v_{2} \in I\), they are not adjacent, i.e., \((v_{1}, v_{2}) \notin E\). An IS is called an MIS if we add one more arbitrary node to this subset, the new subset will not be an IS any more.

  4. 4.

    If there is a tie on the \(f(\mathcal {I})\) value, we use the node ID to break the tie.

  5. 5.

    http://snap.stanford.edu/data/.

References

  1. Kempe, D., Kleinberg, J., Tardos, É.: Maximizing the spread of influence through a social network. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 137–146. ACM (2003)

    Google Scholar 

  2. Saito, K., Kimura, M., Motoda, H.: Discovering influential nodes for sis models in social networks. In: Gama, J., Costa, V.S., Jorge, A.M., Brazdil, P.B. (eds.) DS 2009. LNCS, vol. 5808, pp. 302–316. Springer, Heidelberg (2009). doi:10.1007/978-3-642-04747-3_24

    Chapter  Google Scholar 

  3. Li, Y., Chen, W., Wang, Y., Zhang, Z.-L.: Influence diffusion dynamics and influence maximization in social networks with friend and foe relationships. In: Proceedings of the sixth ACM International Conference on Web Search and Data Mining, pp. 657–666. ACM (2013)

    Google Scholar 

  4. Han, M., Yan, M., Cai, Z., Li, Y., Cai, X., Yu, J.: Influence maximization by probing partial communities in dynamic online social networks. Trans. Emerging Telecommun. Technol

    Google Scholar 

  5. He, X., Song, G., Chen, W., Jiang, Q.: Influence blocking maximization in social networks under the competitive linear threshold model. In: Proceedings of the 2012 SIAM International Conference on Data Mining, pp. 463–474. SIAM (2012)

    Google Scholar 

  6. Lu, W., Bonchi, F., Goyal, A., Lakshmanan, L.V.: The bang for the buck: fair competitive viral marketing from the host perspective. In: Proceedings of the 19th SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 928–936. ACM (2013)

    Google Scholar 

  7. Selcuk Uluagac, A., Beyah, R., Ji, S., He, J. (Selena), Li, Y.: Cell-based snapshot and continuous data collection in wireless sensor networks. ACM Trans. Sensor Networks (TOSN) 9(4)

    Google Scholar 

  8. He, J. (Selena), Ji, S., Li, Y.: Genetic-algorithm-based construction of load-balanced cdss in wireless sensor networks. MILCOM 9(4)

    Google Scholar 

  9. Albinali, H., Han, M., Wang, J., Gao, H., Li, Y.: The roles of social network mavens. In: The 12th International Conference on Mobile Ad-hoc and Sensor Networks

    Google Scholar 

  10. Goyal, A., Bonchi, F., Lakshmanan, L.V.: Learning influence probabilities in social networks. In: Proceedings of the third ACM International Conference on Web Search and Data Mining, pp. 241–250. ACM (2010)

    Google Scholar 

  11. Han, M., Yan, M., Li, J., Ji, S., Li, Y.: Generating uncertain networks based on historical network snapshots. In: Du, D.-Z., Zhang, G. (eds.) COCOON 2013. LNCS, vol. 7936, pp. 747–758. Springer, Heidelberg (2013). doi:10.1007/978-3-642-38768-5_68

    Chapter  Google Scholar 

  12. Goyal, A., Lu, W., Lakshmanan, L.V.: Celf++: optimizing the greedy algorithm for influence maximization in social networks. In: Proceedings of the 20th International Conference Companion on World Wide Web, pp. 47–48. ACM (2011)

    Google Scholar 

  13. Han, M., Yan, M., Cai, Z., Li, Y.: An exploration of broader influence maximization in timeliness networks with opportunistic selection. J. Netw. Comput. Appl. 63, 39–49 (2016)

    Article  Google Scholar 

  14. Wang, C., Chen, W., Wang, Y.: Scalable influence maximization for independent cascade model in large-scale social networks. Data Mining Know. Discovery 25(3), 545 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  15. Han, M., Duan, Z., Ai, C., Lybarger, F.W., Li, Y., Bourgeois, A.G.: Time constraint influence maximization algorithm in the age of big data. Int. J. Comput. Sci. Eng

    Google Scholar 

  16. Tang, J., Wu, S., Sun, J.: Confluence: conformity influence in large social networks. In: Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 347–355. ACM (2013)

    Google Scholar 

  17. Saito, K., Nakano, R., Kimura, M.: Prediction of information diffusion probabilities for independent cascade model. In: Lovrek, I., Howlett, R.J., Jain, L.C. (eds.) KES 2008. LNCS, vol. 5179, pp. 67–75. Springer, Heidelberg (2008). doi:10.1007/978-3-540-85567-5_9

    Chapter  Google Scholar 

  18. Tang, J., Sun, J., Wang, C., Yang, Z.: Social influence analysis in large-scale networks. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 807–816. ACM (2009)

    Google Scholar 

  19. Han, M., Yan, M., Li, J., Ji, S., Li, Y.: Neighborhood-based uncertainty generation in social networks. J. Comb. Optim. 28(3), 561–576 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  20. Wang, C., Tang, J., Sun, J., Han, J.: Dynamic social influence analysis through time-dependent factor graphs. In: 2011 International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 239–246. IEEE (2011)

    Google Scholar 

  21. Wang, F., Camacho, E., Xu, K.: Positive influence dominating set in online social networks. In: Du, D.-Z., Hu, X., Pardalos, P.M. (eds.) COCOA 2009. LNCS, vol. 5573, pp. 313–321. Springer, Heidelberg (2009). doi:10.1007/978-3-642-02026-1_29

    Chapter  Google Scholar 

  22. Wang, F., Du, H., Camacho, E., Xu, K., Lee, W., Shi, Y., Shan, S.: On positive influence dominating sets in social networks. Theoret. Comput. Sci. 412(3), 265–269 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  23. Zhu, X., Yu, J., Lee, W., Kim, D., Shan, S., Du, D.-Z.: New dominating sets in social networks. J. Global Optim. 48(4), 633–642 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  24. He, J.S., Ji, S., Beyah, R., Cai, Z.: Minimum-sized influential node set selection for social networks under the independent cascade model. In: Proceedings of the 15th ACM International Symposium on Mobile ad hoc Networking and Computing, pp. 93–102. ACM (2014)

    Google Scholar 

  25. Kaur, H., He, J.S.: Blocking negative influential node set in social networks: from host perspective. Trans. Emerg. Telecommun. Technol. (ETT) 28(4)

    Google Scholar 

  26. Kempe, D., Kleinberg, J., Tardos, É.: Influential nodes in a diffusion model for social networks. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 1127–1138. Springer, Heidelberg (2005). doi:10.1007/11523468_91

    Chapter  Google Scholar 

  27. Leskovec, J., Krause, A., Guestrin, C., Faloutsos, C., VanBriesen, J., Glance, N.: Cost-effective outbreak detection in networks. In: Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 420–429. ACM (2007)

    Google Scholar 

  28. Chen, W., Yuan, Y., Zhang, L.: Scalable influence maximization in social networks under the linear threshold model. In: 2010 IEEE 10th International Conference on Data Mining (ICDM), pp. 88–97. IEEE (2010)

    Google Scholar 

  29. Han, M., Li, J., Cai, Z., Qilong, H.: Privacy reserved influence maximization in gps-enabled cyber-physical and online social networks. SocialCom 2016, 284–292 (2016)

    Google Scholar 

  30. Han, M., Han, Q., Li, L., Li, J., Li, Y.: Maximizing influence in sensed heterogenous social network with privacy preservation. Int. J. Sens. Netw

    Google Scholar 

  31. Du, D.-Z., Ko, K.-I.: Theory of Computational Complexity, vol. 58. Wiley, Hoboken (2011)

    MATH  Google Scholar 

  32. Technical report. http://ksuweb.kennesaw.edu/~jhe4/Research/MPINS

  33. Leskovec, J., Adamic, L.A., Huberman, B.A.: The dynamics of viral marketing. ACM Trans. Web (TWEB) 1(1) (2007). 5

    Google Scholar 

  34. Leskovec, J., Huttenlocher, D., Kleinberg, J.: Predicting positive and negative links in online social networks. In: Proceedings of the 19th International Conference on World Wide Web, pp. 641–650. ACM (2010)

    Google Scholar 

  35. Tang, J., Zhang, J., Yao, L., Li, J., Zhang, L., Su, Z.: Arnetminer: extraction and mining of academic social networks. In: Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 990–998. ACM (2008)

    Google Scholar 

  36. Hopcroft, J., Lou, T., Tang, J.: Who will follow you back?: reciprocal relationship prediction. In: Proceedings of the 20th ACM International Conference on Information and Knowledge Management, pp. 1137–1146. ACM (2011)

    Google Scholar 

  37. Lou, T., Tang, J., Hopcroft, J., Fang, Z., Ding, X.: Learning to predict reciprocity and triadic closure in social networks. ACM Trans. Know. Discov. from Data (TKDD) 7(2) (2013). 5

    Google Scholar 

  38. Wang, C., Chen, W., Wang, Y.: Scalable influence maximization for independent cascade model in large-scale social networks. Data Min. Know. Disc. 25(3)

    Google Scholar 

Download references

Acknowledgment

This research is funded in part by the Kennesaw State University College of Science and Mathematics Interdisciplinary Research Opportunities (IDROP) Program, the Provincial Key Research and Development Program of Zhejiang, China under No. 2016C01G2010916, the Fundamental Research Funds for the Central Universities, the Alibaba-Zhejiang University Joint Research Institute for Frontier Technologies (A.Z.F.T.) under Program No. XT622017000118, and the CCF-Tencent Open Research Fund under No. AGR20160109.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shouling Ji .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

He, J.(., Xie, Y., Du, T., Ji, S., Li, Z. (2017). Influence Spread in Social Networks with both Positive and Negative Influences. In: Cao, Y., Chen, J. (eds) Computing and Combinatorics. COCOON 2017. Lecture Notes in Computer Science(), vol 10392. Springer, Cham. https://doi.org/10.1007/978-3-319-62389-4_51

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-62389-4_51

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-62388-7

  • Online ISBN: 978-3-319-62389-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics