Skip to main content
Log in

Stemming competitive influence spread in social networks through binary ions motion optimization

  • Original Article
  • Published:
International Journal of Machine Learning and Cybernetics Aims and scope Submit manuscript

Abstract

The rapid development of social networks has brought many conveniences, but it has also resulted in the wanton dissemination of negative information. Identifying key users in the network to block negative information in a timely and effective manner has become an urgent research task. For this purpose, this paper proposes a binary ions motion optimization algorithm to maximize the blocking of negative influence propagation under a competitive-based model. The algorithm adopts a degree-based heuristic initialization strategy by recoding search agents and blocking diffusion channels based on the negative seed location. To overcome the lack of crystal phase search ability, a crossover mechanism of anions and cations is introduced, which accelerates convergence and facilitates the discovery of optimal solution. Finally, the effectiveness of the proposed algorithm is demonstrated on real networks and synthetic networks, showing significant advancements compared to other algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Data availability

The datasets generated during and/or analysed during the current study are available in the [43, 45] repository, [Network Repository,The KONECT Project].

Abbreviations

\(\Theta _v^{+}\) :

The positive activation threshold of node v

\(\Theta _v^{-}\) :

The negative activation threshold of node v

\(G = (V, E)\) :

A network with the node set V and the edge set E

\(IBS(P_0,N_0)\) :

The blocked negative influence

\(N^{+}(u)\) :

The active out-neighbour nodes of u

\(N^{-}(v)\) :

The active in-neighbour nodes of v

\(P_0, N_0\) :

Initial positive active seed set/negative active seed set

\(S_N\) :

The set of all negative active nodes

\(S_P\) :

The set of all positive active nodes

\(S_{P*}\) :

The selected positive seed set

\(w^+(u,v)\) :

The positive weight of edge (uv)

\(w^-(u,v)\) :

The negative weight of edge (uv)

References

  1. Kempe D, Kleinberg J, Tardos É (2003) Maximizing the spread of influence through a social network. In: Proceedings of the ninth ACM SIGKDD international conference on knowledge discovery and data mining, pp 137–146 (2003). https://doi.org/10.1145/956750.956769

  2. Leskovec J, Krause A, Guestrin C, Faloutsos C, VanBriesen J, Glance N (2007) Cost-effective outbreak detection in networks. In: Proceedings of the 13th ACM SIGKDD international conference on knowledge discovery and data mining, pp 420–429. https://doi.org/10.1145/1281192.1281239

  3. Brin S, Page L (2012) Reprint of: The anatomy of a large-scale hypertextual web search engine. Comput Netw 56(18):3825–3833. https://doi.org/10.1016/j.comnet.2012.10.007

    Article  Google Scholar 

  4. Borgs C, Brautbar M, Chayes J, Lucier B (2014) Maximizing social influence in nearly optimal time. In: Proceedings of the twenty-fifth annual ACM-SIAM symposium on discrete algorithms. SIAM, pp 946–957. https://doi.org/10.1137/1.9781611973402.70

  5. Goyal A, Lu W, Lakshmanan LV (2011) Celf++ optimizing the greedy algorithm for influence maximization in social networks. In: Proceedings of the 20th international conference companion on World Wide Web, pp 47–48. https://doi.org/10.1145/1963192.1963217

  6. Gao G, Xiao M, Wu J, Huang H, Chen G (2018) Minimum cost seed selection for multiple influences diffusion in communities. In: 2018 IEEE 15th international conference on mobile ad hoc and sensor systems (MASS). IEEE, pp 263–271. https://doi.org/10.1137/1.9781611973402.70

  7. Liu Z, Li Y, Liu H (2021) Influence maximization based on maximum inner product search. Neural Comput Appl. https://doi.org/10.1007/s00521-021-06595-2

    Article  Google Scholar 

  8. Gong M, Yan J, Shen B, Ma L, Cai Q (2016) Influence maximization in social networks based on discrete particle swarm optimization. Inf Sci 367:600–614. https://doi.org/10.1016/j.ins.2016.07.012

    Article  Google Scholar 

  9. Şimşek A, Resul K (2018) Using swarm intelligence algorithms to detect influential individuals for influence maximization in social networks. Expert Syst Appl 114:224–236. https://doi.org/10.1016/j.eswa.2018.07.038

    Article  Google Scholar 

  10. Wang L, Ma L, Wang C, Xie N, Koh JM, Cheong KH (2021) Identifying influential spreaders in social networks through discrete moth-flame optimization. IEEE Trans Evol Comput 25(6):1091–1102. https://doi.org/10.1109/TEVC.2021.3081478

    Article  Google Scholar 

  11. Bozorgi A, Haghighi H, Zahedi MS, Rezvani M (2016) Incim: a community-based algorithm for influence maximization problem under the linear threshold model. Inf Process Manag 52(6):1188–1199. https://doi.org/10.1016/j.ipm.2016.05.006

    Article  Google Scholar 

  12. Martinez-Seis B, Li X, Wang X (2019) Measure community quality by attribute importance and density in social networks. In: 2019 IEEE 15th international conference on automation science and engineering (CASE). IEEE, pp 628–633. https://doi.org/10.1109/COASE.2019.8842970

  13. Chen W, Yuan Y, Zhang L (2010) Scalable influence maximization in social networks under the linear threshold model. In: 2010 IEEE international conference on data mining. IEEE, pp 88–97. https://doi.org/10.1109/icdm.2010.118

  14. Bharathi S, Kempe D, Salek M (2007) Competitive influence maximization in social networks. In: International workshop on web and internet economics. Springer, pp 306–311. https://doi.org/10.1007/978-3-540-77105-0_31

  15. Bor SE (2014) Using social network sites to improve communication between political campaigns and citizens in the 2012 election. Am Behav Sci 58(9):1195–1213. https://doi.org/10.1177/0002764213490698

    Article  Google Scholar 

  16. Huang H, Chen Y, Ma Y (2021) Modeling the competitive diffusions of rumor and knowledge and the impacts on epidemic spreading. Appl Math Comput 388:125536. https://doi.org/10.1016/j.amc.2020.125536

    Article  MathSciNet  Google Scholar 

  17. Yang L, Li Z, Giua A (2020) Containment of rumor spread in complex social networks. Inf Sci 506:113–130. https://doi.org/10.1016/j.ins.2019.07.055

    Article  MathSciNet  Google Scholar 

  18. Kimura M, Saito K, Motoda H (2009) Blocking links to minimize contamination spread in a social network. ACM Trans Knowl Discov Data (TKDD) 3(2):1–23. https://doi.org/10.1145/1514888.1514892

    Article  Google Scholar 

  19. Borodin A, Filmus Y, Oren J (2010) Threshold models for competitive influence in social networks. In: International workshop on internet and network economics. Springer, pp 539–550. https://doi.org/10.1007/978-3-642-17572-5_48

  20. He X, Song G, Chen W, Jiang Q (2012) Influence blocking maximization in social networks under the competitive linear threshold model. In: Proceedings of the 2012 Siam international conference on data mining. SIAM, pp 463–474. https://doi.org/10.1137/1.9781611972825.40

  21. Bozorgi A, Samet S, Kwisthout J, Wareham T (2017) Community-based influence maximization in social networks under a competitive linear threshold model. Knowl Based Syst 134:149–158. https://doi.org/10.1016/j.knosys.2017.07.029

    Article  Google Scholar 

  22. Poli R, Kennedy J, Blackwell T (2007) Particle swarm optimization. Swarm Intell 1(1):33–57. https://doi.org/10.1007/s11721-007-0002-0

    Article  Google Scholar 

  23. Wang C, Xu R-Q, Ma L, Zhao J, Wang L, Xie N-G, Cheong KH (2023) An efficient salp swarm algorithm based on scale-free informed followers with self-adaption weight. Appl Intell 53(2):1759–1791. https://doi.org/10.1007/s10489-022-03438-y

    Article  Google Scholar 

  24. Pourpanah F, Wang R, Lim CP, Wang X, Yazdani D (2023) A review of artificial fish swarm algorithms: recent advances and applications. Artif Intell Rev 56(3):1867–1903. https://doi.org/10.1007/s10462-022-10214-4

    Article  Google Scholar 

  25. Javidy B, Hatamlou A, Mirjalili S (2015) Ions motion algorithm for solving optimization problems. Appl Soft Comput 32:72–79. https://doi.org/10.1016/j.asoc.2015.03.035

    Article  Google Scholar 

  26. Issa M, Abd Elaziz M (2020) Analyzing Covid-19 virus based on enhanced fragmented biological local aligner using improved ions motion optimization algorithm. Appl Soft Comput 96:106683. https://doi.org/10.1016/j.asoc.2020.106683

    Article  Google Scholar 

  27. Das S, Bhattacharya A, Chakraborty AK (2018) Quasi-reflected ions motion optimization algorithm for short-term hydrothermal scheduling. Neural Comput Appl 29(6):123–149. https://doi.org/10.1007/s00521-016-2529-8

    Article  Google Scholar 

  28. Pan J-S, Nguyen T-T, Chu S-C, Dao T-K, Ngo T-G (2018) A multi-objective ions motion optimization for robot path planning. In: International conference on engineering research and applications. Springer, pp 46–54. https://doi.org/10.1007/978-3-030-04792-4_8

  29. Nguyen T, Wang M, Pan J, Dao T, Ngo T (2020) A load economic dispatch based on ion motion optimization algorithm. In: Advances in intelligent information hiding and multimedia signal processing. Springer, pp 115–125. https://doi.org/10.1007/978-981-13-9710-3_12

  30. Domingos P, Richardson M (2001) Mining the network value of customers. In: Proceedings of the seventh ACM SIGKDD international conference on knowledge discovery and data mining, pp 57–66. https://doi.org/10.1145/502512.502525

  31. Li W, Fan Y, Mo J, Liu W, Wang C, Xin M, Jin Q (2020) Three-hop velocity attenuation propagation model for influence maximization in social networks. World Wide Web 23(2):1261–1273. https://doi.org/10.1007/s11280-019-00750-5

    Article  Google Scholar 

  32. He Y, Xie H, Wong T-L, Wang X (2018) A novel binary artificial bee colony algorithm for the set-union knapsack problem. Future Gener Comput Syst 78:77–86. https://doi.org/10.1016/j.future.2017.05.044

    Article  Google Scholar 

  33. He Y, Wang X (2021) Group theory-based optimization algorithm for solving knapsack problems. Knowl Based Syst 219:104445. https://doi.org/10.1016/j.knosys.2018.07.045

    Article  Google Scholar 

  34. Kennedy J, Eberhart RC (1997) A discrete binary version of the particle swarm algorithm. In: 1997 IEEE International conference on systems, man, and cybernetics. Computational cybernetics and simulation, vol 5. IEEE, pp 4104–4108. https://doi.org/10.1109/icsmc.1997.637339

  35. Rashedi E, Nezamabadi-Pour H, Saryazdi S (2010) Bgsa: binary gravitational search algorithm. Nat Comput 9(3):727–745. https://doi.org/10.1007/s11047-009-9175-3

    Article  MathSciNet  Google Scholar 

  36. Faris H, Mafarja MM, Heidari AA, Aljarah I, Ala’m A-Z, Mirjalili S, Fujita H (2018) An efficient binary salp swarm algorithm with crossover scheme for feature selection problems. Knowl Based Syst 154:43–67. https://doi.org/10.1016/j.knosys.2018.05.009

    Article  Google Scholar 

  37. Emary E, Zawbaa HM, Hassanien AE (2016) Binary ant lion approaches for feature selection. Neurocomputing 213:54–65. https://doi.org/10.1016/j.neucom.2016.03.101

    Article  Google Scholar 

  38. Zhou Y, Kang J, Kwong S, Wang X, Zhang Q (2021) An evolutionary multi-objective optimization framework of discretization-based feature selection for classification. Swarm Evol Comput 60:100770. https://doi.org/10.1016/j.swevo.2020.100770

    Article  Google Scholar 

  39. Frank A, Asuncion A, et al (2010) Uci machine learning repository. http://archive.ics.uci.edu

  40. Guo G, Wang H, Bell D, Bi Y, Greer K (2003) Knn model-based approach in classification. In: On the move to meaningful internet systems 2003: CoopIS, DOA, and ODBASE: OTM confederated international conferences, CoopIS, DOA, and ODBASE 2003, Catania, Sicily, Italy, November 3–7, 2003. Proceedings. Springer, pp 986–996. https://doi.org/10.1007/978-3-540-39964-3_62

  41. Wolpert DH, Macready WG (1997) No free lunch theorems for optimization. IEEE Trans Evol Comput 1(1):67–82. https://doi.org/10.1109/4235.585893

    Article  Google Scholar 

  42. Rossi R, Ahmed N (2015) The network data repository with interactive graph analytics and visualization. In: Twenty-ninth AAAI conference on artificial intelligence, pp 4292–4293. https://doi.org/10.1609/aaai.v29i1.9277

  43. Rossi R, Ahmed N (2012) Network repository: a scientific network data repository with interactive visualization and mining tools. https://networkrepository.com

  44. Rossi RA, Ahmed NK (2015) Networkrepository: A graph data repository with visual interactive analytics. In: 29th AAAI conference on artificial intelligence, Austin, Texas, USA, pp 25–30. arXiv:1410.3560

  45. Kunegis J (2013) Konect: the koblenz network collection. In: Proceedings of the 22nd international conference on World Wide Web, pp 1343–1350. http://dx.doi.org/10.1145/2487788.2488173

  46. Watts DJ, Strogatz SH (1998) Collective dynamics of ‘small-world’ networks. Nature 393(6684):440–442. https://doi.org/10.1038/30918

    Article  Google Scholar 

  47. Duch J, Arenas A (2005) Community detection in complex networks using extremal optimization. Phys Rev E 72(2):027104. https://doi.org/10.1103/physreve.72.027104

    Article  Google Scholar 

  48. Erdős P, Rényi A et al (1960) On the evolution of random graphs. Publ Math Inst Hung Acad Sci 5(1):17–60

    MathSciNet  Google Scholar 

  49. Arazkhani N, Meybodi MR, Rezvanian A (2019) Influence blocking maximization in social network using centrality measures. In: 2019 5th conference on knowledge based engineering and innovation (KBEI). IEEE, pp 492–497. https://doi.org/10.1109/KBEI.2019.8734920

Download references

Acknowledgements

This study was supported by the Program for Synergy Innovation in the Anhui Higher Education Institutions of China (Grant no. GXXT-2021-044), the Excellent scientific research and innovation team of Anhui Provincial Education Department, China (no. 2022AH010027), Scientific Research Foundation of Education Department of Anhui Province, China (Grant nos. KJ2021A0506), Natural Science Foundation of Anhui Province, China (Grant no. 2108085MG237), Open Fund of Key Laboratory of Anhui Higher Education Institutes, China (Grant no. CS2021-02), Philosophy and Social Sciences Planning Project of Anhui Province, China (Grant no. AHSKQ2021D116) and Research Start-Up Fund for Introducing Talents from Anhui Polytechnic University (Grant no. 2021YQQ066).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Chao Wang or Nenggang Xie.

Ethics declarations

Conflict of interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kong, P., Wang, C., Ma, L. et al. Stemming competitive influence spread in social networks through binary ions motion optimization. Int. J. Mach. Learn. & Cyber. 15, 719–737 (2024). https://doi.org/10.1007/s13042-023-01936-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13042-023-01936-0

Keywords

Navigation