Advertisement

Influence Maximization in Social Networks with Genetic Algorithms

  • Doina Bucur
  • Giovanni Iacca
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9597)

Abstract

We live in a world of social networks. Our everyday choices are often influenced by social interactions. Word of mouth, meme diffusion on the Internet, and viral marketing are all examples of how social networks can affect our behaviour. In many practical applications, it is of great interest to determine which nodes have the highest influence over the network, i.e., which set of nodes will, indirectly, reach the largest audience when propagating information. These nodes might be, for instance, the target for early adopters of a product, the most influential endorsers in political elections, or the most important investors in financial operations, just to name a few examples. Here, we tackle the NP-hard problem of influence maximization on social networks by means of a Genetic Algorithm. We show that, by using simple genetic operators, it is possible to find in feasible runtime solutions of high-influence that are comparable, and occasionally better, than the solutions found by a number of known heuristics (one of which was previously proven to have the best possible approximation guarantee, in polynomial time, of the optimal solution). The advantages of Genetic Algorithms show, however, in them not requiring any assumptions about the graph underlying the network, and in them obtaining more diverse sets of feasible solutions than current heuristics.

Keywords

Social network Influence maximization Genetic algorithm Graph theory Combinatorial optimization 

References

  1. 1.
    Kempe, D., Kleinberg, J., Tardos, É.: Maximizing the spread of influence through a social network. Theory Comput. 11(4), 105–147 (2015)MathSciNetCrossRefzbMATHGoogle Scholar
  2. 2.
    Richardson, M., Agrawal, R., Domingos, P.: Trust management for the semantic web. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol. 2870, pp. 351–368. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  3. 3.
    Leskovec, J., Krevl, A.: SNAP Datasets: Stanford large network dataset collection, October 2015. http://snap.stanford.edu/data
  4. 4.
    Goldenberg, J., Libai, B., Muller, E.: Talk of the network: a complex systems look at the underlying process of word-of-mouth. Mark. Lett. 12(3), 211–223 (2001)CrossRefGoogle Scholar
  5. 5.
    Wang, C., Chen, W., Wang, Y.: Scalable influence maximization for independent cascade model in large-scale social networks. Data Min. Knowl. Disc. 25(3), 545–576 (2012)MathSciNetCrossRefzbMATHGoogle Scholar
  6. 6.
    Chen, W., Wang, Y., Yang, S.: Efficient influence maximization in social networks. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2009, pp. 199–208. ACM, New York (2009)Google Scholar
  7. 7.
    Jiang, Q., Song, G., Cong, G., Wang, Y., Si, W., Xie, K.: Simulated annealing based influence maximization in social networks. In: Burgard, W., Roth, D. (eds.) AAAI. AAAI Press (2011)Google Scholar
  8. 8.
    Garret, A.L.: Inspyred: A framework for creating bio-inspired computational intelligence algorithms in Python, October 2015. https://pypi.python.org/pypi/inspyred
  9. 9.
    Miller, B.L., Goldberg, D.E.: Genetic algorithms, tournament selection, and the effects of noise. Complex Syst. 9, 193–212 (1995)MathSciNetGoogle Scholar
  10. 10.
    Bucur, D., Iacca, G., Squillero, G., Tonda, A.: The impact of topology on energy consumption for collection tree protocols: an experimental assessment through evolutionary computation. Appl. Soft Comput. 16, 210–222 (2014)CrossRefGoogle Scholar
  11. 11.
    Bucur, D., Iacca, G., de Boer, P.T.: Characterizing topological bottlenecks for data delivery in CTP using simulation-based stress testing with natural selection. Ad Hoc Netw. 30, 22–45 (2015)CrossRefGoogle Scholar
  12. 12.
    Bucur, D., Iacca, G., Squillero, G., Tonda, A.: Black holes and revelations: using evolutionary algorithms to uncover vulnerabilities in disruption-tolerant networks. In: Mora, A.M., Squillero, G. (eds.) EvoApplications 2015. LNCS, vol. 9028, pp. 29–41. Springer, Switzerland (2015)Google Scholar
  13. 13.
    Bucur, D., Iacca, G., Gaudesi, M., Squillero, G., Tonda, A.: Optimizing groups of colluding strong attackers in mobile urban communication networks with evolutionary algorithms. Appl. Soft Comput. 40, 416–426 (2016)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  1. 1.Johann Bernoulli InstituteUniversity of GroningenGroningenThe Netherlands
  2. 2.INCAS3AssenThe Netherlands

Personalised recommendations