Encyclopedia of Social Network Analysis and Mining

2018 Edition
| Editors: Reda Alhajj, Jon Rokne

Influence Maximization Model

  • Qi LiuEmail author
  • Zhefeng Wang
  • Enhong Chen
Reference work entry
DOI: https://doi.org/10.1007/978-1-4939-7131-2_110197

Synonyms

Glossary

Active nodes

The nodes that adopt the piece of information propagated

Diffusion

The spread of information, idea, or product in social networks

Influence spread

The expected number of active nodes when the process of information diffusion terminates

Seed nodes

The nodes that are the initial disseminators of an information

Definition

According to the opinion of Aristotle, human beings are social animals. Specifically, in social networks, people often make decisions (e.g., repost a tweet) under the influence of their friends. By utilizing such “word-of-mouth” effect, influence maximization aims to trigger a large cascade of influence spread in a social network by targeting on only a small set of individuals. Technically and more specifically, given a diffusion model, which specifies the dynamics of influence spread, each influence maximization model figures out a way to select a set...

This is a preview of subscription content, log in to check access.

References

  1. Bass FM (1969) A new product growth for model consumer durables. Manag Sci 15(5):215–227zbMATHCrossRefGoogle Scholar
  2. Bhagat S, Goyal A, Lakshmanan LVS (2012) Maximizing product adoption in social networks. In: Proceedings of the fifth ACM international conference on web search and data mining, pp 603–612Google Scholar
  3. Borgs C, Brautbar M, Chayes J, Lucier B (2014) Maximizing social influence in nearly optimal time. In: Proceedings of the twenty-fifth annual ACM-SIAM symposium on discrete algorithms. Society for Industrial and Applied Mathematics, Philadelphia, pp 946–957Google Scholar
  4. Borodin A, Filmus Y, Oren J (2010) Threshold models for competitive influence in social networks. In: International workshop on internet and network economics. Springer, pp 539–550Google Scholar
  5. Budak C, Agrawal D, El Abbadi A (2011) Limiting the spread of misinformation in social networks. In: Proceedings of the 20th international conference on World Wide Web. ACM, pp 665–674Google Scholar
  6. Chen W (2015) Research on influence diffusion in social netwoks. Big Data Res 3:1–17Google Scholar
  7. Chen W, Wang C, Wang Y (2010a) Scalable influence maximization for prevalent viral marketing in large-scale social networks. In: Proceedings of the ACM SIGKDD international conference on knowledge discovery and data mining. ACM, pp 1029–1038Google Scholar
  8. Chen W, Yuan Y, Zhang L (2010b) Scalable influence maximization in social networks under the linear threshold model. In: Proceedings of the international conference on data mining. IEEE, pp 88–97Google Scholar
  9. Chen W, Lu W, Zhang N (2012) Time-critical influence maximization in social networks with time-delayed diffusion process. national conference on artificial intelligence. Proc Nat Conf Artif Intell 1:592–598Google Scholar
  10. Chen W, Lakshmanan LVS, Castillo C (2013) Information and influence propagation in social networks. Synth Lect Data Manag 5(4):1–177CrossRefGoogle Scholar
  11. Cheng S, Shen H, Huang J, Chen W, Cheng X (2014) Imrank: influence maximization via finding self-consistent ranking. In: Proceedings of the 37th international ACM SIGIR conference on research & development in information retrieval. ACM, pp 475–484Google Scholar
  12. Domingos P, Richardson M (2001) Mining the network value of customers. In: Proceedings of the seventh ACM SIGKDD international conference on knowledge discovery and data mining. ACM, pp 57–66Google Scholar
  13. Du N, Song L, Gomez-Rodriguez M, Zha H (2013) Scalable influence estimation in continuous-time diffusion networks. Adv Neural Inf Proces Syst 26:3147–3155Google Scholar
  14. Goldenberg J, Libai B, Muller E (2001) Talk of the network: a complex systems look at the underlying process of word-of-mouth. Mark Lett 12(3):211–223CrossRefGoogle Scholar
  15. Goyal A, Bonchi F, Lakshmanan LVS (2011a) A data-based approach to social influence maximization. Very large data bases 5(1):73–84CrossRefGoogle Scholar
  16. Goyal A, Lu W, Lakshmanan LVS (2011b) Celf++: optimizing the greedy algorithm for influence maximization in social networks. In: Proceedings of the 20th international conference companion on World Wide Web. ACM, pp 47–48Google Scholar
  17. Goyal A, Lu W, Lakshmanan LVS (2011c) Simpath: an efficient algorithm for influence maximization under the linear threshold model. In: Proceedings of the international conference on data mining. IEEE, pp 211–220Google Scholar
  18. Granovetter M (1978) Threshold models of collective behavior. Am J Sociol 83(6):1420–1443CrossRefGoogle Scholar
  19. He X, Kempe D (2016) Robust influence maximization. In: Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining. ACM, pp 885–894Google Scholar
  20. Jung K, Heo W, Chen W (2012) Irie: scalable and robust influence maximization in social networks. In: 2012 I.E. 12th international conference on data mining. IEEE, pp 918–923Google Scholar
  21. Kempe D, Kleinberg J, Tardos É (2003) Maximizing the spread of influence through a social network. In: Proceedings of the ninth ACM SIGKDD international conference on knowledge discovery and data mining. ACM, pp 137–146Google Scholar
  22. Kempe D, Kleinberg J, Tardos É (2005) Influential nodes in a diffusion model for social networks. In: International colloquium on automata, languages, and programming. Springer, pp 1127–1138CrossRefGoogle Scholar
  23. Leskovec J, Krause A, Guestrin C, Faloutsos C, VanBriesen J, Glance N (2007) Costeffective outbreak detection in networks. In: Proceedings of the 13th ACM SIGKDD international conference on knowledge discovery and data mining. ACM, pp 420–429Google Scholar
  24. Liu Q, Dong Z, Liu C, Xie X, Chen E, Xiong H (2014a) Social marketing meets targeted customers: a typical user selection and coverage perspective. In: 2014 I.E. international conference on data mining. IEEE, pp 350–359Google Scholar
  25. Liu Q, Xiang B, Chen E, Xiong H, Tang F, Yu JX (2014b) Influence maximization over large-scale social networks: a bounded linear approach. In: Proceedings of the 23rd ACM international conference on information and knowledge management. ACM, pp 171–180Google Scholar
  26. Lu W, Chen W, Lakshmanan LVS (2015) From competition to complementarity: comparative influence diffusion and maximization. Proc VLDB Endowment 9(2):60–71CrossRefGoogle Scholar
  27. Ma G, Liu Q, Wu L, Chen E (2015) Identifying hesitant and interested customers for targeted social marketing. In: Pacific-Asia conference on knowledge discovery and data mining. Springer, pp 576–590Google Scholar
  28. Nguyen HT, Thai MT, Dinh TN (2016) Stop-and-stare: optimal sampling algorithms for viral marketing in billion-scale networks. In: Proceedings of the ACM SIGMOD international conference on management of data. ACM, pp 695–710Google Scholar
  29. Rodriguez MG, Balduzzi D, Schölkopf B (2011) Uncovering the temporal dynamics of diffusion networks. In: International conference on machine learning, pp 561–568Google Scholar
  30. Tang F, Liu Q, Zhu H, Chen E, Zhu F (2014a) Diversified social influence maximization. In: International conference on advances in social networks analysis and mining. IEEE, pp 455–459Google Scholar
  31. Tang Y, Xiao X, Shi Y (2014b) Influence maximization: near-optimal time complexity meets practical efficiency. In: Proceedings of the ACM SIGMOD international conference on management of data. ACM, pp 75–86Google Scholar
  32. Tang Y, Shi Y, Xiao X (2015) Influence maximization in near-linear time: a martingale approach. In: Proceedings of the ACM SIGMOD international conference on management of data. ACM, pp 1539–1554Google Scholar
  33. Wang C, Yu X, Li Y, Zhai C, Han J (2013) Content coverage maximization on word networks for hierarchical topic summarization. In: Proceedings of the 22nd ACM international conference on information & knowledge management. ACM, pp 249–258Google Scholar
  34. Wang Z, Chen E, Liu Q, Yang Y, Ge Y, Chang B (2015) Maximizing the coverage of information propagation in social networks. In: Proceedings of the international conference on artificial intelligence. AAAI Press, pp 2104–2110Google Scholar
  35. Wang X, Zhang Y, Zhang W, Lin X (2016) Distance-aware influence maximization in geo-social network. In: International conference on data engineering, pp 1–12Google Scholar
  36. Wasserman S, Faust K (1994) Social network analysis: methods and applications, vol 8. Cambridge University PressGoogle Scholar
  37. Wu L, Liu Q, Chen E, Xie X, Tan C (2015) Product adoption rate prediction: a multifactor view. In: 2015 SIAM international conference on data mining (SDM 2015). SIAM, VancouverCrossRefGoogle Scholar
  38. Xiang B, Liu Q, Chen E, Xiong H, Zheng Y, Yang Y (2013) Pagerank with priors: an influence propagation perspective. In: International joint conference on artificial intelligence, pp 2740–2746Google Scholar
  39. Xu T, Liu D, Chen E, Cao H, Tian J (2012) Towards annotating media contents through social diffusion analysis. In: 2012 I.E. 12th international conference on data mining. IEEE, pp 1158–1163Google Scholar
  40. Zhu H, Zhu H, Zhao X, Liu Q, Zhong H, Chen E, Xiong H (2016) Taxi driving behavior analysis in latent vehicle-to-vehicle networks: a social influence perspective. In: ACM SIGKDD international conference on knowledge discovery and data mining, pp 1285–1294Google Scholar
  41. Yang Y, Chen E, Liu Q, Xiang B, Xu T, Shad SA (2012) On approximation of real-world influence spread. In: Joint European conference on machine learning and knowledge discovery in databases. Springer, pp 548–564CrossRefGoogle Scholar
  42. Yang Y, Mao X, Pei J, He X (2016) Continuous influence maximization: what discounts should we offer to social network users? In: Proceedings of the ACM SIGMOD international conference on management of data. ACMGoogle Scholar

Copyright information

© Springer Science+Business Media LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.School of Computer Science and TechnologyUniversity of Science and Technology of ChinaAnhuiChina

Section editors and affiliations

  • Guandong Xu
    • 1
  • Peng Cui
    • 2
  1. 1.University of Technology SydneySydneyAustralia
  2. 2.Tsinghua UniversityBeijingChina