Semantics-aware influence maximization in social networks

被引:28
|
作者
Chen, Yipeng [1 ,2 ]
Qu, Qiang [3 ]
Ying, Yuanxiang [1 ,2 ]
Li, Hongyan [1 ,2 ]
Shen, Jialie [4 ]
机构
[1] Peking Univ, Minist Educ, Key Lab Machine Percept, Beijing, Peoples R China
[2] Peking Univ, Sch Elect Engn & Comp Sci, Beijing, Peoples R China
[3] Chinese Acad Sci, Shenzhen Inst Adv Technol, Beijing, Peoples R China
[4] Queens Univ Belfast, Sch EEECS, Belfast, Antrim, North Ireland
基金
中国国家自然科学基金;
关键词
Influence maximization; User semantics; Influence measurement; Social network analysis;
D O I
10.1016/j.ins.2019.10.075
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Influence Maximization (IM) plays an essential role in various social network applications. One such application is viral marketing to trigger a large cascade of product adoption from a small number of users by utilizing "Word-of-Mouth" effect in social networks. IM aims to return a set of users that can influence the largest fraction of a network, such as the early user who demonstrates the good features of a product in marketing. The traditional IM algorithms treat all users equally and ignore semantic context associated with the users, though it has been studied previously. To consider the semantics, we introduce a semantics-aware influence maximization (SIM) problem. The SIM problem integrates semantic information of users with influence maximization by measuring influence spread based on semantic values under a given model, and it aims to find a set of users that maximizes the influence spread, shown to be NP-hard. Generalized Reverse Influence Set based framework for SIM problems (GRIS-SIM) is used to solve SIM with different semantics, which provides a (1 -1/e - epsilon)-approximation solution for each SIM instance. To our knowledge, the guarantee is state-of-the-art in the IM studies. GRIS-SIM enables auto-generation of sampling strategies for various social networks. In this study, we also present three sampling strategies that can be generated to achieve the best approximation guarantee, and one of the three is proved to be the optimal strategy by having the same performance guarantee within the optimal time. Furthermore, in order to show the generality and effectiveness of the proposed GRIS technique, we apply it into solving other IM problems (e.g., the distance-aware influence maximization, DAIM). Extensive experiments on both real-life and synthetic datasets demonstrate the effectiveness, efficiency, and scalability of our methods. The results on large real data show that GRIS-SIM is able to achieve 58% improvement on average in expected influence compared with rivals, and the method adopting GRIS can achieve 65% improvement on average. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页码:442 / 464
页数:23
相关论文
共 50 条
  • [31] Semantics-aware detection of targeted attacks: a survey
    Luh R.
    Marschalek S.
    Kaiser M.
    Janicke H.
    Schrittwieser S.
    [J]. Luh, Robert (robert.luh@fhstp.ac.at), 1600, Springer-Verlag France (13) : 47 - 85
  • [32] Semantics-Aware Active Fault Detection in IoT
    Stamatakis, George J.
    Pappas, Nikolaos
    Fragkiadakis, Alexandros
    Traganitis, Apostolos
    [J]. 2022 20TH INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC, AND WIRELESS NETWORKS (WIOPT 2022), 2022, : 161 - 168
  • [33] Semantics-aware services for the mobile computing environment
    Georgantas, N
    Ben Mokhtar, S
    Tartanoglu, F
    Issarny, V
    [J]. ARCHITECTING DEPENDABLE SYSTEMS III, 2005, 3549 : 1 - 35
  • [34] A Semantics-Aware Approach to Automated Claim Verification
    Figueras, Blanca Calvo
    Cuadros, Montse
    Agerri, Rodrigo
    [J]. PROCEEDINGS OF THE FIFTH FACT EXTRACTION AND VERIFICATION WORKSHOP (FEVER 2022), 2022, : 37 - 48
  • [35] Semantics-aware obfuscation scheme prediction for binary
    Zhao, Yujie
    Tang, Zhanyong
    Ye, Guixin
    Peng, Dongxu
    Fang, Dingyi
    Chen, Xiaojiang
    Wang, Zheng
    [J]. COMPUTERS & SECURITY, 2020, 99 (99)
  • [36] Special issue - Semantics-aware techniques for security
    Damiani, E
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2004, 19 (03): : 119 - 120
  • [37] Malicious Webpage Detection by Semantics-Aware Reasoning
    Lin, Shih-Fen
    Hou, Yung-Tsung
    Chen, Chia-Mei
    Jeng, Bingchiang
    Laih, Chi-Sung
    [J]. ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 1, PROCEEDINGS, 2008, : 115 - +
  • [38] Semantics-Aware Storage and Replication of Trust Metadata in Mobile Ad-Hoc Networks
    Natarajan, Vivek
    Zhu, Sencun
    Srivatsa, Mudhakar
    Opper, Jeff
    [J]. 2012 IEEE 26TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2012, : 376 - 383
  • [39] Semantics-aware data integration for heterogeneous data sources
    Leida, Marcello
    Gusmini, Alex
    Davies, John
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2013, 4 (04) : 471 - 491
  • [40] Extending context descriptions in semantics-aware Access Control
    Damiani, E.
    di Vimercati, S. De Capitani
    Fugazza, C.
    Samarati, P.
    [J]. INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2006, 4332 : 162 - +