Towards Efficient Influence Maximization for Evolving Social Networks

被引:1
|
作者
Liu, Xiaodong [1 ]
Liao, Xiangke [1 ]
Li, Shanshan [1 ]
Lin, Bin [1 ]
机构
[1] Natl Univ Def Technol, Changsha 410073, Hunan, Peoples R China
来源
关键词
D O I
10.1007/978-3-319-45814-4_19
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Identifying the most influential individuals can provide invaluable help in developing and deploying effective viral marketing strategies. Previous studies mainly focus on designing efficient algorithms or heuristics to find top-K influential nodes on a given static social network. While, as a matter of fact, real-world social networks keep evolving over time and a recalculation upon the changed network inevitably leads to a long running time, significantly affecting the efficiency. In this paper, we observe from real-world traces that the evolution of social network follows the preferential attachment rule and the influential nodes are mainly selected from high-degree nodes. Such observations shed light on the design of IncInf, an incremental approach that can efficiently locate the top-K influential individuals in evolving social networks based on previous information instead of calculation from scratch. In particular, IncInf quantitatively analyzes the influence spread changes of nodes by localizing the impact of topology evolution to only local regions, and a pruning strategy is further proposed to effectively narrow the search space into nodes experiencing major increases or with high degrees. We carried out extensive experiments on real-world dynamic social networks including Facebook, NetHEPT, and Flickr. Experimental results demonstrate that, compared with the state-of-the-art static heuristic, IncInf achieves as much as 21x speedup in execution time while maintaining matching performance in terms of influence spread.
引用
收藏
页码:232 / 244
页数:13
相关论文
共 50 条
  • [31] Matching influence maximization in social networks
    Rao, Guoyao
    Wang, Yongcai
    Chen, Wenping
    Li, Deying
    Wu, Weili
    [J]. THEORETICAL COMPUTER SCIENCE, 2021, 857 : 71 - 86
  • [32] An efficient and effective hop-based approach for influence maximization in social networks
    Tang, Jing
    Tang, Xueyan
    Yuan, Junsong
    [J]. SOCIAL NETWORK ANALYSIS AND MINING, 2018, 8 (01) : 1 - 19
  • [33] Signed-PageRank: An Efficient Influence Maximization Framework for Signed Social Networks
    Yin, Xiaoyan
    Hu, Xiao
    Chen, Yanjiao
    Yuan, Xu
    Li, Baochun
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2021, 33 (05) : 2208 - 2222
  • [34] An efficient linear programming based method for the influence maximization problem in social networks
    Guney, Evren
    [J]. INFORMATION SCIENCES, 2019, 503 : 589 - 605
  • [35] Efficient Distance-Aware Influence Maximization in Geo-Social Networks
    Wang, Xiaoyang
    Zhang, Ying
    Zhang, Wenjie
    Lin, Xuemin
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2017, 29 (03) : 599 - 612
  • [36] Towards establishing the effect of self-similarity on influence maximization in online social networks
    Bhawna Saxena
    Vikas Saxena
    [J]. Social Network Analysis and Mining, 2020, 10
  • [37] Towards establishing the effect of self-similarity on influence maximization in online social networks
    Saxena, Bhawna
    Saxena, Vikas
    [J]. SOCIAL NETWORK ANALYSIS AND MINING, 2020, 10 (01)
  • [38] Supplementary Influence Maximization Problem in Social Networks
    Zhang, Yapu
    Guo, Jianxiong
    Yang, Wenguo
    Wu, Weili
    [J]. IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2024, 11 (01) : 986 - 996
  • [39] Influence Maximization with Novelty Decay in Social Networks
    Feng, Shanshan
    Chen, Xuefeng
    Cong, Gao
    Zeng, Yifeng
    Chee, Yeow Meng
    Xiang, Yanping
    [J]. PROCEEDINGS OF THE TWENTY-EIGHTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2014, : 37 - 43
  • [40] Cuckoo Search for Influence Maximization in Social Networks
    Sinha, Nikita
    Annappa, B.
    [J]. PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND INFORMATICS, ICACNI 2015, VOL 2, 2016, 44 : 51 - 61