Browse > Article
http://dx.doi.org/10.6109/jicce.2018.16.4.213

Influence Maximization Scheme against Various Social Adversaries  

Noh, Giseop (Division of Software Convergence, College of Engineering, Cheongju University)
Oh, Hayoung (DASAN University College in Ajou University)
Lee, Jaehoon (Department of Computer Science and Engineering, Seoul National University)
Abstract
With the exponential developments of social network, their fundamental role as a medium to spread information, ideas, and influence has gained importance. It can be expressed by the relationships and interactions within a group of individuals. Therefore, some models and researches from various domains have been in response to the influence maximization problem for the effects of "word of mouth" of new products. For example, in reality, more than two related social groups such as commercial companies and service providers exist within the same market issue. Under such a scenario, they called social adversaries competitively try to occupy their market influence against each other. To address the influence maximization (IM) problem between them, we propose a novel IM problem for social adversarial players (IM-SA) which are exploiting the social network attributes to infer the unknown adversary's network configuration. We sophisticatedly define mathematical closed form to demonstrate that the proposed scheme can have a near-optimal solution for a player.
Keywords
Novel influence maximization; Social adversaries; Social networks; Word of mouth spreading effect;
Citations & Related Records
연도 인용수 순위
  • Reference
1 D. Kempe, J. Kleinberg, and E. Tardos, "Maximizing the spread of influence through a social network," in Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, pp. 137-146, 2003. DOI: 10.1145/956750.956769.
2 M. McPherson, L. Smith-Lovin, and J. M. Cook, "Birds of a feather: homophily in social networks," Annual Review of Sociology, vol. 27, no. 1 pp. 415-444, 2001. DOI: 10.1146/annurev.soc.27.1.415.   DOI
3 R. M. Heeler and T. P. Hustad, "Problems in predicting new product growth for consumer durables," Management Science, vol. 26, no. 10, pp. 1007-1020, 1980. DOI: 10.1287/mnsc.26.10.1007.   DOI
4 J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. VanBriesen, and N. Glance, "Cost-effective outbreak detection in networks," in Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Jose, CA, pp. 420-429, 2007. DOI: 10.1145/1281192.1281239.
5 Y. Wang, G. Cong, G. Song, and K. Xie, "Community-based greedy algorithm for mining top-k influential nodes in mobile social networks," in Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, pp. 1039-1048, 2010. DOI: 10.1145/1835804.1835935.
6 S. Bhagat, A. Goyal, and L. V. Lakshmanan, "Maximizing product adoption in social networks," in Proceedings of the 5th ACM International Conference on Web Search and Data Mining, Seattle, WA, pp. 603-612, 2012. DOI: 10.1145/2124295.2124368.
7 Y. Li, W. Chen, Y. Wang, and Z. L. Zhang, "Influence diffusion dynamics and influence maximization in social networks with friend and foe relationships," in Proceedings of the 6th ACM International Conference on Web Search and Data Mining, Rome, Italy, pp. 657-666, 2013. DOI: 10.1145/2433396.2433478.
8 A. Borodin, Y. Filmus, and J. Oren, "Threshold models for competitive influence in social networks," Internet and Network Economics. Heidelberg: Springer, pp. 539-550, 2010. DOI: 10.1007/978-3-642-17572-5_48.
9 X. He, G. Song, W. Chen, and Q. Jiang, "Influence blocking maximization in social networks under the competitive linear threshold model," Proceedings of the 2012 SIAM International Conference on Data Mining, Anaheim, CA, pp. 463-474, 2012. DOI: 10.1137/1.9781611972825.40.
10 S. Bharathi, D. Kempe, and M. Salek, "Competitive influence maximization in social networks," in Internet and Network Economics. Heidelberg: Springer, pp. 306-311, 2007. DOI: 10.1007/978-3-540-77105-0_31.
11 M. A. Nowak, C. E. Tarnita, and T. Antal, "Evolutionary dynamics in structured populations," Philosophical Transactions of the Royal Society B: Biological Sciences, vol. 365, no. 1537, pp. 19-30, 2009. DOI: 10.1098/rstb.2009.0215.
12 S. Shirazipourazad, B. Bogard, V. Vachhani, A. Sen, and P. Horn, "Influence propagation in adversarial setting: how to defeat competition with least amount of investment," in Proceedings of the 21st ACM International Conference on Information and Knowledge Management, Maui, HI, pp. 585-594, 2012. DOI: 10.1145/2396761.2396837.
13 Y. Yu, T. Y. Berger-Wolf, and J. Saia, "Finding spread blockers in dynamic networks," in Advances in Social Network Mining and Analysis. Heidelberg: Springer, pp. 55-76, 2010. DOI: 10.1007/978-3-642-14929-0_4.
14 T. Carnes, C. Nagarajan, S. M. Wild, and A. van Zuylen, "Maximizing influence in a competitive social network: a follower's perspective," in Proceedings of the 9th International Conference on Electronic Commerce, Minneapolis, MN, pp. 351-360, 2007. DOI: 10.1145/1282100.1282167.   DOI
15 M. E. Newman, "A measure of betweenness centrality based on random walks," Social Networks, vol. 27, no. 1, pp. 39-54, 2005. DOI: 10.1016/j.socnet.2004.11.009.   DOI
16 Y. Boshmaf, K. Beznosov, and M. Ripeanu, "Graph-based Sybil detection in social and information systems," in Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Niagara, Canada, pp. 466-473, 2013. DOI: 10.1145/2492517.2492568.
17 D. J. Watts and S. H. Strogatz, "Collective dynamics of 'smallworld' networks," Nature, vol. 393, no. 6684, pp. 440-442, 1998. DOI: 10.1038/30918.   DOI
18 A. Rapoport, "Spread of information through a population with socio-structural bias. I. Assumption of transitivity," The Bulletin of Mathematical Biophysics, vol. 15, no. 4, pp. 523-533, 1953. DOI: 10.1007/BF02476440.   DOI
19 P. G. Lind, M. C. Gonzalez, and H. J. Herrmann, "Cycles and clustering in bipartite networks," Physical Review E, vol. 72, no. 5, article no. 056127, 2005. DOI: 10.1103/PhysRevE.72.056127.
20 D. Easley and J. Kleinberg, Networks, Crowds, and Markets: Reasoning about a Highly Connected World. New York, NY: Cambridge University Press, 2010.
21 V. Gripon and M. Rabbat, "Reconstructing a graph from path traces," in Proceedings of 2013 IEEE International Symposium on Information Theory, Istanbul, Turkey, pp. 2488-2492, 2013. DOI: 10.1109/ISIT.2013.6620674.
22 M. S. Granovetter, "The strength of weak ties," American Journal of Sociology, vol. 78, no. 6, pp. 1360-1380, 1973. DOI: 10.1086/225469.   DOI
23 K. Saito, R. Nakano, and M. Kimura, "Prediction of information diffusion probabilities for independent cascade model," in Knowledge-Based and Intelligent Information and Engineering Systems. Heidelberg: Springer, pp. 67-75, 2008. DOI: 10.1007/978-3-540-85567-5_9.
24 J. Johnson Brown and P. H. Reingen, "Social ties and word-of-mouth referral behavior," Journal of Consumer Research, vol. 14, no. 3, pp. 350-362, 1987. DOI: 10.1086/209118.   DOI
25 V. Mahajan, E. Muller, and F. M. Bass, "New product diffusion models in marketing: a review and directions for research," Journal of Marketing, vol. 54, no. 1, pp. 1-26, 1990. DOI: 10.1177/002224299005400101.   DOI
26 W. Chen, Y. Wang, and S. Yang, "Efficient influence maximization in social networks," in Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, pp. 199-208, 2009. DOI: 10.1145/1557019.1557047.
27 J. Goldenberg, B. Libai, and E. Muller, "Talk of the network: a complex systems look at the underlying process of word-of-mouth," Marketing Letters, vol. 12, no. 3, pp. 211-223, 2001. DOI: 10.1023/A:1011122126881.   DOI
28 D. Gruhl, R. Guha, D. Liben-Nowell, and A. Tomkins, "Information diffusion through blogspace," in Proceedings of the 13th conference on World Wide Web, New York, NY, pp. 491-501, 2004. DOI: 10.1145/988672.988739.
29 M. W. Macy, "Chains of cooperation: threshold effects in collective action," American Sociological Review, vol. 56, no. 6, pp. 730-747, 1991. DOI: 10.2307/2096252.   DOI
30 W. Chen, Y. Yuan, and L. Zhang, "Scalable influence maximization in social networks under the linear threshold model," in Proceedings of 2010 IEEE International Conference on Data Mining, Sydney, Australia, pp. 88-97, 2010. DOI: 10.1109/ICDM.2010.118.