Abstract
Since the steady development of online social networks, it has resulted in wide-spread research works in the social network analytical areas, especially in the area of influence maximization. Previous works study the influence propagation process based on the social influence model. But traditional influence models ignore some important aspect of influence propagation. The drawbacks of the models are the simplistic influence diffusion process, and the models lack attitude states and capability to capture the interaction between users. To address these problems, we modify Linear Threshold model based on multi-level attitude and users’ interaction, which is proposed modeling the positive and negative attitude towards an entity in the signed social network and the effect of interaction relationship between users. Then we propose the LT-MLA greedy algorithm to solve the positive influence maximization problem. Finally, we conducted experiments on three real-world data sets to select initial k seed with the positive attitude. The results show that the proposed solution in this paper performs better than other heuristic algorithms.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Tang, J., Chang, Y., Aggarwal, C., et al.: A Survey of Signed Network Mining in Social Media. Computer Science, pp. 1–39 (2015)
Kempe, D., Eva, K.J.: Tardos.: Maximizing the spread of influence through a social network. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 137–146. ACM, Washington (2003)
Schiffman, L., Kanuk, L., Wisenblit, J.: Consumer Behavior. Prentice Hall, Pearson Schweiz Ag, pp. 260–268, 370–374 (2009)
Domingos, P., Richardson, M.: Mining the network value of customers. In: Proceedings of the 7th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, pp. 57–66. ACM, San Francisco (2001)
Chen, W., Wang, C., Wang, Y.: Scalable influence maximization for prevalent viral marketing in large scale social networks. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1029–1038. ACM, Washington (2010)
Chen, W., Wang, Y., Yang, S.: Efficient influence maximization in social networks. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 199–208. ACM, Paris (2009)
Chen, W., Yuan, Y., Zhang, L.: Scalable influence maximization in social networks under the linear threshold model. In: IEEE International Conference on ICDM, pp. 88–97. IEEE, Sydney (2010)
Wang, Y., Cong, G., Song, G., Xie, K.: Community-based greedy algorithm for mining top-k influential nodes in mobile social networks. In: Proceedings of the 16th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, pp. 1039–1048. ACM, Washington (2010)
Lappas, T., Terzi, E., Gunopulos, D., Mannila, H.: Finding effectors in social networks. In: Proceedings of the 16th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, pp. 1059–1068. ACM, Washington (2010)
Chen, W., Collins, A., Cummings, R., et al.: Influence maximization in social networks when negative opinions may emerge and propagate. In: 2010 SIAM International Conference on DATA MINING, pp. 379–390. SIAM, Columbus (2010)
Li, Y., Chen, W., Wang, Y., Zhang, Z.-L.: Influence diffusion dynamics and influence maximization in social networks with friend and foe relationships. In: Proceedings of the 6th ACM International Conference on Web Search and Data Mining, pp. 657–666. ACM, Rome (2013)
Leskovec, J., Krause, A., Guestrin, C., Faloutsos, C., VanBriesen, J., Glance, N.: Cost-effective outbreak detection in networks. In: Knowledge Discovery and Data Mining (KDD), pp. 420–429. ACM, California (2007)
Goyal, A., Lu, W., Lakshmanan, L.V.S.: CELF++: optimizing the greedy algorithm for influence maximization in social networks. In: International Conference Companion on World Wide Web, pp. 47–48. WWW 2011, Hyderabad (2011)
Lu, W., Lakshmanan, L.V.S.: SIMPATH: an efficient algorithm for influence maximization under the linear threshold model. In: IEEE International Conference on Data Mining, pp. 211–220. IEEE Computer Society, Vancouver (2011)
Lu, Z., Fan, L., Wu, W., Thuraisingham, B., Yang, K.: Efficient influence spread estimation for influence maximization under the linear threshold model. Comput. Soc. Netw. 1(1), 1–19 (2014)
Hassan, A., Abu-Jbara, A., Radev, D.: Extracting signed social networks from text. In: Association for Computational Linguistics Workshop Proceedings of TextGraphs-7 on Graph-based Methods for Natural Language Processing, pp. 6–14. PA, USA (2012)
Zhang, H., Dinh, T.N., Thai, M.T.: Maximizing the spread of positive influence in online social networks. In: IEEE International Conference on Distributed Computing Systems, pp. 317–326. IEEE, Philadelphia (2013)
Leskovec, J., Huttenlocher, D., Kleinberg, J.: Predicting positive and negative links in online social networks. In: International Conference on World Wide Web, pp. 641–650. ACM, North Carolina (2010)
Leskovec J.: High energy physics theory collaboration network. http://snap.stanford.edu/data/ca-HepTh.html
Leskovec J, Huttenlocher D, Kleinberg J.: Signed networks in social media. In: Proceedings of Chi Conference on Human Factors in Computing Systems, pp. 1361–1370. ACM, Atlanta (2010). http://snap.stanford.edu/data/soc-sign-epinions.html
Acknowledgments
This work is supported in part by the National Natural Science Foundation of China under Grant Numbers 61632009, 61472451 and 61272151, and the High Level Talents Program of Higher Education in Guangdong Province under Funding Support Number 2016ZJ01.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Wang, F., Wang, G., Xie, D. (2016). Maximizing the Spread of Positive Influence Under LT-MLA Model. In: Wang, G., Han, Y., MartĂnez PĂ©rez, G. (eds) Advances in Services Computing. APSCC 2016. Lecture Notes in Computer Science(), vol 10065. Springer, Cham. https://doi.org/10.1007/978-3-319-49178-3_34
Download citation
DOI: https://doi.org/10.1007/978-3-319-49178-3_34
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-49177-6
Online ISBN: 978-3-319-49178-3
eBook Packages: Computer ScienceComputer Science (R0)