Abstract
In this paper, we address the problem of minimizing the negative influence of undesirable things by blocking a limited number of links in a network. When undesirable thing such as a rumor or an infection emerges in a social network and part of users have already been infected, our goal is to minimize the size of ultimately infected users by blocking k links. A greedy algorithm with accuracy guarantee and two efficient heuristics for finding approximate solutions to this problem are proposed. Using two real networks, we demonstrate experimentally that the greedy algorithm is more effective in terms of minimizing negative influence, while the heuristics based on betweenness and out-degree are orders of magnitude faster than the greedy algorithm in terms of running time.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Albert, R., Jeong, H., Barabási, A.-L.: Error and attack tolerance of complex networks. Nature 406, 378–382 (2000)
Budak, C., Agrawal, D., Abbadi, A.E.: Limiting the spread of misinformation in social networks. In: WWW 2011 (2011)
Chen, W., Wang, Y., Yang, S.: Efficient influence maximization in social networks. In: KDD 2009 (2009)
Domingos, P., Richardson, M.: Mining the network value of customers. In: KDD 2001 (2001)
Habiba, Yu, Y., Berger-Wolf, T.Y., Saia, J.: Finding spread blockers in dynamic networks. In: Giles, L., Smith, M., Yen, J., Zhang, H. (eds.) SNAKDD 2008. LNCS, vol. 5498, pp. 55–76. Springer, Heidelberg (2010)
Kempe, D., Kleinberg, J.M., Tardos, É.: Maximizing the spread of influence through a social network. In: KDD 2003 (2003)
Kimura, M., Saito, K., Motoda, H.: Minimizing the spread of contamination by blocking links in a network. In: AAAI 2008 (2008)
Nemhauser, G., Wolsey, L., Fisher, M.: An analysis of the approximations for maximizing submodular set functions. Math. Program. 14, 265–294 (1978)
Newman, M.E.J., Forrest, S., Balthrop, J.: Email networks and the spread of computer viruses. Phys. Rev. E 66, 035101 (2002)
Richardson, M., Domingos, P.: Mining knowledge-sharing sites for viral marketing. In: KDD 2002 (2002)
Wang, S., Zhao, X., Chen, Y., Li, Z., Zhang, K., Xia, J.: Negative influence minimizing by blocking nodes in social networks. In: AAAI (Late-Breaking Developments) (2013)
Zhou, C., Guo, L.: A note on influence maximization in social networks from local to global and beyond. Procedia Comput. Sci. 30, 81–87 (2014)
Acknowledgments
This work was supported by the Strategic Leading Science and Technology Projects of Chinese Academy of Sciences (No. XDA06030200).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yao, Q., Zhou, C., Xiang, L., Cao, Y., Guo, L. (2015). Minimizing the Negative Influence by Blocking Links in Social Networks. In: Yueming, L., Xu, W., Xi, Z. (eds) Trustworthy Computing and Services. ISCTCS 2014. Communications in Computer and Information Science, vol 520. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-47401-3_9
Download citation
DOI: https://doi.org/10.1007/978-3-662-47401-3_9
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-47400-6
Online ISBN: 978-3-662-47401-3
eBook Packages: Computer ScienceComputer Science (R0)