Skip to main content
Log in

Node reactivation model to intensify influence on network targets

  • Regular Paper
  • Published:
Knowledge and Information Systems Aims and scope Submit manuscript

Abstract

In this paper, we study a novel problem of influence maximization on social networks: Given a period of promotion time, a set of target users and a network in which each node can be activated by its neighbors multiple times, we aim at determining the k most influential seeds to maximize the total frequency of activations received by these target users. The promising viral marketing paradigm on social network is different from the current research in two main aspects. First, instead of maximizing the message spread over the entire social network, we focus on the target market since the business vendors almost specify the group of target users before designing its marketing strategy. Second, the status of a user is no longer a binary indicator representing either active or inactive. In the new model, the user status turns to be an integer value reflecting the amount of influences delivered to that user. In this paper, we prove the NP-hard nature of this challenging problem. We further present several strategies, including an efficient heuristic algorithm based on the simulated annealing optimization concept and a greedy algorithm as the baseline, to select the initial k seeds in pursuit of resulting quality close to the optimal one. As demonstrated in the empirical study on real data, instead of only providing the flexibility of striking a compromise between the execution efficiency and the resulting quality, our proposed heuristic algorithm can achieve high efficiency and meanwhile can obtain the target acceptance frequency even better than the greedy result in some cases, demonstrating its prominent feasibility to resolve the challenging problem efficiently.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Notes

  1. http://snap.stanford.edu/data/.

References

  1. Bhagat S, Goyal A, Lakshmanan LV (2012) Maximizing product adoption in social networks. In: Proceedings of the fifth ACM international conference on web search and data mining. ACM, New York, NY, USA, pp 603–612

  2. Bharathi S, Kempe D, Salek M (2007) Competitive influence maximization in social networks. In: Proceedings of internet and network economics: third international workshop, WINE 2007, San Diego, CA, USA, 12–14 Dec 2007. Springer, Berlin, pp 306–311

  3. Černỳ V (1985) Thermodynamical approach to the traveling salesman problem: an efficient simulation algorithm. J Optim Theory Appl 45(1):41–51

    Article  MathSciNet  MATH  Google Scholar 

  4. Chen W, Wang Y, Yang S (2009) Efficient influence maximization in social networks. In: Proceedings of the 15th ACM SIGKDD international conference on knowledge discovery and data mining. ACM, New York, NY, USA, pp 199–208

  5. Chen W, Wang C, Wang Y (2010a) Scalable influence maximization for prevalent viral marketing in large-scale social networks. In: Proceedings of the 16th ACM SIGKDD international conference on knowledge discovery and data mining. ACM, New York, NY, USA, pp 1029–1038

  6. Chen W, Yuan Y, Zhang L (2010) Scalable influence maximization in social networks under the linear threshold model. In: Proceedings of the 2010 IEEE international conference on data mining. IEEE Computer Society, Washington, DC, USA, pp 88–97

  7. Chen W, Collins A, Cummings R, Ke T, Liu Z, Rincón D, Sun X, Wang Y, Wei W, Yuan Y (2011) Influence maximization in social networks when negative opinions may emerge and propagate. In: Proceedings of the eleventh SIAM international conference on data mining, SDM 2011, 28–30 April 2011, Mesa, Arizona, USA, pp 379–390

  8. Chen W, Lu W, Zhang N (2012) Time-critical influence maximization in social networks with time-delayed diffusion process. In: Proceedings of the twenty-sixth AAAI conference on artificial intelligence, AAAI Press, pp 592–598

  9. Domingos P, Richardson M (2001) Mining the network value of customers. In: Proceedings of the seventh ACM SIGKDD international conference on knowledge discovery and data mining. ACM, New York, NY, USA, pp 57–66

  10. Feige U (1998) A threshold of in n for approximating set cover. J ACM (JACM) 45(4):634–652

    Article  MATH  Google Scholar 

  11. Feige U, Mirrokni VS, Vondrák J (2011) Maximizing non-monotone submodular functions. SIAM J Comput 40(4):1133–1153

    Article  MathSciNet  MATH  Google Scholar 

  12. Goyal A, Bonchi F, Lakshmanan LV (2010) Learning influence probabilities in social networks. In: Proceedings of the third ACM international conference on web search and data mining. ACM, New York, NY, USA, pp 241–250

  13. Goyal A, Bonchi F, Lakshmanan LV (2011a) A data-based approach to social influence maximization. Proc VLDB Endow 5(1):73–84

    Article  Google Scholar 

  14. Goyal A, Lu W, Lakshmanan LV (2011b) Celf++: optimizing the greedy algorithm for influence maximization in social networks. In: Proceedings of the 20th international conference companion on world wide web. ACM, New York, NY, USA, pp 47–48

  15. Goyal A, Lu W, Lakshmanan LVS (2011) Simpath: an efficient algorithm for influence maximization under the linear threshold model. In: Proceedings of the 2011 IEEE 11th international conference on data mining. IEEE Computer Society, Washington, DC, USA, pp 211–220

  16. Guo J, Zhang P, Zhou C, Cao Y, Guo L (2013) Personalized influence maximization on social networks. In: Proceedings of the 22Nd ACM international conference on information and knowledge management. ACM, New York, NY, USA, pp 199–208

  17. Hartline J, Mirrokni V, Sundararajan M (2008) Optimal marketing strategies over social networks. In: Proceedings of the 17th international conference on world wide web. ACM, New York, NY, USA, pp 189–198

  18. Jiang Q, Song G, Cong G, Wang Y, Si W, Xie K (2011) Simulated annealing based influence maximization in social networks. In: Proceedings of the twenty-fifth AAAI conference on artificial intelligence. AAAI Press, pp 127–132

  19. Jung K, Heo W, Chen W (2012) Irie: scalable and robust influence maximization in social networks. In: Proceedings of the 2012 IEEE 12th international conference on data mining. IEEE Computer Society, Washington, DC, USA, pp 918–923

  20. Kempe D, Kleinberg J, Tardos É (2003) Maximizing the spread of influence through a social network. In: Proceedings of the ninth ACM SIGKDD international conference on knowledge discovery and data mining. ACM, New York, NY, USA, pp 137–146

  21. Khan A, Zehnder B, Kossmann D (2016) Revenue maximization by viral marketing: a social network host’s perspective. In: 2016 IEEE 32nd international conference on data engineering (ICDE). pp 37–48

  22. Kimura M, Saito K (2006) Tractable models for information diffusion in social networks. In: Proceedings of the 10th European conference on principle and practice of knowledge discovery in databases. Springer, Berlin, pp 259–271

  23. Kirkpatrick S, Gelatt CD, Vecchi MP (1983) Optimization by simulated annealing. Science 220(4598):671–680

    Article  MathSciNet  MATH  Google Scholar 

  24. Leskovec J, Krause A, Guestrin C, Faloutsos C, VanBriesen J, Glance N (2007) Cost-effective outbreak detection in networks. In: Proceedings of the 13th ACM SIGKDD international conference on knowledge discovery and data mining. ACM, New York, NY, USA, pp 420–429

  25. Li FH, Li CT, Shan MK (2011) Labeled influence maximization in social networks for target marketing. In: 2011 IEEE third international conference on privacy, security, risk and trust and 2011 IEEE third international conference on social computing. pp 560–563

  26. Liu B, Cong G, Xu D, Zeng Y (2012) Time constrained influence maximization in social networks. In: 2012 IEEE 12th international conference on data mining. pp 439–448

  27. Lu JL, Wei LY, Yeh MY (2014) Influence maximization in a social network in the presence of multiple influences and acceptances. In: International conference on data science and advanced analytics, DSAA 2014, Shanghai, China, October 30–November 1, 2014. pp 230–236

  28. Ma H, Yang H, Lyu MR, King I (2008) Mining social networks using heat diffusion processes for marketing candidates selection. In: Proceedings of the 17th ACM conference on information and knowledge management. ACM, New York, NY, USA, pp 233–242

  29. Narayanam R, Narahari Y (2011) A shapley value-based approach to discover influential nodes in social networks. IEEE Trans Autom Sci Eng 8(1):130–147

    Article  Google Scholar 

  30. Richardson M, Domingos P (2002) Mining knowledge-sharing sites for viral marketing. In: Proceedings of the eighth ACM SIGKDD international conference on knowledge discovery and data mining. ACM, New York, NY, USA, pp 61–70

  31. Teng Y, Tai C, Yu PS, Chen M (2015) An effective marketing strategy for revenue maximization with a quantity constraint. In: Proceedings of the 21th ACM SIGKDD international conference on knowledge discovery and data mining. ACM, New York, NY, USA, pp 1175–1184

  32. Valiant LG (1979) The complexity of enumeration and reliability problems. SIAM J Comput 8:410–421. doi:10.1137/0208032

    Article  MathSciNet  MATH  Google Scholar 

  33. Yang DN, Hung HJ, Lee WC, Chen W (2013) Maximizing acceptance probability for active friending in online social networks. In: Proceedings of the 19th ACM SIGKDD international conference on knowledge discovery and data mining. ACM, New York, NY, USA, pp 713–721

Download references

Acknowledgements

This paper was supported in part by Ministry of Science and Technology, R.O.C., under Contract 105-2221-E-006-140-MY2.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Mi-Yen Yeh or Kun-Ta Chuang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chang, CW., Yeh, MY. & Chuang, KT. Node reactivation model to intensify influence on network targets. Knowl Inf Syst 54, 567–590 (2018). https://doi.org/10.1007/s10115-017-1071-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10115-017-1071-z

Keywords

Navigation