Skip to main content
Log in

Time-bounded targeted influence spread in online social networks

  • 1209: Recent Advances on Social Media Analytics and Multimedia Systems: Issues and Challenges
  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Influence maximization with application to viral marketing aims to find a small set of influencers in a social network to maximize the number of influenced users under a certain propagation model. However, in many actual marketing scenarios, companies are usually concerned about precision marketing before the specified deadline. In this paper, different from most of influence maximization problems, we focus on an issue of time-bounded targeted influence spread, where it asks for finding a seed set to maximize the influence on a specific set of target users within a bounded time in the network. This problem is NP-hard, and its objective function maintains the monotonicity and submodularity. We devise a greedy algorithm with approximate guarantee to effectively solve the problem. To overcome the low calculational efficiency of this algorithm in large networks, we further propose several efficient heuristic algorithms to greatly speed up the seed selection. Extensive experiments over real-world available social networks of different sizes show the effectiveness and efficiency of the proposed algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Notes

  1. NP-hard problem refers to a problem that all NP problems can be reduced to within polynomial time complexity, while NP problem is a problem that can verify a solution in polynomial time. In general, #P-hard problem is more complicated than NP-hard problem. Therefore, in practice, it usually needs to find the approximate solutions for such problems.

  2. The symbol “\(\setminus\)” represents the difference set in the set operation.

  3. The proposed algorithms are based on the greedy algorithm in Algorithm 1, and their difference is the method of calculating the incremental influence spread.

  4. We do not compare the greedy algorithm using Monte Carlo simulation. It mainly considers that the number of possible random graphs is exponential and usually very large, and a sufficient number of random simulations are required to obtain the accurate estimates with high probability. As a result, the time consumption of this method is too high for all social network datasets.

References

  1. Ahmad A, Ahmad T, Bhatt A (2020) HWSMCB: A community-based hybrid approach for identifying influential nodes in the social network. Physica A: Statistical Mechanics and its Applications 545

  2. Bakshy E, Hofman JM, Mason WA, Watts DJ (2011) Everyone’s an influencer: Quantifying influence on Twitter. In: Proceedings of the 4th ACM International Conference on Web Search and Data Mining. pp 65–74

  3. Borgs C, Brautbar M, Chayes J, Lucier B (2014) Maximizing social influence in nearly optimal time. In: Proceedings of the 25th Annual ACM-SIAM Symposium on Discrete Algorithms. pp 946–957

  4. Chen W, Collins A, Cummings R, Ke T, Liu Z, Rincon D, Sun X, Wang Y (2011) Influence maximization in social networks when negative opinions may emerge and propagate. In: Proceedings of the 11th SIAM International Conference on Data Mining. pp 379–390

  5. Chen W, Wang C, Wang Y (2010) Scalable influence maximization for prevalent viral marketing in large-scale social networks. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. pp 1029–1038

  6. Chen Y-C, Zhu W-Y, Peng W-C, Lee W-C, Lee S-Y (2014) CIM: Community based influence maximization in social networks. ACM Trans Intell Syst Technol 5(2):1–31

    Article  Google Scholar 

  7. Chevalier JA, Mayzlin D (2006) The effect of word-of-mouth on sales: Online book reviews. J Market Res 43(3):345–354

    Article  Google Scholar 

  8. D’Angelo Gianlorenzo, Severini Lorenzo, Velaj Yllka (2019) Recommending links through influence maximization. Theor Comput Sci 764:30–41

    Article  MathSciNet  MATH  Google Scholar 

  9. Domingos P, Richardson M (2001) Mining the network value of customers. In: Proceedings of the 7th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. pp 57–66

  10. Guler B, Varan B, Tutuncuoglu K, Nafea M, Zewail AA, Yener A, Octeau D (2014) Optimal strategies for targeted influence in signed networks. In: Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. pp 906–911

  11. Guo J, Zhang P, Zhou C, Cao Y, Guo L (2013) Personalized influence maximization on social networks. In: Proceedings of the 22nd ACM International Conference on Information and Knowledge Management. pp 199–208

  12. Guojie S, Xiabing Z, Yu W, Kunqing X (2015) Influence maximization on large-scale mobile social network: A divide-and-conquer method. IEEE Trans Parallel Distrib Syst 26(5):1379–1392

    Article  Google Scholar 

  13. Hong W, Qian C, Tang K (2020) Efficient minimum cost seed selection with theoretical guarantees for competitive influence maximization. IEEE Transactions on Cybernetics 2:1–14

    Google Scholar 

  14. Huang H, Shen H, Meng Z (2019) Item diversified recommendation based on influence diffusion. Inf Process Manag 56(3):939–954

    Article  Google Scholar 

  15. Kempe D, Kleinberg J, Tardos É (2003) Maximizing the spread of influence through a social network. In: Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. pp 137–146

  16. Kim S, Kim D, Jinoh O, Hwang J-H, Han W-S, Chen W, Hwanjo Y (2017) Scalable and parallelizable influence maximization with random walk ranking and rank merge pruning. Inf Sci 415:171–189

    Article  Google Scholar 

  17. Leskovec J, Krause A, Guestrin C, Faloutsos C, Van Briesen J, Glance N (2007) Cost-effective outbreak detection in networks. In: Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. pp 420–429

  18. Li H, Bhowmick SS, Cui J, Gao Y, Ma J (2015) GetReal: Towards realistic selection of influence maximization strategies in competitive networks. In: Proceedings of ACM SIGMOD International Conference on Management of Data. pp 1525–1537

  19. Li Y, Zhang D, Tan K-L (2015) Real-time targeted influence maximization for online advertisements. VLDB Endowment 8(10):1070–1081

    Article  Google Scholar 

  20. Liu B, Cong G, Xu D, Zeng Y (2012) Time constrained influence maximization in social networks. In: Proceedings of the 12th IEEE International Conference on Data Mining. pp 439–448

  21. Nemhauser GL, Wolsey LA, Fisher ML (1978) An analysis of the approximations for maximizing submodular set functions. Math Program 14:265–294

    Article  MathSciNet  MATH  Google Scholar 

  22. Nguyen HT, Thai MT, Dinh TN (2016) Stop-and-stare: Optimal sampling algorithms for viral marketing in billion-scale networks. In: Proceedings of ACM SIGMOD International Conference on Management of Data, pp 695–710

  23. Ohsaka N, Sonobe T, Fujita S, Kawarabayashi K (2017) Coarsening massive influence networks for scalable diffusion analysis. In: Proceedings of ACM SIGMOD International Conference on Management of Data. pp 635-650

  24. Pham CV, Duong HV, Bui BQ, Thai MT (2018) Budgeted competitive influence maximization on online social networks. In: Proceedings of International Conference on Computational Social Networks. pp 13–24

  25. Richardson M, Domingos P (2002) Mining knowledge-sharing sites for viral marketing. In: Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. pp 61–70

  26. Sen S, Li X, Cheng X, Sun C (2018) Location-aware targeted influence maximization in social networks. J Assoc Inf Sci Technol 69(2):229–241

    Article  Google Scholar 

  27. Shi Q, Wang C, Ye D, Chen J, Feng Y, Chen C (2019) Adaptive influence blocking: Minimizing the negative spread by observation-based policies. In: Proceedings of the 35th IEEE International Conference on Data Engineering. pp 1502-1513

  28. SNAP Datasets (2014) http://snap.stanford.edu/data/

  29. Tang Y, Shi Y, Xiao X (2015) Influence maximization in near-linear time: A martingale approach. In: Proceedings of ACM SIGMOD International Conference on Management of Data. pp 1539–1554

  30. Tang Y, Xiao X, Shi Y (2014) Influence maximization: Near-optimal time complexity meets practical efficiency. In: Proceedings of ACM SIGMOD International Conference on Management of Data. pp 75–86

  31. Valiant LG (1979) The complexity of enumeration and reliability problems. SIAM J Comput 8(3):410–421

    Article  MathSciNet  MATH  Google Scholar 

  32. Wang X, Zhang Y, Zhang W, Lin X, Chen C (2017) Bring order into the samples: A novel scalable method for influence maximization. IEEE Trans Knowl Data Eng 29(2):243–256

    Article  Google Scholar 

  33. Weng J, Lim EP, Jiang J, He Q (2010) Twitterrank: Finding topic-sensitive influential Twitterers. In: Proceedings of the 3rd ACM International Conference on Web Search and Data Mining. pp 261–270

  34. Wong P, Sun C, Lo E, Yiu ML, Wu X, Zhao Z, Hubert Chan T-H, Kao B (2017) Finding k most influential edges on flow graphs. Inf Syst 65:93–105

  35. Zhu J, Ni P, Wang G (2020) Activity minimization of misinformation influence in online social networks. IEEE Transactions on Computational Social Systems 7(4):897–906

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ling Yuan.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yu, L., Li, G., Yuan, L. et al. Time-bounded targeted influence spread in online social networks. Multimed Tools Appl 82, 9065–9081 (2023). https://doi.org/10.1007/s11042-021-11461-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-11461-3

Keywords

Navigation