Skip to main content

Advertisement

Log in

Risk-Averse Influence Maximization

A computational investigation by genetic algorithm framework

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

The top k-influencers problem, as a social influence maximization (SIM) problem, seeks out the best k actors, called the seed set, in a network with the greatest expected Influence Spread (IS). This problem is formulated as a mean-maximization of the IS with no consideration for the variance of the IS. Consequently, it is a risk-blind influence maximization (RBIM) problem. The variance minimization problem has a considerable tendency toward trivial solutions in the absence of a known exogenous threshold of the IS, which makes the formulation ineffective. As an alternative strategy to overcome the trivial solution challenge, risk-averse influence maximization (RAIM) is being investigated and compared empirically with RBIM based on theoretical findings from the literature. RAIM searches for the best k actors under a known diffusion process, whose conditional value-at-risk (CVaR) measure of the IS is maximized. RAIM lacks an approximation algorithm due to the absence of a proven submodularity feature for CVaR. Moreover, no metaheuristic framework was tuned under all of the IC, WC, LT, and TR diffusion models, despite numerous algorithmic contributions to RBIM. Thus, a Genetic Algorithm Framework for Influence Maximization (GAFIM) is proposed by drawing inspiration from the genetic algorithms proposed for RBIM but under all of the IC, WC, LT, and TR diffusion models. A novel approach to tuning GAFIM has been developed employing a community detection algorithm and applied to RAIM and RBIM. Based on the tuning results, the seed set size has a remarkable effect on GAFIM’s performance and highlights its superiority over the algorithms it was inspired by. Furthermore, a comparison to the closest genetic algorithm published in the literature demonstrates that GAFIM outperforms it by a factor of at least 20 in terms of efficiency while achieving a higher quality result. Having completed the quality investigation of GAFIM with satisfactory results, the comparison experiments support intriguing distinctions between RAIM and RBIM in the dominance factor, dominance rate, and dominance mutuality. The variance of the IS and the propagation time/median of the IS prepare the dominance factor(s) for RAIM/RBIM. According to the results, the significant dominance rates (48% vs. 65%), the unreciprocated dominance pattern in dominating the other problem in its dominance area (66% vs. 91%), the complete dominance pattern in dominating without being dominated (9% vs. 34%), and being nondominated (35% vs. 52%) are not as probable for RBIM as for RAIM.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Data availability

The datasets analysed during the current study are available in two repositories: (1) The Pajek Datasets (2006) [54] repository: http://vlado.fmf.uni-lj.si/pub/networks/data/. (2) The Network Data Repository with interactive graph analytics and visualization [60]: http://networkrepository.com.

References

  1. Kempe D, Kleinberg J, Tardos É (2003) Maximizing the spread of influence through a social network. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp 137–146

  2. Rockafellar RT, Uryasev S et al (2000) Optimization of conditional value-at-risk. J Risk 2:21–42

    Article  Google Scholar 

  3. Uryasev S, Rockafellar RT (2001) Conditional value-at-risk: optimization approach. In: Stochastic optimization: algorithms and applications. Springer, pp 411–435

  4. Maehara T (2015) Risk averse submodular utility maximization. Oper Res Lett 43(5):526–529

    Article  MathSciNet  MATH  Google Scholar 

  5. Ohsaka N, Yoshida Y (2017) Portfolio optimization for influence spread. In: Proceedings of the 26th International Conference on World Wide Web, pp 977–985

  6. Chen W, Lakshmanan LV, Castillo C (2013) Information and influence propagation in social networks. Synth Lect Data Manag 5(4):1–177

    Article  Google Scholar 

  7. Cheng S, Shen H, Huang J, Zhang G, Cheng X (2013) Staticgreedy: solving the scalability-accuracy dilemma in influence maximization. In: Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, pp 509–518

  8. Ohsaka N, Akiba T, Yoshida Y, Kawarabayashi K-I (2014) Fast and accurate influence maximization on large networks with pruned Monte-Carlo simulations. In: AAAI, pp 138–144

  9. Banerjee S, Jenamani M, Pratihar DK (2018) A survey on influence maximization in a social network. arXiv preprint. arXiv:1808.05502

  10. Ackerman E, Ben-Zwi O, Wolfovitz G (2010) Combinatorial model and bounds for target set selection. Theor Comput Sci 411(44–46):4017–4022

    Article  MathSciNet  MATH  Google Scholar 

  11. Cicalese F, Cordasco G, Gargano L, MilaniÄ M, Vaccaro U (2014) Latency-bounded target set selection in social networks. Theor Comput Sci 535:1–15

    Article  MathSciNet  MATH  Google Scholar 

  12. Charikar M, Naamad Y, Wirth A (2016) On approximating target set selection. In: LIPIcs-Leibniz International Proceedings in Informatics, vol 60

  13. Chen W, Lin T, Tan Z, Zhao M, Zhou X (2016) Robust influence maximization. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp 795–804

  14. He X, Kempe D (2018) Stability and robustness in influence maximization. ACM Trans Knowl Discov Data (TKDD) 12(6):66

    Google Scholar 

  15. Kleinberg JM (1999) Authoritative sources in a hyperlinked environment. J ACM (JACM) 46(5):604–632

    Article  MathSciNet  MATH  Google Scholar 

  16. Page L, Brin S, Motwani R, Winograd T (1999) The pagerank citation ranking: bringing order to the web

  17. Kimura M, Saito K (2006) Tractable models for information diffusion in social networks. In: European Conference on Principles of Data Mining and Knowledge Discovery, pp 259–271

  18. Leskovec J, Krause A, Guestrin C, Faloutsos C, VanBriesen J, Glance N (2007) Cost-effective outbreak detection in networks. In: Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp 420–429

  19. Chen W, Wang Y, Yang S (2009) Efficient influence maximization in social networks. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp 199–208

  20. Chen W, Wang C, Wang Y (2010) Scalable influence maximization for prevalent viral marketing in large-scale social networks. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp 1029–1038

  21. Chen W, Yuan Y, Zhang L (2010) Scalable influence maximization in social networks under the linear threshold model. In: IEEE 10th International Conference on Data Mining (ICDM), pp 88–97

  22. Wang Y, Cong G, Song G, Xie K (2010) Community-based greedy algorithm for mining top-k influential nodes in mobile social networks. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp 1039–1048

  23. Goyal A, Lu W, Lakshmanan LV (2011) Celf++: optimizing the greedy algorithm for influence maximization in social networks. In: Proceedings of the 20th International Conference Companion on World Wide Web, pp 47–48

  24. Goyal A, Lu W, Lakshmanan LV (2011) Simpath: an efficient algorithm for influence maximization under the linear threshold model. In: IEEE 11th International Conference on Data Mining (ICDM), pp 211–220

  25. Jiang Q, Song G, Cong G, Wang Y, Si W, Xie K (2011) Simulated annealing based influence maximization in social networks. AAAI 11:127–132

    Article  Google Scholar 

  26. Narayanam R, Narahari Y (2011) A shapley value-based approach to discover influential nodes in social networks. IEEE Trans Autom Sci Eng 8(1):130–147

    Article  Google Scholar 

  27. Jung K, Heo W, Chen W (2012) Irie: scalable and robust influence maximization in social networks. In: IEEE 12th International Conference on Data Mining (ICDM), pp 918–923

  28. Kim J, Kim S-K, Yu H (2013) Scalable and parallelizable processing of influence maximization for large-scale social networks? In: IEEE 29th International Conference on Data Engineering (ICDE), pp 266–277

  29. Cheng S, Shen H, Huang J, Chen W, Cheng X (2014) Imrank: influence maximization via finding self-consistent ranking. In: Proceedings of the 37th International ACM SIGIR Conference on Research and Development in Information Retrieval, pp 475–484

  30. Cohen E, Delling D, Pajor T, Werneck RF (2014) Sketch-based influence maximization and computation: scaling up with guarantees. In: Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, pp 629–638

  31. Liu Q, Xiang B, Chen E, Xiong H, Tang F, Yu JX (2014) Influence maximization over large-scale social networks: a bounded linear approach. In: Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, pp 171–180

  32. Tang Y, Xiao X, Shi Y (2014) Influence maximization: near-optimal time complexity meets practical efficiency. In: Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data, pp 75–86

  33. Tang Y, Shi Y, Xiao X (2015) Influence maximization in near-linear time: a martingale approach. In: Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, pp 1539–1554

  34. Tsai C-W, Yang Y-C, Chiang M-C (2015) A genetic newgreedy algorithm for influence maximization in social network. In: IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp 2549–2554

  35. Zhou C, Zhang P, Zang W, Guo L (2015) On the upper bounds of spread for greedy algorithms in social network influence maximization. IEEE Trans Knowl Data Eng 27(10):2770–2783

    Article  Google Scholar 

  36. Bucur D, Iacca G (2016) Influence maximization in social networks with genetic algorithms. In: European Conference on the Applications of Evolutionary Computation, pp 379–392

  37. Galhotra S, Arora A, Roy S (2016) Holistic influence maximization: Combining scalability and efficiency with opinion-aware models. In: Proceedings of the International Conference on Management of Data, pp 743–758

  38. Gong M, Yan J, Shen B, Ma L, Cai Q (2016) Influence maximization in social networks based on discrete particle swarm optimization. Inf Sci 367:600–614

    Article  Google Scholar 

  39. Nguyen HT, Thai MT, Dinh TN (2016) Stop-and-stare: optimal sampling algorithms for viral marketing in billion-scale networks. In: Proceedings of the International Conference on Management of Data, pp 695–710

  40. Weskida M, Michalski R (2016) Evolutionary algorithm for seed selection in social influence process. In: IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). IEEE, pp 1189–1196

  41. Zhang K, Du H, Feldman MW (2017) Maximizing influence in a social network: improved results using a genetic algorithm. Phys A Stat Mech Appl 478:20–30

    Article  MATH  Google Scholar 

  42. Tang J, Zhang R, Yao Y, Zhao Z, Wang P, Li H, Yuan J (2018) Maximizing the spread of influence via the collective intelligence of discrete bat algorithm. Knowl Based Syst 160:88–103

    Article  Google Scholar 

  43. Krömer P, Nowaková J (2017) Guided genetic algorithm for the influence maximization problem. In: International Computing and Combinatorics Conference, pp 630–641

  44. Krömer P, Nowaková J (2018) Guided genetic algorithm for information diffusion problems. In: IEEE Congress on Evolutionary Computation (CEC), pp 1–8

  45. Khomami MMD, Rezvanian A, Meybodi MR, Bagheri A (2021) Cfin: a community-based algorithm for finding influential nodes in complex social networks. J Supercomput 77:2207–2236

    Article  Google Scholar 

  46. Li Y, Fan J, Wang Y, Tan K-L (2018) Influence maximization on social graphs: a survey. IEEE Trans Knowl Data Eng 30:1852–1872

    Article  Google Scholar 

  47. Arora A, Galhotra S, Ranu S (2017) Debunking the myths of influence maximization: an in-depth benchmarking study. In: Proceedings of the ACM International Conference on Management of Data, pp 651–666

  48. Lu W, Xiao X, Goyal A, Huang K, Lakshmanan LV (2017) Refutations on “ debunking the myths of influence maximization: an in-depth benchmarking study”. arXiv preprint. arXiv:1705.05144

  49. Borgs C, Brautbar M, Chayes J, Lucier B (2014) Maximizing social influence in nearly optimal time. In: Proceedings of the Twenty-Fifth Annual ACM-SIAM Symposium on Discrete Algorithms, pp 946–957

  50. Wang X, Zhang Y, Zhang W, Lin X, Chen C (2017) Bring order into the samples: a novel scalable method for influence maximization. IEEE Trans Knowl Data Eng 29(2):243–256

    Article  Google Scholar 

  51. Huang K, Wang S, Bevilacqua G, Xiao X, Lakshmanan LV (2017) Revisiting the stop-and-stare algorithms for influence maximization. Proc VLDB Endow 10(9):913–924

    Article  Google Scholar 

  52. Markowitz H (1952) Portfolio selection. J Financ 7(1):77–91

    Google Scholar 

  53. Storn R (1996) On the usage of differential evolution for function optimization. In: Proceedings of North American Fuzzy Information Processing. IEEE, pp 519–523

  54. Batagelj V, Mrvar A (2006) Pajek datasets, 2009. http://vlado.fmf.uni-lj.si/pub/networks/data/

  55. Hollander M, Wolfe DA, Chicken E (2013) Nonparametric statistical methods, vol 751. Wiley, Hoboken

    MATH  Google Scholar 

  56. Piepho H-P (2004) An algorithm for a letter-based representation of all-pairwise comparisons. J Comput Graph Stat 13(2):456–466

    Article  MathSciNet  Google Scholar 

  57. Clauset A, Newman ME, Moore C (2004) Finding community structure in very large networks. Phys Rev E 70(6):066111

    Article  Google Scholar 

  58. Newman MEJ, Girvan M (2004) Finding and evaluating community structure in networks. Phys Rev E 69(2):026113

    Article  Google Scholar 

  59. Benjamini Y, Hochberg Y (1995) Controlling the false discovery rate: a practical and powerful approach to multiple testing. J R Stat Soc Ser B (Methodol) 57(1):289–300

    MathSciNet  MATH  Google Scholar 

  60. Rossi RA, Ahmed NK (2015) The network data repository with interactive graph analytics and visualization. In: AAAI. http://networkrepository.com

  61. Conover WJ, Johnson ME, Johnson MM (1981) A comparative study of tests for homogeneity of variances, with applications to the outer continental shelf bidding data. Technometrics 23(4):351–361

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammad Fathian.

Ethics declarations

Conflict of interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Supplementary Information

Below is the link to the electronic supplementary material.

Supplementary file 1 (pdf 166 KB)

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

NasehiMoghaddam, S., Fathian, M. & Amiri, B. Risk-Averse Influence Maximization. J Supercomput 79, 2519–2569 (2023). https://doi.org/10.1007/s11227-022-04731-w

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-022-04731-w

Keywords

Navigation