Abstract
The top k-influencers problem, as a social influence maximization (SIM) problem, seeks out the best k actors, called the seed set, in a network with the greatest expected Influence Spread (IS). This problem is formulated as a mean-maximization of the IS with no consideration for the variance of the IS. Consequently, it is a risk-blind influence maximization (RBIM) problem. The variance minimization problem has a considerable tendency toward trivial solutions in the absence of a known exogenous threshold of the IS, which makes the formulation ineffective. As an alternative strategy to overcome the trivial solution challenge, risk-averse influence maximization (RAIM) is being investigated and compared empirically with RBIM based on theoretical findings from the literature. RAIM searches for the best k actors under a known diffusion process, whose conditional value-at-risk (CVaR) measure of the IS is maximized. RAIM lacks an approximation algorithm due to the absence of a proven submodularity feature for CVaR. Moreover, no metaheuristic framework was tuned under all of the IC, WC, LT, and TR diffusion models, despite numerous algorithmic contributions to RBIM. Thus, a Genetic Algorithm Framework for Influence Maximization (GAFIM) is proposed by drawing inspiration from the genetic algorithms proposed for RBIM but under all of the IC, WC, LT, and TR diffusion models. A novel approach to tuning GAFIM has been developed employing a community detection algorithm and applied to RAIM and RBIM. Based on the tuning results, the seed set size has a remarkable effect on GAFIM’s performance and highlights its superiority over the algorithms it was inspired by. Furthermore, a comparison to the closest genetic algorithm published in the literature demonstrates that GAFIM outperforms it by a factor of at least 20 in terms of efficiency while achieving a higher quality result. Having completed the quality investigation of GAFIM with satisfactory results, the comparison experiments support intriguing distinctions between RAIM and RBIM in the dominance factor, dominance rate, and dominance mutuality. The variance of the IS and the propagation time/median of the IS prepare the dominance factor(s) for RAIM/RBIM. According to the results, the significant dominance rates (48% vs. 65%), the unreciprocated dominance pattern in dominating the other problem in its dominance area (66% vs. 91%), the complete dominance pattern in dominating without being dominated (9% vs. 34%), and being nondominated (35% vs. 52%) are not as probable for RBIM as for RAIM.
Similar content being viewed by others
Data availability
The datasets analysed during the current study are available in two repositories: (1) The Pajek Datasets (2006) [54] repository: http://vlado.fmf.uni-lj.si/pub/networks/data/. (2) The Network Data Repository with interactive graph analytics and visualization [60]: http://networkrepository.com.
References
Kempe D, Kleinberg J, Tardos É (2003) Maximizing the spread of influence through a social network. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp 137–146
Rockafellar RT, Uryasev S et al (2000) Optimization of conditional value-at-risk. J Risk 2:21–42
Uryasev S, Rockafellar RT (2001) Conditional value-at-risk: optimization approach. In: Stochastic optimization: algorithms and applications. Springer, pp 411–435
Maehara T (2015) Risk averse submodular utility maximization. Oper Res Lett 43(5):526–529
Ohsaka N, Yoshida Y (2017) Portfolio optimization for influence spread. In: Proceedings of the 26th International Conference on World Wide Web, pp 977–985
Chen W, Lakshmanan LV, Castillo C (2013) Information and influence propagation in social networks. Synth Lect Data Manag 5(4):1–177
Cheng S, Shen H, Huang J, Zhang G, Cheng X (2013) Staticgreedy: solving the scalability-accuracy dilemma in influence maximization. In: Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, pp 509–518
Ohsaka N, Akiba T, Yoshida Y, Kawarabayashi K-I (2014) Fast and accurate influence maximization on large networks with pruned Monte-Carlo simulations. In: AAAI, pp 138–144
Banerjee S, Jenamani M, Pratihar DK (2018) A survey on influence maximization in a social network. arXiv preprint. arXiv:1808.05502
Ackerman E, Ben-Zwi O, Wolfovitz G (2010) Combinatorial model and bounds for target set selection. Theor Comput Sci 411(44–46):4017–4022
Cicalese F, Cordasco G, Gargano L, MilaniÄ M, Vaccaro U (2014) Latency-bounded target set selection in social networks. Theor Comput Sci 535:1–15
Charikar M, Naamad Y, Wirth A (2016) On approximating target set selection. In: LIPIcs-Leibniz International Proceedings in Informatics, vol 60
Chen W, Lin T, Tan Z, Zhao M, Zhou X (2016) Robust influence maximization. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp 795–804
He X, Kempe D (2018) Stability and robustness in influence maximization. ACM Trans Knowl Discov Data (TKDD) 12(6):66
Kleinberg JM (1999) Authoritative sources in a hyperlinked environment. J ACM (JACM) 46(5):604–632
Page L, Brin S, Motwani R, Winograd T (1999) The pagerank citation ranking: bringing order to the web
Kimura M, Saito K (2006) Tractable models for information diffusion in social networks. In: European Conference on Principles of Data Mining and Knowledge Discovery, pp 259–271
Leskovec J, Krause A, Guestrin C, Faloutsos C, VanBriesen J, Glance N (2007) Cost-effective outbreak detection in networks. In: Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp 420–429
Chen W, Wang Y, Yang S (2009) Efficient influence maximization in social networks. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp 199–208
Chen W, Wang C, Wang Y (2010) Scalable influence maximization for prevalent viral marketing in large-scale social networks. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp 1029–1038
Chen W, Yuan Y, Zhang L (2010) Scalable influence maximization in social networks under the linear threshold model. In: IEEE 10th International Conference on Data Mining (ICDM), pp 88–97
Wang Y, Cong G, Song G, Xie K (2010) Community-based greedy algorithm for mining top-k influential nodes in mobile social networks. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp 1039–1048
Goyal A, Lu W, Lakshmanan LV (2011) Celf++: optimizing the greedy algorithm for influence maximization in social networks. In: Proceedings of the 20th International Conference Companion on World Wide Web, pp 47–48
Goyal A, Lu W, Lakshmanan LV (2011) Simpath: an efficient algorithm for influence maximization under the linear threshold model. In: IEEE 11th International Conference on Data Mining (ICDM), pp 211–220
Jiang Q, Song G, Cong G, Wang Y, Si W, Xie K (2011) Simulated annealing based influence maximization in social networks. AAAI 11:127–132
Narayanam R, Narahari Y (2011) A shapley value-based approach to discover influential nodes in social networks. IEEE Trans Autom Sci Eng 8(1):130–147
Jung K, Heo W, Chen W (2012) Irie: scalable and robust influence maximization in social networks. In: IEEE 12th International Conference on Data Mining (ICDM), pp 918–923
Kim J, Kim S-K, Yu H (2013) Scalable and parallelizable processing of influence maximization for large-scale social networks? In: IEEE 29th International Conference on Data Engineering (ICDE), pp 266–277
Cheng S, Shen H, Huang J, Chen W, Cheng X (2014) Imrank: influence maximization via finding self-consistent ranking. In: Proceedings of the 37th International ACM SIGIR Conference on Research and Development in Information Retrieval, pp 475–484
Cohen E, Delling D, Pajor T, Werneck RF (2014) Sketch-based influence maximization and computation: scaling up with guarantees. In: Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, pp 629–638
Liu Q, Xiang B, Chen E, Xiong H, Tang F, Yu JX (2014) Influence maximization over large-scale social networks: a bounded linear approach. In: Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, pp 171–180
Tang Y, Xiao X, Shi Y (2014) Influence maximization: near-optimal time complexity meets practical efficiency. In: Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data, pp 75–86
Tang Y, Shi Y, Xiao X (2015) Influence maximization in near-linear time: a martingale approach. In: Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, pp 1539–1554
Tsai C-W, Yang Y-C, Chiang M-C (2015) A genetic newgreedy algorithm for influence maximization in social network. In: IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp 2549–2554
Zhou C, Zhang P, Zang W, Guo L (2015) On the upper bounds of spread for greedy algorithms in social network influence maximization. IEEE Trans Knowl Data Eng 27(10):2770–2783
Bucur D, Iacca G (2016) Influence maximization in social networks with genetic algorithms. In: European Conference on the Applications of Evolutionary Computation, pp 379–392
Galhotra S, Arora A, Roy S (2016) Holistic influence maximization: Combining scalability and efficiency with opinion-aware models. In: Proceedings of the International Conference on Management of Data, pp 743–758
Gong M, Yan J, Shen B, Ma L, Cai Q (2016) Influence maximization in social networks based on discrete particle swarm optimization. Inf Sci 367:600–614
Nguyen HT, Thai MT, Dinh TN (2016) Stop-and-stare: optimal sampling algorithms for viral marketing in billion-scale networks. In: Proceedings of the International Conference on Management of Data, pp 695–710
Weskida M, Michalski R (2016) Evolutionary algorithm for seed selection in social influence process. In: IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). IEEE, pp 1189–1196
Zhang K, Du H, Feldman MW (2017) Maximizing influence in a social network: improved results using a genetic algorithm. Phys A Stat Mech Appl 478:20–30
Tang J, Zhang R, Yao Y, Zhao Z, Wang P, Li H, Yuan J (2018) Maximizing the spread of influence via the collective intelligence of discrete bat algorithm. Knowl Based Syst 160:88–103
Krömer P, Nowaková J (2017) Guided genetic algorithm for the influence maximization problem. In: International Computing and Combinatorics Conference, pp 630–641
Krömer P, Nowaková J (2018) Guided genetic algorithm for information diffusion problems. In: IEEE Congress on Evolutionary Computation (CEC), pp 1–8
Khomami MMD, Rezvanian A, Meybodi MR, Bagheri A (2021) Cfin: a community-based algorithm for finding influential nodes in complex social networks. J Supercomput 77:2207–2236
Li Y, Fan J, Wang Y, Tan K-L (2018) Influence maximization on social graphs: a survey. IEEE Trans Knowl Data Eng 30:1852–1872
Arora A, Galhotra S, Ranu S (2017) Debunking the myths of influence maximization: an in-depth benchmarking study. In: Proceedings of the ACM International Conference on Management of Data, pp 651–666
Lu W, Xiao X, Goyal A, Huang K, Lakshmanan LV (2017) Refutations on “ debunking the myths of influence maximization: an in-depth benchmarking study”. arXiv preprint. arXiv:1705.05144
Borgs C, Brautbar M, Chayes J, Lucier B (2014) Maximizing social influence in nearly optimal time. In: Proceedings of the Twenty-Fifth Annual ACM-SIAM Symposium on Discrete Algorithms, pp 946–957
Wang X, Zhang Y, Zhang W, Lin X, Chen C (2017) Bring order into the samples: a novel scalable method for influence maximization. IEEE Trans Knowl Data Eng 29(2):243–256
Huang K, Wang S, Bevilacqua G, Xiao X, Lakshmanan LV (2017) Revisiting the stop-and-stare algorithms for influence maximization. Proc VLDB Endow 10(9):913–924
Markowitz H (1952) Portfolio selection. J Financ 7(1):77–91
Storn R (1996) On the usage of differential evolution for function optimization. In: Proceedings of North American Fuzzy Information Processing. IEEE, pp 519–523
Batagelj V, Mrvar A (2006) Pajek datasets, 2009. http://vlado.fmf.uni-lj.si/pub/networks/data/
Hollander M, Wolfe DA, Chicken E (2013) Nonparametric statistical methods, vol 751. Wiley, Hoboken
Piepho H-P (2004) An algorithm for a letter-based representation of all-pairwise comparisons. J Comput Graph Stat 13(2):456–466
Clauset A, Newman ME, Moore C (2004) Finding community structure in very large networks. Phys Rev E 70(6):066111
Newman MEJ, Girvan M (2004) Finding and evaluating community structure in networks. Phys Rev E 69(2):026113
Benjamini Y, Hochberg Y (1995) Controlling the false discovery rate: a practical and powerful approach to multiple testing. J R Stat Soc Ser B (Methodol) 57(1):289–300
Rossi RA, Ahmed NK (2015) The network data repository with interactive graph analytics and visualization. In: AAAI. http://networkrepository.com
Conover WJ, Johnson ME, Johnson MM (1981) A comparative study of tests for homogeneity of variances, with applications to the outer continental shelf bidding data. Technometrics 23(4):351–361
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Supplementary Information
Below is the link to the electronic supplementary material.
Rights and permissions
Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
NasehiMoghaddam, S., Fathian, M. & Amiri, B. Risk-Averse Influence Maximization. J Supercomput 79, 2519–2569 (2023). https://doi.org/10.1007/s11227-022-04731-w
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-022-04731-w