Skip to main content

Advertisement

Log in

Time and value aware influence blocking maximization in geo-social networks

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

The influence blocking maximization (IBM) problem aims to identify the most influential set of positive nodes in a social network to prevent the propagation of negative information throughout the network. However, existing studies have not considered factors such as the time delay of influence propagation and the value factor of nodes. Therefore, we first propose an influence propagation model called Time-Delayed Campaign-Oblivious Independent Cascade Model (TD-COICM), which incorporates time delay to simulate the decay of influence over time in social networks. Additionally, we present the Time and Value aware Influence Blocking Maximization (TVIBM) problem by considering the value factor of nodes under TD-COICM. More precisely, the value of a node is determined by its social influence and geographical distance from Rumor Source (RS). We demonstrate TVIBM is NP-hard and the influence function is monotonic and submodular. To overcome the low efficiency of the greedy algorithm, we combine the technique of Reverse Influence Sampling (RIS) and present the Reverse Influence Sampling with Time Delay (RIS-TD) algorithm. We prove that the RIS-TD algorithm has a high probability to return a \(\left( 1-1/e-\epsilon \right) \) approximate guarantee. To improve the efficiency, we further present the ERIS-TD algorithm by reducing the number of samples. Experiments on three real geographical social networks further confirm that our algorithms outperform other baseline algorithms in effectiveness, and outperform RIS-based algorithms in efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Algorithm 1
Algorithm 2
Algorithm 3
Algorithm 4
Algorithm 5
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Data availibility

The three datasets used in this study are available in SNAP, http://snap.stanford.edu/data/. The Ego-Facebook dataset is available at http://snap.stanford.edu/data/ego-Facebook.html. The Brightkite dataset is available at http://snap.stanford.edu/data/loc-Brightkite.html. The Gowalla dataset is available at http://snap.stanford.edu/data/loc-Gowalla.html.

References

  1. He X, Song G, Chen W, Jiang Q (2012) Influence blocking maximization in social networks under the competitive linear threshold model. In: Proceedings of the 2012 SIAM International Conference on Data Mining, SIAM, pp 463–474

  2. Wu P, Pan L (2017) Scalable influence blocking maximization in social networks under competitive independent cascade models. Comput Netw 123:38–50

    Article  Google Scholar 

  3. Chen L, Zhang Y, Chen Y, Li B, Liu W (2021) Negative influence blocking maximization with uncertain sources under the independent cascade model. Inf Sci 564:343–367

    Article  MathSciNet  Google Scholar 

  4. Zhang R, Wang X, Pei S (2023) Targeted influence maximization in complex networks. Physica D 446:133677

    Article  MathSciNet  Google Scholar 

  5. Manouchehri MA, Helfroush MS, Danyali H (2022) Non-uniform influence blocking maximization in social network. Expert Syst Appl 207:118052

    Article  Google Scholar 

  6. Shi Q, Wang C, Ye D, Chen J, Zhou S, Feng Y, Chen C, Huang Y (2021) Profit maximization for competitive social advertising. Theoret Comput Sci 868:12–29

    Article  MathSciNet  Google Scholar 

  7. Mohammadi A, Saraee M, Mirzaei A (2015) Time-sensitive influence maximization in social networks. J Inf Sci 41(6):765–778

    Article  Google Scholar 

  8. Liqing Q, Jinfeng Y, Xin F, Wei J, Wenwen G (2019) Analysis of influence maximization in temporal social networks. IEEE Access 7:42052–42062

    Article  Google Scholar 

  9. Chen W, Lu W, Zhang N (2012) Time-critical influence maximization in social networks with time-delayed diffusion process. In: Proceedings of the AAAI Conference on Artificial Intelligence, pp 591–598

  10. Banerjee S, Jenamani M, Pratihar DK (2022) An approximate marginal spread computation approach for the budgeted influence maximization with delay. Computing 104(3):657–680

    Article  MathSciNet  Google Scholar 

  11. Borgs C, Brautbar M, Chayes J, Lucier B (2014) Maximizing social influence in nearly optimal time. In: Proceedings of the Twenty-Fifth Annual ACM-SIAM Symposium on Discrete algorithms, SIAM, pp 946–957

  12. Tang J, Tang X, Xiao X, Yuan J (2018) Online processing algorithms for influence maximization. In: Proceedings of the 2018 International Conference on Management of Data, pp 991–1005

  13. Domingos P, Richardson M (2001) Mining the network value of customers. In: Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge discovery and data mining, pp 57–66

  14. Kempe D, Kleinberg J, Tardos É (2003) Maximizing the spread of influence through a social network. In: Proceedings of the ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp 137–146

  15. Bharathi S, Kempe D, Salek M (2007) Competitive influence maximization in social networks. In: Internet and Network Economics: Third International Workshop, WINE 2007, San Diego, CA, USA, December 12-14, 2007. Proceedings 3, Springer, pp 306–311

  16. Budak C, Agrawal D, El Abbadi A (2011) Limiting the spread of misinformation in social networks. In: Proceedings of the 20th International Conference on World Wide Web, pp 665–674

  17. Chen W, Lakshmanan LV, Castillo C (2013) Information and influence propagation in social networks. Synth Lect Data Manag 5(4):1–177

    Article  Google Scholar 

  18. Leskovec J, Krause A, Guestrin C, Faloutsos C, VanBriesen J, Glance N (2007) Cost-effective outbreak detection in networks. In: Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp 420–429

  19. Goyal A, Lu W, Lakshmanan LV (2011) Celf++ optimizing the greedy algorithm for influence maximization in social networks. In: Proceedings of the 20th International Conference Companion on World Wide Web, pp 47–48

  20. Chen W, Wang Y, Yang S (2009) Efficient influence maximization in social networks. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp 199–208

  21. Zareie A, Sheikhahmadi A, Jalili M (2020) Identification of influential users in social network using gray wolf optimization algorithm. Expert Syst Appl 142:112971

    Article  Google Scholar 

  22. Zhu W, Miao Y, Yang S, Lian Z, Cui L (2023) An influence maximization algorithm based on improved k-shell in temporal social networks. Comput Mater Contin 74(3):3111–3131

    Google Scholar 

  23. Tang Y, Xiao X, Shi Y (2014) Influence maximization: near-optimal time complexity meets practical efficiency. In: Proceedings of the 2014 ACM SIGMOD International Conference on Management of data, pp 75–86

  24. Tang Y, Shi Y, Xiao X (2015) Influence maximization in near-linear time: a martingale approach. In: Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, pp 1539–1554

  25. Nguyen HT, Thai MT, Dinh TN (2016) Stop-and-stare: Optimal sampling algorithms for viral marketing in billion-scale networks. In: Proceedings of the 2016 International Conference on Management of Data, pp 695–710

  26. Guo Q, Wang S, Wei Z, Lin W, Tang J (2022) Influence maximization revisited: efficient sampling with bound tightened. ACM Trans Database Syst 47(3):1–45

    Article  MathSciNet  Google Scholar 

  27. Zareie A, Sakellariou R (2022) Rumour spread minimization in social networks: a source-ignorant approach. Online Soc Netw Media 29:100206

    Article  Google Scholar 

  28. Guo J, Chen T, Wu W (2020) A multi-feature diffusion model: rumor blocking in social networks. IEEE/ACM Trans Netw 29(1):386–397

    Google Scholar 

  29. Liang Z, He Q, Du H, Xu W (2023) Targeted influence maximization in competitive social networks. Inf Sci 619:390–405

    Article  Google Scholar 

  30. Ni Q, Guo J, Huang C, Wu W (2020) Community-based rumor blocking maximization in social networks: algorithms and analysis. Theoret Comput Sci 840:257–269

    Article  MathSciNet  Google Scholar 

  31. Arazkhani N, Meybodi MR, Rezvanian A (2019) Influence blocking maximization in social network using centrality measures. In: 2019 5th Conference on Knowledge Based Engineering and Innovation (KBEI), IEEE, pp 492–497

  32. Wu H, Zhang Z, Fang Y, Zhang S, Jiang Z, Huang J, Li P (2021) Containment of rumor spread by selecting immune nodes in social networks. Math Biosci Eng 18(3):2614–2631

    Article  MathSciNet  Google Scholar 

  33. Fan L, Wu W, Zhai X, Xing K, Lee W, Du DZ (2014) Maximizing rumor containment in social networks with constrained time. Soc Netw Anal Min 4:1–10

    Article  Google Scholar 

  34. Song C, Hsu W, Lee ML (2017) Temporal influence blocking: minimizing the effect of misinformation in social networks. In: 2017 IEEE 33rd international Conference on Data Engineering (ICDE), IEEE, pp 847–858

  35. Manouchehri MA, Helfroush MS, Danyali H (2021) Temporal rumor blocking in online social networks: a sampling-based approach. IEEE Trans Syst Man Cybern Syst 52(7):4578–4588

    Article  Google Scholar 

  36. Zhu W, Yang W, Xuan S, Man D, Wang W, Du X (2018) Location-aware influence blocking maximization in social networks. IEEE Access 6:61462–61477

    Article  Google Scholar 

  37. Chung F, Lu L (2006) Concentration inequalities and martingale inequalities: a survey. Internet Math 3(1):79–127

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgements

This study was funded by the Fundamental Research Funds for the Universities of Heilongjiang (Nos. 145109217, 135509234), and the Youth Science and Technology Innovation Personnel Training Project of Heilongjiang (No. UNPYSCT-2020072)

Author information

Authors and Affiliations

Authors

Contributions

Wenlong Zhu contributed to Conceptualization; Wenlong Zhu, Chongyuan Peng contributed to Methodology; Chongyuan Peng contributed to Formal analysis and investigation; Chongyuan Peng contributed to Writing—original draft preparation; Wenlong Zhu contributed to Writing—review and editing; Wenlong Zhu, Shuangshuang Yang contributed to Funding acquisition; Yufan Bai, Yingchun Diao contributed to Resources; Shuangshuang Yang contributed to Supervision.

Corresponding author

Correspondence to Wenlong Zhu.

Ethics declarations

Conflict of interest

The authors have no Conflict of interest to declare that are relevant to the content of this article.

Ethical and informed consent for data used

Not applicable.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhu, W., Peng, C., Miao, Y. et al. Time and value aware influence blocking maximization in geo-social networks. J Supercomput 80, 21149–21178 (2024). https://doi.org/10.1007/s11227-024-06252-0

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-024-06252-0

Keywords