Skip to main content
Log in

A clique-based discrete bat algorithm for influence maximization in identifying top-k influential nodes of social networks

  • Methodologies and Application
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

The problem of identifying the top-k influential node is still an open and deeply felt issue. The development of a stable and efficient algorithm to deal with such identification is still a challenging research hot spot. Although conventional centrality-based and greedy-based methods show high performance, they are not very efficient when dealing with large-scale social networks. Recently, algorithms based on swarm intelligence are applied to solve the problems mentioned above, and the existing researches show that such algorithms can obtain the optimal global solution. In particular, the discrete bat algorithm (DBA) has been proved to have excellent performance, but the evolution mechanism based on a random selection strategy leads to the optimal solution's instability. To solve this problem, in this paper, we propose a clique-DBA algorithm. The proposed algorithm is based on the clique partition of a network and enhances the initial DBA algorithm's stability. The experimental results show that the proposed clique-DBA algorithm converges to a determined local influence estimation (LIE) value in each run, eliminating the phenomenon of large fluctuation of LIE fitness value generated by the original DBA algorithm. Finally, the simulated results achieved under the independent cascade model show that the clique-DBA algorithm has a comparable performance of influence spreading compared with the algorithms proposed in the state of the art.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  • AybikeŞİMŞEK KR (2018) Using swarm intelligence algorithms to detect influential individuals for influence maximization in social networks. Expert Syst Appl 114:224–236

    Article  Google Scholar 

  • Bi K, Han D, Zhang G, Li K-C, Castiglione A (2020) K maximum probability attack paths generation algorithm for target nodes in networked systems. Int J Inf Secur. https://doi.org/10.1007/s10207-020-00517-4

    Article  Google Scholar 

  • Blondel V, Guillaume JL, Lambiotte R, Lefebvre E (2008) Fast unfolding of community in large networks. J Stat Mech 2008:P10008

    Article  Google Scholar 

  • Bonacich P, Lloyd P (2001) Eigenvector-like measures of centrality for asymmetric relations. Social Netw 23:191–201

    Article  Google Scholar 

  • Chakkingal PS, Kumar SKN (2016) Learning from bees: an approach for influence maximization on viral campaigns. PLoS ONE 11:e0168125

    Article  Google Scholar 

  • Chen W, Wang Y, Yang S Efficient influence maximization in social networks. In: Acm Sigkdd international conference on knowledge discovery and data mining, 2009. ACM, pp 199–208. https://doi.org/10.1145/1557019.1557047.

  • David K, Jon K, Éva T (2003) Maximizing the Spread of Influence through a Social Network. Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 137–146. https://doi.org/10.1145/956750.956769

  • Freeman L (1977) A set of measures of centrality based on betweenness. Sociometry 40:35–41. https://doi.org/10.2307/3033543

    Article  Google Scholar 

  • Gong M, Yan J, Shen B, Lijia M, Cai Q (2016) Influence maximization in social networks based on discrete particle swarm optimization Information Ences An. Int J 367(368):600–614

    Google Scholar 

  • Gregory S (2009) Finding overlapping communities using disjoint community detection algorithms. Complex networks. Springer, Berlin

    Google Scholar 

  • Guimerà R, Danon L, Diaz-Guilera A, Giralt F (2004) Self-similar community structure in a network of human interactions. Phys Rev E Stat Nonliner Soft Matter Phys 68:065103

    Article  Google Scholar 

  • Hsieh M-Y, Weng T-H, Li K-C (2018) A keyword-aware recommender system using implicit feedback on Hadoop. J Parallel Distrib Comput 116:63–73. https://doi.org/10.1016/j.jpdc.2017.12.008

    Article  Google Scholar 

  • Jiang Q, Song G, Gao C, Yu W, Xie K (2011) Simulated annealing based influence maximization in social networks. In: Proceedings of the Twenty-Fifth AAAI Conference on Artificial Intelligence., San Francisco, California, USA. AAAI, pp 7–11

  • Leskovec J, Kleinberg J, Faloutsos C (2007a) Graph evolution: densification and shrinking diameters. ACM Trans Knowl Discovery Data 1:2

    Article  Google Scholar 

  • Leskovec J, Krause A, Guestrin C, Faloutsos C (2007b) Cost-effective outbreak detection in networks. In: Proceedings of the 13th ACM SIGKDD international conference on knowledge discovery and data mining., San Jose, California, USA, August 12–15.

  • Lu F, Zhang W, Shao L, Jiang X, Xu P, Jin H (2017) Scalable influence maximization under independent cascade model. J Netw Comput Appl 86:15–23

    Article  Google Scholar 

  • Marek RO, Ogiela L (2017) Cognitive keys in personalized cryptography. Paper presented at the IEEE international conference on advanced information networking and applications (AINA 2017), Taipei, Taiwan

  • Newman MEJ (2006) Finding community structure in networks using the eigenvectors of matrices. Phys Rev E 74:036104. https://doi.org/10.1103/PhysRevE.74.036104

    Article  MathSciNet  Google Scholar 

  • Ogiela L (2020) Transformative computing in advanced data analysis processes in the cloud. Inf Process Manag 57(5):102260

    Article  Google Scholar 

  • Ogiela L, Marek RO (2020) Cognitive security paradigm for cloud computing applications. Concurr Comput Pract Exp 32:e5316

    Google Scholar 

  • Ogiela L, Takizawa M (2017) Personalized cryptography in cognitive management. Soft Comput 21:2451–2464

    Article  Google Scholar 

  • Tang J, Zhang R (2018) Maximizing the spread of influence via the collective intelligence of discrete bat algorithm. Knowl-Based Syst 160:88–103

    Article  Google Scholar 

  • Tang J, Zhang R, Wang P, Zhao Z, Fan L, Liu X (2020) A discrete shuffled frog-leaping algorithm to identify influential nodes for influence maximization in social networks. Knowl Based Syst 187:104833.104831-104833.104812

    Article  Google Scholar 

  • Tang J, Zhang R, Yao Y, Fan Y, Zhao Z, Hu R, Yuan Y (2018) Identification of top-k influential nodes based on enhanced discrete particle swarm optimization for influence maximization. Phys A Stat Mech Appl 513:477–496

    Article  Google Scholar 

  • Wei L, Kuan-Ching L, Jing L, Xiaoyan K, Zomaya AY (2019) An industrial network intrusion detection algorithm based on multifeature data clustering optimization model. IEEE Trans Ind Informatics 16:2063–2071

    Google Scholar 

  • Wei L, Yongkai F, Kuan-Ching L, Dafang Z, Jean-Luc G (2020) Secure data storage and recovery in industrial blockchain network environments. IEEE Trans Industr Inf 99:1–1

    Google Scholar 

  • Liang W, Huang W, Long J, Li K-C, Zhang D (2020) Deep reinforcement learning for resource protection and real-time detection in loT environment. IEEE Internet Things J 7(7):6392–6401

    Article  Google Scholar 

  • Yan J, Wei L, Jintian T, Kuan-Ching L (2020) A novel data representation framework based on nonnegative manifold regularisation. Connect Sci. https://doi.org/10.1080/09540091.2020.1772722

    Article  Google Scholar 

  • Yang X, Zhou Q, Wang J, Zhou R, Li KC (2018) An energy-efficient dynamic decision model for wireless multi-sensor network. J Supercomput 76:1585–1603

    Article  Google Scholar 

  • Yang XS (2012) Bat algorithm for multi-objective optimisation. Int J Bio-Inspired Comput 3:267–274

    Article  Google Scholar 

  • Zhang W, Han D, Li KC et al (2020) Wireless sensor network intrusion detection system based on MK-ELM[J]. Soft Comput 24(16):12361–12374. https://doi.org/10.1007/s00500-020-04678-1

  • Zhu G, Pan Z, Wang Q, Zhang S, Li KC (2020) Building multi-subtopic Bi-level network for micro-blog hot topic based on feature Co-Occurrence and semantic community division. J Netw Comput Appl 170:102815

    Article  Google Scholar 

Download references

Acknowledgements

This work was partially supported by the National Key R&D Program of China under Grant No. 2020YFC0832500, Ministry of Education—China Mobile Research Foundation under Grant No. MCM20170206, The Fundamental Research Funds for the Central Universities under Grant No. lzujbky-2019-kb51 and lzujbky-2018-k12, National Natural Science Foundation of China under Grant No. 61402210, Major National Project of High-Resolution Earth Observation System under Grant No. 30-Y20A34-9010-15/17, State Grid Corporation of China Science and Technology Project under Grant No. SGGSKY00WYJS2000062, Program for New Century Excellent Talents in University under Grant No. NCET-12-0250, Strategic Priority Research Program of the Chinese Academy of Sciences with Grant No. XDA03030100, Google Research Awards, and Google Faculty Award, Science and Technology Plan of Qinghai Province under Grant No. 2020-GX-164, National Social Science Fund Project under Grant No.20XTJ005, National Social Science Fund Project under Grant No.18BTJ001 and Zhejiang Provincial Natural Science Foundation under Grant No. LQ20F020011. We also gratefully acknowledge the support of NVIDIA Corporation with the donation of the Jetson TX1 used for this research.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qingguo Zhou.

Ethics declarations

Conflict of interest

All authors declare that they have no conflicts of interest regarding the publication of this manuscript.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Han, L., Li, KC., Castiglione, A. et al. A clique-based discrete bat algorithm for influence maximization in identifying top-k influential nodes of social networks. Soft Comput 25, 8223–8240 (2021). https://doi.org/10.1007/s00500-021-05749-7

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-021-05749-7

Keywords

Navigation