Abstract
The problem of identifying the top-k influential node is still an open and deeply felt issue. The development of a stable and efficient algorithm to deal with such identification is still a challenging research hot spot. Although conventional centrality-based and greedy-based methods show high performance, they are not very efficient when dealing with large-scale social networks. Recently, algorithms based on swarm intelligence are applied to solve the problems mentioned above, and the existing researches show that such algorithms can obtain the optimal global solution. In particular, the discrete bat algorithm (DBA) has been proved to have excellent performance, but the evolution mechanism based on a random selection strategy leads to the optimal solution's instability. To solve this problem, in this paper, we propose a clique-DBA algorithm. The proposed algorithm is based on the clique partition of a network and enhances the initial DBA algorithm's stability. The experimental results show that the proposed clique-DBA algorithm converges to a determined local influence estimation (LIE) value in each run, eliminating the phenomenon of large fluctuation of LIE fitness value generated by the original DBA algorithm. Finally, the simulated results achieved under the independent cascade model show that the clique-DBA algorithm has a comparable performance of influence spreading compared with the algorithms proposed in the state of the art.
Similar content being viewed by others
References
AybikeŞİMŞEK KR (2018) Using swarm intelligence algorithms to detect influential individuals for influence maximization in social networks. Expert Syst Appl 114:224–236
Bi K, Han D, Zhang G, Li K-C, Castiglione A (2020) K maximum probability attack paths generation algorithm for target nodes in networked systems. Int J Inf Secur. https://doi.org/10.1007/s10207-020-00517-4
Blondel V, Guillaume JL, Lambiotte R, Lefebvre E (2008) Fast unfolding of community in large networks. J Stat Mech 2008:P10008
Bonacich P, Lloyd P (2001) Eigenvector-like measures of centrality for asymmetric relations. Social Netw 23:191–201
Chakkingal PS, Kumar SKN (2016) Learning from bees: an approach for influence maximization on viral campaigns. PLoS ONE 11:e0168125
Chen W, Wang Y, Yang S Efficient influence maximization in social networks. In: Acm Sigkdd international conference on knowledge discovery and data mining, 2009. ACM, pp 199–208. https://doi.org/10.1145/1557019.1557047.
David K, Jon K, Éva T (2003) Maximizing the Spread of Influence through a Social Network. Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 137–146. https://doi.org/10.1145/956750.956769
Freeman L (1977) A set of measures of centrality based on betweenness. Sociometry 40:35–41. https://doi.org/10.2307/3033543
Gong M, Yan J, Shen B, Lijia M, Cai Q (2016) Influence maximization in social networks based on discrete particle swarm optimization Information Ences An. Int J 367(368):600–614
Gregory S (2009) Finding overlapping communities using disjoint community detection algorithms. Complex networks. Springer, Berlin
Guimerà R, Danon L, Diaz-Guilera A, Giralt F (2004) Self-similar community structure in a network of human interactions. Phys Rev E Stat Nonliner Soft Matter Phys 68:065103
Hsieh M-Y, Weng T-H, Li K-C (2018) A keyword-aware recommender system using implicit feedback on Hadoop. J Parallel Distrib Comput 116:63–73. https://doi.org/10.1016/j.jpdc.2017.12.008
Jiang Q, Song G, Gao C, Yu W, Xie K (2011) Simulated annealing based influence maximization in social networks. In: Proceedings of the Twenty-Fifth AAAI Conference on Artificial Intelligence., San Francisco, California, USA. AAAI, pp 7–11
Leskovec J, Kleinberg J, Faloutsos C (2007a) Graph evolution: densification and shrinking diameters. ACM Trans Knowl Discovery Data 1:2
Leskovec J, Krause A, Guestrin C, Faloutsos C (2007b) Cost-effective outbreak detection in networks. In: Proceedings of the 13th ACM SIGKDD international conference on knowledge discovery and data mining., San Jose, California, USA, August 12–15.
Lu F, Zhang W, Shao L, Jiang X, Xu P, Jin H (2017) Scalable influence maximization under independent cascade model. J Netw Comput Appl 86:15–23
Marek RO, Ogiela L (2017) Cognitive keys in personalized cryptography. Paper presented at the IEEE international conference on advanced information networking and applications (AINA 2017), Taipei, Taiwan
Newman MEJ (2006) Finding community structure in networks using the eigenvectors of matrices. Phys Rev E 74:036104. https://doi.org/10.1103/PhysRevE.74.036104
Ogiela L (2020) Transformative computing in advanced data analysis processes in the cloud. Inf Process Manag 57(5):102260
Ogiela L, Marek RO (2020) Cognitive security paradigm for cloud computing applications. Concurr Comput Pract Exp 32:e5316
Ogiela L, Takizawa M (2017) Personalized cryptography in cognitive management. Soft Comput 21:2451–2464
Tang J, Zhang R (2018) Maximizing the spread of influence via the collective intelligence of discrete bat algorithm. Knowl-Based Syst 160:88–103
Tang J, Zhang R, Wang P, Zhao Z, Fan L, Liu X (2020) A discrete shuffled frog-leaping algorithm to identify influential nodes for influence maximization in social networks. Knowl Based Syst 187:104833.104831-104833.104812
Tang J, Zhang R, Yao Y, Fan Y, Zhao Z, Hu R, Yuan Y (2018) Identification of top-k influential nodes based on enhanced discrete particle swarm optimization for influence maximization. Phys A Stat Mech Appl 513:477–496
Wei L, Kuan-Ching L, Jing L, Xiaoyan K, Zomaya AY (2019) An industrial network intrusion detection algorithm based on multifeature data clustering optimization model. IEEE Trans Ind Informatics 16:2063–2071
Wei L, Yongkai F, Kuan-Ching L, Dafang Z, Jean-Luc G (2020) Secure data storage and recovery in industrial blockchain network environments. IEEE Trans Industr Inf 99:1–1
Liang W, Huang W, Long J, Li K-C, Zhang D (2020) Deep reinforcement learning for resource protection and real-time detection in loT environment. IEEE Internet Things J 7(7):6392–6401
Yan J, Wei L, Jintian T, Kuan-Ching L (2020) A novel data representation framework based on nonnegative manifold regularisation. Connect Sci. https://doi.org/10.1080/09540091.2020.1772722
Yang X, Zhou Q, Wang J, Zhou R, Li KC (2018) An energy-efficient dynamic decision model for wireless multi-sensor network. J Supercomput 76:1585–1603
Yang XS (2012) Bat algorithm for multi-objective optimisation. Int J Bio-Inspired Comput 3:267–274
Zhang W, Han D, Li KC et al (2020) Wireless sensor network intrusion detection system based on MK-ELM[J]. Soft Comput 24(16):12361–12374. https://doi.org/10.1007/s00500-020-04678-1
Zhu G, Pan Z, Wang Q, Zhang S, Li KC (2020) Building multi-subtopic Bi-level network for micro-blog hot topic based on feature Co-Occurrence and semantic community division. J Netw Comput Appl 170:102815
Acknowledgements
This work was partially supported by the National Key R&D Program of China under Grant No. 2020YFC0832500, Ministry of Education—China Mobile Research Foundation under Grant No. MCM20170206, The Fundamental Research Funds for the Central Universities under Grant No. lzujbky-2019-kb51 and lzujbky-2018-k12, National Natural Science Foundation of China under Grant No. 61402210, Major National Project of High-Resolution Earth Observation System under Grant No. 30-Y20A34-9010-15/17, State Grid Corporation of China Science and Technology Project under Grant No. SGGSKY00WYJS2000062, Program for New Century Excellent Talents in University under Grant No. NCET-12-0250, Strategic Priority Research Program of the Chinese Academy of Sciences with Grant No. XDA03030100, Google Research Awards, and Google Faculty Award, Science and Technology Plan of Qinghai Province under Grant No. 2020-GX-164, National Social Science Fund Project under Grant No.20XTJ005, National Social Science Fund Project under Grant No.18BTJ001 and Zhejiang Provincial Natural Science Foundation under Grant No. LQ20F020011. We also gratefully acknowledge the support of NVIDIA Corporation with the donation of the Jetson TX1 used for this research.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
All authors declare that they have no conflicts of interest regarding the publication of this manuscript.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Han, L., Li, KC., Castiglione, A. et al. A clique-based discrete bat algorithm for influence maximization in identifying top-k influential nodes of social networks. Soft Comput 25, 8223–8240 (2021). https://doi.org/10.1007/s00500-021-05749-7
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-021-05749-7