skip to main content
10.1145/2554850.2555141acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

Preventing the diffusion of negative information based on local influence tree

Authors Info & Claims
Published:24 March 2014Publication History

ABSTRACT

In the social network, competitive influence spread is the problem of finding positive seed vertices that propagate information so as to minimize the influence spread of negative vertices. However, the existing heuristic methods need to be further improved. Therefore, we devote to prevent the diffusion of negative information under the competitive independent cascade (CIC) model. In this paper, we propose a new way to tackle the competitive influence problem, referred to as local influence tree (LIT). We carry out experiments on the real-world datasets, the experiments have verified the effectiveness of the proposed methods compared to the baseline methods.

References

  1. S. Bharathi, D. Kempe, M. Salek. Competitive influence maximization in social networks. In Proc. 3rd International Workshop on Internet and Network Economics (WINE), pages 306--311, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. T. Carnes, C. Nagarajan, S. M. Wild, and A. van Zuylen. Maximizing influence in a competitive social network: a follower's perspective. In ICEC'07, pages 351--360, New York, NY, USA, 2007. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. C. Budak, D. Agrawal, A. E. Abbadi. Limiting the spread of misinformation in social networks. In WWW, pages 665--674, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. A. Borodin, Y. Filmus, J. Oren. Threshold models for competitive influence in social networks. In Proc. 6th International Workshop on Internet and Network Economics (WINE 2010), pages 539--550, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. X. He, G. Song, W. Chen, Q. Jiang. Influence Blocking Maximization in Social Networks under the Competitive Linear Threshold Model. arXiv:1110.4723, 2011.Google ScholarGoogle Scholar
  6. M. Kitsak, L. K. Gallos, S. Havlin, F. Liljeros, L. Muchnik, H. E. Stanley, and H. A. Makse. Identifying influential spreaders in complex networks. Jan 2010.Google ScholarGoogle Scholar
  7. Prakas, et al. Winner-takes-all: Competing Viruses on fair-play networks. WWW 2012, pages 1037--1046.ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Beutel, et al. Interacting Viruses on a Network: Can both survive? SIGKDD 2012, pages: 426--434. ACM Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. A. Singh, Y. N. Singh. Rumor Spreading and Inoculation of Nodes in Complex Networks. WWW 2012, pages 675--678. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. High Energy Physics {EB/OL} http://www.arxiv.org/archive/hep, 2003.Google ScholarGoogle Scholar
  11. W. Chen, Y. Wang, and S. Yang. Efficient influence maximization in social networks. In Proceedings of the 15th ACM SIGKDD conference on Knowledge Discovery and Data Mining, 2009: 199--208. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Barthelemy M. Betweeness centrality in large complex network{J}. European Physical Journal B, 2004, 38(1434): 163--168.Google ScholarGoogle Scholar

Index Terms

  1. Preventing the diffusion of negative information based on local influence tree

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SAC '14: Proceedings of the 29th Annual ACM Symposium on Applied Computing
      March 2014
      1890 pages
      ISBN:9781450324694
      DOI:10.1145/2554850

      Copyright © 2014 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 24 March 2014

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      SAC '14 Paper Acceptance Rate218of939submissions,23%Overall Acceptance Rate1,650of6,669submissions,25%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader