skip to main content
research-article

Triadic Closure Sensitive Influence Maximization

Published: 28 February 2023 Publication History

Abstract

The influence are not linked to any footnote in the text. Please check and suggest. maximization problem aims at selecting the k most influential nodes (i.e., seed nodes) from a social network, where the nodes can maximize the number of influenced nodes activated by a certain propagation model. However, the widely used Independent Cascade model shares the same propagation probability among substantial adjacent node pairs, which is too idealistic and unreasonable in practice. In addition, most heuristic algorithms for influence maximization need to update the expected influence of the remaining nodes in the seed selection process, resulting in high computation cost. To address these non-trivial problems, we propose a novel edge propagation probability calculation method. The method first utilizes the triadic closure structure of social networks to precisely measure the closeness between nodes and assigns different propagation probabilities to each edge, deriving a Triadic Closure-based Independent Cascade (TC-IC) model. Then, we further propose a heuristic influence maximization algorithm named Triadic Closure-based Influence Maximization (TC-IM). The algorithm evaluates the expected influence of a node by integrating the triadic closure weighted propagation probability and the triadic closure weighted degree. Especially, in the seed selection process, only the most influential node that has not been updated in the current round needs to be updated, which significantly improves the efficiency. Besides, we further provide theoretical proofs to guarantee the correctness of this updating strategy. Experimental results on nine real datasets and three propagation models demonstrate that: (1) The TC-IC model can set a proper propagation probability for each node pair, where the IM algorithms could easily identify influential nodes; (2) The TC-IM algorithm can significantly reduce the complexity through an efficient updating strategy with a comparable influence spread to the approximation IM algorithms; (3) Besides, the TC-IM algorithm also exhibits stable performance under other IC models including UIC and WIC, exhibiting good stability and generality.

References

[1]
Prithu Banerjee, Wei Chen, and Laks V. S. Lakshmanan. 2019. Maximizing welfare in social networks under a utility driven influence diffusion model. In Proceedings of the 2019 International Conference on Management of Data, SIGMOD. ACM, 1078–1095.
[2]
Jonah Berger. 2014. Word of mouth and interpersonal communication: A review and directions for future research. Journal of Consumer Psychology 24, 4 (2014), 586–607.
[3]
Christian Borgs, Michael Brautbar, Jennifer T. Chayes, and Brendan Lucier. 2014. Maximizing social influence in nearly optimal time. In Proceedings of the 25th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA. SIAM, 946–957.
[4]
Arastoo Bozorgi, Saeed Samet, Johan Kwisthout, and Todd Wareham. 2017. Community-based influence maximization in social networks under a competitive linear threshold model. Knowledge-based Systems 134 (2017), 149–158.
[5]
Jiuxin Cao, Huiyu Min, and Haoran Wang. 2019. Self-interest influence maximization algorithm based on subject preference in competitive environment. Chinese Journal of Computers 42, 07 (2019), 1495–1510.
[6]
Jin Chen and Ziyi Qi. 2020. Research on social network influence maximization algorithm based on time sequential relationship. Journal of Communications 41, 10 (2020), 211–221.
[7]
Shuo Chen, Ju Fan, Guoliang Li, Jianhua Feng, Kian-Lee Tan, and Jinhui Tang. 2015. Online topic-aware influence maximization. Proceedings of the VLDB Endowment 8, 6 (2015), 666–677.
[8]
Wei Chen, Wei Lu, and Ning Zhang. 2012. Time-critical influence maximization in social networks with time-delayed diffusion process. In Proceedings of the 26th AAAI Conference on Artificial Intelligence. AAAI,592–598.
[9]
Wei Chen, Yajun Wang, and Siyu Yang. 2009. Efficient influence maximization in social networks. In Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 199–208.
[10]
Wei Chen, Yajun Wang, Yang Yuan, and Qinshi Wang. 2016. Combinatorial multi-armed bandit and its extension to probabilistically triggered arms. Journal of Machine Learning Research 17, 50 (2016), 1–33.
[11]
Pedro Domingos and Matt Richardson. 2001. Mining the network value of customers. In Proceedings of the 7th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Association for Computing Machinery, 57–66.
[12]
Christiane Fellbaum and George Miller. 1998. WordNet: An Electronic Lexical Database. MIT Press.
[13]
Amit Goyal, Francesco Bonchi, and Laks V. S. Lakshmanan. 2010. Learning influence probabilities in social networks. In Proceedings of the 3rd International Conference on Web Search and Web Data Mining.Brian D. Davison, Torsten Suel, Nick Craswell, and Bing Liu (Eds.), ACM, 241–250.
[14]
Amit Goyal, Wei Lu, and Laks V. S. Lakshmanan. 2011. CELF++: Optimizing the greedy algorithm for influence maximization in social networks. In Proceedings of the 20th International Conference on World Wide Web, WWW’11. ACM, 47–48.
[15]
Qiang He, Xingwei Wang, Zhencheng Lei, Min Huang, Yuliang Cai, and Lianbo Ma. 2019. TIFIM: A two-stage iterative framework for influence maximization in social networks. Applied Mathematics and Computation 354 (2019), 338–352.
[16]
Xinran He, Guojie Song, Wei Chen, and Qingye Jiang. 2012. Influence blocking maximization in social networks under the competitive linear threshold model. In Proceedings of the 12th SIAM International Conference on Data Mining. SIAM/Omnipress, 463–474.
[17]
Hong Huang, Yuxiao Dong, Jie Tang, Hongxia Yang, Nitesh V. Chawla, and Xiaoming Fu. 2018. Will triadic closure strengthen ties in social networks? ACM Transactions on Knowledge Discovery from Data 12, 3 (2018), 30:1–30:25.
[18]
Keke Huang, Jing Tang, Kai Han, Xiaokui Xiao, Wei Chen, Aixin Sun, Xueyan Tang, and Andrew Lim. 2020. Efficient approximation algorithms for adaptive influence maximization. VLDB Journal 29, 6 (2020), 1385–1406.
[19]
H. M. Jeong, S. P. Mason, A. L. Barabási, and Z. N. Oltvai. 2001. Lethality and centrality in protein networks. Nature 411, 6833 (2001), 41–42.
[20]
Tang Jianxin, Zhang Ruisheng, Yao Yabing, Yang Fan, Zhao Zhili, Hu Rongjing, and Yuan Yongna. 2019. Identification of top-k influential nodes based on enhanced discrete particle swarm optimization for influence maximization. Physica A: Statistical Mechanics and its Applications 513 (2019), 477–496.
[21]
Di Jin, Zhizhi Yu, Pengfei Jiao, Shirui Pan, Dongxiao He, Jia Wu, Philip Yu, and Weixiong Zhang. 2021. A survey of community detection approaches: From statistical modeling to deep learning. IEEE Transactions on Knowledge and Data Engineering (2021),
[22]
David Kempe, Jon M. Kleinberg, and Éva Tardos. 2003. Maximizing the spread of influence through a social network. In Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 137–146.
[23]
David Kempe, Jon M. Kleinberg, and Éva Tardos. 2005. Influential nodes in a diffusion model for social networks. In Proceedings of the International Colloquium on Automata, Languages, and Programming. Springer, 1127–1138.
[24]
Sahar Kianian and Mehran Rostamnia. 2021. An efficient path-based approach for influence maximization in social networks. Expert Systems with Applications 167, 6 (2021), 114168.
[25]
Jérôme Kunegis. 2013. KONECT: The Koblenz network collection. In Proceedings of the 22nd International World Wide Web Conference, WWW’13. ACM, 1343–1350.
[26]
Konstantin Kutzkov, Albert Bifet, Francesco Bonchi, and Aristides Gionis. 2013. STRIP: Stream learning of influence probabilities. In Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Inderjit S. Dhillon, Yehuda Koren, Rayid Ghani, Ted E. Senator, Paul Bradley, Rajesh Parekh, Jingrui He, Robert L. Grossman, and Ramasamy Uthurusamy (Eds.), ACM, 275–283.
[27]
Jure Leskovec, Jon M. Kleinberg, and Christos Faloutsos. 2005. Graphs over time: Densification laws, shrinking diameters and possible explanations. In Proceedings of the 11th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 177–187.
[28]
Jure Leskovec, Jon M. Kleinberg, and Christos Faloutsos. 2007. Graph evolution: Densification and shrinking diameters. ACM Transactions on Knowledge Discovery from Data 1, 1 (2007), 2.
[29]
Jure Leskovec, Andreas Krause, Carlos Guestrin, Christos Faloutsos, Jeanne M. VanBriesen, and Natalie S. Glance. 2007. Cost-effective outbreak detection in networks. In Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 420–429.
[30]
Bo Liu, Gao Cong, Dong Xu, and Yifeng Zeng. 2012. Time constrained influence maximization in social networks. In Proceedings of the12th IEEE International Conference on Data Mining, ICDM. IEEE Computer Society, 439–448.
[31]
Dong Liu, Yun Jing, Jing Zhao, Wenjun Wang, and Guojie Song. 2017. A fast and efficient algorithm for mining top-k nodes in complex networks. Scientific Reports 7 (2017), 43330.
[32]
Qi Liu, Biao Xiang, Enhong Chen, Yong Ge, Hui Xiong, Tengfei Bao, and Yi Zheng. 2012. Influential seed items recommendation. In Proceedings of the 6th ACM Conference on Recommender Systems. ACM, 245–248.
[33]
Duy-Linh Nguyen, Tri-Hai Nguyen, Trong-Hop Do, and Myungsik Yoo. 2017. Probability-based multi-hop diffusion method for influence maximization in social networks. Wireless Personal Communications 93, 4 (2017), 903–916.
[34]
Hung T. Nguyen, Tri P. Nguyen, NhatHai Phan, and Thang N. Dinh. 2017. Importance sketching of influence dynamics in billion-scale networks. In Proceedings of the 2017 IEEE International Conference on Data Mining, ICDM’17. IEEE Computer Society, 337–346.
[35]
Hung T. Nguyen, My T. Thai, and Thang N. Dinh. 2016. Stop-and-stare: Optimal sampling algorithms for viral marketing in billion-scale networks. In Proceedings of the 2016 International Conference on Management of Data, SIGMOD’16. ACM, 695–710.
[36]
Matthew Richardson and Pedro Domingos. 2002. Mining knowledge-sharing sites for viral marketing. In Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Association for Computing Machinery, 61–70.
[37]
Amir Sheikhahmadi, Mohammad Ali Nematbakhsh, and Arman Shokrollahi. 2015. Improving detection of influential nodes in complex networks. Physica, A. Statistical Mechanics and its Applications 436 (2015), 833–845.
[38]
Jie Tang, Jimeng Sun, Chi Wang, and Zi Yang. 2009. Social influence analysis in large-scale networks. In Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.Association for Computing Machinery, 807–816.
[39]
Youze Tang, Yanchen Shi, and Xiaokui Xiao. 2015. Influence maximization in near-linear time: A martingale approach. In Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data. ACM, 1539–1554.
[40]
Youze Tang, Xiaokui Xiao, and Yanchen Shi. 2014. Influence maximization: Near-optimal time complexity meets practical efficiency. In Proceedings of the International Conference on Management of Data, SIGMOD’15. ACM, 75–86.
[41]
Hong Tao and Liu Qipeng. 2019. Seeds selection for spreading in a weighted cascade model. Physica A-Statistical Mechanics and Its Applications 526 (2019), 120943.
[42]
Weibo Wang, Zhaohui Peng, Ziyan Liu, Tianchen Zhu, and Xiaoguang Hong. 2015. Learning the influence probabilities based on multipolar factors in social network. In Proceedings of the 8th International Conference on Knowledge Science, Engineering and Management.Songmao Zhang, Martin Wirsing, and Zili Zhang (Eds.), Lecture Notes in Computer Science, Vol. 9403. Springer, 512–524.
[43]
X. Wang, Y. Su, C. Zhao, and D. Yi. 2016. Effective identification of multiple influential spreaders by DegreePunishment. Physica A Statistical Mechanics and Its Applications 461 (2016), 238–247.
[44]
Zhixiao Wang, Chengcheng Sun, Jingke Xi, and Xiaocui Li. 2021. Influence maximization in social graphs based on community structure and node coverage gain. Future Generation Computer Systems-the International Journal of Escience 118 (2021), 327–338.
[45]
D. J. Watts. 2002. A simple model of global cascades on random networks. Proceedings of the National Academy of Sciences of the United States of America 99, 9 (2002), 5766–5771.
[46]
Jaewon Yang and Jure Leskovec. 2015. Defining and evaluating network communities based on ground-truth. Knowledge and Information Systems 42, 1 (2015), 181–213. DOI:
[47]
Zizhu Zhang, Weiliang Zhao, Jian Yang, Cécile Paris, and Surya Nepal. 2019. Learning influence probabilities and modelling influence diffusion in Twitter. In Proceedings of the Companion of The 2019 World Wide Web Conference.Sihem Amer-Yahia, Mohammad Mahdian, Ashish Goel, Geert-Jan Houben, Kristina Lerman, Julian J. McAuley, Ricardo Baeza-Yates, and Leila Zia (Eds.), ACM, 1087–1094.
[48]
Shi Zhou and Raul J. Mondragón. 2004. The rich-club phenomenon in the Internet topology. IEEE Communications Letters 8, 3 (2004), 180–182.
[49]
Enqiang Zhu, Zepeng Li, Zehui Shao, Jin Xu, and Chanjuan Liu. 2015. Tree-core and tree-coritivity of graphs. Information Processing Letters 115, 10 (2015), 754–759.

Cited By

View all
  • (2024)Network Evolution Model with Preferential Attachment at Triadic Formation StepMathematics10.3390/math1205064312:5(643)Online publication date: 22-Feb-2024
  • (2024)Optimizing Diverse Information Exposure in Social Graphs2024 IEEE International Conference on Big Data (BigData)10.1109/BigData62323.2024.10825032(519-528)Online publication date: 15-Dec-2024
  • (2024)Budget-aware local influence iterative algorithm for efficient influence maximization in social networksHeliyon10.1016/j.heliyon.2024.e4003110:21(e40031)Online publication date: Nov-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Knowledge Discovery from Data
ACM Transactions on Knowledge Discovery from Data  Volume 17, Issue 6
July 2023
392 pages
ISSN:1556-4681
EISSN:1556-472X
DOI:10.1145/3582889
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 28 February 2023
Online AM: 30 November 2022
Accepted: 24 November 2022
Revised: 23 November 2022
Received: 21 February 2022
Published in TKDD Volume 17, Issue 6

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Social network
  2. influence maximization
  3. Independent Cascade model
  4. triadic closure
  5. heuristic algorithm

Qualifiers

  • Research-article

Funding Sources

  • National Natural Science Foundation of China
  • Project of Xuzhou Science and Technology

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)108
  • Downloads (Last 6 weeks)10
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Network Evolution Model with Preferential Attachment at Triadic Formation StepMathematics10.3390/math1205064312:5(643)Online publication date: 22-Feb-2024
  • (2024)Optimizing Diverse Information Exposure in Social Graphs2024 IEEE International Conference on Big Data (BigData)10.1109/BigData62323.2024.10825032(519-528)Online publication date: 15-Dec-2024
  • (2024)Budget-aware local influence iterative algorithm for efficient influence maximization in social networksHeliyon10.1016/j.heliyon.2024.e4003110:21(e40031)Online publication date: Nov-2024
  • (2023)A personalized federated learning-based fault diagnosis method for data suffering from network attacksApplied Intelligence10.1007/s10489-023-04753-853:19(22834-22849)Online publication date: 4-Jul-2023
  • (undefined)Unsupervised Social Bot Detection via Structural Information TheoryACM Transactions on Information Systems10.1145/3660522

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Full Text

View this article in Full Text.

Full Text

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media