Influence Blocking Maximization in Social Networks under the Competitive Linear Threshold Model

In many real-world situations, different and often opposite opinions, innovations, or products are competing with one another for their social influence in a networked society. In this paper, we study competitive influence propagation in social networks under the competitive linear threshold (CLT) model, an extension to the classic linear threshold model. Under the CLT model, we focus on the problem that one entity tries to block the influence propagation of its competing entity as much as possible by strategically selecting a number of seed nodes that could initiate its own influence propagation. We call this problem the influence blocking maximization (IBM) problem. We prove that the objective function of IBM in the CLT model is submodular, and thus a greedy algorithm could achieve 1 − 1/e approximation ratio. However, the greedy algorithm requires Monte-Carlo simulations of competitive influence propagation, which makes the algorithm not efficient. We design an efficient algorithm CLDAG, which utilizes the properties of the CLT model, to address this issue. We conduct extensive simulations of CLDAG, the greedy algorithm, and other baseline algorithms on real-world and synthetic datasets. Our results show that CLDAG is able to provide best accuracy in par with the greedy algorithm and often better than other algorithms, while it is two orders of magnitude faster than the greedy algorithm.

[1]  Cameron Marlow,et al.  A 61-million-person experiment in social influence and political mobilization , 2012, Nature.

[2]  Yifei Yuan,et al.  Scalable Influence Maximization in Social Networks under the Linear Threshold Model , 2010, 2010 IEEE International Conference on Data Mining.

[3]  Ning Chen,et al.  On the approximability of influence in social networks , 2008, SODA '08.

[4]  R. Holley,et al.  Ergodic Theorems for Weakly Interacting Infinite Systems and the Voter Model , 1975 .

[5]  Divyakant Agrawal,et al.  Limiting the spread of misinformation in social networks , 2011, WWW.

[6]  Roger Wattenhofer,et al.  Word of Mouth: Rumor Dissemination in Social Networks , 2008, SIROCCO.

[7]  Wei Chen,et al.  Efficient influence maximization in social networks , 2009, KDD.

[8]  P. Clifford,et al.  A model for spatial conflict , 1973 .

[9]  Ljupco Kocarev,et al.  Model for rumor spreading over networks. , 2010, Physical review. E, Statistical, nonlinear, and soft matter physics.

[10]  Mark S. Granovetter Threshold Models of Collective Behavior , 1978, American Journal of Sociology.

[11]  Yifei Yuan,et al.  Influence Maximization in Social Networks When Negative Opinions May Emerge and Propagate , 2011, SDM.

[12]  Jacob Goldenberg,et al.  Using Complex Systems Analysis to Advance Marketing Theory Development , 2001 .

[13]  Jaideep Srivastava,et al.  A Generalized Linear Threshold Model for Multiple Cascades , 2010, 2010 IEEE International Conference on Data Mining.

[14]  Vijay Mahajan,et al.  New Product Diffusion Models in Marketing: A Review and Directions for Research: , 1990 .

[15]  Weili Wu,et al.  Least Cost Rumor Blocking in Social Networks , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems.

[16]  Andreas Krause,et al.  Cost-effective outbreak detection in networks , 2007, KDD '07.

[17]  Matthew Richardson,et al.  Mining the network value of customers , 2001, KDD '01.

[18]  Éva Tardos,et al.  Influential Nodes in a Diffusion Model for Social Networks , 2005, ICALP.

[19]  Masahiro Kimura,et al.  Tractable Models for Information Diffusion in Social Networks , 2006, PKDD.

[20]  Yu Wang,et al.  Community-based greedy algorithm for mining top-K influential nodes in mobile social networks , 2010, KDD.

[21]  Shishir Bharathi,et al.  Competitive Influence Maximization in Social Networks , 2007, WINE.

[22]  Jacob Goldenberg,et al.  Talk of the Network: A Complex Systems Look at the Underlying Process of Word-of-Mouth , 2001 .

[23]  M. L. Fisher,et al.  An analysis of approximations for maximizing submodular set functions—I , 1978, Math. Program..

[24]  Wei Chen,et al.  Scalable influence maximization for prevalent viral marketing in large-scale social networks , 2010, KDD.

[25]  Matthew Richardson,et al.  Mining knowledge-sharing sites for viral marketing , 2002, KDD.

[26]  Allan Borodin,et al.  Threshold Models for Competitive Influence in Social Networks , 2010, WINE.

[27]  Y. Narahari,et al.  Determining the top-k nodes in social networks using the Shapley value , 2008, AAMAS.

[28]  T. Schelling Micromotives and Macrobehavior , 1978 .