Learning cascaded influence under partial monitoring

Social influence has attracted tremendous attention from both academic and industrial communities due to the rapid development of online social networks. While most research has been focused on the direct influence between peers, learning cascaded indirect influence has not been previously studied. In this paper, we formulate the concept of cascade indirect influence based on the Independent Cascade model and then propose a novel online learning algorithm for learning the cascaded influence in the partial monitoring setting. We propose two bandit algorithms E-EXP3 and RE-EXP3 to address this problem. We theoretically prove that E-EXP3 has a cumulative regret bound of O(√(T)) over T, the number of time stamps. We will also show that RE-EXP3, a relaxed version of E-EXP3, achieves a better performance in practice. We compare the proposed algorithms with three baseline methods on both synthetic and real networks (Weibo and AMiner). Our experimental results show that RE-EXP3 converges 100× faster than E-EXP3. Both of them significantly outperform the alternative methods in terms of normalized regret. Finally, we apply the learned cascaded influence to help behavior prediction and experiments show that our proposed algorithms can help achieve a significant improvement (10-15% by accuracy) for behavior prediction.

[1]  Jie Tang,et al.  Modeling Indirect Influence on Twitter , 2012, Int. J. Semantic Web Inf. Syst..

[2]  Xiaohua Hu,et al.  Tackling the Achilles Heel of Social Networks: Influence Propagation based Language Model Smoothing , 2015, WWW.

[3]  Jie Tang,et al.  ArnetMiner: extraction and mining of academic social networks , 2008, KDD.

[4]  Éva Tardos,et al.  Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..

[5]  Lars Backstrom,et al.  Structural diversity in social contagion , 2012, Proceedings of the National Academy of Sciences.

[6]  Jon Kleinberg,et al.  Maximizing the spread of influence through a social network , 2003, KDD '03.

[7]  Nicolò Cesa-Bianchi,et al.  Combinatorial Bandits , 2012, COLT.

[8]  Robert E. Schapire,et al.  Non-Stochastic Bandit Slate Problems , 2010, NIPS.

[9]  Jure Leskovec,et al.  Information diffusion and external influence in networks , 2012, KDD.

[10]  Sinan Aral,et al.  Identifying Influential and Susceptible Members of Social Networks , 2012, Science.

[11]  Jean-Yves Audibert,et al.  Minimax Policies for Adversarial and Stochastic Bandits. , 2009, COLT 2009.

[12]  Peter Auer,et al.  Finite-time Analysis of the Multiarmed Bandit Problem , 2002, Machine Learning.

[13]  Laks V. S. Lakshmanan,et al.  Learning influence probabilities in social networks , 2010, WSDM '10.

[14]  Matthew Richardson,et al.  Mining knowledge-sharing sites for viral marketing , 2002, KDD.

[15]  Tamás Linder,et al.  The On-Line Shortest Path Problem Under Partial Monitoring , 2007, J. Mach. Learn. Res..

[16]  Matthew Richardson,et al.  Mining the network value of customers , 2001, KDD '01.

[17]  Cameron Marlow,et al.  A 61-million-person experiment in social influence and political mobilization , 2012, Nature.

[18]  Reynold Cheng,et al.  Online Influence Maximization , 2015, KDD.

[19]  Masahiro Kimura,et al.  Prediction of Information Diffusion Probabilities for Independent Cascade Model , 2008, KES.

[20]  Zheng Wen,et al.  Combinatorial Cascading Bandits , 2015, NIPS.

[21]  Juan-Zi Li,et al.  Social Influence Locality for Modeling Retweeting Behaviors , 2013, IJCAI.

[22]  Wtt Wtt Tight Regret Bounds for Stochastic Combinatorial Semi-Bandits , 2015 .

[23]  Csaba Szepesvári,et al.  Partial Monitoring - Classification, Regret Bounds, and Algorithms , 2014, Math. Oper. Res..

[24]  Yifeng Zeng,et al.  Influence Maximization with Novelty Decay in Social Networks , 2014, AAAI.

[25]  Wei Chen,et al.  Combinatorial Multi-Armed Bandit: General Framework and Applications , 2013, ICML.

[26]  Jimeng Sun,et al.  Confluence: conformity influence in large social networks , 2013, KDD.

[27]  Peter Auer,et al.  The Nonstochastic Multiarmed Bandit Problem , 2002, SIAM J. Comput..

[28]  Gábor Lugosi,et al.  Regret in Online Combinatorial Optimization , 2012, Math. Oper. Res..

[29]  Jimeng Sun,et al.  Social influence analysis in large-scale networks , 2009, KDD.

[30]  Conor Hayes,et al.  Cross-Community Influence in Discussion Fora , 2012, ICWSM.

[31]  Alexandre Proutière,et al.  Combinatorial Bandits Revisited , 2015, NIPS.