M ay 2 01 8 Multi-Round Influence Maximization ( Extended Version )

In this paper, we study the Multi-Round Influence Maximization (MRIM) problem, where influence propagates in multiple rounds independently from possibly different seed sets, and the goal is to select seeds for each round to maximize the expected number of nodes that are activated in at least one round. MRIM problem models the viral marketing scenarios in which advertisers conduct multiple rounds of viral marketing to promote one product. We consider two different settings: 1) the non-adaptive MRIM, where the advertiser needs to determine the seed sets for all rounds at the very beginning, and 2) the adaptive MRIM, where the advertiser can select seed sets adaptively based on the propagation results in the previous rounds. For the non-adaptive setting, we design two algorithms that exhibit an interesting tradeoff between efficiency and effectiveness: a cross-round greedy algorithm that selects seeds at a global level and achieves 1/2−ε approximation ratio, and a within-round greedy algorithm that selects seeds round by round and achieves 1−e−(1−1/e )−ε ≈ 0.46−ε approximation ratio but saves running time by a factor related to the number of rounds. For the adaptive setting, we design an adaptive algorithm that guarantees 1 − e−(1−1/e ) − ε approximation to the adaptive optimal solution. In all cases, we further design scalable algorithms based on the reverse influence sampling approach and achieve near-linear running time. We conduct experiments on several real-world networks and demonstrate that our algorithms are effective for the MRIM task.

[1]  Elchanan Mossel,et al.  On the submodularity of influence in social networks , 2006, STOC '07.

[2]  Kyomin Jung,et al.  IRIE: Scalable and Robust Influence Maximization in Social Networks , 2011, 2012 IEEE 12th International Conference on Data Mining.

[3]  Yifei Yuan,et al.  Influence Maximization in Social Networks When Negative Opinions May Emerge and Propagate , 2011, SDM.

[4]  Andreas Krause,et al.  Cost-effective outbreak detection in networks , 2007, KDD '07.

[5]  Wei Chen,et al.  Influence Blocking Maximization in Social Networks under the Competitive Linear Threshold Model , 2011, SDM.

[6]  Wei Chen,et al.  Robust Influence Maximization , 2016, KDD.

[7]  Shou-De Lin,et al.  A Learning-based Framework to Handle Multi-round Multi-party Influence Maximization on Social Networks , 2015, KDD.

[8]  Nicola Barbieri,et al.  Topic-aware social influence propagation models , 2012, Knowledge and Information Systems.

[9]  Philip S. Yu,et al.  Joint Community and Structural Hole Spanner Detection via Harmonic Modularity , 2016, KDD.

[10]  Andreas Krause,et al.  Adaptive Submodularity: Theory and Applications in Active Learning and Stochastic Optimization , 2010, J. Artif. Intell. Res..

[11]  Reynold Cheng,et al.  Online Influence Maximization , 2015, KDD.

[12]  Laks V. S. Lakshmanan,et al.  From Competition to Complementarity: Comparative Influence Diffusion and Maximization , 2015, Proc. VLDB Endow..

[13]  Lior Seeman,et al.  Adaptive Seeding in Social Networks , 2013, 2013 IEEE 54th Annual Symposium on Foundations of Computer Science.

[14]  Zheng Wen,et al.  Online Influence Maximization under Independent Cascade Model with Semi-Bandit Feedback , 2016, NIPS.

[15]  Jonah A. Berger Word of mouth and interpersonal communication: A review and directions for future research , 2014 .

[16]  Laks V. S. Lakshmanan,et al.  Information and Influence Propagation in Social Networks , 2013, Synthesis Lectures on Data Management.

[17]  Xiaokui Xiao,et al.  Influence Maximization in Near-Linear Time: A Martingale Approach , 2015, SIGMOD Conference.

[18]  Laks V. S. Lakshmanan,et al.  Influence Maximization with Bandits , 2015, ArXiv.

[19]  Divyakant Agrawal,et al.  Limiting the spread of misinformation in social networks , 2011, WWW.

[20]  David Kempe,et al.  Robust Influence Maximization , 2016, KDD.

[21]  Laks V. S. Lakshmanan,et al.  Maximizing product adoption in social networks , 2012, WSDM '12.

[22]  Yifei Yuan,et al.  Scalable Influence Maximization in Social Networks under the Linear Threshold Model , 2010, 2010 IEEE International Conference on Data Mining.

[23]  Laks V. S. Lakshmanan,et al.  Diffusion Independent Semi-Bandit Influence Maximization , 2017, ArXiv.

[24]  Xiaokui Xiao,et al.  Influence maximization: near-optimal time complexity meets practical efficiency , 2014, SIGMOD Conference.

[25]  Matthew Richardson,et al.  Mining the network value of customers , 2001, KDD '01.

[26]  Éva Tardos,et al.  Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..

[27]  Tanya Y. Berger-Wolf,et al.  A framework for community identification in dynamic social networks , 2007, KDD '07.

[28]  Yajun Wang,et al.  Combinatorial Multi-Armed Bandit and Its Extension to Probabilistically Triggered Arms , 2014, J. Mach. Learn. Res..

[29]  Wei Chen,et al.  Efficient influence maximization in social networks , 2009, KDD.

[30]  Andreas S. Schulz,et al.  Revisiting the Greedy Approach to Submodular Set Function Maximization , 2007 .

[31]  Matthew Richardson,et al.  Mining knowledge-sharing sites for viral marketing , 2002, KDD.

[32]  Ning Chen,et al.  On the approximability of influence in social networks , 2008, SODA '08.

[33]  Christian Borgs,et al.  Maximizing Social Influence in Nearly Optimal Time , 2012, SODA.

[34]  Wei Chen,et al.  Scalable influence maximization for independent cascade model in large-scale social networks , 2012, Data Mining and Knowledge Discovery.