Containment of competitive influence spread in social networks

To contain the competitive influence spread in social networks is to maximize the influence of one participant and contain the influence of its opponent. It is desirable to develop effective strategies for influence spread of the participants themselves instead of blocking the influence spread of their opponents. In this paper, we extend the linear threshold model to establish the diffusion-containment model, abbreviated as D-C model, by incorporating the realistic specialties and characteristics of the containment of competitive influence spread. Then, we discuss the influence spread mechanism for the D-C model, and give the algorithm for the propagation of the diffusion influence (D-influence) and containment influence (C-influence). Further, we define the sub-modular set function of the C-influence in the D-C model and consequently give a greedy algorithm for solving the problem of maximizing the competitive influence containment approximately. Experimental results show the feasibility of our method.

[1]  Jure Leskovec,et al.  {SNAP Datasets}: {Stanford} Large Network Dataset Collection , 2014 .

[2]  Divyakant Agrawal,et al.  Limiting the spread of misinformation in social networks , 2011, WWW.

[3]  Allan Borodin,et al.  Threshold Models for Competitive Influence in Social Networks , 2010, WINE.

[4]  Ljupco Kocarev,et al.  Model for rumor spreading over networks. , 2010, Physical review. E, Statistical, nonlinear, and soft matter physics.

[5]  Éva Tardos,et al.  Influential Nodes in a Diffusion Model for Social Networks , 2005, ICALP.

[6]  C. Durniak,et al.  Soliton interaction in a complex plasma. , 2010, Physical review. E, Statistical, nonlinear, and soft matter physics.

[7]  Yu Wang,et al.  Community-based greedy algorithm for mining top-K influential nodes in mobile social networks , 2010, KDD.

[8]  Manuel Gomez-Rodriguez,et al.  Diffusion in Social and Information Networks: Research Problems, Probabilistic Models and Machine Learning Methods , 2015, KDD.

[9]  Yifei Yuan,et al.  Scalable Influence Maximization in Social Networks under the Linear Threshold Model , 2010, 2010 IEEE International Conference on Data Mining.

[10]  Jiangtao Cui,et al.  Conformity-aware influence maximization in online social networks , 2014, The VLDB Journal.

[11]  Wei Chen,et al.  Influence Blocking Maximization in Social Networks under the Competitive Linear Threshold Model , 2011, SDM.

[12]  Arunabha Sen,et al.  Influence propagation in adversarial setting: how to defeat competition with least amount of investment , 2012, CIKM.

[13]  Jon Kleinberg,et al.  Maximizing the spread of influence through a social network , 2003, KDD '03.

[14]  Nisheeth Shrivastava,et al.  Viral Marketing for Multiple Products , 2010, 2010 IEEE International Conference on Data Mining.

[15]  Shishir Bharathi,et al.  Competitive Influence Maximization in Social Networks , 2007, WINE.

[16]  Yifei Yuan,et al.  Influence Maximization in Social Networks When Negative Opinions May Emerge and Propagate , 2011, SDM.

[17]  Wei Chen,et al.  Influence diffusion dynamics and influence maximization in social networks with friend and foe relationships , 2011, WSDM.

[18]  Dimitrios Gunopulos,et al.  Finding effectors in social networks , 2010, KDD.

[19]  David Kempe,et al.  Stability of influence maximization , 2014, KDD.

[20]  Weiyi Liu,et al.  Maximizing the Spread of Competitive Influence in a Social Network Oriented to Viral Marketing , 2015, WAIM.

[21]  Tony White,et al.  On Measurement of Influence in Social Networks , 2012, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.

[22]  Weili Wu,et al.  Maximizing rumor containment in social networks with constrained time , 2014, Social Network Analysis and Mining.

[23]  Masahiro Kimura,et al.  Blocking links to minimize contamination spread in a social network , 2009, TKDD.

[24]  Stanley Wasserman,et al.  Social Network Analysis: Methods and Applications , 1994 .

[25]  Stefan M. Wild,et al.  Maximizing influence in a competitive social network: a follower's perspective , 2007, ICEC.

[26]  Indrajit Bhattacharya,et al.  Online Topic-based Social Influence Analysis for the Wimbledon Championships , 2015, KDD.

[27]  Zhen Lin,et al.  CK-LPA: Efficient community detection algorithm based on label propagation with community kernel , 2014 .

[28]  Cécile Favre,et al.  Information diffusion in online social networks: a survey , 2013, SGMD.

[29]  Indrajit Bhattacharya,et al.  A bayesian framework for estimating properties of network diffusions , 2014, KDD.

[30]  Warren E. Dixon,et al.  Containment control for a social network with state-dependent connectivity , 2014, Autom..

[31]  Satoru Fujishige,et al.  Submodular functions and optimization , 1991 .