ULBRF: A Framework for Maximizing Influence in Dynamic Networks Based on Upper and Lower Bounds of Propagation

被引:0
作者
Liu, Zekun [1 ]
Yu, Jianyong [1 ]
Liang, Wei [1 ]
Han, Xue [1 ]
机构
[1] Hunan Univ Sci & Technol, Sanya Inst, Sanya 572024, Peoples R China
来源
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING | 2024年 / 11卷 / 06期
关键词
Heuristic algorithms; Integrated circuit modeling; Upper bound; Greedy algorithms; Dispersion; Adaptation models; Optimization; Diffusion models; Approximation algorithms; Vectors; Influence maximization; dynamic network; social network; greedy algorithm; optimization; INFLUENCE MAXIMIZATION; SOCIAL NETWORKS; POSITIVE INFLUENCE; OPINION DYNAMICS; USERS;
D O I
10.1109/TNSE.2024.3485220
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The influence maximization problem that selects a set of seed nodes to maximize the influence spread has been becoming a hot research topic. The classical algorithms select the seed nodes at the initial moment based on the topological properties in static networks, which are not suitable for solving the problem in dynamic networks. In this paper, we propose the Upper and Lower Bound Radix Forward framework to solve this problem in the dynamic network. First, we propose the upper bound of the influence spread and derive the corresponding lower bound to find the seed nodes. When extending the classical IM to the dynamic network, we find the problem that the final influence spreads increase logarithmically with the linear expansion of the initial seed sets. Therefore, the Dynamic Network Path Dispersion is proposed to solve the problem by measuring the heterogeneity of the snaphots on the dynamic network. The Upper and Lower Bound Radix Forward (ULBRF) is tested and applied in two real dynamic networks and two synthetic networks. Experimental results show that the ULBRF is better than the widely recognized improved greedy algorithms. The Dynamic Network Path Dispersion (DNPD) and the strategy based on the heterogeneities also expand the final influence spread by 35% similar to 45%.
引用
收藏
页码:6704 / 6717
页数:14
相关论文
共 48 条
[1]   Effective influence estimation in twitter using temporal, profile, structural and interaction characteristics [J].
Agarwal, Sakshi ;
Mehta, Shikha .
INFORMATION PROCESSING & MANAGEMENT, 2020, 57 (06)
[2]  
Alshahrani M, 2018, 2018 IEEE 3RD INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA ANALYSIS (ICCCBDA), P52, DOI 10.1109/ICCCBDA.2018.8386486
[3]   Efficient algorithms based on centrality measures for identification of top-K influential users in social networks [J].
Alshahrani, Mohammed ;
Zhu Fuxi ;
Sameh, Ahmed ;
Mekouar, Soufiana ;
Sheng Huang .
INFORMATION SCIENCES, 2020, 527 :88-107
[4]   Opinion leader detection: A methodological review [J].
Bamakan, Seyed Mojtaba Hosseini ;
Nurgaliev, Ildar ;
Qu, Qiang .
EXPERT SYSTEMS WITH APPLICATIONS, 2019, 115 :200-222
[5]   A survey on influence maximization in a social network [J].
Banerjee, Suman ;
Jenamani, Mamata ;
Pratihar, Dilip Kumar .
KNOWLEDGE AND INFORMATION SYSTEMS, 2020, 62 (09) :3417-3455
[6]   TI-SC: top-k influential nodes selection based on community detection and scoring criteria in social networks [J].
Beni, Hamid Ahmadi ;
Bouyer, Asgarali .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (11) :4889-4908
[7]   Rumor spreading model considering rumor credibility, correlation and crowd classification based on personality [J].
Chen, Xuelong ;
Wang, Nan .
SCIENTIFIC REPORTS, 2020, 10 (01)
[8]   A Time-Dependent SIR Model for COVID-19 With Undetectable Infected Persons [J].
Chen, Yi-Cheng ;
Lu, Ping-En ;
Chang, Cheng-Shang ;
Liu, Tzu-Hsuan .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2020, 7 (04) :3279-3294
[9]   Machine Learning for 6G Wireless Networks: Carrying Forward Enhanced Bandwidth, Massive Access, and Ultrareliable/Low-Latency Service [J].
Du, Jun ;
Jiang, Chunxiao ;
Wang, Jian ;
Ren, Yong ;
Debbah, Merouane .
IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2020, 15 (04) :122-134
[10]   Community-Structured Evolutionary Game for Privacy Protection in Social Networks [J].
Du, Jun ;
Jiang, Chunxiao ;
Chen, Kwang-Cheng ;
Ren, Yong ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (03) :574-589