Influence Maximization in Social Networks with Genetic Algorithms

被引:73
作者
Bucur, Doina [1 ]
Iacca, Giovanni [2 ]
机构
[1] Univ Groningen, Johann Bernoulli Inst, Nijenborgh 9, NL-9747 AG Groningen, Netherlands
[2] INCAS3, Dr Nassaulaan 9, NL-9401 HJ Assen, Netherlands
来源
APPLICATIONS OF EVOLUTIONARY COMPUTATION, EVOAPPLICATIONS 2016, PT I | 2016年 / 9597卷
关键词
Social network; Influence maximization; Genetic algorithm; Graph theory; Combinatorial optimization;
D O I
10.1007/978-3-319-31204-0_25
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We live in a world of social networks. Our everyday choices are often influenced by social interactions. Word of mouth, meme diffusion on the Internet, and viral marketing are all examples of how social networks can affect our behaviour. In many practical applications, it is of great interest to determine which nodes have the highest influence over the network, i.e., which set of nodes will, indirectly, reach the largest audience when propagating information. These nodes might be, for instance, the target for early adopters of a product, the most influential endorsers in political elections, or the most important investors in financial operations, just to name a few examples. Here, we tackle the NP-hard problem of influence maximization on social networks by means of a Genetic Algorithm. We show that, by using simple genetic operators, it is possible to find in feasible runtime solutions of high-influence that are comparable, and occasionally better, than the solutions found by a number of known heuristics (one of which was previously proven to have the best possible approximation guarantee, in polynomial time, of the optimal solution). The advantages of Genetic Algorithms show, however, in them not requiring any assumptions about the graph underlying the network, and in them obtaining more diverse sets of feasible solutions than current heuristics.
引用
收藏
页码:379 / 392
页数:14
相关论文
共 13 条
[1]  
[Anonymous], 2015, THEOR COMPUT
[2]  
[Anonymous], 2011, AAAI
[3]  
[Anonymous], 2015, SNAP datasets:stanford large network dataset collection
[4]   Black Holes and Revelations: Using Evolutionary Algorithms to Uncover Vulnerabilities in Disruption-Tolerant Networks [J].
Bucur, Doina ;
Iacca, Giovanni ;
Squillero, Giovanni ;
Tonda, Alberto .
APPLICATIONS OF EVOLUTIONARY COMPUTATION, EVOAPPLICATIONS 2015, 2015, 9028 :29-41
[5]   Optimizing groups of colluding strong attackers in mobile urban communication networks with evolutionary algorithms [J].
Bucur, Doina ;
Iacca, Giovanni ;
Gaudesi, Marco ;
Squillero, Giovanni ;
Tonda, Alberto .
APPLIED SOFT COMPUTING, 2016, 40 :416-426
[6]   Characterizing topological bottlenecks for data delivery in CTP using simulation-based stress testing with natural selection [J].
Bucur, Doina ;
Iacca, Giovanni ;
de Boer, Pieter-Tjerk .
AD HOC NETWORKS, 2015, 30 :22-45
[7]   The impact of topology on energy consumption for collection tree protocols: An experimental assessment through evolutionary computation [J].
Bucur, Doina ;
Iacca, Giovanni ;
Squillero, Giovanni ;
Tonda, Alberto .
APPLIED SOFT COMPUTING, 2014, 16 :210-222
[8]   Efficient Influence Maximization in Social Networks [J].
Chen, Wei ;
Wang, Yajun ;
Yang, Siyu .
KDD-09: 15TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2009, :199-207
[9]  
Garret A.L., 2015, INSPYRED FRAMEWORK C
[10]   Talk of the network: A complex systems look at the underlying process of word-of-mouth [J].
Goldenberg, J ;
Libai, B ;
Muller, E .
MARKETING LETTERS, 2001, 12 (03) :211-223