Maximizing rumor containment in social networks with constrained time

被引:35
作者
Fan, Lidan [1 ]
Wu, Weili [2 ,3 ]
Zhai, Xuming [2 ]
Xing, Kai [2 ]
Lee, Wonjun [4 ]
Du, Ding-Zhu [2 ]
机构
[1] Univ Texas Tyler, Dept Comp Sci, Tyler, TX 75799 USA
[2] Univ Texas Dallas, Dept Comp Sci, Richardson, TX 75083 USA
[3] Taiyuan Inst Technol, Taiyuan 030008, Shanxi, Peoples R China
[4] Korea Univ, Dept Comp Sci & Engn, Seoul, South Korea
关键词
Rumor containment; Influence diffusion; Time deadline; Personal interests; Time delay;
D O I
10.1007/s13278-014-0214-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The spread of rumor or misinformation in social networks may cause bad effects among the public. Thus, it is necessary to find effective strategies to control the spread of rumor. Specifically, in our paper, we consider such a setting: initially, a subset of nodes is chosen as the set of protectors, and the influence of protector diffuses competitively with the diffusion of rumor. However, in real world, we generally have limited budget (limited number of protectors) and time to fight with rumor. Therefore, we study the problem of maximizing rumor containment within a fixed number of initial protectors and a given time deadline. Generalizing two seminal models in the fieldthe Independent Cascade (IC) model and the Linear Threshold (LT) model-we propose two new models of competitive influence diffusion in social networks with the following three factors: a time deadline for information diffusion, random time delay of information exchange and personal interests regarding the acceptance of information. Under these two models, we show that the optimization problems are NP-hard. Furthermore, we prove that the objective functions are submodular. As a result, the greedy algorithm is used as constant-factor approximation algorithms with performance guarantee 1 - 1/e for the two optimization problems.
引用
收藏
页码:1 / 10
页数:10
相关论文
共 23 条
[1]   A note on competitive diffusion through social networks [J].
Alon, Noga ;
Feldman, Michal ;
Procaccia, Ariel D. ;
Tennenholtz, Moshe .
INFORMATION PROCESSING LETTERS, 2010, 110 (06) :221-225
[2]  
[Anonymous], [No title captured]
[3]  
[Anonymous], 2007, EC
[4]  
Borodin A, 2010, LECT NOTES COMPUT SC, V6484, P539, DOI 10.1007/978-3-642-17572-5_48
[5]  
Budak Ceren, 2011, P WWW
[6]  
Chen W, 2012, CORR
[7]  
Chen W., 2012, AAAI, P1, DOI DOI 10.1109/ICSICT.2012.6466725
[8]  
Chen W., 2010, KDD 10, P1029, DOI DOI 10.1145/1835804.1835934
[9]   Efficient Influence Maximization in Social Networks [J].
Chen, Wei ;
Wang, Yajun ;
Yang, Siyu .
KDD-09: 15TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2009, :199-207
[10]  
Chen WD, 2010, MODELLING SIMULATION, P88