skip to main content
10.1145/2939672.2939760acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article
Public Access

Robust Influence Maximization

Published: 13 August 2016 Publication History

Abstract

Uncertainty about models and data is ubiquitous in the computational social sciences, and it creates a need for robust social network algorithms, which can simultaneously provide guarantees across a spectrum of models and parameter settings. We begin an investigation into this broad domain by studying robust algorithms for the Influence Maximization problem, in which the goal is to identify a set of k nodes in a social network whose joint influence on the network is maximized. We define a Robust Influence Maximization framework wherein an algorithm is presented with a set of influence functions, typically derived from different influence models or different parameter settings for the same model. The different parameter settings could be derived from observed cascades on different topics, under different conditions, or at different times. The algorithm's goal is to identify a set of k nodes who are simultaneously influential for all influence functions, compared to the (function-specific) optimum solutions.
We show strong approximation hardness results for this problem unless the algorithm gets to select at least a logarithmic factor more seeds than the optimum solution. However, when enough extra seeds may be selected, we show that techniques of Krause et al. can be used to approximate the optimum robust influence to within a factor of 1-1/e. We evaluate this bicriteria approximation algorithm against natural heuristics on several real-world data sets. Our experiments indicate that the worst-case hardness does not necessarily translate into bad performance on real-world data sets; all algorithms perform fairly well.

Supplementary Material

MP4 File (kdd2016_he_influence_maximization_01-acm.mp4)

References

[1]
B. Abrahao, F. Chierichetti, R. Kleinberg, and A. Panconesi. Trace complexity of network inference. In Proc. 19th KDD, pages 491--499, 2013.
[2]
A. Adiga, C. J. Kuhlman, H. S. Mortveit, and A. K. S. Vullikanti. Sensitivity of diffusion dynamics to network uncertainty. In Proc. 28th AAAI, 2013.
[3]
C. Borgs, M. Brautbar, J. Chayes, and B. Lucier. Maximizing social influence in nearly optimal time. In Proc. 25th ACM SODA, pages 946--957, 2014.
[4]
K. E. Campbell and B. A. Lee. Name generators in surveys of personal networks. Social Networks, 13(3):203--221, 1991.
[5]
W. Chen, L. V. Lakshmanan, and C. Castillo. Information and Influence Propagation in Social Networks. Synthesis Lectures on Data Management. Morgan & Claypool, 2013.
[6]
W. Chen, T. Lin, Z. Tan, M. Zhao, and X. Zhou. Robust influence maximization. In Proc. 22nd KDD, 2016.
[7]
W. Chen, Y. Wang, and S. Yang. Efficient influence maximization in social networks. In Proc. 15th KDD, pages 199--208, 2009.
[8]
W. Chen, Y. Wang, Y. Yuan, and Q. Wang. Combinatorial multi-armed bandit and its extension to probabilistically triggered arms. J. Mach. Learn. Res., 17(1):1746--1778, 2016.
[9]
W. Chen, Y. Yuan, and L. Zhang. Scalable influence maximization in social networks under the linear threshold model. In Proc. 10th ICDM, pages 88--97, 2010.
[10]
X. Chen, G. Song, X. He, and K. Xie. On influential nodes tracking in dynamic social networks. In Proc. 15th SDM, pages 613--621, 2015.
[11]
H. Daneshmand, M. Gomez-Rodriguez, L. Song, and B. Schölkopf. Estimating diffusion network structures: Recovery conditions, sample complexity & soft-thresholding algorithm. In Proc. 31st ICML, 2014.
[12]
N. Du, Y. Liang, M.-F. Balcan, and L. Song. Influence function learning in information diffusion networks. In Proc. 31st ICML, 2014.
[13]
N. Du, L. Song, M. Gomez-Rodriguez, and H. Zha. Scalable influence estimation in continuous-time diffusion networks. In Proc. 25th NIPS, 2013.
[14]
M. Gomez-Rodriguez, D. Balduzzi, and B. Schölkopf. Uncovering the temporal dynamics of diffusion networks. In Proc. 28th ICML, pages 561--568, 2011.
[15]
M. Gomez-Rodriguez, J. Leskovec, and A. Krause. Inferring networks of diffusion and influence. ACM Transactions on Knowledge Discovery from Data (TKDD), 5(4):21, 2012.
[16]
M. Gomez-Rodriguez and B. Schölkopf. Submodular inference of diffusion networks from multiple trees. In Proc. 29th ICML, 2012.
[17]
A. Goyal, F. Bonchi, and L. V. S. Lakshmanan. A data-based approach to social influence maximization. Proc. VLDB Endowment, 5(1):73--84, 2011.
[18]
A. Goyal, F. Bonchi, L. V. S. Lakshmanan, and S. Venkatasubramanian. On minimizing budget and time in influence propagation over social networks. Social Network Analysis and Mining, 3(2):179--192, 2013.
[19]
X. He and D. Kempe. Stability of influence maximization. Unpublished Manuscript, available at http://arxiv.org/abs/1501.04579, 2015.
[20]
X. He and D. Kempe. Robust influence maximization. Technical Report, http://arxiv.org/abs/1602.05240, 2016.
[21]
D. Kempe, J. Kleinberg, and E. Tardos. Maximizing the spread of influence in a social network. Theory of Computing, 11(4):105--147, 2015. A preliminary version of the results appeared in KDD 2003 and ICALP 2005.
[22]
S. Khanna and B. Lucier. Influence maximization in undirected networks. In Proc. 25th ACM SODA, pages 1482--1496, 2014.
[23]
A. Krause, H. B. McMahan, C. Guestrin, and A. Gupta. Robust submodular observation selection. In Journal of Machine Learning Research, volume 9, pages 2761--2801, 2008.
[24]
S. Lei, S. Maniu, L. Mo, R. Cheng, and P. Senellart. Online influence maximization. In Proc. 21st KDD, pages 645--654, 2015.
[25]
J. Leskovec, L. Backstrom, and J. Kleinberg. Meme-tracking and the dynamics of the news cycle. In Proc. 15th KDD, pages 497--506, 2009. Note: updated data sets at http://www.memetracker.org/.
[26]
J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. VanBriesen, and N. S. Glance. Cost-effective outbreak detection in networks. In Proc. 13th KDD, pages 420--429, 2007.
[27]
M. Lowalekar, P. Varakantham, and A. Kumar. Robust influence maximization (extended abstract). In Proc. 15th AAMAS, pages 1395--1396, 2016.
[28]
E. Mossel and S. Roch. Submodularity of influence in social networks: From local to global. SIAM J. Comput., 39(6):2176--2188, 2010.
[29]
S. A. Myers and J. Leskovec. On the convexity of latent social network inference. In Proc. 22nd NIPS, pages 1741--1749, 2010.
[30]
H. Narasimhan, D. C. Parkes, and Y. Singer. Learnability of influence in networks. In Proc. 27th NIPS, pages 3168--3176, 2015.
[31]
G. L. Nemhauser, L. A. Wolsey, and M. L. Fisher. An analysis of the approximations for maximizing submodular set functions. Mathematical Programming, 14:265--294, 1978.
[32]
P. Netrapalli and S. Sanghavi. Learning the graph of epidemic cascades. In ACM SIGMETRICS Performance Evaluation Review, pages 211--222, 2012.
[33]
K. Saito, M. Kimura, K. Ohara, and H. Motoda. Selecting information diffusion models over social networks for behavioral analysis. In Proc. 2010 European Conference on Machine Learning and Knowledge Discovery in Databases: Part III, ECML/PKDD 10, pages 180--195, 2010.
[34]
C. Wang, W. Chen, and Y. Wang. Scalable influence maximization for independent cascade model in large-scale social networks. Data Mining and Knowledge Discovery Journal, 25(3):545--576, 2012.
[35]
Y. Wang, G. Cong, G. Song, and K. Xie. Community-based greedy algorithm for mining top-k influential nodes in mobile social networks. In Proc. 16th KDD, pages 1039--1048, 2010.

Cited By

View all
  • (2024)Robust reward placement under uncertaintyProceedings of the Thirty-Third International Joint Conference on Artificial Intelligence10.24963/ijcai.2024/748(6770-6778)Online publication date: 3-Aug-2024
  • (2024)Interrelated Dense Pattern Detection in Multilayer NetworksIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2024.339868336:11(6462-6476)Online publication date: Nov-2024
  • (2024)Maximizing Influence in Social Networks Using Combined Local Features and Deep Learning-Based Node EmbeddingBig Data10.1089/big.2023.0117Online publication date: 22-Oct-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
KDD '16: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
August 2016
2176 pages
ISBN:9781450342322
DOI:10.1145/2939672
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 August 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. influence maximization
  2. noise
  3. robust optimization
  4. submodular optimization
  5. uncertainty

Qualifiers

  • Research-article

Funding Sources

Conference

KDD '16
Sponsor:

Acceptance Rates

KDD '16 Paper Acceptance Rate 66 of 1,115 submissions, 6%;
Overall Acceptance Rate 1,133 of 8,635 submissions, 13%

Upcoming Conference

KDD '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)118
  • Downloads (Last 6 weeks)12
Reflects downloads up to 01 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Robust reward placement under uncertaintyProceedings of the Thirty-Third International Joint Conference on Artificial Intelligence10.24963/ijcai.2024/748(6770-6778)Online publication date: 3-Aug-2024
  • (2024)Interrelated Dense Pattern Detection in Multilayer NetworksIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2024.339868336:11(6462-6476)Online publication date: Nov-2024
  • (2024)Maximizing Influence in Social Networks Using Combined Local Features and Deep Learning-Based Node EmbeddingBig Data10.1089/big.2023.0117Online publication date: 22-Oct-2024
  • (2024)Robust misinformation prevention with uncertainty on suspicious nodesNeurocomputing10.1016/j.neucom.2024.127344577(127344)Online publication date: Apr-2024
  • (2023)Robust Influence Maximization Under Both Aleatory and Epistemic UncertaintyACM Transactions on Knowledge Discovery from Data10.1145/358710017:7(1-27)Online publication date: 4-May-2023
  • (2023)Scalable Adversarial Attack Algorithms on Influence MaximizationProceedings of the Sixteenth ACM International Conference on Web Search and Data Mining10.1145/3539597.3570416(760-768)Online publication date: 27-Feb-2023
  • (2023)Multi-Item Continuous Influence Maximization2023 IEEE International Conference on Big Data (BigData)10.1109/BigData59044.2023.10386164(5282-5291)Online publication date: 15-Dec-2023
  • (2023)Influence Maximization RevisitedDatabases Theory and Applications10.1007/978-3-031-47843-7_25(356-370)Online publication date: 7-Nov-2023
  • (2022)A Framework for Analyzing Influencer Marketing in Social NetworksManagement Science10.1287/mnsc.2020.389968:1(75-104)Online publication date: 1-Jan-2022
  • (2022)The Limitations of Optimization from SamplesJournal of the ACM10.1145/351101869:3(1-33)Online publication date: 11-Jun-2022
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media