skip to main content
10.1145/2939672.2939745acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article

Robust Influence Maximization

Published:13 August 2016Publication History

ABSTRACT

In this paper, we address the important issue of uncertainty in the edge influence probability estimates for the well studied influence maximization problem --- the task of finding k seed nodes in a social network to maximize the influence spread. We propose the problem of robust influence maximization, which maximizes the worst-case ratio between the influence spread of the chosen seed set and the optimal seed set, given the uncertainty of the parameter input. We design an algorithm that solves this problem with a solution-dependent bound. We further study uniform sampling and adaptive sampling methods to effectively reduce the uncertainty on parameters and improve the robustness of the influence maximization task. Our empirical results show that parameter uncertainty may greatly affect influence maximization performance and prior studies that learned influence probabilities could lead to poor performance in robust influence maximization due to relatively large uncertainty in parameter estimates, and information cascade based adaptive sampling method may be an effective way to improve the robustness of influence maximization.

Skip Supplemental Material Section

Supplemental Material

kdd2016_chen_influence_maximization_01-acm.mp4

mp4

422.7 MB

References

  1. A. Badanidiyuru, R. Kleinberg, and A. Slivkins. Bandits with knapsacks. In FOCS 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. N. Barbieri, F. Bonchi, and G. Manco. Topic-aware social influence propagation models. Knowledge and information systems, 37(3):555--584, 2013.Google ScholarGoogle Scholar
  3. A. Ben-Tal and A. Nemirovski. Robust optimization--methodology and applications. Mathematical Programming, 92(3):453--480, 2002.Google ScholarGoogle ScholarCross RefCross Ref
  4. C. Borgs, M. Brautbar, J. T. Chayes, and B. Lucier. Maximizing social influence in nearly optimal time. In SODA 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. S. Bubeck, R. Munos, and G. Stoltz. Pure exploration in finitely-armed and continuous-armed bandits. Theoretical Computer Science, 412:1832--1852, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. C. Budak, D. Agrawal, and A. El Abbadi. Limiting the spread of misinformation in social networks. In WWW 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. S. Chen, T. Lin, I. King, M. R. Lyu, and W. Chen. Combinatorial pure exploration of multi-armed bandits. In NIPS 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. W. Chen, L. V. Lakshmanan, and C. Castillo. Information and influence propagation in social networks. Synthesis Lectures on Data Management, 5(4):1--177, 2013. Google ScholarGoogle ScholarCross RefCross Ref
  9. W. Chen, T. Lin, Z. Tan, M. Zhao, and X. Zhou. Robust influence maximization. CoRR, abs/1601.06551, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. W. Chen, C. Wang, and Y. Wang. Scalable influence maximization for prevalent viral marketing in large-scale social networks. In KDD 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. W. Chen, Y. Wang, and S. Yang. Efficient influence maximization in social networks. In KDD 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. W. Chen, Y. Wang, and Y. Yuan. Combinatorial multi-armed bandit and its extension to probabilistically triggered arms. CoRR, abs/1407.8339, 2014.Google ScholarGoogle Scholar
  13. P. Domingos and M. Richardson. Mining the network value of customers. In KDD 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. U. Feige. A threshold of ln n for approximating set cover. Journal of the ACM (JACM), 45(4):634--652, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. A. Goyal, F. Bonchi, and L. V. Lakshmanan. Learning influence probabilities in social networks. In WSDM 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. A. Goyal, W. Lu, and L. V. Lakshmanan. Celf+: optimizing the greedy algorithm for influence maximization in social networks. In WWW 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. X. He and D. Kempe. Robust influence maximization. In KDD 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. X. He and D. Kempe. Stability of Influence Maximization. ArXiv e-prints, Jan. 2015.Google ScholarGoogle Scholar
  19. D. Kempe, J. Kleinberg, and É. Tardos. Maximizing the spread of influence through a social network. In KDD 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. A. Krause, H. B. McMahon, C. Guestrin, and A. Gupta. Robust submodular observation selection. JMLR, 9:2761--2801, 2008.Google ScholarGoogle Scholar
  21. S. Lei, S. Maniu, L. Mo, R. Cheng, and P. Senellart. Online influence maximization. In KDD 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. VanBriesen, and N. Glance. Cost-effective outbreak detection in networks. In KDD 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. W. Lu, W. Chen, and L. V. Lakshmanan. From competition to complementarity: comparative influence diffusion and maximization. In VLDB 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. P. Netrapalli and S. Sanghavi. Learning the graph of epidemic cascades. In SIGMETRICS 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. M. G. Rodriguez, D. Balduzzi, and B. Schölkopf. Uncovering the temporal dynamics of diffusion networks. In ICML 2011.Google ScholarGoogle Scholar
  26. K. Saito, R. Nakano, and M. Kimura. Prediction of information diffusion probabilities for independent cascade model. In Knowledge-Based Intelligent Information and Engineering Systems, pages 67--75. Springer, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. J. Tang, J. Sun, C. Wang, and Z. Yang. Social influence analysis in large-scale networks. In KDD 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Y. Tang, X. Xiao, and Y. Shi. Influence maximization: near-optimal time complexity meets practical efficiency. In SIGMOD 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Robust Influence Maximization

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            KDD '16: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
            August 2016
            2176 pages
            ISBN:9781450342322
            DOI:10.1145/2939672

            Copyright © 2016 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 13 August 2016

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            KDD '16 Paper Acceptance Rate66of1,115submissions,6%Overall Acceptance Rate1,133of8,635submissions,13%

            Upcoming Conference

            KDD '24

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader