skip to main content
research-article
Public Access

Stability and Robustness in Influence Maximization

Authors Info & Claims
Published:31 August 2018Publication History
Skip Abstract Section

Abstract

In the well-studied Influence Maximization problem, the goal is to identify a set of k nodes in a social network whose joint influence on the network is maximized. A large body of recent work has justified research on Influence Maximization models and algorithms with their potential to create societal or economic value. However, in order to live up to this potential, the algorithms must be robust to large amounts of noise, for they require quantitative estimates of the influence, which individuals exert on each other; ground truth for such quantities is inaccessible, and even decent estimates are very difficult to obtain.

We begin to address this concern formally. First, we exhibit simple inputs on which even very small estimation errors may mislead every algorithm into highly suboptimal solutions. Motivated by this observation, we propose the Perturbation Interval model as a framework to characterize the stability of Influence Maximization against noise in the inferred diffusion network. Analyzing the susceptibility of specific instances to estimation errors leads to a clean algorithmic question, which we term the Influence Difference Maximization problem. However, the objective function of Influence Difference Maximization is NP-hard to approximate within a factor of O(n1−ϵ) for any ϵ > 0.

Given the infeasibility of diagnosing instability algorithmically, we focus on finding influential users robustly across multiple diffusion settings. We define a Robust Influence Maximization framework wherein an algorithm is presented with a set of influence functions. The algorithm’s goal is to identify a set of k nodes who are simultaneously influential for all influence functions, compared to the (function-specific) optimum solutions. We show strong approximation hardness results for this problem unless the algorithm gets to select at least a logarithmic factor more seeds than the optimum solution. However, when enough extra seeds may be selected, we show that techniques of Krause et al. can be used to approximate the optimum robust influence to within a factor of 1−1/e. We evaluate this bicriteria approximation algorithm against natural heuristics on several real-world datasets. Our experiments indicate that the worst-case hardness does not necessarily translate into bad performance on real-world datasets; all algorithms perform fairly well.

References

  1. Bruno Abrahao, Flavio Chierichetti, Robert Kleinberg, and Alessandro Panconesi. 2013. Trace complexity of network inference. In Proc. 19th KDD. 491--499. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Abhijin Adiga, Chris J. Kuhlman, Henning S. Mortveit, and Anil Kumar S. Vullikanti. 2013. Sensitivity of diffusion dynamics to network uncertainty. In Proc. 28th AAAI. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Noga Alon, Itai Benjamini, and Alan Stacey. 2004. Percolation on finite graphs and isoperimetric inequalities. Annals of Probability 32 (2004), 1727--1745.Google ScholarGoogle ScholarCross RefCross Ref
  4. Eric Balkanski, Nicole Immorlica, and Yaron Singer. 2017. The importance of communities for learning to influence. In Proc. 29th NIPS. 5864--5873.Google ScholarGoogle Scholar
  5. Eric Balkanski, Aviad Rubinstein, and Yaron Singer. 2016. The power of optimization from samples. In Proc. 28th NIPS. 4017--4025. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Eric Balkanski, Aviad Rubinstein, and Yaron Singer. 2017. The limitations of optimization from samples. In Proc. 49th ACM STOC. 1016--1027. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Noam Berger, Béla Bollobás, Christian Borgs, Jennifer Chayes, and Oliver Riordan. 2003. Degree distribution of the FKP network model. In Proc. 30th ICALP. 725--738. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Christian Borgs, Michael Brautbar, Jennifer T. Chayes, and Brendan Lucier. 2014. Maximizing social influence in nearly optimal time. In Proc. 25th ACM SODA. 946--957. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Niv Buchbinder, Moran Feldman, Joseph (Seffi) Naor, and Roy Schwartz. 2014. Submodular maximization with cardinality constraints. In Proc. 25th ACM SODA. 1433--1452. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Karen E. Campbell and Barrett A. Lee. 1991. Name generators in surveys of personal networks. Social Networks 13, 3 (1991), 203--221.Google ScholarGoogle ScholarCross RefCross Ref
  11. Robert S. Chen, Brendan Lucier, Yaron Singer, and Vasilis Syrgkanis. 2017. Robust optimization for non-convex objectives. In Proc. 29th NIPS. 4708--4717.Google ScholarGoogle Scholar
  12. Wei Chen, Laks V. S. Lakshmanan, and Carlos Castillo. 2013. Information and Influence Propagation in Social Networks. Morgan 8 Claypool. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Wei Chen, Tian Lin, Zihan Tan, Mingfei Zhao, and Xuren Zhou. 2016. Robust influence maximization. In Proc. 22nd KDD. 795--804. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Wei Chen, Yajun Wang, and Siyu Yang. 2009. Efficient influence maximization in social networks. In Proc. 15th KDD. 199--208. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Wei Chen, Yajun Wang, Yang Yuan, and Qinshi Wang. 2016. Combinatorial multi-armed bandit and its extension to probabilistically triggered arms. Journal of Machine Learning Research 17, 50 (2016), 1--33. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Wei Chen, Yifei Yuan, and Li Zhang. 2010. Scalable influence maximization in social networks under the linear threshold model. In Proc. 10th ICDM. 88--97. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Irit Dinur and David Steurer. 2014. Analytical approach to parallel repetition. In Proc. 46th ACM STOC. 624--633. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Pedro Domingos and Matthew Richardson. 2001. Mining the network value of customers. In Proc. 7th KDD. 57--66. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Nan Du, Yingyu Liang, Maria-Florina Balcan, and Le Song. 2014. Influence function learning in information diffusion networks. In Proc. 31st ICML. 2016--2024. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Nan Du, Le Song, Manuel Gomez-Rodriguez, and Hongyuan Zha. 2013. Scalable influence estimation in continuous-time diffusion networks. In Proc. 25th NIPS. 3147--3155. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Paul Erdős and Alfréd Rényi. 1960. On the evolution of random graphs. Publication of the Mathematical Institute of the Hungarian Academy of Sciences 5, 1 (1960), 17--60.Google ScholarGoogle Scholar
  22. Jacob Goldenberg, Barak Libai, and Eitan Muller. 2001. Talk of the network: A complex systems look at the underlying process of word-of-mouth. Marketing Letters 12, 3 (2001), 211--223.Google ScholarGoogle ScholarCross RefCross Ref
  23. Jacob Goldenberg, Barak Libai, and Eitan Muller. 2001. Using complex systems analysis to advance marketing theory development: Modeling heterogeneity effects on new product growth through stochastic cellular automata. Academy of Marketing Science Review 2001 (2001), 1--18.Google ScholarGoogle Scholar
  24. Manuel Gomez-Rodriguez, David Balduzzi, and Bernhard Schölkopf. 2011. Uncovering the temporal dynamics of diffusion networks. In Proc. 28th ICML. 561--568. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Manuel Gomez-Rodriguez, Jure Leskovec, and Andrease Krause. 2012. Inferring networks of diffusion and influence. ACM Transactions on Knowledge Discovery from Data 5, 4 (2012), 21:1--21:37. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Manuel Gomez-Rodriguez and Bernhard Schölkopf. 2012. Submodular inference of diffusion networks from multiple trees. In Proc. 29th ICML. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Manuel Gomez-Rodriguez, Le Song, Hadi Daneshmand, and B. Schölkopf. 2014. Estimating diffusion network structures: Recovery conditions, sample complexity 8 soft-thresholding algorithm. In Proc. 31st ICML. 793--801. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Amit Goyal, Francesco Bonchi, Laks V. S. Lakshmanan, and Suresh Venkatasubramanian. 2013. On minimizing budget and time in influence propagation over social networks. Social Network Analysis and Mining 3, 2 (2013), 179--192.Google ScholarGoogle ScholarCross RefCross Ref
  29. Amit Goyal, Francesco Bonchi, and Laks V. S. Lakshmanan. 2011. A data-based approach to social influence maximization. In Proc. VLDB Endowment. 5, 1 (sep 2011), 73--84. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Mark Granovetter. 1978. Threshold models of collective behavior. American Journal of Sociology 83 (1978), 1420--1443.Google ScholarGoogle ScholarCross RefCross Ref
  31. Avinatan Hassidim and Yaron Singer. 2016. Submodular optimization under noise. In Proc. 30th COLT. 1069--1122.Google ScholarGoogle Scholar
  32. Johan Håstad. 1999. Clique is hard to approximate within n<sup>1-&epsiv;</sup> . Acta Mathematica 182 (1999), 105--142.Google ScholarGoogle ScholarCross RefCross Ref
  33. Xinran He and David Kempe. 2016. Robust influence maximization. In Proc. 22nd KDD. 885--894. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. David Kempe, Jon Kleinberg, and Éva Tardos. 2015. Maximizing the spread of influence through a social network.Theory of Computing 11, 4 (2015), 105--147.Google ScholarGoogle Scholar
  35. Harry Kesten. 1990. Asymptotics in high dimension for percolation. In Disorder in Physical System, Geoffrey Grimmett and Dominic Welsh (Eds.). Oxford University Press, 219--240.Google ScholarGoogle Scholar
  36. Sanjeev Khanna and Brendan Lucier. 2014. Influence maximization in undirected networks. In Proc. 25th ACM SODA. 1482--1496. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Andreas Krause, H. Brendan McMahan, Carlos Guestrin, and Aunpam Gupta. 2008. Robust submodular observation selection. Journal of Machine Learning Research 9 (2008), 2761--2801.Google ScholarGoogle Scholar
  38. Siyu Lei, Silviu Maniu, Luyi Mo, Reynold Cheng, and Pierre Senellart. 2015. Online influence maximization. In Proc. 21st KDD. 645--654. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Jure Leskovec, Lars Backstrom, and Jon Kleinberg. 2009. Meme-tracking and the dynamics of the news cycle. In Proc. 15th KDD. 497--506. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Jure Leskovec, Deepayan Chakrabarti, Jon Kleinberg, Christos Faloutsos, and Zoubin Ghahramani. 2010. Kronecker graphs: An approach to modeling networks. Journal of Machine Learning Research 11 (2010), 985--1042. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Jure Leskovec, Andreas Krause, Carlos Guestrin, Christos Faloutsos, Jeanne VanBriesen, and Natalie S. Glance. 2007. Cost-effective outbreak detection in networks. In Proc. 13th KDD. 420--429. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Meghna Lowalekar, Pradeep Varakantham, and Akshat Kumar. 2016. Robust influence maximization. In Proc. 15th AAMAS. 1395--1396. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Elchanan Mossel and Sebastien Roch. 2010. Submodularity of influence in social networks: From local to global. SIAM Journal on Computing 39 (2010), 2176--2188.Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Seth A. Myers and Jure Leskovec. 2010. On the convexity of latent social network inference. In Proc. 22nd NIPS. 1741--1749. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Harikrishna Narasimhan, David C. Parkes, and Yaron Singer. 2015. Learnability of influence in networks. In Proc. 27th NIPS. 3168--3176. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. George L. Nemhauser, Laurence A. Wolsey, and Marshall L. Fisher. 1978. An analysis of the approximations for maximizing submodular set functions. Mathematical Programming 14 (1978), 265--294. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Praneeth Netrapalli and Sujay Sanghavi. 2012. Learning the graph of epidemic cascades. In Proc. 12th ACM Sigmetrics. 211--222. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Kazumi Saito, Masahiro Kimura, Kouzou Ohara, and Hiroshi Motoda. 2009. Learning continuous-time information diffusion model for social behavioral data analysis. In Proc. 1st ACML: Advances in Machine Learning. 322--337. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Kazumi Saito, Masahiro Kimura, Kouzou Ohara, and Hiroshi Motoda. 2010. Generative models of information diffusion with asynchronous timedelay. In Proc. ACML. 193--208.Google ScholarGoogle Scholar
  50. Youze Tang, Yanchen Shi, and Xiaokui Xiao. 2015. Influence maximization in near-linear time: A martingale approach. In Proc. 35th ACM SIGMOD. 1539--1554. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Youze Tang, Xiaokui Xiao, and Yanchen Shi. 2014. Influence maximization: Near-optimal time complexity meets practical efficiency. In Proc. 34th ACM SIGMOD. 75--86. Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Chi Wang, Wei Chen, and Yajun Wang. 2012. Scalable influence maximization for independent cascade model in large-scale social networks. Data Mining and Knowledge Discovery 25 (2012), 545--576.Google ScholarGoogle ScholarCross RefCross Ref
  53. Yu Wang, Gao Cong, Guojie Song, and Kunqing Xie. 2010. Community-based greedy algorithm for mining top-K influential nodes in mobile social networks. In Proc. 16th KDD. 1039--1048. Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Amulya Yadav, Bryan Wilder, Eric Rice, Robin Petering, Jaih Craddock, Amanda Yoshioka-Maxwell, Mary Hemler, Laura Onasch-Vera, Milind Tambe, and Darlene Woo. 2017. Influence maximization in the field: The arduous journey from emerging to deployed application. In Proc. 16th AAMAS. 150--158. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Stability and Robustness in Influence Maximization

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Transactions on Knowledge Discovery from Data
          ACM Transactions on Knowledge Discovery from Data  Volume 12, Issue 6
          December 2018
          327 pages
          ISSN:1556-4681
          EISSN:1556-472X
          DOI:10.1145/3271478
          Issue’s Table of Contents

          Copyright © 2018 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 31 August 2018
          • Revised: 1 June 2018
          • Accepted: 1 June 2018
          • Received: 1 February 2018
          Published in tkdd Volume 12, Issue 6

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader