1
|
Zhu X, Huang J. SpreadRank: A Novel Approach for Identifying Influential Spreaders in Complex Networks. ENTROPY (BASEL, SWITZERLAND) 2023; 25:e25040637. [PMID: 37190424 PMCID: PMC10137842 DOI: 10.3390/e25040637] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 02/17/2023] [Revised: 04/03/2023] [Accepted: 04/05/2023] [Indexed: 05/17/2023]
Abstract
Identifying influential spreaders in complex networks is critical for information spread and malware diffusion suppression. In this paper, we propose a novel influential spreader identification method, called SpreadRank, which considers the path reachability in information spreading and uses its quantitative index as a measure of node spread centrality to obtain the spread influence of a single node. To avoid the overlapping of the influence range of the node spread, this method establishes a dynamic influential node set selection mechanism based on the spread centrality value and the principle of minimizing the maximum connected branch after network segmentation, and it selects a group of nodes with the greatest overall spread influence. Experiments based on the SIR model demonstrate that, compared to other existing methods, the selected influential spreaders of SpreadRank can quickly diffuse or suppress information more effectively.
Collapse
Affiliation(s)
- Xuejin Zhu
- School of Cyber Science and Engineering, Southeast University, Nanjing 211189, China
| | - Jie Huang
- School of Cyber Science and Engineering, Southeast University, Nanjing 211189, China
- Purple Mountain Laboratories, Nanjing 211111, China
| |
Collapse
|
2
|
Wang S, Tan X. Finding robust influential seeds from networked systems against structural failures using a niching memetic algorithm. Appl Soft Comput 2023. [DOI: 10.1016/j.asoc.2023.110134] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/25/2023]
|
3
|
Wang C, Zhao J, Li L, Jiao L, Liu J, Wu K. A Multi-Transformation Evolutionary Framework for Influence Maximization in Social Networks. IEEE COMPUT INTELL M 2023. [DOI: 10.1109/mci.2022.3222050] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/26/2023]
|
4
|
Zhang L, Liu Y, Yang H, Cheng F, Liu Q, Zhang X. Overlapping community‐based particle swarm optimization algorithm for influence maximization in social networks. CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY 2023. [DOI: 10.1049/cit2.12158] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/24/2023] Open
Affiliation(s)
- Lei Zhang
- Information Materials and Intelligent Sensing Laboratory of Anhui Province Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education School of Computer Science and Technology Anhui University Hefei China
| | - Yutong Liu
- Information Materials and Intelligent Sensing Laboratory of Anhui Province Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education School of Computer Science and Technology Anhui University Hefei China
| | - Haipeng Yang
- Information Materials and Intelligent Sensing Laboratory of Anhui Province Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education School of Computer Science and Technology Anhui University Hefei China
| | - Fan Cheng
- Information Materials and Intelligent Sensing Laboratory of Anhui Province Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education School of Computer Science and Technology Anhui University Hefei China
| | - Qi Liu
- School of Computer Science and Technology University of Science and Technology of China Hefei China
| | - Xingyi Zhang
- Information Materials and Intelligent Sensing Laboratory of Anhui Province Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education School of Computer Science and Technology Anhui University Hefei China
| |
Collapse
|
5
|
Mehta S. Agglomerative clustering enhanced GA for optimal seed selection in online social networks. INTERNATIONAL JOURNAL OF WEB INFORMATION SYSTEMS 2022. [DOI: 10.1108/ijwis-02-2022-0042] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
Purpose
The social media revolution has brought tremendous change in business strategies for marketing and promoting the products and services. Online social networks have become prime choice to promote the products because of the large size of online communities. Identification of seed nodes or identifying the users who are able to maximize the spread of information over the network is the key challenge faced by organizations. It is proved as non-deterministic polynomial-time hard problem. The purpose of this paper is to design an efficient algorithm for optimal seed selection to cover the online social network as much as possible to maximize the influence. In this approach, agglomerative clustering is used to generate the initial population of seed nodes for GA.
Design/methodology/approach
In this paper agglomerative clustering based approach is proposed to generate the initial population of seed nodes for GA. This approach helps in creating the initial populations of Genetic algorithm from different parts of the network. Genetic algorithm evolves this population and aids in generating the best seed nodes in the network.
Findings
The performance of of proposed approach is assessed with respect to existing seed selection approaches like k-medoid, k-means, general greedy, random, discounted degree and high degree. The algorithms are compared over networks data sets with varying out-degree ratio. Experiments reveal that the proposed approach is able to improve the spread of influence by 35% as compared to contemporary techniques.
Originality/value
This paper is original contribution. The agglomerative clustering-based GA for optimal seed selection is developed to improve the spread of influence in online social networks. This paper is of immense importance for viral marketing and the organizations willing to promote product or services online via influential personalities.
Collapse
|
6
|
Wang S, Tan X. Solving the robust influence maximization problem on multi-layer networks via a Memetic algorithm. Appl Soft Comput 2022. [DOI: 10.1016/j.asoc.2022.108750] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/13/2022]
|
7
|
Zhang X, Liu S, Gong Y. A New Strategy in Boosting Information Spread. ENTROPY 2022; 24:e24040502. [PMID: 35455165 PMCID: PMC9027724 DOI: 10.3390/e24040502] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 02/14/2022] [Revised: 03/15/2022] [Accepted: 03/29/2022] [Indexed: 12/04/2022]
Abstract
Finding a seed set to propagate more information within a specific budget is defined as the influence maximization (IM) problem. The traditional IM model contains two cardinal aspects: (i) the influence propagation model and (ii) effective/efficient seed-seeking algorithms. However, most of models only consider one kind of node (i.e., influential nodes), ignoring the role of other nodes (e.g., boosting nodes) in the spreading process, which are irrational. Specifically, in the real-world propagation scenario, the boosting nodes always improve the spread of influence from the initial activated seeds, which is an efficient and cost-economic measure. In this paper, we consider the realistic budgeted influence maximization (RBIM) problem, which contains two kind of nodes to improve the diffusion of influence. Facing the newly modified objective function, we propose a novel B-degree discount algorithm to solve it. The novel B-degree discount algorithm which adopts the cost-economic boosting nodes to retweet the influence from the predecessor nodes can greatly reduce the cost, and performs better than other state-of-the-art algorithms in both effect and efficiency on RBIM problem solving.
Collapse
Affiliation(s)
- Xiaorong Zhang
- School of Mathematics and Statistics, Shaanxi Xueqian Normal University, Xi’an 710061, China
- Correspondence:
| | - Sanyang Liu
- School of Mathematics and Statistics, Xidian University, Xi’an 710071, China; (S.L.); (Y.G.)
| | - Yudong Gong
- School of Mathematics and Statistics, Xidian University, Xi’an 710071, China; (S.L.); (Y.G.)
| |
Collapse
|
8
|
Wang S, Tan X. Determining seeds with robust influential ability from multi-layer networks: A multi-factorial evolutionary approach. Knowl Based Syst 2022. [DOI: 10.1016/j.knosys.2022.108697] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
|
9
|
A Memetic Algorithm for Solving the Robust Influence Maximization Problem on Complex Networks against Structural Failures. SENSORS 2022; 22:s22062191. [PMID: 35336362 PMCID: PMC8954732 DOI: 10.3390/s22062191] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/18/2022] [Revised: 03/01/2022] [Accepted: 03/10/2022] [Indexed: 11/27/2022]
Abstract
Many transport systems in the real world can be modeled as networked systems. Due to limited resources, only a few nodes can be selected as seeds in the system, whose role is to spread required information or control signals as widely as possible. This problem can be modeled as the influence maximization problem. Most of the existing selection strategies are based on the invariable network structure and have not touched upon the condition that the network is under structural failures. Related studies indicate that such strategies may not completely tackle complicated diffusion tasks in reality, and the robustness of the information diffusion process against perturbances is significant. To give a numerical performance criterion of seeds under structural failure, a measure has been developed to define the robust influence maximization (RIM) problem. Further, a memetic optimization algorithm (MA) which includes several problem-orientated operators to improve the search ability, termed RIMMA, has been presented to deal with the RIM problem. Experimental results on synthetic networks and real-world networks validate the effectiveness of RIMMA, its superiority over existing approaches is also shown.
Collapse
|
10
|
Biswas TK, Abbasi A, Chakrabortty RK. An MCDM integrated adaptive simulated annealing approach for influence maximization in social networks. Inf Sci (N Y) 2021. [DOI: 10.1016/j.ins.2020.12.048] [Citation(s) in RCA: 16] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
|
11
|
Identification of top-k influential nodes based on discrete crow search algorithm optimization for influence maximization. APPL INTELL 2021. [DOI: 10.1007/s10489-021-02283-9] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
|
12
|
Wang S, Liu J, Jin Y. Finding Influential Nodes in Multiplex Networks Using a Memetic Algorithm. IEEE TRANSACTIONS ON CYBERNETICS 2021; 51:900-912. [PMID: 31180880 DOI: 10.1109/tcyb.2019.2917059] [Citation(s) in RCA: 13] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/09/2023]
Abstract
In order to find the nodes with better propagation ability, a large body of studies on the influence maximization problem has been conducted. Several influence spreading models and corresponding optimization algorithms have been proposed and successfully identified the infusive seeds in single isolated networks. However, as indicated by some recent studies and online materials, modern networked systems tend to have more complicated structures and multiple layers, which makes it difficult for existing seed determination techniques to deal with these networks. Thus, finding influential nodes in realistic multiplex networks remains open. Therefore, this paper aims to design an extended influence spreading model to simulate the influence diffusion process in multiplex networks, based on which a memetic algorithm is developed to find the seeds that are influential in all network layers. Experimental results on synthetic and real-world networks validate the effectiveness of the proposed algorithm. These results are helpful for identifying potential propagators in multiplex social networks, and provide solutions to analyze and gain deeper insights into networked systems.
Collapse
|
13
|
Olivares R, Muñoz F, Riquelme F. A multi-objective linear threshold influence spread model solved by swarm intelligence-based methods. Knowl Based Syst 2021. [DOI: 10.1016/j.knosys.2020.106623] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/22/2022]
|
14
|
Ma L, Li J, Lin Q, Gong M, Coello Coello CA, Ming Z. Cost-Aware Robust Control of Signed Networks by Using a Memetic Algorithm. IEEE TRANSACTIONS ON CYBERNETICS 2020; 50:4430-4443. [PMID: 31581105 DOI: 10.1109/tcyb.2019.2932996] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/10/2023]
Abstract
The robust controllability (RC) of a complex system tries to select a set of dominating entities for the functional control of this entire system without uncertain disturbances, and the research on RC will help to understand the system's underlying functions. In this article, we introduce the control cost in signed networks and present a cost-aware robust control (CRC) problem in this scenario. The aim of CRC is to minimize the cost to control a set of dominating nodes and transform a set of unbalanced links into balanced ones, such that the signed network can be robustly controlled without uncertain unbalanced factors (like nodes and links). To solve this problem, we first model CRC as a constrained combination optimization problem, and then present a memetic algorithm with some problem-specific knowledge (like the neighbors of nodes, the constraints of CRC, and the fast computation of the cost under each optimization) to solve this problem on signed networks. The extensive experiments on both real social and biological networks assess that our algorithm outperforms several state-of-the-art RC algorithms.
Collapse
|
15
|
Chen WN, Tan DZ, Yang Q, Gu T, Zhang J. Ant Colony Optimization for the Control of Pollutant Spreading on Social Networks. IEEE TRANSACTIONS ON CYBERNETICS 2020; 50:4053-4065. [PMID: 31295135 DOI: 10.1109/tcyb.2019.2922266] [Citation(s) in RCA: 11] [Impact Index Per Article: 2.2] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/09/2023]
Abstract
The rapid development of online social networks not only enables prompt and convenient dissemination of desirable information but also incurs fast and wide propagation of undesirable information. A common way to control the spread of pollutants is to block some nodes, but such a strategy may affect the service quality of a social network and leads to a high control cost if too many nodes are blocked. This paper considers the node selection problem as a biobjective optimization problem to find a subset of nodes to be blocked so that the effect of the control is maximized while the cost of the control is minimized. To solve this problem, we design an ant colony optimization algorithm with an adaptive dimension size selection under the multiobjective evolutionary algorithm framework based on decomposition (MOEA/D-ADACO). The proposed algorithm divides the biobjective problem into a set of single-objective subproblems and each ant takes charge of optimizing one subproblem. Moreover, two types of pheromone and heuristic information are incorporated into MOEA/D-ADACO, that is, pheromone and heuristic information of dimension size selection and that of node selection. While constructing solutions, the ants first determine the dimension size according to the former type of pheromone and heuristic information. Then, the ants select a specific number of nodes to build solutions according to the latter type of pheromone and heuristic information. Experiments conducted on a set of real-world online social networks confirm that the proposed biobjective optimization model and the developed MOEA/D-ADACO are promising for the pollutant spreading control.
Collapse
|
16
|
Alshahrani M, Fuxi Z, Sameh A, Mekouar S, Huang S. Efficient algorithms based on centrality measures for identification of top-K influential users in social networks. Inf Sci (N Y) 2020. [DOI: 10.1016/j.ins.2020.03.060] [Citation(s) in RCA: 27] [Impact Index Per Article: 5.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
|
17
|
Yerasani S, Tripathi S, Sarma M, Tiwari MK. Exploring the effect of dynamic seed activation in social networks. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2020. [DOI: 10.1016/j.ijinfomgt.2019.11.007] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/01/2022]
|
18
|
Wang S, Gong M, Liu W, Wu Y. Preventing epidemic spreading in networks by community detection and memetic algorithm. Appl Soft Comput 2020. [DOI: 10.1016/j.asoc.2020.106118] [Citation(s) in RCA: 18] [Impact Index Per Article: 3.6] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/25/2022]
|
19
|
Influential Nodes Identification in Complex Networks via Information Entropy. ENTROPY 2020; 22:e22020242. [PMID: 33286016 PMCID: PMC7516697 DOI: 10.3390/e22020242] [Citation(s) in RCA: 48] [Impact Index Per Article: 9.6] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 11/09/2019] [Revised: 02/17/2020] [Accepted: 02/19/2020] [Indexed: 12/11/2022]
Abstract
Identifying a set of influential nodes is an important topic in complex networks which plays a crucial role in many applications, such as market advertising, rumor controlling, and predicting valuable scientific publications. In regard to this, researchers have developed algorithms from simple degree methods to all kinds of sophisticated approaches. However, a more robust and practical algorithm is required for the task. In this paper, we propose the EnRenew algorithm aimed to identify a set of influential nodes via information entropy. Firstly, the information entropy of each node is calculated as initial spreading ability. Then, select the node with the largest information entropy and renovate its l-length reachable nodes’ spreading ability by an attenuation factor, repeat this process until specific number of influential nodes are selected. Compared with the best state-of-the-art benchmark methods, the performance of proposed algorithm improved by 21.1%, 7.0%, 30.0%, 5.0%, 2.5%, and 9.0% in final affected scale on CEnew, Email, Hamster, Router, Condmat, and Amazon network, respectively, under the Susceptible-Infected-Recovered (SIR) simulation model. The proposed algorithm measures the importance of nodes based on information entropy and selects a group of important nodes through dynamic update strategy. The impressive results on the SIR simulation model shed light on new method of node mining in complex networks for information spreading and epidemic prevention.
Collapse
|
20
|
Tang J, Zhang R, Wang P, Zhao Z, Fan L, Liu X. A discrete shuffled frog-leaping algorithm to identify influential nodes for influence maximization in social networks. Knowl Based Syst 2020. [DOI: 10.1016/j.knosys.2019.07.004] [Citation(s) in RCA: 41] [Impact Index Per Article: 8.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
|
21
|
Ma L, Liu Y. Maximizing three-hop influence spread in social networks using discrete comprehensive learning artificial bee colony optimizer. Appl Soft Comput 2019. [DOI: 10.1016/j.asoc.2019.105606] [Citation(s) in RCA: 10] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/26/2022]
|
22
|
Jin J, Zhang G, Sheu P, Hayakawa M, Kitazawa A. Influence maximization in graph-based OLAP (GOLAP). SOCIAL NETWORK ANALYSIS AND MINING 2019. [DOI: 10.1007/s13278-019-0598-2] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
|
23
|
Tang J, Zhang R, Yao Y, Zhao Z, Wang P, Li H, Yuan J. Maximizing the spread of influence via the collective intelligence of discrete bat algorithm. Knowl Based Syst 2018. [DOI: 10.1016/j.knosys.2018.06.013] [Citation(s) in RCA: 22] [Impact Index Per Article: 3.1] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/28/2022]
|
24
|
He Q, Wang X, Huang M, Lv J, Ma L. Heuristics-based influence maximization for opinion formation in social networks. Appl Soft Comput 2018. [DOI: 10.1016/j.asoc.2018.02.016] [Citation(s) in RCA: 19] [Impact Index Per Article: 2.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
|
25
|
Gong M, Wang S, Liu W, Yan J, Jiao L. Evolutionary computation in China: A literature survey. CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY 2016. [DOI: 10.1016/j.trit.2016.11.002] [Citation(s) in RCA: 6] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/20/2022] Open
|