Stability of Influence Maximization

Slides:



Advertisements
Similar presentations
1 Adaptive Submodularity: A New Approach to Active Learning and Stochastic Optimization Joint work with Andreas Krause 1 Daniel Golovin.
Advertisements

Means and Variances of RV 7.2. Example # of BoysP(X) Find the expected value, or mean, of the probability distribution above:
Learning Influence Probabilities in Social Networks 1 2 Amit Goyal 1 Francesco Bonchi 2 Laks V. S. Lakshmanan 1 U. of British Columbia Yahoo! Research.
LEARNING INFLUENCE PROBABILITIES IN SOCIAL NETWORKS Amit Goyal Francesco Bonchi Laks V. S. Lakshmanan University of British Columbia Yahoo! Research University.
Minimizing Seed Set for Viral Marketing Cheng Long & Raymond Chi-Wing Wong Presented by: Cheng Long 20-August-2011.
Maximizing the Spread of Influence through a Social Network
Cost-effective Outbreak Detection in Networks Jure Leskovec, Andreas Krause, Carlos Guestrin, Christos Faloutsos, Jeanne VanBriesen, Natalie Glance.
Maximizing the Spread of Influence through a Social Network
In Search of Influential Event Organizers in Online Social Networks
Maximizing the Spread of Influence through a Social Network By David Kempe, Jon Kleinberg, Eva Tardos Report by Joe Abrams.
1 Learning Entity Specific Models Stefan Niculescu Carnegie Mellon University November, 2003.
On the Stability of Rational, Heterogeneous Interdomain Route Selection Hao Wang Yale University Joint work with Haiyong Xie, Y. Richard Yang, Avi Silberschatz,
Required Sample size for Bayesian network Structure learning
Section 2.6 Question 1. Section 2.6 Answer 1 Section 2.6 Question 2.
Economics 214 Lecture 39 Constrained Optimization.
Influence Maximization
Mariam Salloum (YP.com) Xin Luna Dong (Google) Divesh Srivastava (AT&T Research) Vassilis J. Tsotras (UC Riverside) 1 Online Ordering of Overlapping Data.
Efficient Quantum State Tomography using the MERA in 1D critical system Presenter : Jong Yeon Lee (Undergraduate, Caltech)
A Framework For Community Identification in Dynamic Social Networks Chayant Tantipathananandh Tanya Berger-Wolf David Kempe Presented by Victor Lee.
Exposure In Wireless Ad-Hoc Sensor Networks S. Megerian, F. Koushanfar, G. Qu, G. Veltri, M. Potkonjak ACM SIG MOBILE 2001 (Mobicom) Journal version: S.
Inverse Problems. Example Direct problem given polynomial find zeros Inverse problem given zeros find polynomial.
Price of Anarchy for the N-player Competitive Cascade Game with Submodular Activation Functions Xinran He, David Kempe {xinranhe,
( ) EXAMPLE 1 Evaluating Square Roots a. 36 = 6 6 because 2 = 36 . b.
Maximizing Product Adoption in Social Networks
Active Learning for Networked Data Based on Non-progressive Diffusion Model Zhilin Yang, Jie Tang, Bin Xu, Chunxiao Xing Dept. of Computer Science and.
1 1 MPI for Intelligent Systems 2 Stanford University Manuel Gomez Rodriguez 1,2 David Balduzzi 1 Bernhard Schölkopf 1 UNCOVERING THE TEMPORAL DYNAMICS.
Personalized Influence Maximization on Social Networks
A framework For Community Identification in Dynamic Social Networks Chayant, Tanya Berger-Wolf, David Kempe [KDD’07] Advisor : Dr. Koh Jia-Ling Advisor.
IIASA Yuri Ermoliev International Institute for Applied Systems Analysis Mathematical methods for robust solutions.
1 1 Stanford University 2 MPI for Biological Cybernetics 3 California Institute of Technology Inferring Networks of Diffusion and Influence Manuel Gomez.
1 1 Stanford University 2 MPI for Biological Cybernetics 3 California Institute of Technology Inferring Networks of Diffusion and Influence Manuel Gomez.
Influence Maximization in Dynamic Social Networks Honglei Zhuang, Yihan Sun, Jie Tang, Jialin Zhang, Xiaoming Sun.
December 7-10, 2013, Dallas, Texas
( + ) ÷ ( + ) = ( + ) ( – ) ÷ ( – ) = ( + ) Simplify the following. ( + ) ÷ ( – ) = ( – ) ( – ) ÷ ( + ) = ( – ) 1) – 54 ÷ ( – 9 )= 6 2) – 48 ÷ 6= – 8 3)
Maximizing the Spread of Influence through a Social Network David Kempe, Jon Kleinberg, Eva Tardos Cornell University KDD 2003.
The “ ” Paige in Kalman Filtering K. E. Schubert.
Reinforcement Learning Control with Robust Stability Chuck Anderson, Matt Kretchmar, Department of Computer Science, Peter Young, Department of Electrical.
Maximizing the Spread of Influence through a Social Network Authors: David Kempe, Jon Kleinberg, É va Tardos KDD 2003.
Counting Crowded Moving Objects Vincent Rabaud and Serge Belongie Department of Computer Science and Engineering University of California, San Diego
Online Social Networks and Media
Xinran He1, Theodoros Rekatsinas2,
Lecture 3-1 Independent Cascade Weili Wu Ding-Zhu Du University of Texas at Dallas.
Manuel Gomez Rodriguez Bernhard Schölkopf I NFLUENCE M AXIMIZATION IN C ONTINUOUS T IME D IFFUSION N ETWORKS , ICML ‘12.
ANSWERS!. Completing the Square Level 1 Answers Completing the Square Level 2 Answers.
Guaranteed Stable Projection-Based Model Reduction for Indefinite and Unstable Linear Systems Brad Bond Luca Daniel MIT Speaker: Tuck, Fang Gong.
Bo Zong, Yinghui Wu, Ambuj K. Singh, Xifeng Yan 1 Inferring the Underlying Structure of Information Cascades
1 1 Stanford University 2 MPI for Biological Cybernetics 3 California Institute of Technology Inferring Networks of Diffusion and Influence Manuel Gomez.
BIG DATA Initiative SMART SubstationBig Data Solution.
Inferring Networks of Diffusion and Influence
Wenyu Zhang From Social Network Group
Nanyang Technological University
Independent Cascade Model and Linear Threshold Model
Greedy & Heuristic algorithms in Influence Maximization
MEIKE: Influence-based Communities in Networks
5.5 Trapezoidal Rule.
Georgios Lymperopoulos, EE Controls PI: Petros Ioannou Introduction
Hao Wang Yale University Joint work with
عمل الطالبة : هايدى محمد عبد المنعم حسين
Introduction to Functions
Independent Cascade Model and Linear Threshold Model
הוראת מיומנויות של עבודה בקבוצה מחקר פעולה
Multiplying 3 digits by 2 digits
The Importance of Communities for Learning to Influence
Chapter 4, Regression Diagnostics Detection of Model Violation
Investigation of Heat and Buoyancy Fluxes from Cruise Data
Bharathi-Kempe-Salek Conjecture

Viral Marketing over Social Networks
Discovering Influential Nodes From Social Trust Network
Independent Cascade Model and Linear Threshold Model
Presentation transcript:

Stability of Influence Maximization Xinran He and David Kempe University of Southern California {xinranhe, dkempe}@usc.edu 08/26/2014

Diffusion In Social Networks 0.8 0.2 0.5 0.2 0.6 0.3 0.7 Some friend did and someone did not The adoption of new products can propagate in the social network Diffusion in the social network He & Kempe (USC) Influence Stability KDD 2014

IC Model & Influence Maximization He & Kempe (USC) Influence Stability KDD 2014 Independent Cascade (IC) Model: Each newly activated node 𝑢 has a single chance to activate each inactive neighbor 𝑣 with probability 𝑝 𝑢,𝑣 . Influence Maximization: Find 𝑘 people that generate the largest influence spread (i.e. expected number of activated nodes) [KKT 2003] Where do parameters 𝒑 𝒖,𝒗 come from?

Uncertainty in Influence Strength He & Kempe(USC) Influence Stability KDD 2014 Diffusion History Questionnaire 0.8 0.5 0.3 0.6 0.1 0.4 Network Inference Influence Maximization Does such instability really exist? 0.5 0.6 0.1 0.3 0.4 0.9 Ground truth network

An Extreme Example 0.0625 0.0625 0.055 0.07 Select one seed 𝑝= 𝑝= He & Kempe (USC) Influence Stability KDD 2014 Select one seed 𝑝= 0.0625 0.0625 0.055 0.07 𝑝=

An Extreme Example (Cont.) He & Kempe (USC) Influence Stability KDD 2014 Simple slide with only one animation 𝑝= 0.3 0.25 𝑝= 0.3 0.35

Diagnosing Instability He & Kempe (USC) Influence Stability KDD 2014 Given an instance of Influence Maximization, can we diagnose efficiently whether it is stable or unstable? How about this network? Complete answer ⇒ Computing percolation threshold of any graph. 0.8 0.5 0.3 0.6 0.1 0.4 Partial solution Unstable instances ⇒ Fire an alarm correctly. Instability diagnosis correctly Stable instances ⇒ Possible false alarms.

Definition of Stability He & Kempe (USC) Influence Stability KDD 2014 Definition of Stability Model of misestimation: 1 𝑝 𝑢,𝑣 𝑝 𝑢,𝑣 ′ 𝑢 𝑣 𝑝 𝑢,𝑣 𝐼 𝑢,𝑣 Definition (Stability of Influence Maximization): An instance ( 𝑝 𝑢,𝑣 , 𝐼 𝑢,𝑣 ) is stable if the difference in influence is small for all legal 𝑝 𝑢,𝑣 ′ ∈ 𝐼 𝑢,𝑣 and all seed sets of size 𝑘.

Influence Difference Maximization He & Kempe (USC) Influence Stability KDD 2014 max 𝑆 =𝑘 max 𝑝 𝑢,𝑣 ′ ∈ 𝐼 𝑢,𝑣 |𝜎 𝑆 −𝜎′(𝑆)| Optimization Problem: Definition (Influence Difference Maximization) : Given two instances with probabilities 𝑝 𝑢,𝑣 ≥ 𝑝 𝑢,𝑣 ′ for all 𝑢, 𝑣, let 𝜎 and 𝜎′ be the respective influence functions. Find a set S of size 𝑘 maximizing 𝜎 𝑆 −𝜎′(𝑆). Get rid of the animation for the optimization problem

Main Theory Result He & Kempe (USC) Influence Stability KDD 2014 Main Theorem: Under the IC model, 𝜎 𝑆 −𝜎′(𝑆) is a non-negative and submodular function of the set 𝑆 (but not monotone). Random Greedy Algorithm [Buchbinder et al.] Approximation guarantee: 0.266→1/𝑒 Running time: 𝑂(𝑘𝑀 𝑉 2 ) (𝑘≪|𝑉|) (𝑀:number of Monte-Carlo Simulations) Corollary : Assuming 𝐴 is the seed set returned by maximizing 𝜎 obs 𝑆 with greedy algorithm, we have 𝜎 true 𝐴 ≥𝑐⋅ 𝜎 true 𝐴 ∗ , where 𝑐 is a constant depending on the given instance.

Approximation Guarantee for InfMax He & Kempe (USC) Influence Stability KDD 2014 1 𝑝 𝑢,𝑣 𝑝 𝑢,𝑣 ′ 𝑝 𝑢,𝑣 − 𝑝 𝑢,𝑣 + 𝐼 𝑢,𝑣 𝜽={ 𝑝 𝑢,𝑣 } , 𝜎(𝑆): the observed/inferred probabilities. 𝜽 = 𝑝 𝑢,𝑣 , 𝜎 𝑆 : the ground truth probabilities. 𝜽 + , 𝜽 − , 𝜎 + 𝑆 , 𝜎 − (𝑆) : making each probability as large/small as possible. Theorem: Assuming 𝐴 is the seed set returned by maximizng 𝜎 𝑆 with greedy algorithm, we have 𝜎 𝐴 ≥𝑐⋅ 𝜎 𝐴 , where 𝑐= 1− 𝛼 − ⋅ 1−1/𝑒 1+ 𝛼 + ⋅ 1−1/𝑒 𝛼 − = 𝛿 𝜽, 𝜽 − 𝐴 𝜎(𝐴) (By calculation) 𝛼 + = max 𝑆 𝛿 𝜽 + ,𝜽 𝑆 𝜎(𝐴) (By Inf Diff Max)

Experiments: Setting 𝑝 𝑢,𝑣 Networks He & Kempe (USC) Influence Stability KDD 2014 Networks Synthetic: 2D-grid, random regular graphs, small world, preferential attachment Real: STOCFOCS: co-authorship network, |V|=1768, |E|=10024 HAITI: retweet network, |V|=274, |E|=383 Set 𝐼 𝑢,𝑣 =[ 1−Δ 𝑝 𝑢,𝑣 , (1+Δ) 𝑝 𝑢,𝑣 ] Vary 𝑝 𝑢,𝑣 ∈{0.01,0.02,0.05,0.1} Vary Δ∈ 1%,5%,10%,20%,50% Metrics: Inf Diff Max: max 𝑆 𝛿 𝑆 Approximation guarantee: 𝑐 such that 𝜎 ob𝑠 𝐴 ≥𝑐⋅ 𝜎 true 𝐴 ∗ 1 𝑝 𝑢,𝑣 𝑝 𝑢,𝑣 Δ

Experiments: PA network He & Kempe (USC) Influence Stability KDD 2014 𝒎𝒂𝒙 𝑺 𝜹 𝑺 Approximation guarantee 𝒄

Experiments: STOCFOCS He & Kempe (USC) Influence Stability KDD 2014 𝒎𝒂𝒙 𝑺 𝜹 𝑺 Approximation guarantee 𝒄

Conclusion Noise is everywhere in social network data He & Kempe (USC) Influence Stability KDD 2014 Noise is everywhere in social network data Influence Maximization could be unstable Calls into question practicality of algorithmic approaches Instability can be diagnosed by solving Influence Difference Maximization Via non-monotone submodular maximization Experiments on synthetic networks (2D-grid, random regular, SW, PA) and real networks (retweet, collaboration) 10% relative noise ⇒ Decent approximation 20% relative noise ⇒ Significant Challenge Further extension: Linear Threshold Model, Triggering Model transition

Future work Generalization to other diffusion models. He & Kempe (USC) Influence Stability KDD 2014 Generalization to other diffusion models. Generalized Threshold (GT) model Generalization to other misestimation models. Current assumption: each deviation is bounded What if the total (squared) deviation is bounded? Big picture: How accurate are our diffusion models?

Questions?