Spread of Influence through a Social Network Adapted from :

Slides:



Advertisements
Similar presentations
The role of compatibility in the diffusion of technologies in social networks Mohammad Mahdian Yahoo! Research Joint work with N. Immorlica, J. Kleinberg,
Advertisements

How to Schedule a Cascade in an Arbitrary Graph F. Chierchetti, J. Kleinberg, A. Panconesi February 2012 Presented by Emrah Cem 7301 – Advances in Social.
LEARNING INFLUENCE PROBABILITIES IN SOCIAL NETWORKS Amit Goyal Francesco Bonchi Laks V. S. Lakshmanan University of British Columbia Yahoo! Research University.
Minimizing Seed Set for Viral Marketing Cheng Long & Raymond Chi-Wing Wong Presented by: Cheng Long 20-August-2011.
Maximizing the Spread of Influence through a Social Network
Cost-effective Outbreak Detection in Networks Jure Leskovec, Andreas Krause, Carlos Guestrin, Christos Faloutsos, Jeanne VanBriesen, Natalie Glance.
Maximizing the Spread of Influence through a Social Network
Suqi Cheng Research Center of Web Data Sciences & Engineering
Least Cost Rumor Blocking in Social networks Lidan Fan Computer Science Department the University of Texas at Dallas.
Efficient Control of Epidemics over Random Networks Marc Lelarge (INRIA-ENS) SIGMETRICS 09.
Nodes, Ties and Influence
Maximizing the Spread of Influence through a Social Network By David Kempe, Jon Kleinberg, Eva Tardos Report by Joe Abrams.
Based on “Cascading Behavior in Networks: Algorithmic and Economic Issues” in Algorithmic Game Theory (Jon Kleinberg, 2007) and Ch.16 and 19 of Networks,
Absorbing Random walks Coverage
CIKM’2008 Presentation Oct. 27, 2008 Napa, California
Epidemics in Social Networks
Using Structure Indices for Efficient Approximation of Network Properties Matthew J. Rattigan, Marc Maier, and David Jensen University of Massachusetts.
INFERRING NETWORKS OF DIFFUSION AND INFLUENCE Presented by Alicia Frame Paper by Manuel Gomez-Rodriguez, Jure Leskovec, and Andreas Kraus.
Matroids, Secretary Problems, and Online Mechanisms Nicole Immorlica, Microsoft Research Joint work with Robert Kleinberg and Moshe Babaioff.
Influence Maximization
Maximizing the Spread of Influence through a Social Network
Simpath: An Efficient Algorithm for Influence Maximization under Linear Threshold Model Amit Goyal Wei Lu Laks V. S. Lakshmanan University of British Columbia.
Maximizing Product Adoption in Social Networks
Active Learning for Probabilistic Models Lee Wee Sun Department of Computer Science National University of Singapore LARC-IMS Workshop.
Models of Influence in Online Social Networks
A Distributed and Privacy Preserving Algorithm for Identifying Information Hubs in Social Networks M.U. Ilyas, Z Shafiq, Alex Liu, H Radha Michigan State.
Personalized Influence Maximization on Social Networks
Information Spread and Information Maximization in Social Networks Xie Yiran 5.28.
Influence Maximization in Dynamic Social Networks Honglei Zhuang, Yihan Sun, Jie Tang, Jialin Zhang, Xiaoming Sun.
December 7-10, 2013, Dallas, Texas
Jing (Selena) He and Hisham M. Haddad Department of Computer Science, Kennesaw State University Shouling Ji, Xiaojing Liao, and Raheem Beyah School of.
Optimal Link Bombs are Uncoordinated Sibel Adali Tina Liu Malik Magdon-Ismail Rensselaer Polytechnic Institute.
Maximizing the Spread of Influence through a Social Network David Kempe, Jon Kleinberg, Eva Tardos Cornell University KDD 2003.
Maximizing the Spread of Influence through a Social Network Authors: David Kempe, Jon Kleinberg, É va Tardos KDD 2003.
Problem Setting :Influence Maximization A new product is available in the market. Whom to give free samples to maximize the purchase of the product ? 1.
Online Social Networks and Media
I NFORMATION C ASCADE Priyanka Garg. OUTLINE Information Propagation Virus Propagation Model How to model infection? Inferring Latent Social Networks.
Lecture 3-1 Independent Cascade Weili Wu Ding-Zhu Du University of Texas at Dallas.
On Bharathi-Kempe-Salek Conjecture about Influence Maximization Ding-Zhu Du University of Texas at Dallas.
1 Latency-Bounded Minimum Influential Node Selection in Social Networks Incheol Shin
Algorithms For Solving History Sensitive Cascade in Diffusion Networks Research Proposal Georgi Smilyanov, Maksim Tsikhanovich Advisor Dr Yu Zhang Trinity.
1 Finding Spread Blockers in Dynamic Networks (SNAKDD08)Habiba, Yintao Yu, Tanya Y., Berger-Wolf, Jared Saia Speaker: Hsu, Yu-wen Advisor: Dr. Koh, Jia-Ling.
Cost-effective Outbreak Detection in Networks Presented by Amlan Pradhan, Yining Zhou, Yingfei Xiang, Abhinav Rungta -Group 1.
Matroids, Secretary Problems, and Online Mechanisms Nicole Immorlica, Microsoft Research Joint work with Robert Kleinberg and Moshe Babaioff.
Lecture 5-1 Positive Influence Dominating Set Ding-Zhu Du Univ of Texas at Dallas.
Steffen Staab 1WeST Web Science & Technologies University of Koblenz ▪ Landau, Germany Network Theory and Dynamic Systems Cascading.
1 1 MPI for Intelligent Systems 2 Stanford University Manuel Gomez Rodriguez 1,2 Bernhard Schölkopf 1 S UBMODULAR I NFERENCE OF D IFFUSION NETWORKS FROM.
Instructor: Shengyu Zhang 1. Location change for the final 2 classes Nov 17: YIA 404 (Yasumoto International Academic Park 康本國際學術園 ) Nov 24: No class.
Yu Wang1, Gao Cong2, Guojie Song1, Kunqing Xie1
Cohesive Subgraph Computation over Large Graphs
Seed Selection.
Wenyu Zhang From Social Network Group
Nanyang Technological University
Independent Cascade Model and Linear Threshold Model
Greedy & Heuristic algorithms in Influence Maximization
Social Analytics for BI
What Stops Social Epidemics?
Influence Maximization
Diffusion and Viral Marketing in Networks
Independent Cascade Model and Linear Threshold Model
Influence Maximization
Maximizing the Spread of Influence through a Social Network
The Importance of Communities for Learning to Influence
Coverage Approximation Algorithms
Bharathi-Kempe-Salek Conjecture
Kempe-Kleinberg-Tardos Conjecture A simple proof
Influence Maximization
Viral Marketing over Social Networks
Independent Cascade Model and Linear Threshold Model
Presentation transcript:

Spread of Influence through a Social Network Adapted from :

Influence Spread We live in communities and interact with our friends, family and even strangers. In the process, we influence each other. University of British Columbia

Social Network and Spread of Influence Social network plays a fundamental role as a medium for the spread of INFLUENCE among its members  Opinions, ideas, information, innovation… Direct Marketing takes the “ word-of-mouth ” effects to significantly increase profits (Gmail, Tupperware popularization, Microsoft Origami …)

4 Social Network and Spread of Influence Examples:  Hotmail grew from zero users to 12 million users in 18 months on a small advertising budget.  A company selects a small number of customers and ask them to try a new product. The company wants to choose a small group with largest influence.  Obesity grows as fat people stay with fat people (homofily relations)  Viral Marketing..

Viral Marketing 5 Identify influential customers These customers endorse the product among their friends Convince them to adopt the product – Offer discount/free samples

Problem Setting Given  a limited budget B for initial advertising (e.g. give away free samples of product)  estimates for influence between individuals Goal  trigger a large cascade of influence (e.g. further adoptions of a product) Question  Which set of individuals should B target at? Application besides product marketing  spread an innovation  detect stories in blogs (gossips)

What we need Form models of influence in social networks. Obtain data about particular network (to estimate inter-personal influence). Devise algorithm to maximize spread of influence.

Outline Models of influence  Linear Threshold  Independent Cascade Influence maximization problem  Algorithm

Outline Models of influence  Linear Threshold  Independent Cascade Influence maximization problem  Algorithm

Models of Influence Two basic classes of diffusion models: threshold and cascade General operational view:  A social network is represented as a directed graph, with each person (customer) as a node  Nodes start either active or inactive  An active node may trigger activation of neighboring nodes  Monotonicity assumption: active nodes never deactivate (not always true, e.g. epidemics, here more complex models are used)

Outline Models of influence  Linear Threshold  Independent Cascade Influence maximization problem  Algorithm

Linear Threshold Model A node v has random threshold θ v ~ U[0,1] A node v is influenced by each neighbor w according to a weight b vw such that A node v becomes active when at least (weighted) θ v fraction of its neighbors are active Similar to perceptron model..

Example Inactive Node Active Node Threshold Active neighbors v w Stop! U X

Outline Models of influence  Linear Threshold  Independent Cascade Influence maximization problem  Algorithm

Independent Cascade Model When node v becomes active, it has a single chance of activating each currently inactive neighbor w. The activation attempt succeeds with probability p vw.

Example v w Inactive Node Active Node Newly active node Successful attempt Unsuccessful attempt Stop! U X

Outline Models of influence  Linear Threshold  Independent Cascade Influence maximization problem  Algorithm

Influence Maximization Problem Influence of node set S: f(S)  expected number of active nodes at the end, if set S is the initial active set Problem:  Given a parameter k (budget), find a k-node set S to maximize f(S)  Constrained optimization problem with f(S) as the objective function

f(S): properties (to be demonstrated) Non-negative (obviously) Monotone: Submodular:  Let N be a finite set  A set function is submodular iff (diminishing returns)

Bad News For a submodular function f, if f only takes non- negative value, and is monotone, finding a k-element set S for which f(S) is maximized is an NP-hard optimization problem. It is NP-hard to determine the optimum for influence maximization for both independent cascade model and linear threshold model.

Good News We can use Greedy Algorithm!  Start with an empty set S  For k iterations: Add node v to S that maximizes f(S +v) - f(S). How good (bad) it is?  Theorem: The greedy algorithm is a (1 – 1/e) approximation.  The resulting set S activates at least (1- 1/e) > 63% of the number of nodes that any size-k set S could activate.

Estimating Spread S(v) 22 We observe that the influence of a node x on node z can be computed by enumerating all simple paths starting from x and ending in z. x y z A simple path is a path that doesn’t contain any cycle University of British Columbia Influence of x on z through path x  y  z is 0.3 * 0.2 = 0.06 Influence of x on z through path x  z is 0.4 Total influence of x on z is 0.46

Estimating Spread 23 Thus, the spread of a node can be computed by enumerating simple paths starting from the node. = 1 + ( * 0.5) + ( * 0.2) = 1.96 Influence Spread of node x is x y z Influence of x on x itselfInfluence of x on y Influence of x on z Total influence of node x is 1.96 University of British Columbia

Estimating Spread 24 Let the seed set S = {x,y}, then influence spread of S is x y z Influence of node y in a subgraph that does not contain x Influence of node x in a subgraph that does not contain y Total influence of the seed set {x, y} is 2.6 University of British Columbia

Performance Spread of influence algorithms have been demonstrated to obtain much better performance wrt simpler methods such as:  Page Rank – Top-k nodes with highest page rank.  High Degree – Top-k nodes with highest degree. Temporal complexity is an issue (several algorithms recently improved over “base” algorithm described here)