Maximizing the Spread of Influence through a Social Network By David Kempe, Jon Kleinberg, Eva Tardos Report by Joe Abrams.

Slides:



Advertisements
Similar presentations
Mobile Communication Networks Vahid Mirjalili Department of Mechanical Engineering Department of Biochemistry & Molecular Biology.
Advertisements

Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
Viral Marketing – Learning Influence Probabilities.
Learning Influence Probabilities in Social Networks 1 2 Amit Goyal 1 Francesco Bonchi 2 Laks V. S. Lakshmanan 1 U. of British Columbia Yahoo! Research.
LEARNING INFLUENCE PROBABILITIES IN SOCIAL NETWORKS Amit Goyal Francesco Bonchi Laks V. S. Lakshmanan University of British Columbia Yahoo! Research University.
Minimizing Seed Set for Viral Marketing Cheng Long & Raymond Chi-Wing Wong Presented by: Cheng Long 20-August-2011.
Spread of Influence through a Social Network Adapted from :
Maximizing the Spread of Influence through a Social Network
Information Networks Failures and Epidemics in Networks Lecture 12.
Maximizing the Spread of Influence through a Social Network
Guest lecture II: Amos Fiat’s Social Networks class Edith Cohen TAU, December 2014.
Least Cost Rumor Blocking in Social networks Lidan Fan Computer Science Department the University of Texas at Dallas.
Midge Cozzens Rutgers University NIMBIOS Graph Workshop August 16-18, 2010.
A Game Theory Approach to Cascading Behavior in Networks By Jim Manning Jordan Mitchell Ajay Mattappallil.
1 Social Influence Analysis in Large-scale Networks Jie Tang 1, Jimeng Sun 2, Chi Wang 1, and Zi Yang 1 1 Dept. of Computer Science and Technology Tsinghua.
Based on “Cascading Behavior in Networks: Algorithmic and Economic Issues” in Algorithmic Game Theory (Jon Kleinberg, 2007) and Ch.16 and 19 of Networks,
CIKM’2008 Presentation Oct. 27, 2008 Napa, California
Epidemics in Social Networks
Strategic Network Formation With Structural Holes By Jon Kleinberg, Siddharth Suri, Eva Tardos, Tom Wexler.
On the Construction of Energy- Efficient Broadcast Tree with Hitch-hiking in Wireless Networks Source: 2004 International Performance Computing and Communications.
INFERRING NETWORKS OF DIFFUSION AND INFLUENCE Presented by Alicia Frame Paper by Manuel Gomez-Rodriguez, Jure Leskovec, and Andreas Kraus.
Influence and Correlation in Social Networks Aris Anagnostopoulos Ravi Kumar Mohammad Mahdian.
Keeping Peers Honest In EigenTrust Robert McGrew Joint work with Zoë Abrams and Serge Plotkin.
(hyperlink-induced topic search)
Maximizing the Spread of Influence through a Social Network
Algorithms for Data Mining and Querying with Graphs Investigators: Padhraic Smyth, Sharad Mehrotra University of California, Irvine Students: Joshua O’
Simpath: An Efficient Algorithm for Influence Maximization under Linear Threshold Model Amit Goyal Wei Lu Laks V. S. Lakshmanan University of British Columbia.
Maximizing Product Adoption in Social Networks
Models of Influence in Online Social Networks
Active Learning for Networked Data Based on Non-progressive Diffusion Model Zhilin Yang, Jie Tang, Bin Xu, Chunxiao Xing Dept. of Computer Science and.
Link Recommendation In P2P Social Networks Yusuf Aytaş, Hakan Ferhatosmanoğlu, Özgür Ulusoy Bilkent University, Ankara, Turkey.
Modeling the Spread of Influence on the Blogosphere Akshay Java, Pranam Kolari, Tim Finin, and Tim Oates UMBC Tech Report 04/12/06.
Influence Maximization in Dynamic Social Networks Honglei Zhuang, Yihan Sun, Jie Tang, Jialin Zhang, Xiaoming Sun.
A Graph-based Friend Recommendation System Using Genetic Algorithm
Inoculation Strategies for Victims of Viruses and the Sum-of-Squares Partition Problem James Apnes, Kevin Change, and Aleksandr Yampolskiy.
Maximizing the Spread of Influence through a Social Network David Kempe, Jon Kleinberg, Eva Tardos Cornell University KDD 2003.
Maximizing the Spread of Influence through a Social Network Authors: David Kempe, Jon Kleinberg, É va Tardos KDD 2003.
The new protocol of freenet Taken from Ian Clarke and Oskar Sandberg (The Freenet Project)
Online Social Networks and Media
I NFORMATION C ASCADE Priyanka Garg. OUTLINE Information Propagation Virus Propagation Model How to model infection? Inferring Latent Social Networks.
Lecture 3-1 Independent Cascade Weili Wu Ding-Zhu Du University of Texas at Dallas.
SybilGuard: Defending Against Sybil Attacks via Social Networks.
On Bharathi-Kempe-Salek Conjecture about Influence Maximization Ding-Zhu Du University of Texas at Dallas.
1 Latency-Bounded Minimum Influential Node Selection in Social Networks Incheol Shin
Preserving Privacy and Social Influence Isabelle Stanton.
IMRank: Influence Maximization via Finding Self-Consistent Ranking
Algorithms For Solving History Sensitive Cascade in Diffusion Networks Research Proposal Georgi Smilyanov, Maksim Tsikhanovich Advisor Dr Yu Zhang Trinity.
1 Finding Spread Blockers in Dynamic Networks (SNAKDD08)Habiba, Yintao Yu, Tanya Y., Berger-Wolf, Jared Saia Speaker: Hsu, Yu-wen Advisor: Dr. Koh, Jia-Ling.
Speaker : Yu-Hui Chen Authors : Dinuka A. Soysa, Denis Guangyin Chen, Oscar C. Au, and Amine Bermak From : 2013 IEEE Symposium on Computational Intelligence.
Biao Wang 1, Ge Chen 1, Luoyi Fu 1, Li Song 1, Xinbing Wang 1, Xue Liu 2 1 Shanghai Jiao Tong University 2 McGill University
Yu Wang1, Gao Cong2, Guojie Song1, Kunqing Xie1
Wenyu Zhang From Social Network Group
Nanyang Technological University
Finding Dense and Connected Subgraphs in Dual Networks
Independent Cascade Model and Linear Threshold Model
Greedy & Heuristic algorithms in Influence Maximization
Learning Influence Probabilities In Social Networks
Diffusion and Viral Marketing in Networks
Independent Cascade Model and Linear Threshold Model
Maximizing the Spread of Influence through a Social Network
The Importance of Communities for Learning to Influence
Effective Social Network Quarantine with Minimal Isolation Costs
Department of Computer Science University of York
Binghui Wang, Le Zhang, Neil Zhenqiang Gong
A History Sensitive Cascade Model in Diffusion Networks
Kempe-Kleinberg-Tardos Conjecture A simple proof
Viral Marketing over Social Networks
Independent Cascade Model and Linear Threshold Model
Diffusion in Networks
Presentation transcript:

Maximizing the Spread of Influence through a Social Network By David Kempe, Jon Kleinberg, Eva Tardos Report by Joe Abrams

Social Networks

Infectious disease networks

Viral Marketing

Example:Hotmail Example:Hotmail Included service’s URL in every sent by users Included service’s URL in every sent by users Grew from zero to 12 million users in 18 months with small advertising budget Grew from zero to 12 million users in 18 months with small advertising budget

Domingos and Richardson (2001, 2002) Introduction to maximization of influence over social networks Introduction to maximization of influence over social networks Intrinsic Value vs. Network Value Intrinsic Value vs. Network Value Expected Lift in Profit (ELP) Expected Lift in Profit (ELP) Epinions, “web of trust”, 75,000 users and 500,000 edges Epinions, “web of trust”, 75,000 users and 500,000 edges

Domingos and Richardson (2001, 2002) Viral marketing (using greedy hill-climbing strategy) worked very well compared with direct marketing Viral marketing (using greedy hill-climbing strategy) worked very well compared with direct marketing Robust (69% of total lift knowing only 5% of edges) Robust (69% of total lift knowing only 5% of edges)

Diffusion Model: Linear Threshold Model Each node (consumer) influenced by set of neighbors; has threshold Θ from uniform distribution [0,1] Each node (consumer) influenced by set of neighbors; has threshold Θ from uniform distribution [0,1] When combined influence reaches threshold, node becomes “active” When combined influence reaches threshold, node becomes “active” Active node now can influence its neighbors Active node now can influence its neighbors Weighted edges Weighted edges

Diffusion Model: Linear Threshold Model

Diffusion Model: Independent Cascade Model Each active node has a probability p of activating a neighbor Each active node has a probability p of activating a neighbor At time t+1, all newly activated nodes try to activate their neighbors At time t+1, all newly activated nodes try to activate their neighbors Only one attempt for per node on target Only one attempt for per node on target Akin to turn-based strategy game? Akin to turn-based strategy game?

Influence Maximization Using greedy hill-climbing strategy, can approximate optimum to within a factor of (1 – 1/e – ε), or ~63% Using greedy hill-climbing strategy, can approximate optimum to within a factor of (1 – 1/e – ε), or ~63% Proven using theories of submodular functions (diminishing returns) Proven using theories of submodular functions (diminishing returns) Applies to both diffusion models Applies to both diffusion models

Testing on network data Co-authorship network Co-authorship network High-energy physics theory section of High-energy physics theory section of ,748 nodes (authors) and ~53,000 edges 10,748 nodes (authors) and ~53,000 edges Multiple co-authored papers listed as parallel edges (greater weight) Multiple co-authored papers listed as parallel edges (greater weight)

Testing on network data Linear Threshold: influence weighed by # of parallel lines, inversely weighed by degree of target node: w = c u,v /d v Linear Threshold: influence weighed by # of parallel lines, inversely weighed by degree of target node: w = c u,v /d v Independent Cascade: p set at 1% and 10%; total probability for u v is Independent Cascade: p set at 1% and 10%; total probability for u v is 1 – (1 – p)^c u,v 1 – (1 – p)^c u,v Weighted Cascade: p = 1/ d v Weighted Cascade: p = 1/ d v

Algorithms Greedy hill-climbing Greedy hill-climbing High degree: nodes with greatest number of edges High degree: nodes with greatest number of edges Distance centrality: lowest average distance with other nodes Distance centrality: lowest average distance with other nodes Random Random

Algorithms

Results: Linear Threshold Model Greedy: ~40% better than central, ~18% better than high degree

Results: Weighted Cascade Model

Results: Independent Cascade, p = 1%

Results: Independent Cascade, p = 10%

Advantages of Random Selection

Generalized models Generalized Linear Threshold: for node v, influence of neighbors not necessarily sum of individual influences Generalized Linear Threshold: for node v, influence of neighbors not necessarily sum of individual influences Generalized Independent Cascade: for node v, probability p depends on set of v’s neighbors that have previously tried to activate v Generalized Independent Cascade: for node v, probability p depends on set of v’s neighbors that have previously tried to activate v Models computationally equivalent, impossible to guarantee approximation Models computationally equivalent, impossible to guarantee approximation

Non-Progressive Threshold Model Active nodes can become inactive Active nodes can become inactive Similar concept: at each time t, whether or not v becomes/stays active depends on if influence meets threshold Similar concept: at each time t, whether or not v becomes/stays active depends on if influence meets threshold Can “intervene” at different times; need not perform all interventions at t = 0 Can “intervene” at different times; need not perform all interventions at t = 0 Answer to progressive model with graph G equivalent to non-progressive model with layered graph G τ Answer to progressive model with graph G equivalent to non-progressive model with layered graph G τ

General Marketing Strategies Can divide up total budget κ into equal increments of size δ Can divide up total budget κ into equal increments of size δ For greedy hill-climbing strategy, can guarantee performance within factor of For greedy hill-climbing strategy, can guarantee performance within factor of 1 – e^[-(κ *γ)/(κ + δ *n)] 1 – e^[-(κ *γ)/(κ + δ *n)] As δ decreases relative to κ, result approaches 1 – e -1 = 63% As δ decreases relative to κ, result approaches 1 – e -1 = 63%

Strengths of paper Showed results in two complementary fashions: theoretical models and test results using real dataset Showed results in two complementary fashions: theoretical models and test results using real dataset Demonstrated that greedy hill-climbing strategy could guarantee results within 63% of optimum Demonstrated that greedy hill-climbing strategy could guarantee results within 63% of optimum Used specific and generalized versions of two different diffusion models Used specific and generalized versions of two different diffusion models

Weaknesses of paper Doesn’t fully explain methodology of greedy hill-climbing strategy Doesn’t fully explain methodology of greedy hill-climbing strategy Lots of work not shown – simply refers to work done in other papers Lots of work not shown – simply refers to work done in other papers Threshold value uniformly distributed? Threshold value uniformly distributed? Influence inversely weighted by degree of target? Influence inversely weighted by degree of target?

Questions?