Models of Influence in Online Social Networks

Slides:



Advertisements
Similar presentations
How to Schedule a Cascade in an Arbitrary Graph F. Chierchetti, J. Kleinberg, A. Panconesi February 2012 Presented by Emrah Cem 7301 – Advances in Social.
Advertisements

Viral Marketing – Learning Influence Probabilities.
Learning Influence Probabilities in Social Networks 1 2 Amit Goyal 1 Francesco Bonchi 2 Laks V. S. Lakshmanan 1 U. of British Columbia Yahoo! Research.
LEARNING INFLUENCE PROBABILITIES IN SOCIAL NETWORKS Amit Goyal Francesco Bonchi Laks V. S. Lakshmanan University of British Columbia Yahoo! Research University.
Minimizing Seed Set for Viral Marketing Cheng Long & Raymond Chi-Wing Wong Presented by: Cheng Long 20-August-2011.
Spread of Influence through a Social Network Adapted from :
Maximizing the Spread of Influence through a Social Network
CSE 5243 (AU 14) Graph Basics and a Gentle Introduction to PageRank 1.
Cost-effective Outbreak Detection in Networks Jure Leskovec, Andreas Krause, Carlos Guestrin, Christos Faloutsos, Jeanne VanBriesen, Natalie Glance.
Analysis and Modeling of Social Networks Foudalis Ilias.
Community Detection Algorithm and Community Quality Metric Mingming Chen & Boleslaw K. Szymanski Department of Computer Science Rensselaer Polytechnic.
Maximizing the Spread of Influence through a Social Network
VL Netzwerke, WS 2007/08 Edda Klipp 1 Max Planck Institute Molecular Genetics Humboldt University Berlin Theoretical Biophysics Networks in Metabolism.
Online Social Networks and Media. Graph partitioning The general problem – Input: a graph G=(V,E) edge (u,v) denotes similarity between u and v weighted.
Information Networks Small World Networks Lecture 5.
Nodes, Ties and Influence
Maximizing the Spread of Influence through a Social Network By David Kempe, Jon Kleinberg, Eva Tardos Report by Joe Abrams.
Directional triadic closure and edge deletion mechanism induce asymmetry in directed edge properties.
Mining and Searching Massive Graphs (Networks)
Clustering short time series gene expression data Jason Ernst, Gerard J. Nau and Ziv Bar-Joseph BIOINFORMATICS, vol
Using Structure Indices for Efficient Approximation of Network Properties Matthew J. Rattigan, Marc Maier, and David Jensen University of Massachusetts.
INFERRING NETWORKS OF DIFFUSION AND INFLUENCE Presented by Alicia Frame Paper by Manuel Gomez-Rodriguez, Jure Leskovec, and Andreas Kraus.
Influence and Correlation in Social Networks Aris Anagnostopoulos Ravi Kumar Mohammad Mahdian.
Advanced Topics in Data Mining Special focus: Social Networks.
Graphs and Topology Yao Zhao. Background of Graph A graph is a pair G =(V,E) –Undirected graph and directed graph –Weighted graph and unweighted graph.
Social Network Analysis via Factor Graph Model
© Y. Zhu and Y. University of North Carolina at Charlotte, USA 1 Chapter 1: Social-based Routing Protocols in Opportunistic Networks Ying Zhu and.
Topic 13 Network Models Credits: C. Faloutsos and J. Leskovec Tutorial
A Distributed and Privacy Preserving Algorithm for Identifying Information Hubs in Social Networks M.U. Ilyas, Z Shafiq, Alex Liu, H Radha Michigan State.
+ Offline Optimal Ads Allocation in SNS Advertising Hui Miao, Peixin Gao.
Influence and Correlation in Social Networks Priyanka Garg.
Free Powerpoint Templates Page 1 Free Powerpoint Templates Influence and Correlation in Social Networks Azad University KurdistanSocial Network.
Data Analysis in YouTube. Introduction Social network + a video sharing media – Potential environment to propagate an influence. Friendship network and.
Principles of Social Network Analysis. Definition of Social Networks “A social network is a set of actors that may have relationships with one another”
Tie Strength, Embeddedness & Social Influence: Evidence from a Large Scale Networked Experiment Sinan Aral, Dylan Walker Presented by: Mengqi Qiu(Mendy)
1 1 Stanford University 2 MPI for Biological Cybernetics 3 California Institute of Technology Inferring Networks of Diffusion and Influence Manuel Gomez.
Information Spread and Information Maximization in Social Networks Xie Yiran 5.28.
Influence Maximization in Dynamic Social Networks Honglei Zhuang, Yihan Sun, Jie Tang, Jialin Zhang, Xiaoming Sun.
A Graph-based Friend Recommendation System Using Genetic Algorithm
December 7-10, 2013, Dallas, Texas
Robustness of complex networks with the local protection strategy against cascading failures Jianwei Wang Adviser: Frank,Yeong-Sung Lin Present by Wayne.
Maximizing the Spread of Influence through a Social Network Authors: David Kempe, Jon Kleinberg, É va Tardos KDD 2003.
Yongqin Gao, Greg Madey Computer Science & Engineering Department University of Notre Dame © Copyright 2002~2003 by Serendip Gao, all rights reserved.
Online Social Networks and Media
Lecture 10: Network models CS 765: Complex Networks Slides are modified from Networks: Theory and Application by Lada Adamic.
Measuring Behavioral Trust in Social Networks
Community Detection Algorithms: A Comparative Analysis Authors: A. Lancichinetti and S. Fortunato Presented by: Ravi Tiwari.
On Bharathi-Kempe-Salek Conjecture about Influence Maximization Ding-Zhu Du University of Texas at Dallas.
Biclustering of Expression Data by Yizong Cheng and Geoge M. Church Presented by Bojun Yan March 25, 2004.
Community Discovery in Social Network Yunming Ye Department of Computer Science Shenzhen Graduate School Harbin Institute of Technology.
1 Latency-Bounded Minimum Influential Node Selection in Social Networks Incheol Shin
IMRank: Influence Maximization via Finding Self-Consistent Ranking
1 Friends and Neighbors on the Web Presentation for Web Information Retrieval Bruno Lepri.
CS 590 Term Project Epidemic model on Facebook
Speaker : Yu-Hui Chen Authors : Dinuka A. Soysa, Denis Guangyin Chen, Oscar C. Au, and Amine Bermak From : 2013 IEEE Symposium on Computational Intelligence.
Analyzing Networks. Milgram’s Experiments “Six degrees of Separation” Milgram’s letters to various recruits in Nebraska who were asked to forward the.
A Connectivity-Based Popularity Prediction Approach for Social Networks Huangmao Quan, Ana Milicic, Slobodan Vucetic, and Jie Wu Department of Computer.
Biao Wang 1, Ge Chen 1, Luoyi Fu 1, Li Song 1, Xinbing Wang 1, Xue Liu 2 1 Shanghai Jiao Tong University 2 McGill University
1 Link Privacy in Social Networks Aleksandra Korolova, Rajeev Motwani, Shubha U. Nabar CIKM’08 Advisor: Dr. Koh, JiaLing Speaker: Li, HueiJyun Date: 2009/3/30.
Yu Wang1, Gao Cong2, Guojie Song1, Kunqing Xie1
Inferring Networks of Diffusion and Influence
Wenyu Zhang From Social Network Group
Nanyang Technological University
Hiroki Sayama NECSI Summer School 2008 Week 2: Complex Systems Modeling and Networks Network Models Hiroki Sayama
Greedy & Heuristic algorithms in Influence Maximization
Groups of vertices and Core-periphery structure
Friend Recommendation with a Target User in Social Networking Services
Analysis of Large Graphs: Overlapping Communities
GhostLink: Latent Network Inference for Influence-aware Recommendation
Presentation transcript:

Models of Influence in Online Social Networks Author: Kanna AlFalahi, Yacine Atif, Ajith Abraham, Faculty of Information Technology, UAE University, Al Ain, United Arab Emirates VSB-Technical University of Ostrava, Ostrava, Czech Republic Teacher: 苑守慈 Presentation: Chih-Teng(Eric) Huang

Agenda Abstract & Introduction Background of social influence Social Influence structures and models Comparison and implications EXPERIMENTS AND RESULTS

Abstract & Introduction An influencer is a person who is followed by many people and has the power to make changes in a community.

Abstract & Introduction In this paper, we discuss metrics used to measure influence probabilities. Then, we reveal means to maximize social influence by identifying and using the most influential users in a social network.

Background of social influence Sociologists defined social influence as a “change in an individual’s thoughts, feelings, attitudes, or behaviors that results from interaction with another individual or a group”. Social influence occurs when an individual changes his/her behavior after interacting with other individuals who tend to be similar or superior.

Background of social influence Social influence involves social correlations, which are divided into three categories as follows: Influence: where a user performs an action based on his friends’ recent actions. Homophily: a user chooses friends who share the same characteristics; this leads to perform the same actions. Confounding factors: or external influence that affects individuals who are located near each other in the social network.

Background of social influence Social network structure and introduce some properties, which are categorized as follows: Large scale: Each network has basic properties such as: network order, represented by the number of nodes in the network; the size, that represents the number of edges in the network; and the node degree, which represents the number of edges that are connected to a node.

Background of social influence Network clustering: Clusters are groups of friends who know each other. This is related to the idea of “friend of your friend is likely to be your friend”. The degree by which nodes are able to be clustered together can be measured by the clustering coefficient.

Background of social influence Power law degree distribution: The degree of a node represents the number of edges connected to that node. A distribution function P(K) gives the probability that a selected node at random has a degree K. The long right tail indicates that in social networks, most nodes have a low degree, whereas a small proportion of nodes known as “hubs” have a high degree.

Background of social influence Edge Strength The tie strength depends on the number of overlapping friends or neighbors between two nodes. The larger the overlap the stronger the ties between the nodes.

Background of social influence Node Strength Nodes with high centrality have higher influence in the network than the nodes with less centrality power. Degree centrality is the number of ties that a node has. In Figure 3, node Ali has the highest degree centrality, because it is the node with the highest number of ties or edges. This means that he is quite active in the network. However, he is not necessarily the most influential person because he is only directly connected within one degree to people in his clique—he has to go through Ahmed to get to other cliques.

Background of social influence Node Strength Betweenness centrality occurs when a node falls in a favored position between two cliques in the network.

Background of social influence Node Strength Closeness centrality measures how quickly a node can access more nodes in a network.

Social Influence structures and models The problem of influence maximization can be expressed as follows: “given a network with influence estimates, how to select an initial set of k users such that they eventually influence the largest number of users in the social network”. This influence problem can be formally stated as follows: given a social graph that is undirected G = (V, E, T ), where V represents the set of users in the network, E is the set of edges in the network, and T is the matrix of time stamps at which the social ties were created.

Social Influence structures and models Definition 1 formally introduces the action propagation between users in graph G.

Social Influence structures and models Definition 2 shows the propagation graph of each action. This leads to a natural notion of a propagation graph, defined next.

Social Influence Models

Social Influence Models Static Influence Models Static influence models are independent of time and used to capture the most influential nodes presently. Therefore, the network size is fixed. One instance of this model is based on Bernoulli distribution.

Social Influence Models Dynamic Influence Models In real life, influence changes over time and may not stay static. For example, users’ opinions could change over time.

Social Influence Models Diffusion Influence Models These models are used when adopting behavior depends on knowing the number of neighbors who adopted the same behavior. Their idea is based on how to find the most influential individuals and target them to advertise a new innovation or a product. These diffusion models can be used to optimize marketing decisions.

Social Influence Models Linear threshold model

Social Influence Models Independent cascade model An independent cascade model starts with an initial set of active nodes A0. This set of individuals should be chosen the generate the maximum influence during the cascade diffusion process. The process occurs in discrete steps as follows: when node u becomes active for the first time in time step t , its provided with one chance to activate each of its currently inactive neighbor v; in that case u is called contagious, which means that it has the ability to affect other nodes.

Social Influence Models Models of Influence based on Users’ Behavior Scholars have studied the problem of building influence from past users’ actions. They focused on the independent cascade model of influence. They formally defined the likelihood maximization problem and then applied Expectation Maximization (EM) algorithm to solve it. Their formulation dose not, however, scale to huge data sets like in social networks. This is due to the fact that in each iteration, EM algorithm must update the influence probability.

Social Influence Models Leskovec et al. studied the influence problem from a different perspective. The main question in their study was: how to select nodes in a network to detect the spread of virus as soon as possible?; this was called outbreak detection. They developed an efficient algorithm based on “lazy-forward” optimization. The algorithm was optimal and 700 times faster than the simple greedy algorithm; but the approach still faces problems related to scalability.

Comparison and implications

Comparison and implications

EXPERIMENTS AND RESULTS To compare the two influence propagation models, we used four methods to assign edges probabilities in the social graph: Jaccard coefficient based on common actions: in this method, we calculate similarity between two nodes based on the common actions they have. Weighted cascade: which is a special case of the independent cascade model. Trivalency (TV): where edge probabilities are selected uniformly at random from the set {0.1, 0.01, 0.001} Uniform (UN): where all edges have the same probability (e.g., p = 0.01)

EXPERIMENTS AND RESULTS

EXPERIMENTS AND RESULTS