On Bharathi-Kempe-Salek Conjecture about Influence Maximization Ding-Zhu Du University of Texas at Dallas.

Slides:



Advertisements
Similar presentations
University of Texas at Dallas
Advertisements

Approximation Algorithms
LEARNING INFLUENCE PROBABILITIES IN SOCIAL NETWORKS Amit Goyal Francesco Bonchi Laks V. S. Lakshmanan University of British Columbia Yahoo! Research University.
Minimizing Seed Set for Viral Marketing Cheng Long & Raymond Chi-Wing Wong Presented by: Cheng Long 20-August-2011.
Spread of Influence through a Social Network Adapted from :
Maximizing the Spread of Influence through a Social Network
Cost-effective Outbreak Detection in Networks Jure Leskovec, Andreas Krause, Carlos Guestrin, Christos Faloutsos, Jeanne VanBriesen, Natalie Glance.
Maximizing the Spread of Influence through a Social Network
Guest lecture II: Amos Fiat’s Social Networks class Edith Cohen TAU, December 2014.
Least Cost Rumor Blocking in Social networks Lidan Fan Computer Science Department the University of Texas at Dallas.
Ding-Zhu Du │ University of Texas at Dallas │ Lecture 7 Rumor Blocking 0.
CS774. Markov Random Field : Theory and Application Lecture 17 Kyomin Jung KAIST Nov
Competitive Viral Marketing Based on: S. Bharathi et al. Competitive Influence Maximization in Social Networks, WINE C. Budak et al. Limiting the.
Nodes, Ties and Influence
Maximizing the Spread of Influence through a Social Network By David Kempe, Jon Kleinberg, Eva Tardos Report by Joe Abrams.
Based on “Cascading Behavior in Networks: Algorithmic and Economic Issues” in Algorithmic Game Theory (Jon Kleinberg, 2007) and Ch.16 and 19 of Networks,
Epidemics in Social Networks
CSC 2300 Data Structures & Algorithms April 17, 2007 Chapter 9. Graph Algorithms.
Matroids, Secretary Problems, and Online Mechanisms Nicole Immorlica, Microsoft Research Joint work with Robert Kleinberg and Moshe Babaioff.
The community-search problem and how to plan a successful cocktail party Mauro SozioAris Gionis Max Planck Institute, Germany Yahoo! Research, Barcelona.
Distributed Combinatorial Optimization
Influence Maximization
Maximizing the Spread of Influence through a Social Network
Maximizing Product Adoption in Social Networks
Models of Influence in Online Social Networks
Personalized Influence Maximization on Social Networks
1 1 Stanford University 2 MPI for Biological Cybernetics 3 California Institute of Technology Inferring Networks of Diffusion and Influence Manuel Gomez.
1 1 Stanford University 2 MPI for Biological Cybernetics 3 California Institute of Technology Inferring Networks of Diffusion and Influence Manuel Gomez.
Influence Maximization in Dynamic Social Networks Honglei Zhuang, Yihan Sun, Jie Tang, Jialin Zhang, Xiaoming Sun.
December 7-10, 2013, Dallas, Texas
Chapter 2 Greedy Strategy I. Independent System Ding-Zhu Du.
Maximizing the Spread of Influence through a Social Network David Kempe, Jon Kleinberg, Eva Tardos Cornell University KDD 2003.
Maximizing the Spread of Influence through a Social Network Authors: David Kempe, Jon Kleinberg, É va Tardos KDD 2003.
Problem Setting :Influence Maximization A new product is available in the market. Whom to give free samples to maximize the purchase of the product ? 1.
Online Social Networks and Media
Lecture 3-1 Independent Cascade Weili Wu Ding-Zhu Du University of Texas at Dallas.
1 Latency-Bounded Minimum Influential Node Selection in Social Networks Incheol Shin
Algorithms For Solving History Sensitive Cascade in Diffusion Networks Research Proposal Georgi Smilyanov, Maksim Tsikhanovich Advisor Dr Yu Zhang Trinity.
Lecture 5-1 Positive Influence Dominating Set Ding-Zhu Du Univ of Texas at Dallas.
Lecture 2-1 Submodular Maximization Weili Wu Ding-Zhu Du University of Texas at Dallas.
1 1 Stanford University 2 MPI for Biological Cybernetics 3 California Institute of Technology Inferring Networks of Diffusion and Influence Manuel Gomez.
Lecture 2-3 Deterministic Difussion Weili Wu Ding-Zhu Du University of Texas at Dallas.
Approximation Algorithms based on linear programming.
Biao Wang 1, Ge Chen 1, Luoyi Fu 1, Li Song 1, Xinbing Wang 1, Xue Liu 2 1 Shanghai Jiao Tong University 2 McGill University
1/54 Rumor Source Detection: monitor placement Ding-Zhu Du Department of Computer Science University of Texas at Dallas.
Inferring Networks of Diffusion and Influence
Seed Selection.
Nanyang Technological University
Independent Cascade Model and Linear Threshold Model
Greedy & Heuristic algorithms in Influence Maximization
Influence Maximization
Friend Recommendation with a Target User in Social Networking Services
Independent Cascade Model and Linear Threshold Model
Influence Maximization
Maximizing the Spread of Influence through a Social Network
The Importance of Communities for Learning to Influence
Coverage Approximation Algorithms
Detect rumor sources 2019/1/3
Lecture 11 Overview Self-Reducibility.
Bharathi-Kempe-Salek Conjecture
General Threshold and Cascade Models
Kempe-Kleinberg-Tardos Conjecture A simple proof
Influence Maximization
Viral Marketing over Social Networks
Independent Cascade Model and Linear Threshold Model
And Competitive Influence
Lecture 2-6 Complexity for Computing Influence Spread
Multiple Products.
Noncooperative Rumor Blocking
Guess Free Maximization of Submodular and Linear Sums
Presentation transcript:

On Bharathi-Kempe-Salek Conjecture about Influence Maximization Ding-Zhu Du University of Texas at Dallas

Outline Influence Max BKS-conjecture 2

What is Social Network? Wikipedia Definition: Social Structure Nodes: Social actors (individuals or organizations) Links: Social relations 3

What is Social Influence? Social influence occurs when one's opinions, emotions, or behaviors are affected by others, intentionally or unintentionally. [1] – Informational social influence: to accept information from another; – Normative social influence: to conform to the positive expectations of others. [1] 4

The trend effect that Kate, Duchess of Cambridge has on others, from cosmetic surgery for brides, to sales of coral-colored jeans.” “Kate Middleton effect Kate Middleton effect 5

According to Newsweek, "The Kate Effect may be worth £1 billion to the UK fashion industry." Tony DiMasso, L. K. Bennett’s US president, stated in 2012, "...when she does wear something, it always seems to go on a waiting list." Hike in Sales of Special Products 6

Influential persons often have many friends. Kate is one of the persons that have many friends in this social network. For more Kates, it’s not as easy as you might think! How to Find Kate? 7

Given a digraph and k>0, Find k seeds (Kates) to maximize the number of influenced persons (possibly in many steps). Influence Maximization 8

9 Theorem Proof

Modularity of Influence 10

Theorem 11

Diffusion Model Deterministic diffusion model Independent Cascade (IC) Linear Threshold (LT) 12

Independent Cascade (IC) Model When node v becomes active, it has a single chance of activating each currently inactive neighbor w. The activation attempt succeeds with probability p vw. The deterministic model is a special case of IC model. In this case, p vw =1 for all (v,w).

Example v w Inactive Node Active Node Newly active node Successful attempt Unsuccessful attempt Stop! U X Y

IC Model Each person can tell only one person at each moment. However, each person may hear from many persons. 15

Linear Threshold (LT) Model A node v has random threshold ~ U[0,1] A node v is influenced by each neighbor w according to a weight b w,v such that A node v becomes active when at least (weighted) fraction of its neighbors are active

Example Inactive Node Active Node Threshold Active neighbors v w Stop! U X Y

Influence Maximization Problem Influence spread of node set S: σ(S) – expected number of active nodes at the end of diffusion process, if set S is the initial active set. Problem Definition (by Kempe et al., 2003): (Influence Maximization). Given a directed and edge-weighted social graph G = (V,E, p), a diffusion model m, and an integer k ≤ |V |, find a set S ⊆ V, |S| = k, such that the expected influence spread σ m (S) is maximum.

Known Results Bad news: NP-hard optimization problem for both IC and LT models. Good news: σ m (S) is monotone and submodular. We can use Greedy algorithm! Theorem: The resulting set S activates at least (1-1/e) (>63%) of the number of nodes that any size-k set could activate.

Outline Influence Max BKS-Conjecture 20

Bharathi-Kempe-Salek Conjecture 21

Diffusion Model Deterministic diffusion model -polynomial- time. Linear Threshold (LT) – polynomial-time. Independent Cascade (IC) – PTAS 22

Deterministic Diffusion Model  When a node becomes active (infected or protected), it activates all of its currently inactive (not infected and not protected) neighbors.  The activation attempts succeed with a probability 1. 23

Deterministic Model both 1 and 6 are source nodes. Step 1: 1--2,3; 6--2,4.. 12/19/201524

Step 2: Example 12/19/201525

A Property of Optimal Solution 26

27 Naïve Dynamic Programming

28

Running Time 29 It is not a polynomial-time!

Counting 30

Virtual Nodes 31 Change arborescence to binary arborescence At most n virtual nodes can be introduced.

Weight 32

Naïve Dynamic Programming 33

Linear Threshold (LT) Model A node v has random threshold ~ U[0,1] A node v is influenced by each neighbor w according to a weight b w,v such that A node v becomes active when at least (weighted) fraction of its neighbors are active

Example Inactive Node Active Node Threshold Active neighbors v w Stop! U X Y

A property 36

@C model Influence can be made only through private talk of person to p.erson 37

38 Important understanding on IC

Equivalent Networks 39

40 Additional Condition

Equivalent Networks 41

A Property 42

43

44

At seed v 45

At non-seed v 46

At non-seed v 47

At non-seed v 48

At seed v 49

Independent Cascade (IC) Model When node v becomes active, it has a single chance of activating each currently inactive neighbor w. The activation attempt succeeds with probability p vw. The deterministic model is a special case of IC model. In this case, p vw =1 for all (v,w).

Example v w Inactive Node Active Node Newly active node Successful attempt Unsuccessful attempt Stop! U X Y

IC Model Each person can tell only one person at each moment. However, each person may hear from many persons. 52

53 Important understanding on IC

At non-seed v 54

Another Dynamic Programming 55

Open Problem IC model Parameterized algorithms with treewidth as parameter in IC model. 56

Bharathi-Kempe-Salek Conjecture 57 Open!!!

Polynomial-time Algorithm 58 Primal or incremental method duality Primal-dual Dynamic program Divide and conquer greedy Local ratio

THANK YOU!