Online Influence Maximization with Semi-Bandit Feedback under Corruptions

Xiaotong Cheng,Behzad Nourani-Koliji,Setareh Maghsudi
2024-09-30
Abstract:In this work, we investigate the online influence maximization in social networks. Most prior research studies on online influence maximization assume that the nodes are fully cooperative and act according to their stochastically generated influence probabilities on others. In contrast, we study the online influence maximization problem in the presence of some corrupted nodes whose damaging effects diffuse throughout the network. We propose a novel bandit algorithm, CW-IMLinUCB, which robustly learns and finds the optimal seed set in the presence of corrupted users. Theoretical analyses establish that the regret performance of our proposed algorithm is better than the state-of-the-art online influence maximization algorithms. Extensive empirical evaluations on synthetic and real-world datasets also show the superior performance of our proposed algorithm.
Social and Information Networks
What problem does this paper attempt to address?
This paper attempts to solve the problem of how to achieve Online Influence Maximization (OIM) in social networks in the presence of malicious nodes. Specifically, the paper focuses on: 1. **Limitations of existing research**: Most previous studies assume that all users are fully cooperative and influence others according to their randomly generated influence probabilities. However, in the real world, there may be some malicious nodes in social networks, and these nodes will interfere with information dissemination in unpredictable ways, thus affecting the performance of the entire system. 2. **Unique challenges of the problem**: When malicious nodes exist, traditional online influence maximization algorithms may become ineffective because these algorithms cannot effectively deal with the uncertainty and noise caused by malicious nodes. Therefore, a new algorithm needs to be developed to handle this complex situation. 3. **Solution**: To solve the above problems, the authors propose a new Confidence Weighted Influence Maximization Linear UCB (CW - IMLinUCB) algorithm with weighted regression. This algorithm can robustly learn and find the optimal seed set and maintain good performance even in the presence of malicious users in the network. 4. **Theoretical and empirical analysis**: Through theoretical analysis, the authors prove that the proposed CW - IMLinUCB algorithm has better regret performance in the face of malicious behavior. In addition, through extensive experiments on synthetic and real - world datasets, the superiority of this algorithm over existing methods is verified. In summary, this paper aims to fill the research gap in the online influence maximization problem in the presence of malicious nodes, proposes a novel and effective solution, and proves its effectiveness through strict theoretical analysis and empirical research. ### Formula summary 1. **Activation probability formula**: - The activation probability of normal users is: \[ p(e) = x_e^T \theta \] - The activation probability of malicious users is: \[ p_t(e) = x_e^T \theta + c_{u,t} \] 2. **Weighted ridge regression estimation**: - The formula for estimating the unknown feature vector $\theta$ is: \[ \hat{\theta}_t = \arg\min_{\theta \in \mathbb{R}^d} \left( \|\theta\|_2^2 + \sum_{\tau = 1}^t \sum_{e \in \tilde{E}_\tau} \omega_{e,\tau} \sigma^{-2} (\theta^T x_e - y_\tau(e))^2 \right) \] - Its closed - form solution is: \[ \hat{\theta}_t = \sigma^{-2} M_t^{-1} b_t \] - Where: \[ M_t = I + \sigma^{-2} \sum_{\tau = 1}^t \sum_{e \in \tilde{E}_\tau} \omega_{e,\tau} x_e x_e^T \] \[ b_t = \sum_{\tau = 1}^t \sum_{e \in \tilde{E}_\tau} \omega_{e,\tau} x_e y_\tau(e) \] 3. **Regret bound formula**: - Under the assumption conditions, the $\alpha\gamma$-scaled regret bound is: \[ R_{\alpha\gamma}(T) \leq O(d B E^* \sqrt{T \log(nT)} + B