Target Users' Activation Probability Maximization with Different Seed Set Constraints in Social Networks

Ruidong Yan,Hongwei Du,Yi Li,Wenping Chen,Yongcai Wang,Yuqing Zhu,Deying Li
DOI: https://doi.org/10.1016/j.tcs.2020.06.008
IF: 1.002
2020-01-01
Theoretical Computer Science
Abstract:Influence Maximization (IM) over the online social networks have been widely explored in recent years, which selects a seed set from nodes in the network using a limited budget such that the expected number of nodes influenced by the seed set is maximized. However, how to activate a considered set of targeting users T, e.g., selling a product to a specific target group, is a more practical problem. To address this problem, we respectively propose the Target Users' Activation Probability Maximization with Constraint (TUAPM-WC) problem and the Target Users' Activation Probability Maximization without Constraint (TUAPM-WOC) problem, i.e., to select a seed set S with/without size constraints such that the activation probabilities of the target users in T are maximized. Considering that the influence will decay during information propagation, we propose a novel and practical Influence Decay Model (IDM) as the information diffusion model. Based on the IDM, we show that the TUAPM-WC and the TUAPM-WOC problems are NP-hard. We also prove that the objective functions of TUAPM-WC and TUAPM-WOC problems are monotone non-decreasing and submodular. On one hand, we employ a Double Greedy Algorithm (DGA) to guarantee a (1/3)-approximation ratio for TUAPM-WOC problem when vertical bar S vertical bar is unconstrained. On the other hand, we propose a series of algorithms to solve the TUAPM-WC when vertical bar S vertical bar <= b, where b is a positive integer. More specifically, we provide a (1 - 1/e)-approximation Basic Greedy Algorithm (BGA). Furthermore, a speed-up Scalable Algorithm (SA) is proposed for online large social networks. Finally, we run our algorithms by simulations on synthetic and real-life social networks to evaluate the effectiveness and efficiency of the proposed algorithms. Experimental results validate our algorithms' superior to the comparison algorithms. (C) 2020 Elsevier B.V. All rights reserved.
What problem does this paper attempt to address?