• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
LiJin, YueKun, ZhangDehai, LiuWeiyi. Robust Influence Blocking Maximization in Social Networks[J]. Journal of Computer Research and Development, 2016, 53(3): 601-610. DOI: 10.7544/issn1000-1239.2016.20148341
Citation: LiJin, YueKun, ZhangDehai, LiuWeiyi. Robust Influence Blocking Maximization in Social Networks[J]. Journal of Computer Research and Development, 2016, 53(3): 601-610. DOI: 10.7544/issn1000-1239.2016.20148341

Robust Influence Blocking Maximization in Social Networks

More Information
  • Published Date: February 29, 2016
  • Influence blocking maximization is currently a problem of great interest in the research area of social networks. Existing influence blocking methods assume negative influence sources are definitely known or non-adversarial. However, in real applications, it is hard to obtain the accurate information of influence sources. In addition, adversarial spreader may strategically select the seeds to maximize negative spread. In this paper, we aim to tackle the problems of influence blocking maximization with uncertain and strategic negative influence sources respectively. First, in order to increase the efficiency of the algorithms for mining blocking seeds, we discuss approximate estimation of the influence spread of negative seeds under the competitive linear threshold model. Based on the estimation, we propose a blocking seeds mining algorithm under the situation of finite uncertain and negative influence sources to maximize the expected influence blocking utility. In adversarial influence spread situations, one entity strategically attempts to maximize negative influence spread while the other one tries to block the negative propagation of its competing entity as much as possible by selecting a number of seed nodes that could initiate its own influence propagation. We model the interaction as a game and propose a polynomial time approximate algorithm for solving random blocking strategy based on min-max principle to decrease the worst negative influence spread. Finally, we make experiments on real data sets of social networks to verify the feasibility and scalability of the proposed algorithms.
  • Related Articles

    [1]Li Junwei, Liu Quan, Huang Zhigang, Xu Yapeng. A Diversity-Enriched Option-Critic Algorithm with Interest Functions[J]. Journal of Computer Research and Development, 2024, 61(12): 3108-3120. DOI: 10.7544/issn1000-1239.202220970
    [2]Zhang Chun, Zhou Jing. Optimization Algorithm of Association Rule Mining for EMU Operation and Maintenance Efficiency[J]. Journal of Computer Research and Development, 2017, 54(9): 1958-1965. DOI: 10.7544/issn1000-1239.2017.20160498
    [3]Zhang Fenxiang, Chen Huahui, Qian Jiangbo, Dong Yihong. HSSM: A Hierarchical Method for Streaming Submodular Maximization[J]. Journal of Computer Research and Development, 2016, 53(8): 1792-1805. DOI: 10.7544/issn1000-1239.2016.20160140
    [4]Wang Min, Wang Lei, Feng Xiaobing, Cao Baoxiang. An Approximation Algorithm of Betweenness Centrality Based on Vertex Weighted[J]. Journal of Computer Research and Development, 2016, 53(7): 1631-1640. DOI: 10.7544/issn1000-1239.2016.20148355
    [5]Zhang Zhao. Survey of Approximation Algorithm on Virtual Backbone of Wireless Sensor Network[J]. Journal of Computer Research and Development, 2016, 53(1): 15-25. DOI: 10.7544/issn1000-1239.2016.20150657
    [6]Miao Dongjing, Liu Xianmin, Li Jianzhong. An Algorithm on Mining Approximate Functional Dependencies in Probabilistic Database[J]. Journal of Computer Research and Development, 2015, 52(12): 2857-2865. DOI: 10.7544/issn1000-1239.2015.20140685
    [7]Zhong Shan, Liu Quan, Fu Qiming, Zhang Zongzhang, Zhu Fei, Gong Shengrong. A Heuristic Dyna Optimizing Algorithm Using Approximate Model Representation[J]. Journal of Computer Research and Development, 2015, 52(12): 2764-2775. DOI: 10.7544/issn1000-1239.2015.20148160
    [8]Meng Xiangfu, Yan Li, Zhang Wengbo, Ma Zongmin. XML Approximate Query Approach Based on Attribute Units Extension[J]. Journal of Computer Research and Development, 2010, 47(11): 1936-1946.
    [9]Qi Yutao, Liu Fang, and Jiao Licheng. A Pheromone Meme Based Immune Clonal Selection Algorithm for Function Optimization[J]. Journal of Computer Research and Development, 2008, 45(6).
    [10]Yang Hao, Tang Feng, Xie Haibin, Wu Chenggang, and Feng Xiaobing. Library Function Disposing Approach in Binary Translation[J]. Journal of Computer Research and Development, 2006, 43(12): 2174-2179.

Catalog

    Article views (1683) PDF downloads (838) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return