Abstract
Rumor Blocking, an important optimization problem in social network, has been extensively studied in the literature. Given social network \(G=(V,E)\) and rumor seed set A, the goal is asking for k protector seeds that protect the largest expected number of social individuals by truth. However, the source of rumor is always uncertain, rather than being predicted or being known in advance in the real situations, while rumor spreads like wildfire on the Internet.
This paper presents General Rumor Blocking with unpredicted rumor seed set (randomized A) and various personal profits while being protected (weights of nodes in V). We first show that the objective function of this problem is non-decreasing and submodular, and thus a \((1-1/e)\) approximate solution can be returned by greedy approach. We then propose an efficient random algorithm R-GRB which returns a (\(1-1/e-\varepsilon \)) approximate solution with at least \(1-n^{-\ell }\) probability. We show that it runs in \(O\left( m(n-r)(k\log (n-r) + \ell \log n)/\varepsilon ^{2}\right) \) expected time, where \(m=|E|\), \(n=|V|\), \(r=|A|\) and k is the number of protector seeds.
This work is supported by NSFC (No. 11271341 and No. 11201439).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Borgs, C., Brautbar, M., Chayes, J., Lucier, B.: Maximizing social influence in nearly optimal time. In: The Proceeding of the 25th SODA, SIAM, pp. 946–957 (2014)
Borodin, A., Filmus, Y., Oren, J.: Threshold models for competitive influence in social networks. In: Saberi, A. (ed.) WINE 2010. LNCS, vol. 6484, pp. 539–550. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-17572-5_48
Budak, C., Agrawal, D., El Abbadi, A.: Limiting the spread of misinformation in social networks. In: The Proceeding of the 20th WWW, pp. 665–674. ACM (2011)
Chung, F.R.K., Lu, L.: Concentration inequalities and martingale inequalities: a survey. Internet Math. 3(1), 79–127 (2006)
Fan, L., Wu, W., Zhai, X., Xing, K., Lee, W., Du, D.Z.: Maximizing rumor containment in social networks with constrained time. Soc. Netw. Anal. Min. 4(1), 214 (2014)
Fan, L., Wu, W., Xing, K., Lee, W.: Precautionary rumor containment via trustworthy people in social networks. Discret. Math. Algorithms Appl. 8(01), 1650004 (2016)
He, X., Song, G., Chen, W., Jiang, Q.: Influence blocking maximization in social networks under the competitive linear threshold model. In: The Proceeding of the 2012 SIAM International Conference on Data Mining, Society for Industrial and Applied Mathematics, pp. 463–474 (2012)
Kempe, D., Kleinberg, J., Tardos, E.: Maximizing the spread of influence through a social network. In: The Proceeding of the 9th SIGKDD, pp. 137–146. ACM (2003)
Moore, E.F.: The shortest path through a maze. In: The Proceeding of International Symposium Switching Theory, pp. 285–292 (1959)
Nemhauser, L.G., Wolsey, A.L., Fisher, L.M.: An analysis of approximations for maximizing submodular set functional. Math. Program. 14(1), 265–294 (1978)
Nguyen, H.T., Thai, M.T., Dinh, T.N.: Stop-and-stare: optimal sampling algorithms for viral marketing in billion-scale networks. In: The Proceedings of the 2016 International Conference on Management of Data, pp. 695–710. ACM (2016)
Nguyen, H.T., Tsai, J., Jiang, A., Bowring, E., Maheswaran, R., Tambe, M.: Security games on social networks. In: The Proceeding of the 2012 AAAI fall symposium series (2012)
Pathak, N., Banerjee, A., Srivastava, J.: A generalized linear threshold model for multiple cascades. In: The Proceeding of the ICDM, pp. 965–970 (2010)
Song, C., Hsu, W., Lee, M.L.: Targeted influence maximization in social networks. In: The Proceeding of the 25th ACM International on Conference on Information and Knowledge Management, pp. 1683–1692 (2016)
Tang, Y., Shi, Y., Xiao, X.: Influence maximization in near-linear time: a martingale approach. In: The Proceeding of the 2015 ACM SIGMOD International Conference on Management of Data, pp. 1539–1554 (2015)
Tong, G., et al.: An efficient randomized algorithm for rumor blocking in online social networks. arXiv preprint arXiv:1701.02368 (2017)
Vaziran, V.V.: Approximation Algorithms. Springer, Heidelberg (2002). https://doi.org/10.1007/978-3-662-04565-7
Williams, D.: Probability with Martingales. Cambridge University Press, Cambridge (1991)
Zhang, H., Zhang, H., Li, X., Thai, M.T.: Limiting the spread of misinformation while effectively raising awareness in social networks. In: Thai, M.T., Nguyen, N.P., Shen, H. (eds.) CSoNet 2015. LNCS, vol. 9197, pp. 35–47. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-21786-4_4
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendix
Appendix
Proof of Lemma 2. First, we show the monotonicity. For any node set B and any protector seed \(u \notin B\), we have
Since \(x(B, R_{i}) = 1\) leads to \(x(B\cup \{u\}) =1\), \(f_{\mathcal {R}}(B\cup \{u\}) - f_{\mathcal {R}}(B) \ge 0\). It implies the monotonicity.
Then, we show the submodularity. For any pair of \(B_{1}, B_{2}\) with \(B_{1} \subseteq B_{2}\) and \(u\notin B_{2}\), we have
Observe that if \(x(B_{2} \cup \{u\}, R_{i}) - x(B_{2} ,R_{i}) = 1\), \(B_{2} \cap R_{i} = \emptyset \) and \(u \in R_{i}\). Then \(B_{1} \cap R_{i} = \emptyset \) and \(u\in R_{i}\), implying that \(x(B_{1}\cup \{u\}) -x(B_{1},R_{i}) =1\). Thus,
The submodularity follows. \(\square \)
Proof of Lemma 4. We first show that the sequence \(Z_{1}, \ldots , Z_{\rho }\) is a martingale. Since \(Z_{i} = \sum _{j=1}^{i}(w(\overline{A_{j}}) \cdot x(B, R_{j})) - q)\), we have \(\mathbb {E}[Z_{i}] = 0\) and \(\mathbb {E}[|Z_{i}|] < +\infty \). Based on the process of generating random RP sets, we can observe that the value of \(x(B, R_{i})\) is independent of \(x(B,R_{1}), \ldots , x(B, R_{i-1})\). Therefore,
implying that \(Z_{1}, \cdots , Z_{\rho }\) is a martingale.
Then we find the value of a and b in the conditions of Martingale’s Property respect with \(Z_{1},\cdots , Z_{\rho }\). Recall that \(w(\overline{A_{i}}) = \sum _{u\in V\setminus A_{i}} w_{u}\) and \(w_{u} \in [\frac{1}{n-r}, 1]\) for any u. Since
for each \(j\in \{2,\ldots ,i\}\), we can set \(a=n-r\). Based on the properties of variance and \(Z_{\rho } = \sum _{j=1}^{\rho } (w(\overline{A_{j}}) \cdot x(B, R_{j}) - q)\), we can set \(b = (n-r) \cdot \rho q\). It is because
where the second inequality from the end holds from the facts that \(w(\overline{A_{i}}) \le n-r\) and \(x^{2}(B,R_{j}) = x(B,R_{j})\). Applying Martingale’s Property, one can see that inequalities (1) and (2) hold. \(\square \)
Proof of Lemma 5. Let \(\tilde{B}\) be the solution of Algorithm 2 (Node Selection). Let \(B^{*}\) be the optimal solution. Based on the greedy approach in Algorithm 2, we have
In the sequel we show that if \(\rho \ge \rho _{1}\), \(\Pr [f_{\mathcal {R}}(B^{*}) \le (1-\varepsilon _{1}) \cdot OPT ] \le \delta _{1}\).
The result means that \(\Pr [f_{\mathcal {R}} (B^{*})\ge (1-\varepsilon _{1})\cdot OPT ] \ge 1- \delta _{1}\), and thus \(f_{\mathcal {R}}(\tilde{B}) \ge (1-1/e)(1-\varepsilon _{1})\cdot OPT \) holds with at least \(1-\delta _{1}\) probability when \(\rho \ge \rho _{1}\), implying the lemma.
By Lemmas 3 and 4, we can verify that if \(\rho > \rho _{1}\), the following inequality holds.
Consider the sampling result \(\mathcal {R}\) of R-NRB algorithm. First, for any \(R_{i} \in \mathcal {R}\), we denote by \(x(B^{*}, R_{i})\) a random variable such that \(x(B^{*}, R_{i}) =1\) if \(B^{*} \cap R_{i} \ne \emptyset \) and \(x^(B^{*}, R_{i}) = 0\) otherwise. Based on Lemma 4, the sequence of \(Z_{i} = \sum _{j=1}^{i}\left( w(\overline{A_{i}}) \cdot x(B^{*}, R_{i})-q^{*}\right) \), \(i \in \{1, \ldots , \rho \}\) is a martingale. Let \(q^{*}= \mathbb {E}[f_{\mathcal {R}}(B^{*})]\). By Lemma 3, \(q^{*}= \sigma (B^{*}) = OPT \). We have
By the inequality (2) of Lemma 4 and \(\rho \ge \rho _{1}\),
Thus the inequality 6 holds. This completes the proof of the lemma. \(\square \)
Proof of Lemma 6
Proof
Let \(\mathcal {R} = \{R_{1}, \ldots , R_{\rho }\}\) be an input of Algorithm 2 and let |R| be the number of nodes in a random RP set R. Recall that Algorithm 2 is a greedy process which returns a protector seed set \(\tilde{B}\) by maximizing the marginal utility of \(f_{\mathcal {R}}(\cdot )\). Due to
it is clear that Algorithm 2 is equivalent to the greedy approach for a maximum weighted coverage problem. We have known that the time complexity of greedy approach for the maximum weighted coverage is \(O(\sum _{R\in \mathcal {R}} |R|)\) in [17]. Thus, Algorithm 2 runs in \(O(\sum _{R\in \mathcal {R}} |R|)\) time. \(\square \)
Proof of Claim 1. We prove Claim 1 by showing that if OPT\(<\xi _{i}\),
for any size-k set B.
Based on Lemma 4, the sequence \(Z_{d} = \sum _{j=1}^{d}\left( w(\overline{A_{j}}) \cdot x(B, R_{j})\right) \), \(d\in \{1,\ldots ,\rho _{i}\}\) is a martingale. Denote \(q= \mathbb {E}[f_{\mathcal {R}}(B)]\). It is clear that
where \(\zeta =(1+\varepsilon _{0}) \cdot \xi _{i} /q - 1\) and the last inequality holds from the inequality (1) of Lemma 4. By Lemma 3, \(q= \sigma (B) \le OPT < \xi _{i}\), we have \(\zeta = (1+\varepsilon _{0}) \cdot \xi _{i}/q -1> \varepsilon _{0} \cdot \xi _{i} / q > \varepsilon _{0}\). Then the right side of above inequality
Since \(\rho \ge \mu _{0} / \xi _{i}\), the right side of above inequality
Thus the Claim 1 is proved. \(\square \)
Proof of Claim 2. We prove Claim 2 by showing that if OPT \(\ge \xi _{i}\),
for any size-k set B. Based on Lemma 4, the sequence \(Z_{d} = \sum _{j=1}^{d}(w(\overline{A_{j}}) \cdot x(B, R_{j}))\), \(d \in \{1, \ldots ,\rho \}\) is a martingale. Recall that \(f_{\mathcal {R}}(B) = \frac{1}{\rho }\sum _{R_{i}\in \mathcal {R}} \left( w(\overline{A_{i}}) \cdot x(B, R_{i})\right) \) and denote \(q= \mathbb {E}[f_{\mathcal {R}}(B)] < OPT \). It is clear that
By inequality (1) of Lemma 4 and \(q < OPT \),
By \(\rho \ge \mu _{0} / \xi _{i}\) and \(OPT \ge \xi _{i}\), the right side of above inequality
Thus, the Claim 2 holds. \(\square \)
Proof of Lemma 7. Denote by \(\hat{v}\) a random node is subjected to some probability distribution \(\mathcal {V}\) with \(\Pr ^{*}[\hat{v}]\). Let \(\Pr ^{*}[\hat{v}]= \frac{d(\hat{v})}{2m}\), where \(d(\hat{v})\) is the in-degree of \(\hat{v}\) in G and m is the number of edges in G. For any random node \(\hat{v}\), denote by \(p_{\hat{v}}\) the probability that \(\hat{v}\) is covered by a random RP set. Let \(\varphi (\hat{v}, R)\) be a function as follows:
Recall that for any protector seed set B, \(x(B, R)=1\) if \(B \cap R \ne \emptyset \) and \(x(B, R)=0\) otherwise. \(\mathcal {P}\) is a collection consisting of all possible RP sets. Then we obtain that
where the last inequality holds from the fact that \(\varphi (\hat{v}, R) =1\) if and only if \(x(\hat{v}, R) =1\). Recall the Definition 1 (Random RP Set), assume that the sampled rumor seed set is A, then the target v is selected with \(\Pr [v] = \frac{w_{v}}{w(\overline{A})}\). Since \(w(\overline{A_{i}})=\sum _{u\in V\setminus A_{i}} w_{u} \ge (n-r) \cdot \frac{1}{n-r}=1\), the right side of above inequality
where the first and second equalities can be derived from the proof of Lemma 3. Then the last inequality holds by \(\sum _{\hat{v} \in V} d(\hat{v}) = m\) and \(\sigma (\{\hat{v}\}) \le \) OPT, Therefore the lemma holds. \(\square \)
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Fang, Q. et al. (2018). General Rumor Blocking: An Efficient Random Algorithm with Martingale Approach. In: Tang, S., Du, DZ., Woodruff, D., Butenko, S. (eds) Algorithmic Aspects in Information and Management. AAIM 2018. Lecture Notes in Computer Science(), vol 11343. Springer, Cham. https://doi.org/10.1007/978-3-030-04618-7_14
Download citation
DOI: https://doi.org/10.1007/978-3-030-04618-7_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-04617-0
Online ISBN: 978-3-030-04618-7
eBook Packages: Computer ScienceComputer Science (R0)