Abstract
We live in a world of social networks. Our everyday choices are often influenced by social interactions. Word of mouth, meme diffusion on the Internet, and viral marketing are all examples of how social networks can affect our behaviour. In many practical applications, it is of great interest to determine which nodes have the highest influence over the network, i.e., which set of nodes will, indirectly, reach the largest audience when propagating information. These nodes might be, for instance, the target for early adopters of a product, the most influential endorsers in political elections, or the most important investors in financial operations, just to name a few examples. Here, we tackle the NP-hard problem of influence maximization on social networks by means of a Genetic Algorithm. We show that, by using simple genetic operators, it is possible to find in feasible runtime solutions of high-influence that are comparable, and occasionally better, than the solutions found by a number of known heuristics (one of which was previously proven to have the best possible approximation guarantee, in polynomial time, of the optimal solution). The advantages of Genetic Algorithms show, however, in them not requiring any assumptions about the graph underlying the network, and in them obtaining more diverse sets of feasible solutions than current heuristics.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
For any node n, we denote by in-degree(n) the number of edges incoming to n, and by out-degree(n) the number of edges outgoing from n. Unlike some of the related literature, which works with undirected rather than directed graphs, in our algorithms we make the distinction between the two degree counts explicit.
- 2.
This number of repetitions was chosen as a practical compromise between the confidence interval that it affords, and the overall computational complexity of the Genetic Algorithm. With regards to the accuracy of the fitness estimation, 100 simulation repetitions give a 95 % confidence interval for the average in the approximate range of [3, 10] nodes influenced, for all our experiments. Increasing the number of repetitions to 10000 would give a 95 % confidence interval for the average that is \(\le 1\) nodes influenced in all experimental cases, but requires far longer runtimes.
References
Kempe, D., Kleinberg, J., Tardos, É.: Maximizing the spread of influence through a social network. Theory Comput. 11(4), 105–147 (2015)
Richardson, M., Agrawal, R., Domingos, P.: Trust management for the semantic web. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol. 2870, pp. 351–368. Springer, Heidelberg (2003)
Leskovec, J., Krevl, A.: SNAP Datasets: Stanford large network dataset collection, October 2015. http://snap.stanford.edu/data
Goldenberg, J., Libai, B., Muller, E.: Talk of the network: a complex systems look at the underlying process of word-of-mouth. Mark. Lett. 12(3), 211–223 (2001)
Wang, C., Chen, W., Wang, Y.: Scalable influence maximization for independent cascade model in large-scale social networks. Data Min. Knowl. Disc. 25(3), 545–576 (2012)
Chen, W., Wang, Y., Yang, S.: Efficient influence maximization in social networks. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2009, pp. 199–208. ACM, New York (2009)
Jiang, Q., Song, G., Cong, G., Wang, Y., Si, W., Xie, K.: Simulated annealing based influence maximization in social networks. In: Burgard, W., Roth, D. (eds.) AAAI. AAAI Press (2011)
Garret, A.L.: Inspyred: A framework for creating bio-inspired computational intelligence algorithms in Python, October 2015. https://pypi.python.org/pypi/inspyred
Miller, B.L., Goldberg, D.E.: Genetic algorithms, tournament selection, and the effects of noise. Complex Syst. 9, 193–212 (1995)
Bucur, D., Iacca, G., Squillero, G., Tonda, A.: The impact of topology on energy consumption for collection tree protocols: an experimental assessment through evolutionary computation. Appl. Soft Comput. 16, 210–222 (2014)
Bucur, D., Iacca, G., de Boer, P.T.: Characterizing topological bottlenecks for data delivery in CTP using simulation-based stress testing with natural selection. Ad Hoc Netw. 30, 22–45 (2015)
Bucur, D., Iacca, G., Squillero, G., Tonda, A.: Black holes and revelations: using evolutionary algorithms to uncover vulnerabilities in disruption-tolerant networks. In: Mora, A.M., Squillero, G. (eds.) EvoApplications 2015. LNCS, vol. 9028, pp. 29–41. Springer, Switzerland (2015)
Bucur, D., Iacca, G., Gaudesi, M., Squillero, G., Tonda, A.: Optimizing groups of colluding strong attackers in mobile urban communication networks with evolutionary algorithms. Appl. Soft Comput. 40, 416–426 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Bucur, D., Iacca, G. (2016). Influence Maximization in Social Networks with Genetic Algorithms. In: Squillero, G., Burelli, P. (eds) Applications of Evolutionary Computation. EvoApplications 2016. Lecture Notes in Computer Science(), vol 9597. Springer, Cham. https://doi.org/10.1007/978-3-319-31204-0_25
Download citation
DOI: https://doi.org/10.1007/978-3-319-31204-0_25
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-31203-3
Online ISBN: 978-3-319-31204-0
eBook Packages: Computer ScienceComputer Science (R0)