Generic placeholder image

Recent Advances in Computer Science and Communications

Editor-in-Chief

ISSN (Print): 2666-2558
ISSN (Online): 2666-2566

Research Article

Online Behavior Balancing Model for Influence Maximization in Twitter

Author(s): Sakshi Agarwal* and Shikha Mehta

Volume 15, Issue 8, 2022

Published on: 08 December, 2020

Page: [1059 - 1073] Pages: 15

DOI: 10.2174/2666255813666201208122616

Price: $65

Abstract

Background: Social influence estimation is an important aspect of viral marketing. The majority of the influence estimation models for online social networks are either based on Independent Cascade (IC) or Linear Threshold (LT) models. These models are based on some hypothesis: (1) process of influence is irreversible; (2) classification of user’s status is binary, i.e., either influenced or non-influenced; (3) process of influence is either single person’s dominance or collective dominance but not both at the same time. However, these assumptions are not always valid in the real world, as human behavior is unpredictable.

Objective: To develop a generalized model to handle the primary assumptions of the existing influence estimation models.

Methods: This paper proposes a Behavior Balancing (BB) Model, which is a hybrid of IC and LT models and counters the underlying assumptions of the contemporary models.

Results: The efficacy of the proposed model to deal with various scenarios is evaluated over six different twitter election integrity datasets. Results depict that BB model is able to handle the stochastic behavior of the user with up to 35% improved accuracy in influence estimation as compared to the contemporary counterparts.

Conclusion: The BB model employs the activity or interaction information of the user over the social network platform in the estimation of diffusion and allows any user to alter their opinion at any time without compromising the accuracy of the predictions.

Keywords: Diffusion Model, Hybrid model, Independent Cascade, Influence estimation, Influence Maximization, Linear Threshold, Social Network Analysis.

Graphical Abstract

[1]
"Statista - The Statistics Portal for Market Data, Market Research and Market Studies", https://www.statista.com
[2]
W. Chen, C. Wang, and Y. Wang, "Scalable influence maximization for prevalent viral marketing in large-scale social networks", Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, 2010, pp. 1029-1038.
[http://dx.doi.org/10.1145/1835804.1835934]
[3]
David Kempe, and Jon Kleinberg, "Maximizing the Spread of Influence through a Social Network", Theory OF Computing, vol. 11, no. 4, pp. 105-147, 2015.
[4]
S.P. Borgatti, "Identifying sets of key players in a social network", Comput. Math. Organ. Theory, vol. 12, no. 1, pp. 21-34, 2006.
[http://dx.doi.org/10.1007/s10588-006-7084-x]
[5]
J.T. Khim, V. Jog, and P-L. Loh, "Computing and maximizing influence in linear threshold and triggering models", Adv. Neural Inf. Process. Syst., vol. 12, pp. 4538-4546, 2016.
[6]
O. Ben-Zwi, D. Hermelin, D. Lokshtanov, and I. Newman, "Treewidth governs the complexity of target set selection", Discrete Optim., vol. 8, no. 1, pp. 87-96, 2011.
[http://dx.doi.org/10.1016/j.disopt.2010.09.007]
[7]
S. Raghavan, and Rui Zhang, "Weighted target set selection on social networks", The Robert H. smith school of business and institute for systems research, University of Maryland Maryland, USA, Tech. Rep., 2015.
[8]
B. Ryan, and N.C. Gross, "The diffusion of hybrid seed corn in two Iowa communities", Rural Sociol., vol. 8, no. 1, p. 15, 1943.
[9]
S. Agarwal, and S. Mehta, "Multi-perspective Elicitation of Influential Parameters and Measures in Social Network", International Journal of Innovative Technology and Exploring Engineering, vol. 8, no. 8, pp. 2560-2571, 2019.
[10]
P. Domingos, and M. Richardson, "Mining the network value of customers", Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining, 2001, pp. 57-66.
[http://dx.doi.org/10.1145/502512.502525]
[11]
C. Zhou, P. Zhang, J. Guo, X. Zhu, and L. Guo, "Ublf: An upper bound based approach to discover influential nodes in social networks", 2013 IEEE 13th International Conference on Data Mining, 2013, pp. 907-916.
[http://dx.doi.org/10.1109/ICDM.2013.55]
[12]
W. Chen, Y. Wang, and S. Yang, "Efficient influence maximization in social networks", Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, 2009, pp. 199-208.
[http://dx.doi.org/10.1145/1557019.1557047]
[13]
C.C. Aggarwal, A. Khan, and X. Yan, "On flow authority discovery in social networks", Proceedings of the 2011 SIAM International Conference on Data Mining, 2011, pp. 522-533.
[http://dx.doi.org/10.1137/1.9781611972818.45]
[14]
M. Fischetti, M. Kahr, M. Leitner, M. Monaci, and M. Ruthmair, "Least cost influence propagation in (social) networks", Math. Program., vol. 170, no. 1, pp. 293-325, 2018.
[http://dx.doi.org/10.1007/s10107-018-1288-y]
[15]
Z. Zhang, W. Zhao, J. Yang, C. Paris, and S. Nepal, "Learning Influence Probabilities and Modelling Influence Diffusion in Twitter", Companion Proceedings of The 2019 World Wide Web Conference, 2019, pp. 1087-1094.
[http://dx.doi.org/10.1145/3308560.3316701]
[16]
Hao-Hsiang Wu, Comput. Optim. Appl., vol. 69, no. 3, pp. 563-595, 2018.
[http://dx.doi.org/10.1007/s10589-017-9958-x]
[17]
L. Yang, Z. Li, and A. Giua, "Influence minimization in linear threshold networks", Automatica, vol. 100, pp. 10-16, 2019.
[http://dx.doi.org/10.1016/j.automatica.2018.10.053]
[18]
Bhawna Saxena, and Vikas Saxena, "Hurst exponent based approach for Influence Maximization in Social Networks", Journal of King Saud University-Computer and Information Sciences, 2019.
[http://dx.doi.org/10.1016/j.jksuci.2019.12.010]
[19]
S.S. Singh, A. Kumar, K. Singh, and B. Biswas, "C2IM: Community based context-aware influence maximization in social networks", Physica A, vol. 514, pp. 796-818, 2019.
[http://dx.doi.org/10.1016/j.physa.2018.09.142]
[20]
A. Kuhnle, M.A. Alim, X. Li, H. Zhang, and M.T. Thai, "Multiplex influence maximization in online social networks with heterogeneous diffusion models", IEEE Transactions on Computational Social Systems, vol. 5, no. 2, pp. 418-429, 2018.
[http://dx.doi.org/10.1109/TCSS.2018.2813262]
[21]
S. Agarwal, and S. Mehta, "Effective influence estimation in twitter using temporal, profile, structural and interaction characteristics", Inf. Process. Manage., vol. 57, no. 6, 2020.
[http://dx.doi.org/10.1016/j.ipm.2020.102321]
[22]
M. Kimura, K. Saito, and R. Nakano, "Extracting influential nodes for information diffusion on a social network", AAAI, vol. 7, pp. 1371-1376, 2007.
[http://dx.doi.org/10.1007/s10618-009-0150-5]
[23]
D. Gunnec, "Integrating social network effects in product design and diffusion", Diss, 2012.
[24]
J. Zhu, Y. Liu, and X. Yin, "A new structure-hole-based algorithm for influence maximization in large online social networks", IEEE Access, vol. 5, pp. 23405-23412, 2017.
[http://dx.doi.org/10.1109/ACCESS.2017.2758353]
[25]
S. Agarwal, and S. Mehta, "GA with k-Medoid Approach for Optimal Seed Selection to Maximize Social Influence", International Conference on Innovative Computing and Communications, 2020, pp. 97-106.
[http://dx.doi.org/10.1007/978-981-15-1286-5_9]
[26]
J. Tang, J. Sun, C. Wang, and Z. Yang, "Social influence analysis in large-scale networks", Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, 2009, pp. 807-816.
[27]
S. Agarwal, and S. Mehta, "Social Influence Maximization Using Genetic Algorithm with Dynamic Probabilities", 2018 Eleventh International Conference on Contemporary Computing (IC3), 2018, pp. 1-6.
[http://dx.doi.org/10.1109/IC3.2018.8530626]
[28]
D. Science, "6 Easy Steps to Learn Naive Bayes Algorithm (with code in Python)", Analytics Vidhya.
[29]
I. Rish, "An empirical study of the naive Bayes classifier", In: IJCAI 2001 workshop on empirical methods in artificial intelligence, vol. 3. 2001, no. 22, pp. 41-46.
[30]
About.twitter.com, "Elections integrity", https://about.twitter.com/en_us/values/elections-integrity.html#data

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy