×

Fuzzy sign-aware diffusion models for influence maximization in signed social networks. (English) Zbl 1536.91265

Summary: The diffusion models in the influence maximization problem are a trending topic in many companies’ viral marketing to raise their business promotion. The majority of existing diffusion models have focused only on trust relationships, and a few models have considered distrust relationships. Nevertheless, the latter models lack appropriate theoretical support to cover social influences resulting from different user-relationship types and still do not provide proper predictions. In this study, a fuzzy-based approach is first introduced to model the influence propagation for different user-relationship types. Then, four novel fuzzy sign-aware diffusion models named FSC-SB, FSC-N, FST-SB, and FST-N are proposed by the introduced fuzzy-based approach in two categories: cascade and threshold-based models. In the proposed models, the user-relationship type is determined by a fuzzy expert system in which a natural multi-trust level relationship is applied instead of a commonly used crisp relationship. Moreover, new rules and equations are defined to determine a user’s state by information received from its active neighbors. The performance of proposed models was compared with some state-of-the-art models conducted by two real-world networks, Bitcoin OTC and Bitcoin Alpha. The experimental results showed that the proposed models enhance the prediction accuracy and make effective decisions in viral marketing.

MSC:

91D30 Social networks; opinion dynamics
91B86 Mathematical economics and fuzziness
90B60 Marketing, advertising

Software:

REV2
Full Text: DOI

References:

[1] S. Ahmed, C. Ezeife, Discovering influential nodes from trust network, in: Proceedings of the 28th annual acm symposium on applied computing, 2013, pp. 121-128.
[2] Alshahrani, M.; Fuxi, Z.; Sameh, A.; Mekouar, S.; Huang, S., Efficient Algorithms based on Centrality Measures for Identification of Top-K Influential Users in Social Networks, Inf. Sci., 527, 88-107 (2020)
[3] Badiee, A.; Ghazanfari, M., Development of a monopoly pricing model for diffusion maximization in fuzzy weighted social networks with negative externalities of heterogeneous nodes using a case study, Neural Comput. & Applic., 31, 6287-6301 (2019)
[4] W. Chen, A. Collins, R. Cummings, T. Ke, Z. Liu, D. Rincon, X. Sun, Y. Wang, W. Wei, Y. Yuan, Influence maximization in social networks when negative opinions may emerge and propagate, in: Proceedings of the 2011 siam international conference on data mining, SIAM, 2011, pp. 379-390.
[5] Chu, J.; Wang, Y.; Liu, X.; Liu, Y., Social network community analysis based large-scale group decision making approach with incomplete fuzzy preference relations, Information Fusion, 60, 98-120 (2020)
[6] De Souza, R.; Figueiredo, D. R.; A.d. A. Rocha, A. Ziviani, Efficient network seeding under variable node cost and limited budget for social networks, Inf. Sci., 514, 369-384 (2020)
[7] P. Domingos, M. Richardson, Mining the network value of customers, in: Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining, 2001, pp. 57-66.
[8] Giráldez-Cru, J.; Chica, M.; Cordón, O.; Herrera, F., Modeling agent-based consumers decision-making with 2-tuple fuzzy linguistic perceptions, Int. J. Intell. Syst., 35, 283-299 (2020)
[9] Girdhar, N.; Minz, S.; Bharadwaj, K. K., Link prediction in signed social networks based on fuzzy computational model of trust and distrust, Soft. Comput., 23, 12123-12138 (2019)
[10] A. Goyal, F. Bonchi, L.V. Lakshmanan, Learning influence probabilities in social networks, in: Proceedings of the third ACM international conference on Web search and data mining, 2010, pp. 241-250.
[11] R. Guha, R. Kumar, P. Raghavan, A. Tomkins, Propagation of trust and distrust, in: Proceedings of the 13th international conference on World Wide Web, 2004, pp. 403-412.
[12] Hosseini-Pozveh, M.; Zamanifar, K.; Naghsh-Nilchi, A. R.; Dolog, P., Maximizing the spread of positive influence in signed social networks, Intell. Data Anal., 20, 199-218 (2016)
[13] Hosseini-Pozveh, M.; Zamanifar, K.; Naghsh-Nilchi, A. R., Assessing information diffusion models for influence maximization in signed social networks, Expert Syst. Appl., 119, 476-490 (2019)
[14] Ju, W.; Chen, L.; Li, B.; Chen, Y.; Sun, X., Node deletion-based algorithm for blocking maximizing on negative influence from uncertain sources, Knowl.-Based Syst., 231, Article 107451 pp. (2021)
[15] D. Kempe, J. Kleinberg, É. Tardos, Maximizing the spread of influence through a social network, in: Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, 2003, pp. 137-146. · Zbl 1337.91069
[16] Kempe, D.; Kleinberg, J.; Tardos, É., Influential nodes in a diffusion model for social networks, (International Colloquium on Automata, Languages, and Programming (2005), Springer), 1127-1138 · Zbl 1084.91053
[17] Kimura, M.; Saito, K., Tractable models for information diffusion in social networks, (European conference on principles of data mining and knowledge discovery (2006), Springer), 259-271
[18] Kostić, S. M.; Simić, M. I.; Kostić, M. V., Social Network Analysis and Churn Prediction in Telecommunications Using Graph Theory, Entropy, 22, 753 (2020)
[19] Kumar, S.; Spezzano, F.; Subrahmanian, V.; Faloutsos, C., Edge weight prediction in weighted signed networks, (in: 2016 IEEE 16th International Conference on Data Mining (ICDM) (2016), IEEE), 221-230
[20] S. Kumar, B. Hooi, D. Makhija, M. Kumar, C. Faloutsos, V. Subrahmanian, Rev2: Fraudulent user prediction in rating platforms, in: Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining, 2018, pp. 333-341.
[21] Langari, R. K.; Sardar, S.; Amin Mousavi, S. A.; Radfar, R., Combined fuzzy clustering and firefly algorithm for privacy preserving in social networks, Expert Syst. Appl., 141, 112968 (2020)
[22] J. Leskovec, D. Huttenlocher, J. Kleinberg, Signed networks in social media, in: Proceedings of the SIGCHI conference on human factors in computing systems, 2010, pp. 1361-1370.
[23] Li, D.; Xu, Z.-M.; Chakraborty, N.; Gupta, A.; Sycara, K.; Li, S.; Gómez, S., Polarity related influence maximization in signed social networks, PLoS One, 9, 7, e102199 (2014)
[24] Li, L.; Liu, Y.; Zhou, Q.; Yang, W.; Yuan, J., Targeted influence maximization under a multifactor-based information propagation model, Inf. Sci., 519, 124-140 (2020)
[25] Liang, W.; Shen, C.; Li, X.; Nishide, R.; Piumarta, I.; Takada, H., Influence Maximization in Signed Social Networks With Opinion Formation, IEEE Access, 7, 68837-68852 (2019)
[26] Lin, X.; Jiao, Q.; Wang, L., Competitive diffusion in signed social networks: A game-theoretic perspective, Automatica, 112, Article 108656 pp. (2020) · Zbl 1430.91068
[27] Liu, B.; Li, X.; Wang, H.; Fang, Q.; Dong, J.; Wu, W., Profit maximization problem with coupons in social networks, Theor. Comput. Sci., 803, 22-35 (2020) · Zbl 1443.91244
[28] Liu, W.; Chen, X.; Jeon, B.; Chen, L.; Chen, B., Influence maximization on signed networks under independent cascade model, Appl. Intell., 49, 912-928 (2019)
[29] Mohamadi-Baghmolaei, R.; Mozafari, N.; Hamzeh, A., Trust based latency aware influence maximization in social networks, Eng. Appl. Artif. Intel., 41, 195-206 (2015)
[30] More, J. S.; Lingam, C., A gradient-based methodology for optimizing time for influence diffusion in social networks, Soc. Netw. Anal. Min., 9, 5 (2019)
[31] Nadimi-Shahraki, M. H.; Adami-Dehkordi, M., K-indicators Method for Community Detection in Social Networks, Int. J. Advance Soft Compu. Appl, 8, 137-159 (2016)
[32] Nadimi, M. H.; Mosakhani, M., A more accurate clustering method by using co-author social networks for author name disambiguation, Journal of Computing and Security, 1, 307-317 (2014)
[33] Narayanam, R.; Narahari, Y., A shapley value-based approach to discover influential nodes in social networks, IEEE Trans. Autom. Sci. Eng., 8, 1, 130-147 (2011)
[34] Olivares, R.; Muñoz, F.; Riquelme, F., A multi-objective linear threshold influence spread model solved by swarm intelligence-based methods, Knowl.-Based Syst., 212, 106623 (2021)
[35] Pastor-Satorras, R.; Vespignani, A., Epidemic spreading in scale-free networks, Phys. Rev. Lett., 86, 14, 3200-3203 (2001)
[36] Richardson, M.; Domingos, P., Mining knowledge-sharing sites for viral marketing, in, (Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining (2002)), 61-70
[37] Robles, J. F.; Chica, M.; Cordon, O., Evolutionary multiobjective optimization to target social network influentials in viral marketing, Expert Syst. Appl., 147, Article 113183 pp. (2020)
[38] Son, J.; Kim, S. B., Content-based filtering for recommendation systems using multiattribute networks, Expert Syst. Appl., 89, 404-412 (2017)
[39] Tong, G.; Wang, R.; Dong, Z., On Multi-Cascade Influence Maximization: Model, Hardness and Algorithmic Framework, IEEE Transactions on Network Science and Engineering, 8, 2, 1600-1613 (2021)
[40] Varshney, D.; Kumar, S.; Gupta, V., Modeling information diffusion in social networks using latent topic information, (International Conference on Intelligent Computing (2014), Springer), 137-148
[41] Varshney, D.; Kumar, S.; Gupta, V., Predicting information diffusion probabilities in social networks: A Bayesian networks based approach, Knowl.-Based Syst., 133, 66-76 (2017)
[42] Wang, F.; Wang, G.; Xie, D., Maximizing the spread of positive influence under LT-MLA model, in, Asia-Pacific Services Computing Conference, Springer, 450-463 (2016)
[43] Wang, Y.; Zhang, Y.; Yang, F.; Li, D.; Sun, X.; Ma, J., Time-sensitive positive influence maximization in signed social networks, Physica A, 584, 126353 (2021)
[44] West, R.; Paskov, H. S.; Leskovec, J.; Potts, C., Exploiting social network structure for person-to-person sentiment analysis, Transactions of the Association for, Comput. Linguist., 2, 297-310 (2014)
[45] Yang, L.; Li, Z.; Giua, A., Containment of rumor spread in complex social networks, Inf. Sci., 506, 113-130 (2020)
[46] Zadeh, L. A., Fuzzy sets, Inf. Control, 8, 3, 338-353 (1965) · Zbl 0139.24606
[47] Zareie, A.; Sheikhahmadi, A.; Jalili, M., Identification of influential users in social networks based on users’ interest, Inf. Sci., 493, 217-231 (2019) · Zbl 1451.91158
[48] Zhang, J.; Philip, S. Y., Information Diffusion, Broad Learning Through Fusions, 315-349 (2019), Springer
[49] Zhang, J.; Philip, S. Y., Viral Marketing, Broad Learning Through Fusions, 351-384 (2019), Springer
[50] Zheng, W.; Pan, H.; Sun, C., A friendship-based altruistic incentive knowledge diffusion model in social networks, Inf. Sci., 491, 138-150 (2019)
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.