Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3579654.3579748acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacaiConference Proceedingsconference-collections
research-article

Top-k node identification method based on Gaussian plume model

Published: 14 March 2023 Publication History
  • Get Citation Alerts
  • Abstract

    As one of the most commonly used models in the Top-k node recognition task, the greedy model has the advantages of convenience, easy understanding and stable effect. The CELF++ algorithm, as a method of using the greedy strategy, also has the above characteristics. However, since the algorithm uses Monte Carlo simulation to calculate the effect of node influence diffusion, its time overhead is unbearable on large networks. Regarding the above points, this paper introduces a Gaussian plume model commonly used in the field of atmospheric pollution diffusion simulation, and proposes a Gaussian influence diffusion model. On this basis, the CELF++ algorithm is improved, and the Gaussian influence diffusion model is used to replace the traditional Monte Carlo simulation to model the influence diffusion in social networks, and the GPM-CELF++ (Gaussian Plume Model-CELF++) algorithm is proposed. Extensive experimental results on real datasets show that the proposed algorithm has advantages in both propagation effect and running time compared with baseline methods.

    References

    [1]
    Yuchen Li, Ju Fan, Yanhao Wang, and Kian-Lee Tan. 2018. Influence Maximization on Social Graphs: A Survey. IEEE Trans. Knowl. Data Eng. 30, 10 (October 2018), 1852–1872.
    [2]
    Neda Salehi Najaf Abadi and Mohammad Reza Khayyambashi. 2014. Influence maximization in viral marketing with expert and influential leader discovery approach. In 8th International Conference on e-Commerce in Developing Countries: With Focus on e-Trust, IEEE, Mashhad, Iran, 1–8.
    [3]
    Mao Ye, Xingjie Liu, and Wang-Chien Lee. Exploring social influence for recommendation: a generative model approach. 10.
    [4]
    Karishma Sharma, Feng Qian, He Jiang, Natali Ruchansky, Ming Zhang, and Yan Liu. 2019. Combating Fake News: A Survey on Identification and Mitigation Techniques. ACM Trans. Intell. Syst. Technol. 10, 3 (May 2019), 1–42.
    [5]
    Pedro Domingos and Matt Richardson. 2001. Mining the network value of customers. In Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining  - KDD ’01, ACM Press, San Francisco, California, 57–66.
    [6]
    Mehdi Azaouzi, Wassim Mnasri, and Lotfi Ben Romdhane. 2021. New trends in influence maximization models. Computer Science Review 40, (May 2021), 100393.
    [7]
    Jon Kleinberg and Eva Tardos. Maximizing the Spread of Influence through a Social Network. 10.
    [8]
    Jure Leskovec, Andreas Krause, Carlos Guestrin, Christos Faloutsos, Jeanne VanBriesen, and Natalie Glance. 2007. Cost-effective outbreak detection in networks. In Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining  - KDD ’07, ACM Press, San Jose, California, USA, 420.
    [9]
    Amit Goyal, Wei Lu, and Laks V.S. Lakshmanan. 2011. CELF++: optimizing the greedy algorithm for influence maximization in social networks. In Proceedings of the 20th international conference companion on World wide web - WWW ’11, ACM Press, Hyderabad, India, 47.
    [10]
    Sirag Erkol, Dario Mazzilli, and Filippo Radicchi. 2020. Influence maximization on temporal networks. Phys. Rev. E 102, 4 (October 2020), 042307.
    [11]
    Ahmad Zareie, Amir Sheikhahmadi, and Mahdi Jalili. 2020. Identification of influential users in social network using gray wolf optimization algorithm. Expert Systems with Applications 142, (March 2020), 112971.
    [12]
    Jalil Jabari Lotf, Mohammad Abdollahi Azgomi, and Mohammad Reza Ebrahimi Dishabi. 2022. An improved influence maximization method for social networks based on genetic algorithm. Physica A: Statistical Mechanics and its Applications 586, (January 2022), 126480.
    [13]
    Jianxin Tang, Ruisheng Zhang, Ping Wang, Zhili Zhao, Li Fan, and Xin Liu. 2020. A discrete shuffled frog-leaping algorithm to identify influential nodes for influence maximization in social networks. Knowledge-Based Systems 187, (January 2020), 104833.
    [14]
    Sanjay Kumar, Lakshay Singhla, Kshitij Jindal, Khyati Grover, and B. S. Panda. 2021. IM-ELPR: Influence maximization in social networks using label propagation based community structure. Appl Intell 51, 11 (November 2021), 7647–7665.
    [15]
    Zhixiao Wang, Chengcheng Sun, Jingke Xi, and Xiaocui Li. 2021. Influence maximization in social graphs based on community structure and node coverage gain. Future Generation Computer Systems 118, (May 2021), 327–338.
    [16]
    Zannetti Paolo (ED). 2013 Air pollution modeling: theories, computational methods and available software. Vol 7. Springer Science & Business Media. NY.
    [17]
    Ashis Talukder, Md. Golam Rabiul Alam, Nguyen H. Tran, Dusit Niyato, Gwan Hoon Park, and Choong Seon Hong. 2019. Threshold Estimation Models for Linear Threshold-Based Influential User Mining in Social Networks. IEEE Access 7, (2019), 105441–105461.
    [18]
    Aditya Grover and Jure Leskovec. 2016. node2vec: Scalable Feature Learning for Networks. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM, San Francisco California USA, 855–864.
    [19]
    Jing Tang, Xueyan Tang, and Junsong Yuan. 2018. An efficient and effective hop-based approach for influence maximization in social networks. Soc. Netw. Anal. Min. 8, 1 (December 2018), 10.
    [20]
    Maryam Adineh and Mostafa Nouri-Baygi. 2019. High Quality Degree Based Heuristics for the Influence Maximization Problem. Retrieved July 24, 2022 from http://arxiv.org/abs/1904.12164.

    Index Terms

    1. Top-k node identification method based on Gaussian plume model
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image ACM Other conferences
          ACAI '22: Proceedings of the 2022 5th International Conference on Algorithms, Computing and Artificial Intelligence
          December 2022
          770 pages
          ISBN:9781450398336
          DOI:10.1145/3579654
          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          Published: 14 March 2023

          Permissions

          Request permissions for this article.

          Check for updates

          Qualifiers

          • Research-article
          • Research
          • Refereed limited

          Funding Sources

          • Chengdu philosophy and social science planning project
          • The Fundamental Research Funds for The Central Universities of Southwest Minzu University
          • Sichuan Science and Technology Funding Project
          • National Social Science Foundation Major Tendering Project

          Conference

          ACAI 2022

          Acceptance Rates

          Overall Acceptance Rate 173 of 395 submissions, 44%

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • 0
            Total Citations
          • 14
            Total Downloads
          • Downloads (Last 12 months)12
          • Downloads (Last 6 weeks)1
          Reflects downloads up to

          Other Metrics

          Citations

          View Options

          Get Access

          Login options

          View options

          PDF

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format.

          HTML Format

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media