Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3589335.3651566acmconferencesArticle/Chapter ViewAbstractPublication PagesthewebconfConference Proceedingsconference-collections
short-paper

Targeted Filter Bubbles Mitigating via Edges Insertion

Published: 13 May 2024 Publication History

Abstract

The emergence of filter bubbles leads to various harms. To mitigate filter bubbles, some recent works select the seeds for different viewpoints to minimize the formation of bubbles under the influence propagation model. Different from these works where the diffusion networks remain unchanged, in this paper, we conduct the first attempt to mitigate filter bubbles via edge insertion. Besides, to be more generalized, we focus on mitigating filter bubbles for the given target node set since the audiences can be different for different scenarios. Specifically, we propose the concept of openness score for each target node, which serves as a metric to assess the likelihood of this node being influenced by multiple viewpoints simultaneously. Given a directed graph G, two seed sets, a positive integer k and a target node set, we aim to find k edges incident to the given seeds such that the total openness score is maximized. We prove the NP-hardness of problem studied. A baseline method is first presented by extending the greedy framework. To handle large graphs efficiently, we develop a sampling-based strategy. A data-dependent approximation method is developed with theoretical guarantees. Experiments over real social networks are conducted to demonstrate the advantages of proposed techniques.

Supplemental Material

MP4 File
Supplemental video

References

[1]
Prithu Banerjee, Wei Chen, and Laks V. S. Lakshmanan. 2023. Mitigating Filter Bubbles Under a Competitive Diffusion Model. In SIGMOD.
[2]
Christian Borgs, Michael Brautbar, Jennifer T. Chayes, and Brendan Lucier. 2014. Maximizing Social Influence in Nearly Optimal Time. In SIAM.
[3]
Vineet Chaoji, Sayan Ranu, Rajeev Rastogi, and Rushi Bhatt. 2012. Recommendations to boost content spread in social networks. In WWW.
[4]
Chen Chen, Qiuyu Zhu, Renjie Sun, Xiaoyang Wang, and Yanping Wu. 2023. Edge Manipulation Approaches for K-Core Minimization: Metrics and Analytics. In TKDE.
[5]
Uriel Feige. 1998. A Threshold of ln n for Approximating Set Cover. In JACM.
[6]
Kiran Garimella, Aristides Gionis, Nikos Parotsidis, and Nikolaj Tatti. 2017. Balancing information exposure in social networks. In NeurIPS.
[7]
David Kempe, Jon M. Kleinberg, and É va Tardos. 2003. Maximizing the spread of influence through a social network. In KDD.
[8]
Wei Lu, Wei Chen, and Laks V. S. Lakshmanan. 2015. From Competition to Complementarity: Comparative Influence Diffusion and Maximization. In VLDB.
[9]
Antonis Matakos, cC igdem Aslay, Esther Galbrun, and Aristides Gionis. 2022. Maximizing the Diversity of Exposure in a Social Network. In TKDE.
[10]
C Thi Nguyen. 2020. Echo chambers and epistemic bubbles. In Episteme.
[11]
Anne Shelley. 2012. Book review of Eli Pariser's The filter bubble: What the Internet is hiding from you. In First Monday.
[12]
Jing Tang, Xueyan Tang, Xiaokui Xiao, and Junsong Yuan. 2018. Online Processing Algorithms for Influence Maximization. In SIGMOD.
[13]
Sijing Tu, cC igdem Aslay, and Aristides Gionis. 2020. Co-exposure Maximization in Online Social Networks. In NeurIPS.
[14]
Xiaoyang Wang, Ying Zhang, Wenjie Zhang, and Xuemin Lin. 2016. Efficient distance-aware influence maximization in geo-social networks. In TKDE.
[15]
Fangsong Xiang, Jinghao Wang, Yanping Wu, Xiaoyang Wang, Chen Chen, and Ying Zhang. 2024. Rumor blocking with pertinence set in large graphs. In WWWJ.
[16]
Liwang Zhu, Qi Bao, and Zhongzhi Zhang. 2021. Minimizing Polarization and Disagreement in Social Networks via Link Recommendation. In NeurIPS.
[17]
Weijie Zhu, Chen Chen, Xiaoyang Wang, and Xuemin Lin. 2018. K-core minimization: An edge manipulation approach. In CIKM.
[18]
Yuqing Zhu, Jing Tang, Xueyan Tang, Sibo Wang, and Andrew Lim. 2023. 2-hop Sampling: Efficient and Effective Influence Estimation. In TKDE. io

Cited By

View all
  • (2024)Mitigate the Damage of Rumor on Susceptible GroupDatabases Theory and Applications10.1007/978-981-96-1242-0_29(389-402)Online publication date: 13-Dec-2024
  • (2024)Keyword-Based Betweenness Centrality Maximization in Attributed GraphsDatabases Theory and Applications10.1007/978-981-96-1242-0_16(209-223)Online publication date: 13-Dec-2024

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WWW '24: Companion Proceedings of the ACM Web Conference 2024
May 2024
1928 pages
ISBN:9798400701726
DOI:10.1145/3589335
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 May 2024

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. filter bubble
  2. influence propagation
  3. social network

Qualifiers

  • Short-paper

Conference

WWW '24
Sponsor:
WWW '24: The ACM Web Conference 2024
May 13 - 17, 2024
Singapore, Singapore

Acceptance Rates

Overall Acceptance Rate 1,899 of 8,196 submissions, 23%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)105
  • Downloads (Last 6 weeks)6
Reflects downloads up to 27 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Mitigate the Damage of Rumor on Susceptible GroupDatabases Theory and Applications10.1007/978-981-96-1242-0_29(389-402)Online publication date: 13-Dec-2024
  • (2024)Keyword-Based Betweenness Centrality Maximization in Attributed GraphsDatabases Theory and Applications10.1007/978-981-96-1242-0_16(209-223)Online publication date: 13-Dec-2024

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media