簡易檢索 / 詳目顯示

研究生: 林奎勝
Kuei-Sheng Lin
論文名稱: 藉由預期負面傳播解決影響力阻擋最大化問題
Solving the Influence Blocking Maximization Problem by the Expected Negative Influence
指導教授: 戴碧如
Bi-Ru Dai
口試委員: 黃俊隆
Jiun-Long Huang
戴碧如
Bi-Ru Dai
沈之涯
Chih-Ya Shen
陳怡伶
Yi-Ling Chen
學位類別: 碩士
Master
系所名稱: 電資學院 - 資訊工程系
Department of Computer Science and Information Engineering
論文出版年: 2019
畢業學年度: 107
語文別: 英文
論文頁數: 62
中文關鍵詞: 影響力阻擋最大化社群媒體多競爭者擴散模型謠言阻擋
外文關鍵詞: influence blocking maximization, social network, competitive influence diffusion, rumor blocking
相關次數: 點閱:213下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報

近年來,因為社群媒體的成長,使得資訊得以快速的傳遞。然而,社群媒體 的發展也使得負面消息,例如謠言或是錯誤的知識等,被迅速的傳播。找出一個 好方法來阻止謠言的擴散變得刻不容緩。影響力阻擋最大化問題(IBM) 目標即為找出正種子來阻擋負面消息傳播,然而現存的方法無法在阻擋點質量以及計算時 間中取得有效的權衡。因此,我們提出了BENI 演算法以及新的圖架構ENIG 來有效的解決影響力阻擋最 化問題,並於真實資料集中驗證BENI 演算法可以有效的阻擋負面消息傳遞。


With the growing of social networks, information can be propagated fast in social networks. However, social networks also leads bad information such as rumor and misinformations can spread faster simultaneously. Influence Blocking Maximization (IBM) problem is studied to find positive seeds to block the spread of negative information as much as possible. Existing solutions can not effectively trade-off between seed quality and time cost. In this work, we propose BENI algorithm and devise a new graph structure ENIG to solve IBM problem. As verified by experiments on real world datasets,BENI algorithm is able to block negative information with high efficiency and effectiveness.

指導教授推薦書...................................i 論文口試委員審定書................................ii Abstract ........................................iii 論文摘要.......................................iv 致謝..........................................v Contents ........................................vi List of Figures .....................................viii List of Tables .....................................x List of Algorithms ...................................xi 1 Introduction ....................................1 2 Related Work ...................................3 2.1 Influence Maximization Problem ......................3 2.2 Competitive Influence Maximization Problem ...............4 2.3 Influence Blocking Maximization Problem .................4 3 Preliminaries ....................................6 3.1 Competitive Diffusion Models .......................6 3.2 Problem Definition .............................7 4 Proposed Algorithm ................................10 4.1 Construct ENIG ..............................11 4.2 Compute Blocking Score ..........................15 4.3 Initialize ENIG ..............................18 4.4 Update ENIG ...............................19 5 Experiment ....................................23 5.1 Experimental Settings ............................23 5.2 Results of experiments ...........................26 5.2.1 The experiments of BENI .....................26 5.2.2 Compare with other algorithms ..................30 6 Conclusions and Future Works ..........................48 6.1 Conclusions .................................48 6.2 Future Works ................................48 References .......................................49

[1] D. Kempe, J. Kleinberg, and É. Tardos, “Maximizing the spread of influence through a social network,” in Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 137–146, ACM, 2003.

[2] J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. VanBriesen, and N. Glance, “Cost-effective outbreak detection in networks,” in Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 420–429, ACM, 2007.

[3] Y. Tang, X. Xiao, and Y. Shi, “Influence maximization: Near-optimal time complexity meets practical efficiency,” in Proceedings of the 2014 ACM SIGMOD international conference on Management of data, pp. 75–86, ACM, 2014.

[4] C. Wang, W. Chen, and Y. Wang, “Scalable influence maximization for independent cascade model in large-scale social networks,” Data Mining and Knowledge Discovery, vol. 25, no. 3, pp. 545–576, 2012.

[5] K. Jung, W. Heo, and W. Chen, “Irie: Scalable and robust influence maximization in social networks,” in 2012 IEEE 12th International Conference on Data Mining, pp. 918–923, IEEE, 2012.

[6] L. Sun, W. Huang, P. S. Yu, and W. Chen, “Multi-round influence maximization,” in Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 2249–2258, ACM, 2018.

[7] C. Budak, D. Agrawal, and A. El Abbadi, “Limiting the spread of misinformation in social networks,” in Proceedings of the 20th international conference on World wide web, pp. 665–674, ACM, 2011.

[8] X. He, G. Song, W. Chen, and Q. Jiang, “Influence blocking maximization in social networks under the competitive linear threshold model,” in Proceedings of the 2012 siam international conference on data mining, pp. 463–474, SIAM, 2012.

[9] P. Wu and L. Pan, “Scalable influence blocking maximization in social networks under competitive independent cascade models,” Computer Networks, vol. 123, pp. 38–50, 2017.

[10] J. Lv, B. Yang, Z. Yang, and W. Zhang, “A community-based algorithm for influence blocking maximization in social networks,” Cluster Computing, pp. 1–16, 2017.

[11] W. Zhu, W. Yang, S. Xuan, D. Man, W. Wang, and X. Du, “Location-aware influence blocking maximization in social networks,” IEEE Access, vol. 6, pp. 61462–61477, 2018.

[12] X. Wang, K. Deng, J. Li, J. X. Yu, C. S. Jensen, and X. Yang, “Targeted influence minimization in social networks,” in Pacific-Asia Conference on Knowledge Discovery and Data Mining, pp. 689–700, Springer, 2018.

[13] C. Yao, Y. Zhang, X. Zhang, K. Bian, and L. Song, “Competitive influence blocking in online social networks: A case study on wechat,” in 2018 24th Asia Pacific Conference on Communications (APCC), pp. 251–256, IEEE, 2018.

[14] K. S. Lin and B. R. Dai, “Biog: an effective and efficient algorithm for influence blocking maximization in social networks,” in International Conference on Data Mining and Big Data, pp. 000–000, Springer, 2019.

[15] W. Zhu, W. Yang, S. Xuan, D. Man, W. Wang, X. Du, and M. Guizani, “Location-based seeds selection for influence blocking maximization in social networks,” IEEE Access, 2019.

[16] C. Song, W. Hsu, and M. L. Lee, “Temporal influence blocking: minimizing the effect of misinformation in social networks,” in 2017 IEEE 33rd International Conference on Data Engineering (ICDE), pp. 847–858, IEEE, 2017.

[17] J. Qiu, J. Tang, H. Ma, Y. Dong, K. Wang, and J. Tang, “Deepinf: Social influence prediction with deep learning,” in Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 2110–2119, ACM, 2018.

[18] T. Carnes, C. Nagarajan, S. M. Wild, and A. Van Zuylen, “Maximizing influence in a competitive social network: a follower’s perspective,” in Proceedings of the ninth international conference on Electronic commerce, pp. 351–360, ACM, 2007.

[19] R. Guimera, L. Danon, A. Diaz-Guilera, F. Giralt, and A. Arenas, “Self-similar community structure in a network of human interactions,” Physical review `E, vol. 68, no. 6, p. 065103, 2003.

無法下載圖示 全文公開日期 2024/08/15 (校內網路)
全文公開日期 本全文未授權公開 (校外網路)
全文公開日期 本全文未授權公開 (國家圖書館:臺灣博碩士論文系統)
QR CODE