研究生: |
林奎勝 Kuei-Sheng Lin |
---|---|
論文名稱: |
藉由預期負面傳播解決影響力阻擋最大化問題 Solving the Influence Blocking Maximization Problem by the Expected Negative Influence |
指導教授: |
戴碧如
Bi-Ru Dai |
口試委員: |
黃俊隆
Jiun-Long Huang 戴碧如 Bi-Ru Dai 沈之涯 Chih-Ya Shen 陳怡伶 Yi-Ling Chen |
學位類別: |
碩士 Master |
系所名稱: |
電資學院 - 資訊工程系 Department of Computer Science and Information Engineering |
論文出版年: | 2019 |
畢業學年度: | 107 |
語文別: | 英文 |
論文頁數: | 62 |
中文關鍵詞: | 影響力阻擋最大化 、社群媒體 、多競爭者擴散模型 、謠言阻擋 |
外文關鍵詞: | influence blocking maximization, social network, competitive influence diffusion, rumor blocking |
相關次數: | 點閱:213 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
近年來,因為社群媒體的成長,使得資訊得以快速的傳遞。然而,社群媒體 的發展也使得負面消息,例如謠言或是錯誤的知識等,被迅速的傳播。找出一個 好方法來阻止謠言的擴散變得刻不容緩。影響力阻擋最大化問題(IBM) 目標即為找出正種子來阻擋負面消息傳播,然而現存的方法無法在阻擋點質量以及計算時 間中取得有效的權衡。因此,我們提出了BENI 演算法以及新的圖架構ENIG 來有效的解決影響力阻擋最 化問題,並於真實資料集中驗證BENI 演算法可以有效的阻擋負面消息傳遞。
With the growing of social networks, information can be propagated fast in social networks. However, social networks also leads bad information such as rumor and misinformations can spread faster simultaneously. Influence Blocking Maximization (IBM) problem is studied to find positive seeds to block the spread of negative information as much as possible. Existing solutions can not effectively trade-off between seed quality and time cost. In this work, we propose BENI algorithm and devise a new graph structure ENIG to solve IBM problem. As verified by experiments on real world datasets,BENI algorithm is able to block negative information with high efficiency and effectiveness.
[1] D. Kempe, J. Kleinberg, and É. Tardos, “Maximizing the spread of influence through a social network,” in Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 137–146, ACM, 2003.
[2] J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. VanBriesen, and N. Glance, “Cost-effective outbreak detection in networks,” in Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 420–429, ACM, 2007.
[3] Y. Tang, X. Xiao, and Y. Shi, “Influence maximization: Near-optimal time complexity meets practical efficiency,” in Proceedings of the 2014 ACM SIGMOD international conference on Management of data, pp. 75–86, ACM, 2014.
[4] C. Wang, W. Chen, and Y. Wang, “Scalable influence maximization for independent cascade model in large-scale social networks,” Data Mining and Knowledge Discovery, vol. 25, no. 3, pp. 545–576, 2012.
[5] K. Jung, W. Heo, and W. Chen, “Irie: Scalable and robust influence maximization in social networks,” in 2012 IEEE 12th International Conference on Data Mining, pp. 918–923, IEEE, 2012.
[6] L. Sun, W. Huang, P. S. Yu, and W. Chen, “Multi-round influence maximization,” in Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 2249–2258, ACM, 2018.
[7] C. Budak, D. Agrawal, and A. El Abbadi, “Limiting the spread of misinformation in social networks,” in Proceedings of the 20th international conference on World wide web, pp. 665–674, ACM, 2011.
[8] X. He, G. Song, W. Chen, and Q. Jiang, “Influence blocking maximization in social networks under the competitive linear threshold model,” in Proceedings of the 2012 siam international conference on data mining, pp. 463–474, SIAM, 2012.
[9] P. Wu and L. Pan, “Scalable influence blocking maximization in social networks under competitive independent cascade models,” Computer Networks, vol. 123, pp. 38–50, 2017.
[10] J. Lv, B. Yang, Z. Yang, and W. Zhang, “A community-based algorithm for influence blocking maximization in social networks,” Cluster Computing, pp. 1–16, 2017.
[11] W. Zhu, W. Yang, S. Xuan, D. Man, W. Wang, and X. Du, “Location-aware influence blocking maximization in social networks,” IEEE Access, vol. 6, pp. 61462–61477, 2018.
[12] X. Wang, K. Deng, J. Li, J. X. Yu, C. S. Jensen, and X. Yang, “Targeted influence minimization in social networks,” in Pacific-Asia Conference on Knowledge Discovery and Data Mining, pp. 689–700, Springer, 2018.
[13] C. Yao, Y. Zhang, X. Zhang, K. Bian, and L. Song, “Competitive influence blocking in online social networks: A case study on wechat,” in 2018 24th Asia Pacific Conference on Communications (APCC), pp. 251–256, IEEE, 2018.
[14] K. S. Lin and B. R. Dai, “Biog: an effective and efficient algorithm for influence blocking maximization in social networks,” in International Conference on Data Mining and Big Data, pp. 000–000, Springer, 2019.
[15] W. Zhu, W. Yang, S. Xuan, D. Man, W. Wang, X. Du, and M. Guizani, “Location-based seeds selection for influence blocking maximization in social networks,” IEEE Access, 2019.
[16] C. Song, W. Hsu, and M. L. Lee, “Temporal influence blocking: minimizing the effect of misinformation in social networks,” in 2017 IEEE 33rd International Conference on Data Engineering (ICDE), pp. 847–858, IEEE, 2017.
[17] J. Qiu, J. Tang, H. Ma, Y. Dong, K. Wang, and J. Tang, “Deepinf: Social influence prediction with deep learning,” in Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 2110–2119, ACM, 2018.
[18] T. Carnes, C. Nagarajan, S. M. Wild, and A. Van Zuylen, “Maximizing influence in a competitive social network: a follower’s perspective,” in Proceedings of the ninth international conference on Electronic commerce, pp. 351–360, ACM, 2007.
[19] R. Guimera, L. Danon, A. Diaz-Guilera, F. Giralt, and A. Arenas, “Self-similar community structure in a network of human interactions,” Physical review `E, vol. 68, no. 6, p. 065103, 2003.