2020
DOI: 10.1007/s13278-020-00680-5
|View full text |Cite
|
Sign up to set email alerts
|

A numerical evaluation of the accuracy of influence maximization algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 38 publications
0
3
0
Order By: Relevance
“…We investigate two adversarial objectives of a socialbot: influencing people while evading socialbot detection. While the first one can be modeled as an IM task on graph networks, traditional IM algorithms-e.g., [3,25,27], assume that the number of seed nodes is relatively small and all nodes are equally acquirable, all of which are not applicable in the socialbot context as previously described. There have been also a few works-e.g., [33,49], that utilizes RL to IM task.…”
Section: Adversarial Socialbot Learningmentioning
confidence: 99%
See 1 more Smart Citation
“…We investigate two adversarial objectives of a socialbot: influencing people while evading socialbot detection. While the first one can be modeled as an IM task on graph networks, traditional IM algorithms-e.g., [3,25,27], assume that the number of seed nodes is relatively small and all nodes are equally acquirable, all of which are not applicable in the socialbot context as previously described. There have been also a few works-e.g., [33,49], that utilizes RL to IM task.…”
Section: Adversarial Socialbot Learningmentioning
confidence: 99%
“…Simultaneously, it also needs to systematically constrain its online behaviors such that it will not easily expose itself to socialbot detectors. Although the IM problem has been widely studied by several works [3,24,25,27], they only focus on maximizing the network influence given a fixed and static budget # of seed nodes (that is relatively small) and they assume that every node is equally acquirable. However, these assumptions are not practical in our context.…”
Section: Introductionmentioning
confidence: 99%
“…In the same paper, the authors proposed a greedy heuristic providing a good guaranteed solution to the problem. Since then, a great number heuristics and approximations have been proposed to tackle this problem (Kempe et al 2005;Chen et al 2010;Jung et al 2012;Liu et al 2014;Srivastava et al 2015;Kingi et al 2020;Tang et al 2018;Hajdu et al 2018). The survey paper of Li et al gives an excellent summary of the field (Li et al 2018).…”
Section: Introductionmentioning
confidence: 99%