2020
DOI: 10.1007/s10115-020-01461-4
|View full text |Cite
|
Sign up to set email alerts
|

A survey on influence maximization in a social network

Abstract: Given a social network with diffusion probabilities as edge weights and an integer k, which k nodes should be chosen for initial injection of information to maximize influence in the network? This problem is known as Target Set Selection in a social network (TSS Problem) and more popularly, Social Influence Maximization Problem (SIM Problem). This is an active area of research in computational social network analysis domain since one and half decades or so.Due to its practical importance in various domains, su… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
81
0
2

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 177 publications
(83 citation statements)
references
References 144 publications
(159 reference statements)
0
81
0
2
Order By: Relevance
“…where S is the chosen cardinality for the seed set. Several algorithms are available in the related literature to approximately solve this problem [31]. In this section we first recall two wellknown approaches (namely the SelectTopS and the Greedy algorithm); subsequently, we present two novel algorithms to effectively find near-optimal solutions to the influence maximization problem in a computationally efficient fashion.…”
Section: Formulation and Resolution Of The Influence Maximizationmentioning
confidence: 99%
“…where S is the chosen cardinality for the seed set. Several algorithms are available in the related literature to approximately solve this problem [31]. In this section we first recall two wellknown approaches (namely the SelectTopS and the Greedy algorithm); subsequently, we present two novel algorithms to effectively find near-optimal solutions to the influence maximization problem in a computationally efficient fashion.…”
Section: Formulation and Resolution Of The Influence Maximizationmentioning
confidence: 99%
“…Researchers have proposed various types of information diffusion models [2,[36][37][38][39][40]. One of the most widely used diffusion models is the independent cascade model, which has been used in most studies [2,5,37,41,42].…”
Section: Diffusion Modelmentioning
confidence: 99%
“…Thus, the researchers, during years, have been and are seeking manners to develop algorithms that can find nodes of seed set and have appropriate influence spread. These algorithms are categorized as follows [9]:  Approximant algorithms: In this context, approximant algorithms produce high approximant rate and acceptable influence spread, while most of them are not scalable and by growing the size of the network, running time increases severely. Basic Greedy, CELF, CELF++ are among the approximant algorithms.…”
Section: Related Workmentioning
confidence: 99%