2019
DOI: 10.1016/j.physa.2019.04.202
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and effective influence maximization in large-scale social networks via two frameworks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 29 publications
0
3
0
Order By: Relevance
“…In general, both IVI and CELF++ seed selection methods performed poorly with the large, national‐scale Sustainable Rivers Program network under the LT model, and with the small, regional‐scale Red River network under the IC model. Because these heuristic estimates of the influence of each node are designed to be used on large‐scale networks, they aim to provide a result in a reasonable amount of time at the sacrifice of a sub‐optimal solution (Arora et al, 2017; Goyal et al, 2011; Yuan et al, 2019). Our results suggest a brute‐force MC simulation approach identified the most influential seed nodes that resulted in the highest adoption outcomes more effectively than IVI and CELF++ that require additional computational time.…”
Section: Discussionmentioning
confidence: 99%
“…In general, both IVI and CELF++ seed selection methods performed poorly with the large, national‐scale Sustainable Rivers Program network under the LT model, and with the small, regional‐scale Red River network under the IC model. Because these heuristic estimates of the influence of each node are designed to be used on large‐scale networks, they aim to provide a result in a reasonable amount of time at the sacrifice of a sub‐optimal solution (Arora et al, 2017; Goyal et al, 2011; Yuan et al, 2019). Our results suggest a brute‐force MC simulation approach identified the most influential seed nodes that resulted in the highest adoption outcomes more effectively than IVI and CELF++ that require additional computational time.…”
Section: Discussionmentioning
confidence: 99%
“…Some typical literature is as follows: Pallis ( 12 ) deleted k edges from the original network to diffuse rumors as little as possible, and explained which edge should be deleted depended on the eigenvalues of the network adjacency matrix. Yuan et al ( 13 ) proposed a fine-grained heuristic algorithm to solve the rumor propagation minimization problem. The experiment showed that the heuristics based on betweenness and out-degree were orders of magnitude faster than the greedy algorithm in terms of running time.…”
Section: Literature Reviewmentioning
confidence: 99%
“…To be specific, instead of selecting the most influential node at each round, the within-round greedy selection searching a set of seed nodes for each iteration. Yuan et al [40] improved the greedy algorithm by using a two-stage framework, in which finding seed candidates and filtering connected nodes before the seed selection. Ding et al [6] raised three greedy algorithms based on a proposed influence cascade model which considers the activation probability of potential influencers.…”
Section: Related Workmentioning
confidence: 99%