SlideShare a Scribd company logo
1 of 68
Least Cost Influence in
Multiplex Social Networks
MODEL REPRESENTATION AND ANALYSIS
Presented by:
Ayushi Jain Rahul Bobhate
Natasha Mandal Ankur Sachdeva
Dung T. Nguyen, Huiyuan Zhang, Soham Das, My T. Thai, Thang N. Dinh
Structure
β€’ Define a few terms
β€’ Motivation
β€’ Related work
β€’ Challenges and proposed solution
β€’ Math notations and problem definition
β€’ Lossless coupling
β€’ Lossy coupling
β€’ Influence relay
β€’ Experiments
β€’ Conclusion
What are Multiplex networks?
β€’ Networks extended to multiple edges between nodes like in more than one
social media platforms
β€’ Example: A set of users who interact of Facebook, Twitter & Foursquare
What is least cost influence (LCI) problem?
β€’ A minimum number of seed users who can eventually influence a large number
of users
β€’ Example: How to find the least advertising cost set of influencers who can
influence a massive number of users
Or
How to find the minimum number of inducements required for the product
adoption to reach a certain proportion of the population
motivation
β€’ In the recent decade, the popularity of OSNs has created a major
communication medium which allows for information sharing
β€’ Similar to real social networks: word-of-mouth & peer-pressure effect
Do you know how much time does an individual spend(on average) on social
media?
1.72
hours per
day
28% of
online
activity
some more statistics!
Number of Facebook Users
Number of users(in millions)
Why is it important to study information diffusion in these networks??
β€’ Considerable number of overlapping users
β€’ Users can relay the information from one network to another
β€’ Example:
Jack
If we only consider the information propagation in one network, we’ll
fail to identify the most influent users
Single network
β€’ Kempe et al.
β€’ Find a set of k users who can maximize influence
β€’ Stochastic process- Independent Cascade Model (IC)
β€’ Probability of influencing friends Ξ± Strength of Friendship
β€’ NP Hard- greedy algorithm with approximation ratio (1-1/e)
β€’ Linear Threshold Model (LT)
β€’ User adopts a new product when total influence of friends exceeds a threshold
β€’ Dinh et al.
β€’ Suggested algorithm for a special case of LT
β€’ Influence between users is uniform and user is influenced if a certain fraction ρ of
his friends are active
Related work
Multiplex Networks
β€’ Yagan et al.
β€’ Studied connection between online and offline networks
β€’ Investigated outbreak of information using SIR model on random networks
β€’ Liu at al.
β€’ Analyzed networks formed by online interaction and offline events
Drawbacks:
β€’ Studied flow of information and network clustering but not LCI
β€’ Did not study specific optimization problem of viral marketing
β€’ Shen et al.
β€’ Studied information propagation in multiplex OSN
β€’ Combined all networks into one network by representing an overlapping user as a
super node
β€’ Cannot preserve individual networks’ properties
challenges
How to evaluate
influence of
overlapping
users in
multiplex
networks?
In which
network, a user
is easier to be
influenced?
Which network
propagates the
influence
better?
β€’ In this paper, we study LCI for a set of users with minimum cardinality to
influence a certain fraction of users in multiplex networks
β€’ Represent a model for various coupling schemes to reduce the problem in
multiplex networks to an equivalent problem on a single network. Coupling
schemes can be applied for most popular diffusion models including: Linear
Threshold model, Stochastic Threshold model, and Independent Cascading
model
β€’ Introduce a new metric called influence relay to analyze the influence diffusion
process in both- a single network and multiplex networks
Proposed solution
Graph Notations
β€’ Gi – Weighted directed graph consisting of (Vi, Ei, ΞΈi, Wi).
β€’ Vi – Set of vertices in graph Gi, represents users in the network.
β€’ Ei – Set of edges in graph Gi, which represent the connection between the
users.
β€’ Wi – Set of weights of the edges which belong to Ei, which represents
the strength of influence or the strength of connection.
β€’ Nu
i- , Nu
i+ – Set of incoming and outgoing neighbors of u.
β€’ ΞΈi(u) – Threshold indicating the persistence of opinions of u.
Least Cost Influence (LCI) Problem definition
β€’ Given:
β€’ System of k networks G1..k
β€’ Set of users U
β€’ Time hop d
β€’ 0<Ξ²<1
β€’ To find:
β€’ A seed set S βŠ‚ U of minimum cardinality to such that
β€’ There are at least Ξ² fraction of users U active
β€’ After d hops
Linear Threshold model
β€’ Influence and information diffusion model for single network
β€’ Could be extended to handle multiple networks
β€’ In LT model:
β€’ Every user is either active or inactive
β€’ A user u is active if he/she accepts the information OR
β€’ The total influence of their neighbors is greater than their threshold.
β€’ After each time hop, inactive users are activated and they continue to activate new
users.
β€’ d be the number of hops in the network till which information is propagated.
β€’ Active set of users after d hops caused by seed set S is denoted by Ad(G1...k, S)
Coupling Schemes
β€’ Lossless coupling scheme:
β€’ Scheme to combine multiple networks into single network.
β€’ No loss of data while combining networks. (Obviously!)
β€’ Advantages:
β€’ Use existing algorithms
β€’ Same quality of solution
Challenges
β€’ Heterogeneity of user participation:
β€’ User might have joined a single network
β€’ Other user might have joined multiple networks
β€’ Recognition of users is difficult
β€’ Inter-network Influence propagation
β€’ User transmits the information in multiple networks
β€’ Represent transmission of influence between networks in a single network.
β€’ Preserving properties of individual networks
β€’ Coupled network should preserve diffusion properties of individual networks.
β€’ Should be able to establish relationship between solution for coupled network and
individual network
Coupling scheme for LT-model
β€’ Solution to 1st challenge
β€’ Introduce dummy nodes.
β€’ They represent a user u in the network Gi, in which the user is not registered.
β€’ Solution to 2nd challenge
β€’ Introduce gateway vertices.
β€’ Introduce Synchronization edges.
β€’ Instead of an edge between two vertices, there exist
β€’ An edge between a user to a gateway vertex
β€’ And an edge from gateway vertex to a user
β€’ Solution to 3rd challenge
β€’ Don’t need to do anything else.
Lemmas
β€’ Lemma 1: Suppose that the propagation process in the coupled network G
starts from the seed set which contains only gateway vertices S = {s0
1, . . . , s0
p},
then representative vertices are activated only at even propagation hops.
β€’ Lemma 2: Suppose that the propagation process on G1...k and G starts from the
same seed set S, then following conditions are equivalent:
β€’ User u is active after d propagation hops in G1...k.
β€’ There exists i such that ui is active after 2d βˆ’ 1 propagation hops in G.
β€’ Vertex u0 is active after 2d propagation hops in G.
Theorems
β€’ Theorem 1: Given a system of k networks G1...k with the user set U, the coupled
network G produced by the lossless coupling scheme, and a seed set S = {s1, s2,
. . . , sp}, if Ad(G1...k, S) = {a1, a2, . . . , aq} is the set of active users caused by S
after d propagation hops in multiplex networks, then A2d(G, S)= {a0
1, a1
1, . . . ,
ak
1, . . ., a0
q, a1
q, . . . , ak
q} is the set of active vertices caused by S after 2d
propagation hops in the coupled network.
β€’ Theorem 2: When the lossless scheme is used, the set S = {s1, s2, . . . , sp}
influences Ξ² fraction of users in G1...k after d propagation hops if and only if S =
{s0
1, s0
2, . . . , s0
p} influences Ξ² fraction of vertices in coupled network G after 2d
propagation hops.
Extension to other diffusion models
β€’ Lossless coupling scheme can be used for other diffusion models.
β€’ Stochastic Threshold model
β€’ Independent Cascading model
β€’ Similarity between LT model and other approaches
β€’ Same approach of using
β€’ Gateway vertices
β€’ Representative vertices
β€’ Synchronization edges
Lossy Coupling
MOTIVATION
β€’ In the coupled network of Lossless Coupling which was shown, there were a
large number of extra vertices and edges.
β€’ It is ideal to have a compact coupled network which contains only users as
vertices.
β€’ Such a compact coupled network will inevitably have loss of information.
Lossy Coupling
GOALS
β€’ The goal is to design a scheme which will minimize this loss of information.
β€’ The solution for finding the Least Cost Influence in the compact coupled
network should be very close to the solution in the original multiplex network.
Lossy Coupling
OBSERVATION 1
β€’ A user 𝑒 will be activated if there exists 𝑖 such that π‘£βˆˆπ‘ 𝑒
π‘–βˆ’βˆ©π΄
𝑀 𝑖(𝑣, 𝑒) β‰₯
πœƒ 𝑖(𝑒) where 𝐴 is the set of active users.
β€’ We can relax the conditions to activate 𝑒 with positive parameters 𝛼 𝑖
𝑒 as in
follows:
𝑖=1
π‘˜
(𝛼 𝑖(𝑒) π‘£βˆˆπ‘ 𝑒
π‘–βˆ’
∩𝐴
𝑀 𝑖(𝑣, 𝑒)) β‰₯ 𝑖=1
π‘˜
𝛼 𝑖(𝑒)πœƒ 𝑖(𝑒)
Lossy Coupling
PROPOSITION 1
β€’ For a system of networks 𝐺1..π‘˜ , if
𝑖=1
π‘˜
(𝛼 𝑖(𝑒) π‘£βˆˆπ‘ 𝑒
π‘–βˆ’βˆ©π΄
𝑀 𝑖(𝑣, 𝑒)) β‰₯ 𝑖=1
π‘˜
𝛼 𝑖(𝑒)πœƒ 𝑖(𝑒)
is satisfied, then user 𝑒 is activated.
β€’ This can be used by checking the condition for a single network 𝑖. The
inequality still holds because 𝛼 𝑖 𝑒 > 0.
Lossy Coupling
β€’ 𝛼 𝑖 𝑒 can constitute for extra influence which may be required to activate 𝑒
β€’ 𝛼 𝑖
𝑒 can be made proportional to π‘£βˆˆπ‘ 𝑒
π‘–βˆ’
∩𝐴
𝑀 𝑖
(𝑣, 𝑒) βˆ’ πœƒ 𝑖
(𝑒) . In this way,
when π‘£βˆˆπ‘ 𝑒
π‘–βˆ’βˆ©π΄
𝑀 𝑖(𝑣, 𝑒) > πœƒ 𝑖 𝑒 we choose 𝛼 𝑖 𝑒 ≫ 𝛼 𝑗 𝑒 [βˆ€π‘— β‰  𝑖].
β€’ In real life, we don’t know in which network 𝑒 will be activated. Hence, we
have to use heuristics.
Lossy Coupling
OBSERVATION 2
β€’ When 𝑒 participates in multiple networks, it may be easier to influence 𝑒 in
some networks, than in others.
β€’ For example if a node 𝑒 is in two networks:
Network 1: πœƒ1(𝑒) = 0.1, 𝑒 has 8 in-neighbors and each in-neighbor 𝑣 influences 𝑒
with 𝑀1(𝑣, 𝑒) = 0.1, it takes 1 neighbor to activate 𝑒.
Network 2: πœƒ2(𝑒) = 0.7, 𝑒 has 8 in-neighbors and each in-neighbor 𝑣 influences 𝑒
with 𝑀2(𝑣, 𝑒) = 0.1, it takes 7 neighbors to activate 𝑒.
Lossy Coupling
EASINESS
β€’ Intuitively we can say that 𝑒 is easier to influence in Network 1.
β€’ Formally, π‘’π‘Žπ‘ π‘–π‘›π‘’π‘ π‘  πœ– 𝑖(𝑒) =
π‘£βˆˆπ‘ 𝑒
π‘–βˆ’ 𝑀 𝑖(𝑣,𝑒)
πœƒ 𝑖(𝑒)
β€’ We can use π‘’π‘Žπ‘ π‘–π‘›π‘’π‘ π‘  πœ– 𝑖(𝑒) as 𝛼 𝑖 𝑒 for the equation stated in OBSERVATION
1.
Lossy Coupling
β€’ Vertex Set is the set of users 𝑉 = {𝑒1,…𝑒 𝑛}
β€’ The threshold of vertex 𝑒 is πœƒ 𝑒 = 𝑖=1
π‘˜
πœ– 𝑖(𝑒)πœƒ 𝑖(𝑒)
β€’ The weight of edge (𝑣, 𝑒) is 𝑀 𝑣, 𝑒 = 𝑖=1
π‘˜
πœ– 𝑖(𝑒)𝑀 𝑖(𝑣, 𝑒) where 𝑀 𝑖 𝑣, 𝑒 =
0 if there is no edge from 𝑣 to 𝑒 in the network 𝑖
Lossy Coupling
For the blue node,
πœƒ 𝑒 = 𝑖=1
π‘˜
πœ– 𝑖
(𝑒)πœƒ 𝑖
(𝑒) =>
0.2+0.1
0.2
βˆ— 0.2 +
0.5
0.5
βˆ— 0.5 = 0.8
For the edge between red node and blue node,
𝑀 𝑣, 𝑒 = 𝑖=1
π‘˜
πœ– 𝑖 𝑒 𝑀 𝑖 𝑣, 𝑒 =>
0.2+0.1
0.2
βˆ— 0.2 + 0 = 0.3
Lossy Coupling
INVOLVEMENT
β€’ If a user is surrounded by a group of friends who have a high influence on each
other, the user tends to get influenced.
β€’ We estimate π‘–π‘›π‘£π‘œπ‘™π‘£π‘’π‘šπ‘’π‘›π‘‘ of a node 𝑣 in a network 𝐺 𝑖by measuring how
strongly the 1-hop neighborhood 𝑣 is connected and to what extent influence
can propagate from one node to another in a 1-hop neighborhood.
Lossy Coupling
β€’ Formally, π‘–π‘›π‘£π‘œπ‘™π‘£π‘’π‘šπ‘’π‘›π‘‘ of a node 𝑣 in a network 𝐺 𝑖 is defined as πœŽπ‘£
𝑖
=
π‘₯,π‘¦βˆˆπ‘ 𝑉
𝑖
βˆͺ{𝑣}
𝑀 𝑖 π‘₯,𝑦
πœƒ 𝑦
𝑖 where 𝑁 𝑉
𝑖
= 𝑁 𝑉
𝑖+
βˆͺ 𝑁 𝑉
π‘–βˆ’
AVERAGE
β€’ All parameters have same value i.e. 𝛼 𝑖 𝑒 = 1
Lossy Coupling
THEOREM 3
β€’ When a lossy coupling scheme is used, if the set of users 𝑆 activates 𝛽 fraction
of users in 𝐺 (lossy coupled network), then it activates at least 𝛽 fraction of
users in 𝐺1..π‘˜ (original system).
β€’ The proof is based on the fact that the active state of a user in 𝐺 implies an
active state of users in 𝐺1..π‘˜
.
Influence Relay
MOTIVATION
β€’ When information is diffused in multiplex networks, it may flow within a single
network or may travel through multiplex networks.
β€’ What is the contribution of each component network in the influence process?
β€’ How much information flows within a network or between networks?
β€’ Quantifying these values will help us understand the diffusion process in
multiplex networks.
Influence Relay
DEFINITION
β€’ The authors proposed 𝑖𝑛𝑓𝑙𝑒𝑒𝑛𝑐𝑒 π‘Ÿπ‘’π‘™π‘Žπ‘¦ as a metric to quantify the role of
users in propagating information.
β€’ The 𝑖𝑛𝑓𝑙𝑒𝑒𝑛𝑐𝑒 π‘Ÿπ‘’π‘™π‘Žπ‘¦ of vertices is recursively defined depending on order of
activation.
β€’ 𝑆 = seed set, 𝐺= coupled network, 𝑑 = number of hops after which the
activation process stops, β„Ž 𝑒 = hop at which u is activated.
β€’ All inactive vertices in 𝑉𝐴 𝑑(𝐺, 𝑆) have an 𝑖𝑛𝑓𝑙𝑒𝑒𝑛𝑐𝑒 π‘Ÿπ‘’π‘™π‘Žπ‘¦ of 0.
Influence Relay
β€’ For each activated vertex 𝑒 ∈ 𝐴 𝑑
(𝐺, 𝑆), 𝑖𝑛𝑓𝑙𝑒𝑒𝑛𝑐𝑒 π‘Ÿπ‘’π‘™π‘Žπ‘¦ of u, denoted by
𝐼𝑅(𝑒), is a linear combination of the 𝑖𝑛𝑓𝑙𝑒𝑒𝑛𝑐𝑒 π‘Ÿπ‘’π‘™π‘Žπ‘¦ of its outgoing
neighbors that are activated after 𝑒.
β€’ Formally, the 𝐼𝑅 𝑒 of vertices 𝑒 ∈ 𝐴 𝑑(𝐺, 𝑆) is defined as:
𝐼𝑅 𝑒 = 1 +
(π‘£βˆˆπ‘ 𝑒
+)∩(β„Ž 𝑣 >β„Ž(𝑒))
𝑀 𝑒, 𝑣 𝐼𝑅(𝑣)
(π‘§βˆˆπ‘ 𝑧
βˆ’)∩(β„Ž 𝑧 <β„Ž(𝑣)) 𝑀(𝑧, 𝑣)
Influence Relay
β€’ The 𝑖𝑛𝑓𝑙𝑒𝑒𝑛𝑐𝑒 π‘Ÿπ‘’π‘™π‘Žπ‘¦ captures the amount of influence a vertex relays to other
vertices after adopting the information.
β€’ Thus, the 𝑖𝑛𝑓𝑙𝑒𝑒𝑛𝑐𝑒 π‘Ÿπ‘’π‘™π‘Žπ‘¦ of a vertex 𝑒 depends largely on the
𝑖𝑛𝑓𝑙𝑒𝑒𝑛𝑐𝑒 π‘Ÿπ‘’π‘™π‘Žπ‘¦ of vertices that 𝑒 helps to activate and the weight of edges
between 𝑒 and them.
β€’ The vertex 𝑒 is responsible for
𝑀 𝑒,𝑣
(π‘§βˆˆπ‘ 𝑧
βˆ’)∩(β„Ž 𝑧 <β„Ž(𝑣)) 𝑀(𝑧,𝑣)
of 𝑣 ’s
𝑖𝑛𝑓𝑙𝑒𝑒𝑛𝑐𝑒 π‘Ÿπ‘’π‘™π‘Žπ‘¦.
β€’ We add 1 to 𝑖𝑛𝑓𝑙𝑒𝑒𝑛𝑐𝑒 π‘Ÿπ‘’π‘™π‘Žπ‘¦ of 𝑒 since 𝑒 also contributes itself to the set of
activated vertices.
Influence Relay
COMPUTING INFLUENCE RELAY
β€’ We compute 𝑖𝑛𝑓𝑙𝑒𝑒𝑛𝑐𝑒 π‘Ÿπ‘’π‘™π‘Žπ‘¦ of vertices in reverse order of the diffusion
process.
β€’ We construct the influence graph 𝐼𝐺𝑆 = (𝑉𝑆, 𝐸𝑆) from the seed set 𝑆 to
represent the diffusion process and to calculate the 𝑖𝑛𝑓𝑙𝑒𝑒𝑛𝑐𝑒 π‘Ÿπ‘’π‘™π‘Žπ‘¦ of all
nodes in 𝑉𝑆.
β€’ The vertex set 𝑉𝑆 of 𝑛 𝑆 nodes is 𝐴 𝑑(𝐺, 𝑆).
β€’ There is an edge from 𝑒 to 𝑣 in 𝐸𝑆 if 𝑒 has passed information to 𝑣 i.e. 𝑒, 𝑣 ∈
𝐴 𝑑
(𝐺, 𝑆) and β„Ž 𝑣 > β„Ž(𝑒).
β€’ 𝐼𝐺𝑆 is a directed acyclic graph and the reverse topological ordering of 𝐼𝐺𝑆 takes
linear time. The main loop runs for all the edges in 𝐼𝐺𝑆 so 𝑖𝑛𝑓𝑙𝑒𝑒𝑛𝑐𝑒 π‘Ÿπ‘’π‘™π‘Žπ‘¦ of
all vertices can be computed in linear time.
Input: A network 𝐺, a seed set 𝑆 and the number of hops 𝑑.
Output: The influence relay 𝐼𝑅 of all vertices.
𝐼𝐺𝑆 ← The influence graph caused by 𝑆 on 𝐺
for each 𝑒 ∈ 𝐴 𝑑
(𝐺, 𝑆) do
𝐼𝑅(𝑒) ← 0
end for
Compute the topological ordering 𝑒1, 𝑒2, … , 𝑒 𝑛 𝑆
of vertices in 𝑉𝑆
for 𝑖 = 𝑛 𝑆 down to 1 do
𝐼𝑅(𝑒𝑖) ← 𝐼𝑅(𝑒𝑖) + 1
total ← 0
for each 𝑣 ∈ 𝑁 𝑒
βˆ’
do
total ← total + 𝑀(𝑣, 𝑒𝑖)
end for
for each 𝑣 ∈ 𝑁 𝑒
βˆ’
do
𝐼𝑅(𝑣) ← 𝐼𝑅(𝑣) +
𝑀(𝑣,𝑒 𝑖)𝐼𝑅(𝑒 𝑖)
π‘‘π‘œπ‘‘π‘Žπ‘™
end for
end for
Return IR
Influence Relay
THEOREM 4
β€’ One of the important properties of 𝑖𝑛𝑓𝑙𝑒𝑒𝑛𝑐𝑒 π‘Ÿπ‘’π‘™π‘Žπ‘¦ is that it preserves the
number of activated vertices.
β€’ The total 𝑖𝑛𝑓𝑙𝑒𝑒𝑛𝑐𝑒 π‘Ÿπ‘’π‘™π‘Žπ‘¦ of seeding vertices is equal to the total number of
activated vertices.
π‘’βˆˆπ‘† 𝐼𝑅 𝑒 = |𝐴 𝑑(𝐺, 𝑆)|
Influence Relay
INFLUENCE CONTRIBUTION
β€’ To obtain the contribution of a network to the diffusion process, we sum up
𝑖𝑛𝑓𝑙𝑒𝑒𝑛𝑐𝑒 π‘Ÿπ‘’π‘™π‘Žπ‘¦ of all seed vertices in that network.
INTERNAL AND EXTERNAL INFLUENCE
β€’ This can be used to quantify the amount of information flowing within and
between networks.
Influence Relay
β€’ When the information is propagated within a component network called the
β€œtarget” network there are two kinds of influence paths:
β€’ πΌπ‘›π‘‘π‘’π‘Ÿπ‘›π‘Žπ‘™ π‘π‘Žπ‘‘β„Žπ‘  include edges only in the target network.
β€’ 𝐸π‘₯π‘‘π‘’π‘Ÿπ‘›π‘Žπ‘™ π‘π‘Žπ‘‘β„Žπ‘  include some edges of other networks. They are formed
when some of the vertices are activated outside the target network.
β€’ We adapt relay influence to measure internal influence (passes through
internal paths) and external influence (passes through external paths) of the
seed set in the target network as follows:
Influence Relay
β€’ Each vertex 𝑒 has internal influence 𝐼𝑅 𝑖𝑛 𝑒 and external influence 𝐼𝑅 𝑒π‘₯ 𝑒 .
β€’ Both values are calculated backwards from activated vertices under 𝑒’s
influence.
β€’ Only activated vertex 𝑒 in the target network receives 1 more influence unit to
𝐼𝑅 𝑖𝑛 𝑒 since we only consider the influence propagation in the target
network.
β€’ If a vertex is activated outside the target network, all internal influence is
converted to external influence.
EXPERIMENTS
Data Sets
Typesofdatasets Real Networks
Synthesized
Networks
Real Networks
β€’ Experiments performed on 2 data sets :
β€’ Foursquare (FSQ) and Twitter networks
β€’ Co-author networks in the area of Condensed Matter(CM), High-Energy
Theory(Het), and Network Science(NetS)
β€’ Number of overlapping users in first dataset FSQ-Twitter is 4100.
β€’ For second dataset, the numbers of overlapping users of the network pairs CM-Het,
CM-NetS, and Het-NetS are 2860, 517, and 90, respectively.
Real Networks
Weights of edges are
randomly assigned
from 0 to 1.
The edge weights are
then normalized so
that the total weight
of incoming degree of
each node is 1.
Threshold of each
node is a random
value from 0 to 1.
Synthesized Networks
β€’ Synthesized networks generated by Erdos-Renyi random network model are
used for testing networks with controlled parameters.
β€’ Two networks with 10000 nodes are formed by randomly connecting each pair
of nodes with probabilities 0.0008 and 0.006.
β€’ The average degrees of the two networks are 8 and 60.
Comparison of coupling schemes
Solution Quality
β€’ In both networks the seed size is smallest when the lossless coupling scheme
is used.
β€’ The seed sizes are only a bit larger using the lossy coupling schemes.
Comparison of coupling schemes
β€’ The small seed size is obtained through two different means:
β€’ Increasing the fraction of overlapping users.
β€’ Increasing the number of propagation hops.
Comparison of coupling schemes
Running Time
β€’ The greedy algorithm runs much faster in the lossy coupled networks than in the
lossless coupled networks.
β€’ Using the lossy coupled networks reduces the running times by a factor of 2 in FSQ-
Twitter and a factor 4 in the co-author networks in comparison to using the lossless
coupled networks.
β€’ The major disadvantages of the lossless coupling scheme are the doubled number
of hops and the number of extra nodes and edges.
Advantages of using coupled networks
Influencing a fraction Ξ² of the nodes in all networks:
β€’ The results using our lossless coupling method outperform the results when
we run the greedy algorithm on each network separately and take the union
of the produced seed sets.
β€’ In Co-author networks, the size of seed set is 30% larger, and in FSQ-Twitter,
it is 47% larger than the size of seed sets using lossless coupling method.
Influencing a fraction Ξ² of the nodes in a particular network:
β€’ The seed size decreases up to 9%, 25%, 17%, and 26% in CM, Het, FSQ, and Twitter,
respectively, when we consider these networks in connection with other networks.
β€’ The external influence is substantial and accounts for large portions in many cases.
For instance, when the influenced fraction Ξ² = 0.2, the external influence accounts
for 27.3%, 52.7%, and 30.0% the total influence in CM, Het, and NetS, respectively.
Analysis of seed sets
β€’ A significant fraction of the seed set is overlapping nodes although only 5%-7% users
of any network are overlapping users.
β€’ For Ξ² = 0.4, the fraction of overlapping seed vertices is around 24.9% and 25% in the
co-author and FSQ-Twitter networks, respectively.
β€’ When Ξ² is small, there is high influence contribution of overlapping users(approx. 50%
when Ξ² = 0.2). However when Ξ² is large, overlapping users are already selected so
they are not favored.
Mutual Impact of networks
β€’ When k increases from 2 to 5, the seed size decreases several times. It implies that the
introduction of a new OSN increases the diffusion of information significantly.
β€’ The number of influenced vertices is raised 46% with the support of 3 new networks
when k is changed from 2 to 5.
β€’ the fraction of external influence is also increased dramatically from 39% when k = 2
to 67% when k = 5.
β€’ All these results suggest that the existing networks may benefit from the newly
introduced competitor.
Conclusion and future Work
β€’ To tackle the LCI problem, novel coupling schemes are introduced to reduce
the problem to a version on a single network.
β€’ A new metric is designed to quantify the flow of influence inside and between
networks based on the coupled network.
β€’ Exhaustive experiments provide new insights to the information diffusion in
multiplex networks.
β€’ In future, the LCI problem can be investigated in multiplex networks with
heterogeneous diffusion models in which each network may have its own
diffusion mode.
Thank you!!
Thank You!!

More Related Content

What's hot

Community detection
Community detectionCommunity detection
Community detectionScott Pauls
Β 
Recomendation system: Community Detection Based Recomendation System using Hy...
Recomendation system: Community Detection Based Recomendation System using Hy...Recomendation system: Community Detection Based Recomendation System using Hy...
Recomendation system: Community Detection Based Recomendation System using Hy...Rajul Kukreja
Β 
Clique-based Network Clustering
Clique-based Network ClusteringClique-based Network Clustering
Clique-based Network ClusteringGuang Ouyang
Β 
Building a Large-Scale, Adaptive Recommendation Engine with Apache Flink and ...
Building a Large-Scale, Adaptive Recommendation Engine with Apache Flink and ...Building a Large-Scale, Adaptive Recommendation Engine with Apache Flink and ...
Building a Large-Scale, Adaptive Recommendation Engine with Apache Flink and ...DataWorks Summit/Hadoop Summit
Β 
Download
DownloadDownload
Downloadbutest
Β 
Network Visualization guest lecture at #DataVizQMSS at @Columbia / #SNA at PU...
Network Visualization guest lecture at #DataVizQMSS at @Columbia / #SNA at PU...Network Visualization guest lecture at #DataVizQMSS at @Columbia / #SNA at PU...
Network Visualization guest lecture at #DataVizQMSS at @Columbia / #SNA at PU...Denis Parra Santander
Β 
Speeding up Distributed Big Data Recommendation in Spark
Speeding up Distributed Big Data Recommendation in SparkSpeeding up Distributed Big Data Recommendation in Spark
Speeding up Distributed Big Data Recommendation in SparkHans De Sterck
Β 
Group and Community Detection in Social Networks
Group and Community Detection in Social NetworksGroup and Community Detection in Social Networks
Group and Community Detection in Social NetworksKent State University
Β 
Collaborative Filtering with Spark
Collaborative Filtering with SparkCollaborative Filtering with Spark
Collaborative Filtering with SparkChris Johnson
Β 
Introduction to Topological Data Analysis
Introduction to Topological Data AnalysisIntroduction to Topological Data Analysis
Introduction to Topological Data AnalysisMason Porter
Β 
Community Detection with Networkx
Community Detection with NetworkxCommunity Detection with Networkx
Community Detection with NetworkxErika Fille Legara
Β 
Topological Data Analysis of Complex Spatial Systems
Topological Data Analysis of Complex Spatial SystemsTopological Data Analysis of Complex Spatial Systems
Topological Data Analysis of Complex Spatial SystemsMason Porter
Β 
08 Exponential Random Graph Models (ERGM)
08 Exponential Random Graph Models (ERGM)08 Exponential Random Graph Models (ERGM)
08 Exponential Random Graph Models (ERGM)dnac
Β 
04 Diffusion and Peer Influence
04 Diffusion and Peer Influence04 Diffusion and Peer Influence
04 Diffusion and Peer Influencednac
Β 
Community Detection in Social Media
Community Detection in Social MediaCommunity Detection in Social Media
Community Detection in Social MediaSymeon Papadopoulos
Β 
Comtella: Adaptive Rewards Mechanism to Incentivize Participation in Online C...
Comtella: Adaptive Rewards Mechanism to Incentivize Participation in Online C...Comtella: Adaptive Rewards Mechanism to Incentivize Participation in Online C...
Comtella: Adaptive Rewards Mechanism to Incentivize Participation in Online C...Julita Vassileva
Β 
Snowbird comp-top-may2017
Snowbird comp-top-may2017Snowbird comp-top-may2017
Snowbird comp-top-may2017Mason Porter
Β 
00 Automatic Mental Health Classification in Online Settings and Language Emb...
00 Automatic Mental Health Classification in Online Settings and Language Emb...00 Automatic Mental Health Classification in Online Settings and Language Emb...
00 Automatic Mental Health Classification in Online Settings and Language Emb...Duke Network Analysis Center
Β 

What's hot (20)

Community detection
Community detectionCommunity detection
Community detection
Β 
06 Community Detection
06 Community Detection06 Community Detection
06 Community Detection
Β 
Recomendation system: Community Detection Based Recomendation System using Hy...
Recomendation system: Community Detection Based Recomendation System using Hy...Recomendation system: Community Detection Based Recomendation System using Hy...
Recomendation system: Community Detection Based Recomendation System using Hy...
Β 
Clique-based Network Clustering
Clique-based Network ClusteringClique-based Network Clustering
Clique-based Network Clustering
Β 
Building a Large-Scale, Adaptive Recommendation Engine with Apache Flink and ...
Building a Large-Scale, Adaptive Recommendation Engine with Apache Flink and ...Building a Large-Scale, Adaptive Recommendation Engine with Apache Flink and ...
Building a Large-Scale, Adaptive Recommendation Engine with Apache Flink and ...
Β 
Download
DownloadDownload
Download
Β 
Network Visualization guest lecture at #DataVizQMSS at @Columbia / #SNA at PU...
Network Visualization guest lecture at #DataVizQMSS at @Columbia / #SNA at PU...Network Visualization guest lecture at #DataVizQMSS at @Columbia / #SNA at PU...
Network Visualization guest lecture at #DataVizQMSS at @Columbia / #SNA at PU...
Β 
Speeding up Distributed Big Data Recommendation in Spark
Speeding up Distributed Big Data Recommendation in SparkSpeeding up Distributed Big Data Recommendation in Spark
Speeding up Distributed Big Data Recommendation in Spark
Β 
Group and Community Detection in Social Networks
Group and Community Detection in Social NetworksGroup and Community Detection in Social Networks
Group and Community Detection in Social Networks
Β 
Collaborative Filtering with Spark
Collaborative Filtering with SparkCollaborative Filtering with Spark
Collaborative Filtering with Spark
Β 
Introduction to Topological Data Analysis
Introduction to Topological Data AnalysisIntroduction to Topological Data Analysis
Introduction to Topological Data Analysis
Β 
Community Detection with Networkx
Community Detection with NetworkxCommunity Detection with Networkx
Community Detection with Networkx
Β 
Topological Data Analysis of Complex Spatial Systems
Topological Data Analysis of Complex Spatial SystemsTopological Data Analysis of Complex Spatial Systems
Topological Data Analysis of Complex Spatial Systems
Β 
08 Exponential Random Graph Models (ERGM)
08 Exponential Random Graph Models (ERGM)08 Exponential Random Graph Models (ERGM)
08 Exponential Random Graph Models (ERGM)
Β 
04 Diffusion and Peer Influence
04 Diffusion and Peer Influence04 Diffusion and Peer Influence
04 Diffusion and Peer Influence
Β 
05 Whole Network Descriptive Stats
05 Whole Network Descriptive Stats05 Whole Network Descriptive Stats
05 Whole Network Descriptive Stats
Β 
Community Detection in Social Media
Community Detection in Social MediaCommunity Detection in Social Media
Community Detection in Social Media
Β 
Comtella: Adaptive Rewards Mechanism to Incentivize Participation in Online C...
Comtella: Adaptive Rewards Mechanism to Incentivize Participation in Online C...Comtella: Adaptive Rewards Mechanism to Incentivize Participation in Online C...
Comtella: Adaptive Rewards Mechanism to Incentivize Participation in Online C...
Β 
Snowbird comp-top-may2017
Snowbird comp-top-may2017Snowbird comp-top-may2017
Snowbird comp-top-may2017
Β 
00 Automatic Mental Health Classification in Online Settings and Language Emb...
00 Automatic Mental Health Classification in Online Settings and Language Emb...00 Automatic Mental Health Classification in Online Settings and Language Emb...
00 Automatic Mental Health Classification in Online Settings and Language Emb...
Β 

Similar to Least Cost Influence in Multiplex Social Networks

Social Network Analysis (SNA) 2018
Social Network Analysis  (SNA) 2018Social Network Analysis  (SNA) 2018
Social Network Analysis (SNA) 2018Arsalan Khan
Β 
Homophily and influence in social networks
Homophily and influence in social networksHomophily and influence in social networks
Homophily and influence in social networksNicola Barbieri
Β 
Graph Analysis Beyond Linear Algebra
Graph Analysis Beyond Linear AlgebraGraph Analysis Beyond Linear Algebra
Graph Analysis Beyond Linear AlgebraJason Riedy
Β 
Algorithm in Social network of graph and social network analysis
Algorithm in Social network of graph and social network analysisAlgorithm in Social network of graph and social network analysis
Algorithm in Social network of graph and social network analysisoliviaclark2905
Β 
240115_Thanh_LabSeminar[Don't walk, skip! online learning of multi-scale netw...
240115_Thanh_LabSeminar[Don't walk, skip! online learning of multi-scale netw...240115_Thanh_LabSeminar[Don't walk, skip! online learning of multi-scale netw...
240115_Thanh_LabSeminar[Don't walk, skip! online learning of multi-scale netw...thanhdowork
Β 
NS-CUK Journal club: HBKim, Review on "Neural Graph Collaborative Filtering",...
NS-CUK Journal club: HBKim, Review on "Neural Graph Collaborative Filtering",...NS-CUK Journal club: HBKim, Review on "Neural Graph Collaborative Filtering",...
NS-CUK Journal club: HBKim, Review on "Neural Graph Collaborative Filtering",...ssuser4b1f48
Β 
OccupyWallStreetNetworkAnalysis.pptx
OccupyWallStreetNetworkAnalysis.pptxOccupyWallStreetNetworkAnalysis.pptx
OccupyWallStreetNetworkAnalysis.pptxFabrizioLanubile
Β 
Random graph models
Random graph modelsRandom graph models
Random graph modelsnetworksuw
Β 
A Novel Target Marketing Approach based on Influence Maximization
A Novel Target Marketing Approach based on Influence MaximizationA Novel Target Marketing Approach based on Influence Maximization
A Novel Target Marketing Approach based on Influence MaximizationSurendra Gadwal
Β 
Scale free network Visualiuzation
Scale free network VisualiuzationScale free network Visualiuzation
Scale free network VisualiuzationHarshit Srivastava
Β 
Random Walk by User Trust and Temporal Issues toward Sparsity Problem in Soci...
Random Walk by User Trust and Temporal Issues toward Sparsity Problem in Soci...Random Walk by User Trust and Temporal Issues toward Sparsity Problem in Soci...
Random Walk by User Trust and Temporal Issues toward Sparsity Problem in Soci...Sc Huang
Β 
From econophysicsto networks to data science: Estonian network of payments
From econophysicsto networks to data science: Estonian network of paymentsFrom econophysicsto networks to data science: Estonian network of payments
From econophysicsto networks to data science: Estonian network of paymentsEesti Pank
Β 
Predicting Communication Intention in Social Media
Predicting Communication Intention in Social MediaPredicting Communication Intention in Social Media
Predicting Communication Intention in Social MediaCharalampos Chelmis
Β 
Artificial neural network
Artificial neural networkArtificial neural network
Artificial neural networkIshaneeSharma
Β 
TruSIS: Trust Accross Social Network
TruSIS: Trust Accross Social NetworkTruSIS: Trust Accross Social Network
TruSIS: Trust Accross Social NetworkLora Aroyo
Β 
Topology ppt
Topology pptTopology ppt
Topology pptDaksh Bapna
Β 
Scalable Similarity-Based Neighborhood Methods with MapReduce
Scalable Similarity-Based Neighborhood Methods with MapReduceScalable Similarity-Based Neighborhood Methods with MapReduce
Scalable Similarity-Based Neighborhood Methods with MapReducesscdotopen
Β 
Maximizing the Diversity of Exposure in a Social Network
Maximizing the Diversity of Exposure in a Social Network	Maximizing the Diversity of Exposure in a Social Network
Maximizing the Diversity of Exposure in a Social Network Cigdem Aslay
Β 

Similar to Least Cost Influence in Multiplex Social Networks (20)

Social Network Analysis (SNA) 2018
Social Network Analysis  (SNA) 2018Social Network Analysis  (SNA) 2018
Social Network Analysis (SNA) 2018
Β 
Homophily and influence in social networks
Homophily and influence in social networksHomophily and influence in social networks
Homophily and influence in social networks
Β 
Graph Analysis Beyond Linear Algebra
Graph Analysis Beyond Linear AlgebraGraph Analysis Beyond Linear Algebra
Graph Analysis Beyond Linear Algebra
Β 
Algorithm in Social network of graph and social network analysis
Algorithm in Social network of graph and social network analysisAlgorithm in Social network of graph and social network analysis
Algorithm in Social network of graph and social network analysis
Β 
240115_Thanh_LabSeminar[Don't walk, skip! online learning of multi-scale netw...
240115_Thanh_LabSeminar[Don't walk, skip! online learning of multi-scale netw...240115_Thanh_LabSeminar[Don't walk, skip! online learning of multi-scale netw...
240115_Thanh_LabSeminar[Don't walk, skip! online learning of multi-scale netw...
Β 
NS-CUK Journal club: HBKim, Review on "Neural Graph Collaborative Filtering",...
NS-CUK Journal club: HBKim, Review on "Neural Graph Collaborative Filtering",...NS-CUK Journal club: HBKim, Review on "Neural Graph Collaborative Filtering",...
NS-CUK Journal club: HBKim, Review on "Neural Graph Collaborative Filtering",...
Β 
OccupyWallStreetNetworkAnalysis.pptx
OccupyWallStreetNetworkAnalysis.pptxOccupyWallStreetNetworkAnalysis.pptx
OccupyWallStreetNetworkAnalysis.pptx
Β 
Graph Evolution Models
Graph Evolution ModelsGraph Evolution Models
Graph Evolution Models
Β 
Random graph models
Random graph modelsRandom graph models
Random graph models
Β 
A Novel Target Marketing Approach based on Influence Maximization
A Novel Target Marketing Approach based on Influence MaximizationA Novel Target Marketing Approach based on Influence Maximization
A Novel Target Marketing Approach based on Influence Maximization
Β 
Scale free network Visualiuzation
Scale free network VisualiuzationScale free network Visualiuzation
Scale free network Visualiuzation
Β 
Random Walk by User Trust and Temporal Issues toward Sparsity Problem in Soci...
Random Walk by User Trust and Temporal Issues toward Sparsity Problem in Soci...Random Walk by User Trust and Temporal Issues toward Sparsity Problem in Soci...
Random Walk by User Trust and Temporal Issues toward Sparsity Problem in Soci...
Β 
From econophysicsto networks to data science: Estonian network of payments
From econophysicsto networks to data science: Estonian network of paymentsFrom econophysicsto networks to data science: Estonian network of payments
From econophysicsto networks to data science: Estonian network of payments
Β 
Predicting Communication Intention in Social Media
Predicting Communication Intention in Social MediaPredicting Communication Intention in Social Media
Predicting Communication Intention in Social Media
Β 
Artificial neural network
Artificial neural networkArtificial neural network
Artificial neural network
Β 
Content-based link prediction
Content-based link predictionContent-based link prediction
Content-based link prediction
Β 
TruSIS: Trust Accross Social Network
TruSIS: Trust Accross Social NetworkTruSIS: Trust Accross Social Network
TruSIS: Trust Accross Social Network
Β 
Topology ppt
Topology pptTopology ppt
Topology ppt
Β 
Scalable Similarity-Based Neighborhood Methods with MapReduce
Scalable Similarity-Based Neighborhood Methods with MapReduceScalable Similarity-Based Neighborhood Methods with MapReduce
Scalable Similarity-Based Neighborhood Methods with MapReduce
Β 
Maximizing the Diversity of Exposure in a Social Network
Maximizing the Diversity of Exposure in a Social Network	Maximizing the Diversity of Exposure in a Social Network
Maximizing the Diversity of Exposure in a Social Network
Β 

Recently uploaded

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
Β 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
Β 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
Β 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
Β 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
Β 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
Β 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
Β 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
Β 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
Β 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
Β 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
Β 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
Β 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
Β 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
Β 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
Β 
FULL ENJOY πŸ” 8264348440 πŸ” Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY πŸ” 8264348440 πŸ” Call Girls in Diplomatic Enclave | DelhiFULL ENJOY πŸ” 8264348440 πŸ” Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY πŸ” 8264348440 πŸ” Call Girls in Diplomatic Enclave | Delhisoniya singh
Β 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
Β 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
Β 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
Β 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
Β 

Recently uploaded (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Β 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Β 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Β 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Β 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
Β 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Β 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Β 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
Β 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
Β 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Β 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Β 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
Β 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
Β 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Β 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
Β 
FULL ENJOY πŸ” 8264348440 πŸ” Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY πŸ” 8264348440 πŸ” Call Girls in Diplomatic Enclave | DelhiFULL ENJOY πŸ” 8264348440 πŸ” Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY πŸ” 8264348440 πŸ” Call Girls in Diplomatic Enclave | Delhi
Β 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Β 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
Β 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Β 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Β 

Least Cost Influence in Multiplex Social Networks

  • 1. Least Cost Influence in Multiplex Social Networks MODEL REPRESENTATION AND ANALYSIS Presented by: Ayushi Jain Rahul Bobhate Natasha Mandal Ankur Sachdeva Dung T. Nguyen, Huiyuan Zhang, Soham Das, My T. Thai, Thang N. Dinh
  • 2. Structure β€’ Define a few terms β€’ Motivation β€’ Related work β€’ Challenges and proposed solution β€’ Math notations and problem definition β€’ Lossless coupling β€’ Lossy coupling β€’ Influence relay β€’ Experiments β€’ Conclusion
  • 3. What are Multiplex networks? β€’ Networks extended to multiple edges between nodes like in more than one social media platforms β€’ Example: A set of users who interact of Facebook, Twitter & Foursquare
  • 4. What is least cost influence (LCI) problem? β€’ A minimum number of seed users who can eventually influence a large number of users β€’ Example: How to find the least advertising cost set of influencers who can influence a massive number of users Or How to find the minimum number of inducements required for the product adoption to reach a certain proportion of the population
  • 5. motivation β€’ In the recent decade, the popularity of OSNs has created a major communication medium which allows for information sharing β€’ Similar to real social networks: word-of-mouth & peer-pressure effect Do you know how much time does an individual spend(on average) on social media? 1.72 hours per day 28% of online activity
  • 6. some more statistics! Number of Facebook Users
  • 7.
  • 8. Number of users(in millions)
  • 9. Why is it important to study information diffusion in these networks?? β€’ Considerable number of overlapping users β€’ Users can relay the information from one network to another β€’ Example: Jack
  • 10. If we only consider the information propagation in one network, we’ll fail to identify the most influent users
  • 11. Single network β€’ Kempe et al. β€’ Find a set of k users who can maximize influence β€’ Stochastic process- Independent Cascade Model (IC) β€’ Probability of influencing friends Ξ± Strength of Friendship β€’ NP Hard- greedy algorithm with approximation ratio (1-1/e) β€’ Linear Threshold Model (LT) β€’ User adopts a new product when total influence of friends exceeds a threshold β€’ Dinh et al. β€’ Suggested algorithm for a special case of LT β€’ Influence between users is uniform and user is influenced if a certain fraction ρ of his friends are active Related work
  • 12. Multiplex Networks β€’ Yagan et al. β€’ Studied connection between online and offline networks β€’ Investigated outbreak of information using SIR model on random networks β€’ Liu at al. β€’ Analyzed networks formed by online interaction and offline events Drawbacks: β€’ Studied flow of information and network clustering but not LCI β€’ Did not study specific optimization problem of viral marketing β€’ Shen et al. β€’ Studied information propagation in multiplex OSN β€’ Combined all networks into one network by representing an overlapping user as a super node β€’ Cannot preserve individual networks’ properties
  • 13. challenges How to evaluate influence of overlapping users in multiplex networks? In which network, a user is easier to be influenced? Which network propagates the influence better?
  • 14. β€’ In this paper, we study LCI for a set of users with minimum cardinality to influence a certain fraction of users in multiplex networks β€’ Represent a model for various coupling schemes to reduce the problem in multiplex networks to an equivalent problem on a single network. Coupling schemes can be applied for most popular diffusion models including: Linear Threshold model, Stochastic Threshold model, and Independent Cascading model β€’ Introduce a new metric called influence relay to analyze the influence diffusion process in both- a single network and multiplex networks Proposed solution
  • 15. Graph Notations β€’ Gi – Weighted directed graph consisting of (Vi, Ei, ΞΈi, Wi). β€’ Vi – Set of vertices in graph Gi, represents users in the network. β€’ Ei – Set of edges in graph Gi, which represent the connection between the users. β€’ Wi – Set of weights of the edges which belong to Ei, which represents the strength of influence or the strength of connection. β€’ Nu i- , Nu i+ – Set of incoming and outgoing neighbors of u. β€’ ΞΈi(u) – Threshold indicating the persistence of opinions of u.
  • 16. Least Cost Influence (LCI) Problem definition β€’ Given: β€’ System of k networks G1..k β€’ Set of users U β€’ Time hop d β€’ 0<Ξ²<1 β€’ To find: β€’ A seed set S βŠ‚ U of minimum cardinality to such that β€’ There are at least Ξ² fraction of users U active β€’ After d hops
  • 17.
  • 18.
  • 19. Linear Threshold model β€’ Influence and information diffusion model for single network β€’ Could be extended to handle multiple networks β€’ In LT model: β€’ Every user is either active or inactive β€’ A user u is active if he/she accepts the information OR β€’ The total influence of their neighbors is greater than their threshold. β€’ After each time hop, inactive users are activated and they continue to activate new users. β€’ d be the number of hops in the network till which information is propagated. β€’ Active set of users after d hops caused by seed set S is denoted by Ad(G1...k, S)
  • 20. Coupling Schemes β€’ Lossless coupling scheme: β€’ Scheme to combine multiple networks into single network. β€’ No loss of data while combining networks. (Obviously!) β€’ Advantages: β€’ Use existing algorithms β€’ Same quality of solution
  • 21. Challenges β€’ Heterogeneity of user participation: β€’ User might have joined a single network β€’ Other user might have joined multiple networks β€’ Recognition of users is difficult β€’ Inter-network Influence propagation β€’ User transmits the information in multiple networks β€’ Represent transmission of influence between networks in a single network. β€’ Preserving properties of individual networks β€’ Coupled network should preserve diffusion properties of individual networks. β€’ Should be able to establish relationship between solution for coupled network and individual network
  • 22.
  • 23. Coupling scheme for LT-model β€’ Solution to 1st challenge β€’ Introduce dummy nodes. β€’ They represent a user u in the network Gi, in which the user is not registered. β€’ Solution to 2nd challenge β€’ Introduce gateway vertices. β€’ Introduce Synchronization edges. β€’ Instead of an edge between two vertices, there exist β€’ An edge between a user to a gateway vertex β€’ And an edge from gateway vertex to a user β€’ Solution to 3rd challenge β€’ Don’t need to do anything else.
  • 24.
  • 25.
  • 26.
  • 27. Lemmas β€’ Lemma 1: Suppose that the propagation process in the coupled network G starts from the seed set which contains only gateway vertices S = {s0 1, . . . , s0 p}, then representative vertices are activated only at even propagation hops. β€’ Lemma 2: Suppose that the propagation process on G1...k and G starts from the same seed set S, then following conditions are equivalent: β€’ User u is active after d propagation hops in G1...k. β€’ There exists i such that ui is active after 2d βˆ’ 1 propagation hops in G. β€’ Vertex u0 is active after 2d propagation hops in G.
  • 28. Theorems β€’ Theorem 1: Given a system of k networks G1...k with the user set U, the coupled network G produced by the lossless coupling scheme, and a seed set S = {s1, s2, . . . , sp}, if Ad(G1...k, S) = {a1, a2, . . . , aq} is the set of active users caused by S after d propagation hops in multiplex networks, then A2d(G, S)= {a0 1, a1 1, . . . , ak 1, . . ., a0 q, a1 q, . . . , ak q} is the set of active vertices caused by S after 2d propagation hops in the coupled network. β€’ Theorem 2: When the lossless scheme is used, the set S = {s1, s2, . . . , sp} influences Ξ² fraction of users in G1...k after d propagation hops if and only if S = {s0 1, s0 2, . . . , s0 p} influences Ξ² fraction of vertices in coupled network G after 2d propagation hops.
  • 29. Extension to other diffusion models β€’ Lossless coupling scheme can be used for other diffusion models. β€’ Stochastic Threshold model β€’ Independent Cascading model β€’ Similarity between LT model and other approaches β€’ Same approach of using β€’ Gateway vertices β€’ Representative vertices β€’ Synchronization edges
  • 30. Lossy Coupling MOTIVATION β€’ In the coupled network of Lossless Coupling which was shown, there were a large number of extra vertices and edges. β€’ It is ideal to have a compact coupled network which contains only users as vertices. β€’ Such a compact coupled network will inevitably have loss of information.
  • 31. Lossy Coupling GOALS β€’ The goal is to design a scheme which will minimize this loss of information. β€’ The solution for finding the Least Cost Influence in the compact coupled network should be very close to the solution in the original multiplex network.
  • 32. Lossy Coupling OBSERVATION 1 β€’ A user 𝑒 will be activated if there exists 𝑖 such that π‘£βˆˆπ‘ 𝑒 π‘–βˆ’βˆ©π΄ 𝑀 𝑖(𝑣, 𝑒) β‰₯ πœƒ 𝑖(𝑒) where 𝐴 is the set of active users. β€’ We can relax the conditions to activate 𝑒 with positive parameters 𝛼 𝑖 𝑒 as in follows: 𝑖=1 π‘˜ (𝛼 𝑖(𝑒) π‘£βˆˆπ‘ 𝑒 π‘–βˆ’ ∩𝐴 𝑀 𝑖(𝑣, 𝑒)) β‰₯ 𝑖=1 π‘˜ 𝛼 𝑖(𝑒)πœƒ 𝑖(𝑒)
  • 33. Lossy Coupling PROPOSITION 1 β€’ For a system of networks 𝐺1..π‘˜ , if 𝑖=1 π‘˜ (𝛼 𝑖(𝑒) π‘£βˆˆπ‘ 𝑒 π‘–βˆ’βˆ©π΄ 𝑀 𝑖(𝑣, 𝑒)) β‰₯ 𝑖=1 π‘˜ 𝛼 𝑖(𝑒)πœƒ 𝑖(𝑒) is satisfied, then user 𝑒 is activated. β€’ This can be used by checking the condition for a single network 𝑖. The inequality still holds because 𝛼 𝑖 𝑒 > 0.
  • 34. Lossy Coupling β€’ 𝛼 𝑖 𝑒 can constitute for extra influence which may be required to activate 𝑒 β€’ 𝛼 𝑖 𝑒 can be made proportional to π‘£βˆˆπ‘ 𝑒 π‘–βˆ’ ∩𝐴 𝑀 𝑖 (𝑣, 𝑒) βˆ’ πœƒ 𝑖 (𝑒) . In this way, when π‘£βˆˆπ‘ 𝑒 π‘–βˆ’βˆ©π΄ 𝑀 𝑖(𝑣, 𝑒) > πœƒ 𝑖 𝑒 we choose 𝛼 𝑖 𝑒 ≫ 𝛼 𝑗 𝑒 [βˆ€π‘— β‰  𝑖]. β€’ In real life, we don’t know in which network 𝑒 will be activated. Hence, we have to use heuristics.
  • 35. Lossy Coupling OBSERVATION 2 β€’ When 𝑒 participates in multiple networks, it may be easier to influence 𝑒 in some networks, than in others. β€’ For example if a node 𝑒 is in two networks: Network 1: πœƒ1(𝑒) = 0.1, 𝑒 has 8 in-neighbors and each in-neighbor 𝑣 influences 𝑒 with 𝑀1(𝑣, 𝑒) = 0.1, it takes 1 neighbor to activate 𝑒. Network 2: πœƒ2(𝑒) = 0.7, 𝑒 has 8 in-neighbors and each in-neighbor 𝑣 influences 𝑒 with 𝑀2(𝑣, 𝑒) = 0.1, it takes 7 neighbors to activate 𝑒.
  • 36. Lossy Coupling EASINESS β€’ Intuitively we can say that 𝑒 is easier to influence in Network 1. β€’ Formally, π‘’π‘Žπ‘ π‘–π‘›π‘’π‘ π‘  πœ– 𝑖(𝑒) = π‘£βˆˆπ‘ 𝑒 π‘–βˆ’ 𝑀 𝑖(𝑣,𝑒) πœƒ 𝑖(𝑒) β€’ We can use π‘’π‘Žπ‘ π‘–π‘›π‘’π‘ π‘  πœ– 𝑖(𝑒) as 𝛼 𝑖 𝑒 for the equation stated in OBSERVATION 1.
  • 37. Lossy Coupling β€’ Vertex Set is the set of users 𝑉 = {𝑒1,…𝑒 𝑛} β€’ The threshold of vertex 𝑒 is πœƒ 𝑒 = 𝑖=1 π‘˜ πœ– 𝑖(𝑒)πœƒ 𝑖(𝑒) β€’ The weight of edge (𝑣, 𝑒) is 𝑀 𝑣, 𝑒 = 𝑖=1 π‘˜ πœ– 𝑖(𝑒)𝑀 𝑖(𝑣, 𝑒) where 𝑀 𝑖 𝑣, 𝑒 = 0 if there is no edge from 𝑣 to 𝑒 in the network 𝑖
  • 38. Lossy Coupling For the blue node, πœƒ 𝑒 = 𝑖=1 π‘˜ πœ– 𝑖 (𝑒)πœƒ 𝑖 (𝑒) => 0.2+0.1 0.2 βˆ— 0.2 + 0.5 0.5 βˆ— 0.5 = 0.8 For the edge between red node and blue node, 𝑀 𝑣, 𝑒 = 𝑖=1 π‘˜ πœ– 𝑖 𝑒 𝑀 𝑖 𝑣, 𝑒 => 0.2+0.1 0.2 βˆ— 0.2 + 0 = 0.3
  • 39. Lossy Coupling INVOLVEMENT β€’ If a user is surrounded by a group of friends who have a high influence on each other, the user tends to get influenced. β€’ We estimate π‘–π‘›π‘£π‘œπ‘™π‘£π‘’π‘šπ‘’π‘›π‘‘ of a node 𝑣 in a network 𝐺 𝑖by measuring how strongly the 1-hop neighborhood 𝑣 is connected and to what extent influence can propagate from one node to another in a 1-hop neighborhood.
  • 40. Lossy Coupling β€’ Formally, π‘–π‘›π‘£π‘œπ‘™π‘£π‘’π‘šπ‘’π‘›π‘‘ of a node 𝑣 in a network 𝐺 𝑖 is defined as πœŽπ‘£ 𝑖 = π‘₯,π‘¦βˆˆπ‘ 𝑉 𝑖 βˆͺ{𝑣} 𝑀 𝑖 π‘₯,𝑦 πœƒ 𝑦 𝑖 where 𝑁 𝑉 𝑖 = 𝑁 𝑉 𝑖+ βˆͺ 𝑁 𝑉 π‘–βˆ’ AVERAGE β€’ All parameters have same value i.e. 𝛼 𝑖 𝑒 = 1
  • 41. Lossy Coupling THEOREM 3 β€’ When a lossy coupling scheme is used, if the set of users 𝑆 activates 𝛽 fraction of users in 𝐺 (lossy coupled network), then it activates at least 𝛽 fraction of users in 𝐺1..π‘˜ (original system). β€’ The proof is based on the fact that the active state of a user in 𝐺 implies an active state of users in 𝐺1..π‘˜ .
  • 42.
  • 43. Influence Relay MOTIVATION β€’ When information is diffused in multiplex networks, it may flow within a single network or may travel through multiplex networks. β€’ What is the contribution of each component network in the influence process? β€’ How much information flows within a network or between networks? β€’ Quantifying these values will help us understand the diffusion process in multiplex networks.
  • 44. Influence Relay DEFINITION β€’ The authors proposed 𝑖𝑛𝑓𝑙𝑒𝑒𝑛𝑐𝑒 π‘Ÿπ‘’π‘™π‘Žπ‘¦ as a metric to quantify the role of users in propagating information. β€’ The 𝑖𝑛𝑓𝑙𝑒𝑒𝑛𝑐𝑒 π‘Ÿπ‘’π‘™π‘Žπ‘¦ of vertices is recursively defined depending on order of activation. β€’ 𝑆 = seed set, 𝐺= coupled network, 𝑑 = number of hops after which the activation process stops, β„Ž 𝑒 = hop at which u is activated. β€’ All inactive vertices in 𝑉𝐴 𝑑(𝐺, 𝑆) have an 𝑖𝑛𝑓𝑙𝑒𝑒𝑛𝑐𝑒 π‘Ÿπ‘’π‘™π‘Žπ‘¦ of 0.
  • 45. Influence Relay β€’ For each activated vertex 𝑒 ∈ 𝐴 𝑑 (𝐺, 𝑆), 𝑖𝑛𝑓𝑙𝑒𝑒𝑛𝑐𝑒 π‘Ÿπ‘’π‘™π‘Žπ‘¦ of u, denoted by 𝐼𝑅(𝑒), is a linear combination of the 𝑖𝑛𝑓𝑙𝑒𝑒𝑛𝑐𝑒 π‘Ÿπ‘’π‘™π‘Žπ‘¦ of its outgoing neighbors that are activated after 𝑒. β€’ Formally, the 𝐼𝑅 𝑒 of vertices 𝑒 ∈ 𝐴 𝑑(𝐺, 𝑆) is defined as: 𝐼𝑅 𝑒 = 1 + (π‘£βˆˆπ‘ 𝑒 +)∩(β„Ž 𝑣 >β„Ž(𝑒)) 𝑀 𝑒, 𝑣 𝐼𝑅(𝑣) (π‘§βˆˆπ‘ 𝑧 βˆ’)∩(β„Ž 𝑧 <β„Ž(𝑣)) 𝑀(𝑧, 𝑣)
  • 46. Influence Relay β€’ The 𝑖𝑛𝑓𝑙𝑒𝑒𝑛𝑐𝑒 π‘Ÿπ‘’π‘™π‘Žπ‘¦ captures the amount of influence a vertex relays to other vertices after adopting the information. β€’ Thus, the 𝑖𝑛𝑓𝑙𝑒𝑒𝑛𝑐𝑒 π‘Ÿπ‘’π‘™π‘Žπ‘¦ of a vertex 𝑒 depends largely on the 𝑖𝑛𝑓𝑙𝑒𝑒𝑛𝑐𝑒 π‘Ÿπ‘’π‘™π‘Žπ‘¦ of vertices that 𝑒 helps to activate and the weight of edges between 𝑒 and them. β€’ The vertex 𝑒 is responsible for 𝑀 𝑒,𝑣 (π‘§βˆˆπ‘ 𝑧 βˆ’)∩(β„Ž 𝑧 <β„Ž(𝑣)) 𝑀(𝑧,𝑣) of 𝑣 ’s 𝑖𝑛𝑓𝑙𝑒𝑒𝑛𝑐𝑒 π‘Ÿπ‘’π‘™π‘Žπ‘¦. β€’ We add 1 to 𝑖𝑛𝑓𝑙𝑒𝑒𝑛𝑐𝑒 π‘Ÿπ‘’π‘™π‘Žπ‘¦ of 𝑒 since 𝑒 also contributes itself to the set of activated vertices.
  • 47. Influence Relay COMPUTING INFLUENCE RELAY β€’ We compute 𝑖𝑛𝑓𝑙𝑒𝑒𝑛𝑐𝑒 π‘Ÿπ‘’π‘™π‘Žπ‘¦ of vertices in reverse order of the diffusion process. β€’ We construct the influence graph 𝐼𝐺𝑆 = (𝑉𝑆, 𝐸𝑆) from the seed set 𝑆 to represent the diffusion process and to calculate the 𝑖𝑛𝑓𝑙𝑒𝑒𝑛𝑐𝑒 π‘Ÿπ‘’π‘™π‘Žπ‘¦ of all nodes in 𝑉𝑆. β€’ The vertex set 𝑉𝑆 of 𝑛 𝑆 nodes is 𝐴 𝑑(𝐺, 𝑆). β€’ There is an edge from 𝑒 to 𝑣 in 𝐸𝑆 if 𝑒 has passed information to 𝑣 i.e. 𝑒, 𝑣 ∈ 𝐴 𝑑 (𝐺, 𝑆) and β„Ž 𝑣 > β„Ž(𝑒). β€’ 𝐼𝐺𝑆 is a directed acyclic graph and the reverse topological ordering of 𝐼𝐺𝑆 takes linear time. The main loop runs for all the edges in 𝐼𝐺𝑆 so 𝑖𝑛𝑓𝑙𝑒𝑒𝑛𝑐𝑒 π‘Ÿπ‘’π‘™π‘Žπ‘¦ of all vertices can be computed in linear time.
  • 48. Input: A network 𝐺, a seed set 𝑆 and the number of hops 𝑑. Output: The influence relay 𝐼𝑅 of all vertices. 𝐼𝐺𝑆 ← The influence graph caused by 𝑆 on 𝐺 for each 𝑒 ∈ 𝐴 𝑑 (𝐺, 𝑆) do 𝐼𝑅(𝑒) ← 0 end for Compute the topological ordering 𝑒1, 𝑒2, … , 𝑒 𝑛 𝑆 of vertices in 𝑉𝑆 for 𝑖 = 𝑛 𝑆 down to 1 do 𝐼𝑅(𝑒𝑖) ← 𝐼𝑅(𝑒𝑖) + 1 total ← 0 for each 𝑣 ∈ 𝑁 𝑒 βˆ’ do total ← total + 𝑀(𝑣, 𝑒𝑖) end for for each 𝑣 ∈ 𝑁 𝑒 βˆ’ do 𝐼𝑅(𝑣) ← 𝐼𝑅(𝑣) + 𝑀(𝑣,𝑒 𝑖)𝐼𝑅(𝑒 𝑖) π‘‘π‘œπ‘‘π‘Žπ‘™ end for end for Return IR
  • 49. Influence Relay THEOREM 4 β€’ One of the important properties of 𝑖𝑛𝑓𝑙𝑒𝑒𝑛𝑐𝑒 π‘Ÿπ‘’π‘™π‘Žπ‘¦ is that it preserves the number of activated vertices. β€’ The total 𝑖𝑛𝑓𝑙𝑒𝑒𝑛𝑐𝑒 π‘Ÿπ‘’π‘™π‘Žπ‘¦ of seeding vertices is equal to the total number of activated vertices. π‘’βˆˆπ‘† 𝐼𝑅 𝑒 = |𝐴 𝑑(𝐺, 𝑆)|
  • 50. Influence Relay INFLUENCE CONTRIBUTION β€’ To obtain the contribution of a network to the diffusion process, we sum up 𝑖𝑛𝑓𝑙𝑒𝑒𝑛𝑐𝑒 π‘Ÿπ‘’π‘™π‘Žπ‘¦ of all seed vertices in that network. INTERNAL AND EXTERNAL INFLUENCE β€’ This can be used to quantify the amount of information flowing within and between networks.
  • 51. Influence Relay β€’ When the information is propagated within a component network called the β€œtarget” network there are two kinds of influence paths: β€’ πΌπ‘›π‘‘π‘’π‘Ÿπ‘›π‘Žπ‘™ π‘π‘Žπ‘‘β„Žπ‘  include edges only in the target network. β€’ 𝐸π‘₯π‘‘π‘’π‘Ÿπ‘›π‘Žπ‘™ π‘π‘Žπ‘‘β„Žπ‘  include some edges of other networks. They are formed when some of the vertices are activated outside the target network. β€’ We adapt relay influence to measure internal influence (passes through internal paths) and external influence (passes through external paths) of the seed set in the target network as follows:
  • 52. Influence Relay β€’ Each vertex 𝑒 has internal influence 𝐼𝑅 𝑖𝑛 𝑒 and external influence 𝐼𝑅 𝑒π‘₯ 𝑒 . β€’ Both values are calculated backwards from activated vertices under 𝑒’s influence. β€’ Only activated vertex 𝑒 in the target network receives 1 more influence unit to 𝐼𝑅 𝑖𝑛 𝑒 since we only consider the influence propagation in the target network. β€’ If a vertex is activated outside the target network, all internal influence is converted to external influence.
  • 53.
  • 55. Data Sets Typesofdatasets Real Networks Synthesized Networks
  • 56. Real Networks β€’ Experiments performed on 2 data sets : β€’ Foursquare (FSQ) and Twitter networks β€’ Co-author networks in the area of Condensed Matter(CM), High-Energy Theory(Het), and Network Science(NetS) β€’ Number of overlapping users in first dataset FSQ-Twitter is 4100. β€’ For second dataset, the numbers of overlapping users of the network pairs CM-Het, CM-NetS, and Het-NetS are 2860, 517, and 90, respectively.
  • 57. Real Networks Weights of edges are randomly assigned from 0 to 1. The edge weights are then normalized so that the total weight of incoming degree of each node is 1. Threshold of each node is a random value from 0 to 1.
  • 58. Synthesized Networks β€’ Synthesized networks generated by Erdos-Renyi random network model are used for testing networks with controlled parameters. β€’ Two networks with 10000 nodes are formed by randomly connecting each pair of nodes with probabilities 0.0008 and 0.006. β€’ The average degrees of the two networks are 8 and 60.
  • 59. Comparison of coupling schemes Solution Quality β€’ In both networks the seed size is smallest when the lossless coupling scheme is used. β€’ The seed sizes are only a bit larger using the lossy coupling schemes.
  • 60. Comparison of coupling schemes β€’ The small seed size is obtained through two different means: β€’ Increasing the fraction of overlapping users. β€’ Increasing the number of propagation hops.
  • 61. Comparison of coupling schemes Running Time β€’ The greedy algorithm runs much faster in the lossy coupled networks than in the lossless coupled networks. β€’ Using the lossy coupled networks reduces the running times by a factor of 2 in FSQ- Twitter and a factor 4 in the co-author networks in comparison to using the lossless coupled networks. β€’ The major disadvantages of the lossless coupling scheme are the doubled number of hops and the number of extra nodes and edges.
  • 62. Advantages of using coupled networks Influencing a fraction Ξ² of the nodes in all networks: β€’ The results using our lossless coupling method outperform the results when we run the greedy algorithm on each network separately and take the union of the produced seed sets. β€’ In Co-author networks, the size of seed set is 30% larger, and in FSQ-Twitter, it is 47% larger than the size of seed sets using lossless coupling method.
  • 63. Influencing a fraction Ξ² of the nodes in a particular network: β€’ The seed size decreases up to 9%, 25%, 17%, and 26% in CM, Het, FSQ, and Twitter, respectively, when we consider these networks in connection with other networks. β€’ The external influence is substantial and accounts for large portions in many cases. For instance, when the influenced fraction Ξ² = 0.2, the external influence accounts for 27.3%, 52.7%, and 30.0% the total influence in CM, Het, and NetS, respectively.
  • 64. Analysis of seed sets β€’ A significant fraction of the seed set is overlapping nodes although only 5%-7% users of any network are overlapping users. β€’ For Ξ² = 0.4, the fraction of overlapping seed vertices is around 24.9% and 25% in the co-author and FSQ-Twitter networks, respectively. β€’ When Ξ² is small, there is high influence contribution of overlapping users(approx. 50% when Ξ² = 0.2). However when Ξ² is large, overlapping users are already selected so they are not favored.
  • 65. Mutual Impact of networks β€’ When k increases from 2 to 5, the seed size decreases several times. It implies that the introduction of a new OSN increases the diffusion of information significantly. β€’ The number of influenced vertices is raised 46% with the support of 3 new networks when k is changed from 2 to 5. β€’ the fraction of external influence is also increased dramatically from 39% when k = 2 to 67% when k = 5. β€’ All these results suggest that the existing networks may benefit from the newly introduced competitor.
  • 66. Conclusion and future Work β€’ To tackle the LCI problem, novel coupling schemes are introduced to reduce the problem to a version on a single network. β€’ A new metric is designed to quantify the flow of influence inside and between networks based on the coupled network. β€’ Exhaustive experiments provide new insights to the information diffusion in multiplex networks. β€’ In future, the LCI problem can be investigated in multiplex networks with heterogeneous diffusion models in which each network may have its own diffusion mode.
  • 67.