diffusion in networks
play

Diffusion in Networks Luchon Summer School, 2015 Panayiotis - PowerPoint PPT Presentation

Diffusion in Networks Luchon Summer School, 2015 Panayiotis Tsaparas University of Ioannina, Greece Diffusion: the process by which a piece of information spreads and reaches individuals through interactions in a netowork. Why do we


  1. Analysis β€’ As 𝑒 β†’ ∞ – if πœ‡ 1 𝑁 < 1 ⇔ πœ‡ 1 𝐡 < π‘Ÿ/π‘ž then 𝑀 𝑒 β†’ 0 β€’ the probability that all copies die converges to 1 – if πœ‡ 1 𝑁 = 1 ⇔ πœ‡ 1 𝐡 = π‘Ÿ/π‘ž then 𝑀 𝑒 β†’ 𝑑 β€’ the probability that all copies die converges to 1 – if πœ‡ 1 𝑁 > 1 ⇔ πœ‡ 1 𝐡 > π‘Ÿ/π‘ž then 𝑀 𝑒 β†’ ∞ β€’ the probability that all copies die converges to a constant < 1

  2. Including time β€’ Infection can only happen within the active window D. Easley, J. Kleinberg. Networks, Crowds and Markets: Reasoning about a highly connected world.

  3. Concurrency β€’ Importance of concurrency – enables branching D. Easley, J. Kleinberg. Networks, Crowds and Markets: Reasoning about a highly connected world.

  4. References β€’ D. Easley, J. Kleinberg. Networks, Crowds and Markets: Reasoning about a highly connected world . Cambridge University Press, 2010 – Chapter 21 β€’ Y. Wang, D. Chakrabarti, C. Wang, C. Faloutsos. Epidemic Spreading in Real Networks: An Eigenvalue Viewpoint . SRDS 2003 β€’ G. Giakkoupis, A. Gionis, E. Terzi, P. Tsaparas. Models and algorithms for network immunization . Technical Report C-2005-75, Department of Computer Science, University of Helsinki, 2005.

  5. INFLUENCE MAXIMIZATION

  6. Maximizing spread β€’ Suppose that instead of a virus we have an item (product, idea, video) that propagates through contact – Word of mouth propagation. β€’ An advertiser is interested in maximizing the spread of the item in the network – The holy grail of β€œ viral marketing ” β€’ Question: which nodes should we β€œ infect ” so that we maximize the spread? D. Kempe, J. Kleinberg, E. Tardos. Maximizing the Spread of Influence through a Social Network . Proc. 9th ACM SIGKDD Intl. Conf. on Knowledge Discovery and Data Mining, 2003.

  7. Independent cascade model β€’ Each node may be active (has the item) or inactive (does not have the item) β€’ Time proceeds at discrete time-steps. At time t, every node v that became active in time t-1 activates a non-active neighbor w with probability π‘ž 𝑣π‘₯ . If it fails, it does not try again β€’ The same as the simple SIR model

  8. Influence maximization β€’ Influence function: for a set of nodes A (target set) the influence s(A) is the expected number of active nodes at the end of the diffusion process if the item is originally placed in the nodes in A. β€’ Influence maximization problem: Given an network, a diffusion model, and a value k, identify a set A of k nodes in the network that maximizes s(A). β€’ The problem is NP-hard

  9. A Greedy algorithm β€’ What is a simple algorithm for selecting the set A? Greedy algorithm Start with an empty set A Proceed in k steps At each step add the node u to the set A the maximizes the increase in function s(A) β€’ The node that activates the most additional nodes β€’ Computing s(A): perform multiple simulations of the process and take the average. β€’ How good is the solution of this algorithm compared to the optimal solution?

  10. Approximation Algorithms β€’ Suppose we have a (combinatorial) optimization problem, and X is an instance of the problem, OPT(X) is the value of the optimal solution for X, and ALG(X) is the value of the solution of an algorithm ALG for X – In our case: X = (G,k) is the input instance, OPT(X) is the spread S(A*) of the optimal solution, GREEDY(X) is the spread S(A) of the solution of the Greedy algorithm β€’ ALG is a good approximation algorithm if the ratio of OPT and ALG is bounded.

  11. Approximation Ratio β€’ For a maximization problem, the algorithm ALG is an 𝛽 -approximation algorithm, for 𝛽 < 1 , if for all input instances X, 𝐡𝑀𝐻 π‘Œ β‰₯ π›½π‘ƒπ‘„π‘ˆ π‘Œ β€’ The solution of ALG(X) has value at least Ξ±% that of the optimal β€’ Ξ± is the approximation ratio of the algorithm – Ideally we would like Ξ± to be a constant close to 1

  12. Approximation Ratio for Influence Maximization β€’ The GREEDY algorithm has approximation 1 ratio 𝛽 = 1 βˆ’ 𝑓 1 𝐻𝑆𝐹𝐹𝐸𝑍 π‘Œ β‰₯ 1 βˆ’ 𝑓 π‘ƒπ‘„π‘ˆ π‘Œ , for all X

  13. Proof of approximation ratio β€’ The spread function s has two properties: β€’ S is monotone: 𝑇(𝐡) ≀ 𝑇 𝐢 if 𝐡 βŠ† 𝐢 β€’ S is submodular: 𝑇 𝐡 βˆͺ 𝑦 βˆ’ 𝑇 𝐡 β‰₯ 𝑇 𝐢 βˆͺ 𝑦 βˆ’ 𝑇 𝐢 𝑗𝑔 𝐡 βŠ† 𝐢 β€’ The addition of node x to a set of nodes has greater effect (more activations) for a smaller set. – The diminishing returns property

  14. Optimizing submodular functions β€’ Theorem: A greedy algorithm that optimizes a monotone and submodular function S, each time adding to the solution A, the node x that maximizes the gain 𝑇 𝐡 βˆͺ 𝑦 βˆ’ 𝑑(𝐡) has 1 approximation ratio 𝛽 = 1 βˆ’ 𝑓 β€’ The spread of the Greedy solution is at least 63% that of the optimal

  15. Submodularity of influence β€’ Why is S(A) submodular? – How do we deal with the fact that influence is defined as an expectation? β€’ We will use the fact that probabilistic propagation on a fixed graph can be viewed as deterministic propagation over a randomized graph – Express S(A) as an expectation over the input graph rather than the choices of the algorithm

  16. Independent cascade model β€’ Each edge (u,v) is considered only once, and it is β€œactivated” with probability p uv . β€’ We can assume that all random choices have been made in advance – generate a sample subgraph of the input graph where edge (u,v) is included with probability p uv – propagate the item deterministically on the input graph – the active nodes at the end of the process are the nodes reachable from the target set A β€’ The influence function is obviously(?) submodular when propagation is deterministic β€’ The linear combination of submodular functions is also a submodular function

  17. Linear threshold model β€’ Again, each node may be active or inactive β€’ Every directed edge (v,u) in the graph has a weight b vu , such that 𝑐 𝑀𝑣 ≀ 1 𝑀 is a neighbor of 𝑣 β€’ Each node u has a randomly generated threshold value T u β€’ Time proceeds in discrete time-steps. At time t an inactive node u becomes active if 𝑐 𝑀𝑣 β‰₯ π‘ˆ 𝑣 𝑀 is an active neighbor of 𝑣 β€’ Related to the game-theoretic model of adoption.

  18. Influence Maximization β€’ KKT03 showed that in this case the influence S(A) is still a submodular function, using a similar technique – Assumes uniform random thresholds β€’ The Greedy algorithm achieves a (1-1/e) approximation

  19. Proof idea β€’ For each node 𝑣 , pick one of the edges (𝑀, 𝑣) incoming to 𝑣 with probability 𝑐 𝑀𝑣 and make it live. With probability 1 βˆ’ 𝑐 𝑀𝑣 it picks no edge to make live β€’ Claim: Given a set of seed nodes A, the following two distributions are the same: – The distribution over the set of activated nodes using the Linear Threshold model and seed set A – The distribution over the set of nodes of reachable nodes from A using live edges.

  20. Proof idea β€’ Consider the special case of a DAG (Directed Acyclic Graph) – There is a topological ordering of the nodes 𝑀 0 , 𝑀 1 , … , 𝑀 π‘œ such that edges go from left to right β€’ Consider node 𝑀 𝑗 in this ordering and assume that 𝑇 𝑗 is the set of neighbors of 𝑀 𝑗 that are active. β€’ What is the probability that node 𝑀 𝑗 becomes active in either of the two models? – In the Linear Threshold model the random threshold πœ„ 𝑗 must be greater than π‘£βˆˆπ‘‡ 𝑗 𝑐 𝑣𝑗 β‰₯ πœ„ 𝑗 – In the live-edge model we should pick one of the edges in 𝑇 𝑗 β€’ This proof idea generalizes to general graph.

  21. Example 𝑀 2 𝑀 5 𝑀 4 𝑀 1 𝑀 6 𝑀 3 Assume that all edge weights incoming to any node sum to 1

  22. Example 𝑀 2 𝑀 5 𝑀 4 𝑀 1 𝑀 6 𝑀 3 The nodes select a single incoming edge with probability equal to the weight (uniformly at random in this case

  23. Example 𝑀 2 𝑀 5 𝑀 4 𝑀 1 𝑀 6 𝑀 3 Node 𝑀 1 is the seed

  24. Example 𝑀 2 𝑀 5 𝑀 4 𝑀 1 𝑀 6 𝑀 3 Node 𝑀 3 has a single incoming neighbor, therefore for any threshold it will be activated

  25. Example 𝑀 2 𝑀 5 𝑀 4 𝑀 1 𝑀 6 𝑀 3 The probability that node 𝑀 4 gets activated is 2/3 since it has incoming edges from two active nodes. The probability that node 𝑀 4 picks one of the two edges to these nodes is also 2/3

  26. Example 𝑀 2 𝑀 5 𝑀 4 𝑀 1 𝑀 6 𝑀 3 Similarly the probability that node 𝑀 6 gets activated is 2/3 since it has incoming edges from two active nodes. The probability that node 𝑀 6 picks one of the two edges to these nodes is also 2/3

  27. Example 𝑀 2 𝑀 5 𝑀 4 𝑀 1 𝑀 6 𝑀 3 The set of active nodes is the set of nodes reachable from 𝑀 1 with live edges (orange).

  28. Experiments

  29. Another example β€’ What is the spread from the red node? β€’ Inclusion of time changes the problem of influence maximization – N. Gayraud, E. Pitoura, P. Tsaparas, Diffusion Maximization on Evolving networks

  30. Evolving network β€’ Consider a network that changes over time – Edges and nodes can appear and disappear at discrete time steps β€’ Model: – The evolving network is a sequence of graphs {𝐻 1 , 𝐻 2 , … , 𝐻 π‘œ } defined over the same set of vertices π‘Š , with different edge sets 𝐹 1 , 𝐹 2 , … , 𝐹 π‘œ β€’ Graph snapshot 𝐻 𝑗 is the graph at time-step 𝑗 . N. Gayraud, E. Pitoura, P. Tsaparas. Maximizing Diffusion in Evolving Networks . ICCSS 2015

  31. Time β€’ How does the evolution of the network relates to the evolution of the diffusion? – How much physical time does a diffusion step last? β€’ Assumption: The two processes are in sync. One diffusion step happens in on one graph snapshot β€’ Evolving IC model: at time-step 𝑒 , the infectious nodes try to infect their neighbors in the graph 𝐻 𝑒 . β€’ Evolving LT model: at time-step 𝑒 if the weight of the active neighbors of node 𝑀 in graph 𝐻 𝑒 is greater than the threshold the nodes gets activated.

  32. Submodularity β€’ Will the spread function remain monotone and submodular? β€’ No!

  33. Monotonicity for the EIC model π’˜ 𝟐 π’˜ 𝟐 π’˜ 𝟐 π’˜ πŸ“ π’˜ πŸ“ π’˜ πŸ“ π’˜ πŸ‘ π’˜ πŸ‘ π’˜ πŸ‘ π’˜ πŸ’ π’˜ πŸ’ π’˜ πŸ’ 𝒗 𝟐 𝒗 πŸ’ 𝒗 𝟐 𝒗 πŸ’ 𝒗 πŸ’ 𝒗 𝟐 𝒗 πŸ‘ 𝒗 πŸ‘ 𝒗 πŸ‘ 𝑯 𝟐 𝑯 πŸ‘ 𝑯 πŸ’

  34. Monotonicity for the EIC model 𝑯 𝟐 𝑯 πŸ‘ 𝑯 πŸ’ 𝑯 𝟏 𝑯 πŸ‘ 𝑯 πŸ’ 𝑯 𝟏 𝑯 𝟐 The spread is not monotone in the case of the Evolving IC model

  35. Submodularity for the EIC model π’˜ 𝟐 π’˜ πŸ” π’˜ 𝟐 π’˜ πŸ” π’˜ 𝟐 π’˜ πŸ” π’˜ 𝟐 π’˜ πŸ” π’˜ πŸ‘ π’˜ πŸ‘ π’˜ πŸ‘ π’˜ πŸ‘ π’˜ πŸ• π’˜ πŸ• π’˜ πŸ• π’˜ πŸ• π’˜ πŸ’ π’˜ πŸ’ π’˜ πŸ’ π’˜ πŸ’ π’˜ πŸ“ π’˜ πŸ“ π’˜ πŸ“ π’˜ πŸ“ 𝒗 𝟐 𝒗 𝟐 𝒗 𝟐 𝒗 𝟐 𝒗 πŸ’ 𝒗 πŸ’ 𝒗 πŸ’ 𝒗 πŸ’ 𝒗 πŸ‘ 𝒗 πŸ‘ 𝒗 πŸ‘ 𝒗 πŸ‘ 𝑯 𝟐 𝑯 πŸ‘ 𝑯 πŸ’ 𝑯 πŸ“

  36. Submodularity for the EIC model π’˜ 𝟐 π’˜ πŸ” π’˜ 𝟐 π’˜ πŸ” π’˜ πŸ” π’˜ 𝟐 π’˜ 𝟐 π’˜ πŸ” π’˜ 𝟐 π’˜ πŸ” π’˜ πŸ‘ π’˜ πŸ‘ π’˜ πŸ‘ π’˜ πŸ‘ π’˜ πŸ‘ π’˜ πŸ• π’˜ πŸ• π’˜ πŸ• π’˜ πŸ• π’˜ πŸ• π’˜ πŸ’ π’˜ πŸ’ π’˜ πŸ’ π’˜ πŸ’ π’˜ πŸ’ π’˜ πŸ“ π’˜ πŸ“ π’˜ πŸ“ π’˜ πŸ“ π’˜ πŸ“ 𝒗 𝟐 𝒗 𝟐 𝒗 𝟐 𝒗 𝟐 𝒗 πŸ’ 𝒗 𝟐 𝒗 πŸ’ 𝒗 πŸ’ 𝒗 πŸ’ 𝒗 πŸ’ 𝒗 πŸ‘ 𝒗 πŸ‘ 𝒗 πŸ‘ 𝒗 πŸ‘ 𝒗 πŸ‘ 𝑯 𝟏 𝑯 πŸ“ 𝑯 𝟐 𝑯 πŸ‘ 𝑯 πŸ’ Activating node 𝑀 1 at time 𝑒 = 0 has spread 7

  37. Submodularity for the EIC model π’˜ 𝟐 π’˜ πŸ” π’˜ 𝟐 π’˜ πŸ” π’˜ πŸ” π’˜ 𝟐 π’˜ 𝟐 π’˜ πŸ” π’˜ πŸ‘ π’˜ πŸ‘ π’˜ πŸ‘ π’˜ πŸ‘ π’˜ πŸ• π’˜ πŸ• π’˜ πŸ• π’˜ πŸ• π’˜ πŸ’ π’˜ πŸ’ π’˜ πŸ’ π’˜ πŸ’ π’˜ πŸ“ π’˜ πŸ“ π’˜ πŸ“ π’˜ πŸ“ 𝒗 𝟐 𝒗 𝟐 𝒗 πŸ’ 𝒗 𝟐 𝒗 πŸ’ 𝒗 𝟐 𝒗 πŸ’ 𝒗 πŸ’ 𝒗 πŸ‘ 𝒗 πŸ‘ 𝒗 πŸ‘ 𝒗 πŸ‘ 𝑯 𝟐 𝑯 πŸ“ 𝑯 πŸ‘ 𝑯 πŸ’ Activating node 𝑀 1 at time 𝑒 = 0 has spread 7 Adding node 𝑀 6 at time 𝑒 = 3 does not increase the spread

  38. Submodularity for the EIC model π’˜ 𝟐 π’˜ 𝟐 π’˜ πŸ” π’˜ πŸ” π’˜ πŸ” π’˜ 𝟐 π’˜ 𝟐 π’˜ πŸ” π’˜ πŸ” π’˜ 𝟐 π’˜ πŸ‘ π’˜ πŸ‘ π’˜ πŸ‘ π’˜ πŸ‘ π’˜ πŸ‘ π’˜ πŸ• π’˜ πŸ• π’˜ πŸ• π’˜ πŸ• π’˜ πŸ• π’˜ πŸ’ π’˜ πŸ’ π’˜ πŸ’ π’˜ πŸ’ π’˜ πŸ’ π’˜ πŸ“ π’˜ πŸ“ π’˜ πŸ“ π’˜ πŸ“ π’˜ πŸ“ 𝒗 𝟐 𝒗 𝟐 𝒗 𝟐 𝒗 𝟐 𝒗 πŸ’ 𝒗 πŸ’ 𝒗 πŸ’ 𝒗 𝟐 𝒗 πŸ’ 𝒗 πŸ’ 𝒗 πŸ‘ 𝒗 πŸ‘ 𝒗 πŸ‘ 𝒗 πŸ‘ 𝒗 πŸ‘ 𝑯 𝟏 𝑯 𝟐 𝑯 πŸ‘ 𝑯 πŸ’ 𝑯 πŸ“ Activating nodes 𝑀 1 and 𝑀 5 at time 𝑒 = 0 has spread 4

  39. Submodularity for the EIC model π’˜ 𝟐 π’˜ πŸ” π’˜ πŸ” π’˜ 𝟐 π’˜ 𝟐 π’˜ πŸ” π’˜ πŸ” π’˜ 𝟐 π’˜ πŸ‘ π’˜ πŸ‘ π’˜ πŸ‘ π’˜ πŸ‘ π’˜ πŸ• π’˜ πŸ• π’˜ πŸ• π’˜ πŸ• π’˜ πŸ’ π’˜ πŸ’ π’˜ πŸ’ π’˜ πŸ’ π’˜ πŸ“ π’˜ πŸ“ π’˜ πŸ“ π’˜ πŸ“ 𝒗 𝟐 𝒗 𝟐 𝒗 𝟐 𝒗 πŸ’ 𝒗 πŸ’ 𝒗 𝟐 𝒗 πŸ’ 𝒗 πŸ’ 𝒗 πŸ‘ 𝒗 πŸ‘ 𝒗 πŸ‘ 𝒗 πŸ‘ 𝑯 𝟐 𝑯 πŸ‘ 𝑯 πŸ’ 𝑯 πŸ“ Activating nodes 𝑀 1 and 𝑀 5 at time 𝑒 = 0 has spread 4 Adding node 𝑀 6 at time 𝑒 = 3 increases the spread to 9

  40. Evolving LT model β€’ The evolving LT model is monotone but it is not submodular π’˜ πŸ‘ π’˜ πŸ‘ π’˜ πŸ‘ π’˜ 𝟐 π’˜ 𝟐 π’˜ 𝟐 π’˜ πŸ’ π’˜ πŸ’ π’˜ πŸ’ 𝒗 𝑣 𝒗 𝑯 𝟐 𝑯 πŸ‘ 𝑯 𝑽 β€’ Expected Spread: the probability that 𝑣 gets infected – Adding node 𝑀 3 has a larger effect if added to the set {𝑀 1 , 𝑀 2 } than to set {𝑀 1 } .

  41. One-slide summary β€’ Influence maximization: Given a graph 𝐻 and a budget 𝑙 , for some diffusion model, find a subset of 𝑙 nodes 𝐡 , such that when activating these nodes, the spread of the diffusion 𝑑(𝐡) in the network is maximized. β€’ Diffusion models: – Independent Cascade model – Linear Threshold model β€’ Algorithm: Greedy algorithm that adds to the set each time the node with the maximum marginal gain, i.e., the node that causes the maximum increase in the diffusion spread. 1 β€’ The Greedy algorithm gives a 1 βˆ’ 𝑓 approximation of the optimal solution – Follows from the fact that the spread function 𝑑 𝐡 is β€’ Monotone 𝑑 𝐡 ≀ 𝑑 𝐢 , if 𝐡 βŠ† 𝐢 β€’ Submodular 𝑑 𝐡 βˆͺ {𝑦} βˆ’ 𝑑 𝐡 β‰₯ 𝑑 𝐢 βˆͺ 𝑦 βˆ’ 𝑑 𝐢 , βˆ€π‘¦ if 𝐡 βŠ† 𝐢

  42. Improvements β€’ Computation of Expected Spread – Performing simulations for estimating the spread on multiple instances is very slow. Several techniques have been developed for speeding up the process. β€’ CELF: exploiting the submodularity property J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. M. VanBriesen, N. S. Glance. Cost-effective outbreak detection in networks . KDD 2007 β€’ Maximum Influence Paths: store paths for computation W. Chen, C.Wang, and Y.Wang. Scalable influence maximization for prevalent viral marketing in large- scale social networks . KDD 2010. β€’ Sketches: compute sketches for each node for approximate estimation of spread Edith Cohen, Daniel Delling, Thomas Pajor, Renato F. Werneck. Sketch-based Influence Maximization and Computation: Scaling up with Guarantees . CIKM 2014

  43. Extensions β€’ Other models for diffusion – Deadline model: There is a deadline by which a node can be infected W. Chen, W. Lu, N. Zhang. Time-critical influence maximization in social networks with time-delayed diffusion process . AAAI, 2012. – Time-decay model: The probability of an infected node to infect its neighbors decays over time B. Liu, G. Cong, D. Xu, and Y. Zeng. Time constrained influence maximization in social networks. ICDM 2012. – Timed influence: Each edge has a speed of infection, and you want to maximize the speed by which nodes are infected. N. Du, L. Song, M. Gomez-Rodriguez, H. Zha. Scalable influence estimation in continuous-time diffusion networks . NIPS 2013. β€’ Competing diffusions – Maximize the spread while competing with other products that are being diffused. A. Borodin, Y. Filmus, and J. Oren. Threshold models for competitive influence in social networks . WINE, 2010. M. Draief and H. Heidari. M. Kearns. New Models for Competitive Contagion. AAAI 2014.

  44. Extensions β€’ Reverse problems: – Initiator discovery: Given the state of the diffusion, find the nodes most likely to have initiated the diffusion H. Mannila, E. Terzi. Finding Links and Initiators: A Graph-Reconstruction Problem . SDM 2009 – Diffusion trees: Identify the most likely tree of diffusion tree given the output M. Gomez Rodriguez, J. Leskovec, A. Krause. Inferring networks of diffusion and influence . KDD 2010 – Infection probabilities: estimate the true infection probabilities M. Gomez-Rodriguez, D. Balduzzi, B. Scholkopf. Uncovering the temporal dynamics of diffusion networks . ICML, 2011.

  45. References β€’ D. Kempe, J. Kleinberg, E. Tardos. Maximizing the Spread of Influence through a Social Network . Proc. 9th ACM SIGKDD Intl. Conf. on Knowledge Discovery and Data Mining, 2003. β€’ N. Gayraud, E. Pitoura, P. Tsaparas. Maximizing Diffusion in Evolving Networks . ICCSS 2015 β€’ J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. M. VanBriesen, Natalie S. Glance. Cost-effective outbreak detection in networks . KDD 2007 β€’ W. Chen, C.Wang, and Y.Wang. Scalable influence maximization for prevalent viral marketing in large-scale social networks . In 16th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD 2010. β€’ B. Liu, G. Cong, D. Xu, and Y. Zeng. Time constrained influence maximization in social networks. ICDM 2012. β€’ Edith Cohen, Daniel Delling, Thomas Pajor, Renato F. Werneck. Sketch-based Influence Maximization and Computation: Scaling up with Guarantees . CIKM 2014 β€’ W. Chen, W. Lu, N. Zhang. Time-critical influence maximization in social networks with time-delayed diffusion process . AAAI, 2012. β€’ N. Du, L. Song, M. Gomez-Rodriguez, H. Zha. Scalable influence estimation in continuous-time diffusion networks . NIPS 2013. β€’ A. Borodin, Y. Filmus, and J. Oren. Threshold models for competitive influence in social networks . In Proceedings of the 6th international conference on Internet and network economics, WINE’10, 2010. β€’ M. Draief and H. Heidari. M. Kearns. New Models for Competitive Contagion. AAAI 2014. β€’ H. Mannila, E. Terzi. Finding Links and Initiators: A Graph-Reconstruction Problem . SDM 2009 β€’ Manuel Gomez Rodriguez, Jure Leskovec, Andreas Krause. Inferring networks of diffusion and influence . KDD 2010 β€’ M. Gomez-Rodriguez, D. Balduzzi, B. Scholkopf. Uncovering the temporal dynamics of diffusion networks . ICML, 2011.

  46. OPINION FORMATION IN SOCIAL NETWORKS

  47. Diffusion of items β€’ So far we have assumed that what is being diffused in the network is some discrete item: – E.g., a virus, a product, a video, an image, a link etc. β€’ For each network user a binary decision is being made about the item being diffused – Being infected by the virus, adopt the product, watch the video, save the image, retweet the link, etc. – (This decision may happen with some probability, but the probability is over the discrete values {0,1})

  48. Diffusion of opinions β€’ The network can also diffuse opinions. – What people believe about an issue, a person, an item, is shaped by their social network β€’ Opinions assume a continuous range of values, from completely negative to completely positive. – Opinion diffusion is different from item diffusion – It is often referred to as opinion formation.

  49. What is an opinion? β€’ An opinion is a real value – In our models a value in the interval [0,1] (0: negative, 1: positive)

  50. How are opinions formed? β€’ Opinions change over time

  51. How are opinions formed? β€’ And they are influenced by our social network

  52. An opinion formation model (De Groot) β€’ Every user 𝑗 has an opinion 𝑨 𝑗 ∈ [0,1] β€’ The opinion of each user in the network is iteratively updated, each time taking the average of the opinions of its neighbors and herself π‘’βˆ’1 + π‘˜βˆˆπ‘‚(𝑗) π‘₯ π‘—π‘˜ 𝑨 π‘’βˆ’1 𝑨 𝑗 𝑒 = π‘˜ 𝑨 𝑗 1 + π‘˜βˆˆπ‘‚(𝑗) π‘₯ π‘—π‘˜ – where 𝑂(𝑗) is the set of neighbors of user 𝑗 . β€’ This iterative process converges to a consensus

  53. What about personal biases? β€’ People tend to cling on to their personal opinions

  54. Another opinion formation model (Friedkin and Johnsen) β€’ Every user 𝑗 has an intrinsic opinion 𝑑 𝑗 ∈ [0,1] and an expressed opinion 𝑨 𝑗 ∈ [0,1] β€’ The public opinion 𝑨 𝑗 of each user in the network is iteratively updated, each time taking the average of the expressed opinions of its neighbors and the intrinsic opinion of herself π‘’βˆ’1 𝑑 𝑗 + π‘˜βˆˆπ‘‚(𝑗) π‘₯ π‘—π‘˜ 𝑨 𝑒 = π‘˜ 𝑨 𝑗 1 + π‘˜βˆˆπ‘‚(𝑗) π‘₯ π‘—π‘˜

  55. Opinion formation as a game β€’ Assume that network users are rational (selfish) agents β€’ Each user has a personal cost for expressing an opinion 2 𝑑 𝑨 𝑗 = 𝑨 𝑗 βˆ’ 𝑑 𝑗 2 + π‘₯ π‘—π‘˜ 𝑨 𝑗 βˆ’ 𝑨 π‘˜ π‘˜βˆˆπ‘‚(𝑗) Conflict cost: The cost for Inconsistency cost: The cost for disagreeing with the opinions deviating from one’s intrinsic opinion in one’s social network β€’ Each user is selfishly trying to minimize her personal cost. D. Bindel, J. Kleinberg, S. Oren. How Bad is Forming Your Own Opinion? Proc. 52nd IEEE Symposium on Foundations of Computer Science, 2011.

  56. Opinion formation as a game β€’ The opinion 𝑨 𝑗 that minimizes the personal cost of user 𝑗 𝑑 𝑗 + π‘˜βˆˆπ‘‚(𝑗) π‘₯ π‘—π‘˜ 𝑨 π‘˜ 𝑨 𝑗 = 1 + π‘˜βˆˆπ‘‚(𝑗) π‘₯ π‘—π‘˜

  57. Understanding opinion formation β€’ To better study the opinion formation process we will show a connection between opinion formation and absorbing random walks.

  58. Random Walks on Graphs β€’ A random walk is a stochastic process performed on a graph β€’ Random walk: – Start from a node chosen uniformly at random with 1 probability π‘œ . – Pick one of the outgoing edges uniformly at random – Move to the destination of the edge – Repeat. β€’ Made very popular with Google’s PageRank algorithm.

  59. Example β€’ Step 0 𝑀 2 𝑀 1 𝑀 3 𝑀 5 𝑀 4

  60. Example β€’ Step 0 𝑀 2 𝑀 1 𝑀 3 𝑀 5 𝑀 4

  61. Example β€’ Step 1 𝑀 2 𝑀 1 𝑀 3 𝑀 5 𝑀 4

  62. Example β€’ Step 1 𝑀 2 𝑀 1 𝑀 3 𝑀 5 𝑀 4

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend