Abstract
Large graphs are prevalent in many applications and enable a variety of information dissemination processes, e.g., meme, virus, and influence propagation. How can we optimize the underlying graph structure to affect the outcome of such dissemination processes in a desired way (e.g., stop a virus propagation, facilitate the propagation of a piece of good idea, etc)? Existing research suggests that the leading eigenvalue of the underlying graph is the key metric in determining the so-called epidemic threshold for a variety of dissemination models. In this paper, we study the problem of how to optimally place a set of edges (e.g., edge deletion and edge addition) to optimize the leading eigenvalue of the underlying graph, so that we can guide the dissemination process in a desired way. We propose effective, scalable algorithms for edge deletion and edge addition, respectively. In addition, we reveal the intrinsic relationship between edge deletion and node deletion problems. Experimental results validate the effectiveness and efficiency of the proposed algorithms.
- Deepak Agarwal, Andrei Z. Broder, Deepayan Chakrabarti, Dejan Diklic, Vanja Josifovski, and Mayssam Sayyadian. 2007. Estimating rates of rare events at multiple resolutions. In KDD. San Jose, CA, USA, 16--25. Google ScholarDigital Library
- Lars Backstrom and Jure Leskovec. 2011. Supervised random walks: Predicting and recommending links in social networks. In WSDM. Hong Kong, China, 635--644. Google ScholarDigital Library
- Tanya Berger-Wolf and others. 2011. Working for influence: Effect of network density and modularity on diffusion in networks. In Proceedings of the 2011 IEEE 11th International Conference on Data Mining Workshops (ICDMW). IEEE, Vancouver, Canada, 933--940. Google ScholarDigital Library
- Alex Beutel, B. Aditya Prakash, Roni Rosenfeld, and Christos Faloutsos. 2012. Interacting viruses in networks: Can both survive? In Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, New York, NY, 426--434. Google ScholarDigital Library
- Sushil Bikhchandani, David Hirshleifer, and Ivo Welch. 1992. A theory of fads, fashion, custom, and cultural change in informational cascades. J. Pol. Economy 100, 5 (October 1992), 992--1026.Google ScholarCross Ref
- Adrian N. Bishop and Iman Shames. 2011. Link operations for slowing the spread of disease in complex networks. EPL (Europhysics Letters) 95.1 (2011), 18005.Google ScholarCross Ref
- Linda Briesemeister, Patric Lincoln, and Philip Porras. 2003. Epidemic profiles and defense of scale-free networks. WORM 2003 (Oct. 27 2003), 67--75. Google ScholarDigital Library
- Andrei Z. Broder, Ravi Kumar, Farzin Maghoul, Prabhakar Raghavan, Sridhar Rajagopalan, Raymie Stata, Andrew Tomkins, and Janet L. Wiener. 2000. Graph structure in the Web. Computer Networks 33, 1--6 (2000), 309--320. Google ScholarDigital Library
- Chen Chen, Jingrui He, Nadya Bliss, and Hanghang Tong. 2015. On the connectivity of multi-layered networks: Models, measures and optimal control. In ICDM. Atlantic City, NJ, USA, 715--720. Google ScholarDigital Library
- Chen Chen and Hanghang Tong. 2015. Fast eigen-functions tracking on dynamic graphs. In Proceedings of the 2015 SIAM International Conference on Data Mining. SIAM, Vancouver, BC, CA, 559--567.Google ScholarCross Ref
- Chen Chen, Hanghang Tong, B. Aditya Prakash, Charalampos E. Tsourakakis, Tina Eliassi-Rad, Christos Faloutsos, and Duen Horng Chau. 2016. Node immunization on large graphs: Theory and algorithms. Knowledge and Data Engineering, IEEE Transactions on 28, 1 (2016), 113--126. Google ScholarDigital Library
- Wei Chen, Chi Wang, and Yajun Wang. 2010. Scalable influence maximization for prevalent viral marketing in large-scale social networks. In KDD. Washington DC, USA, 1029--1038. Google ScholarDigital Library
- Samik Datta, Anirban Majumder, and Nisheeth Shrivastava. 2010. Viral marketing for multiple products. In ICDM. Sydney, Australia, 118--127. Google ScholarDigital Library
- L. C. Freeman. 1977. A set of measures of centrality based on betweenness. Sociometry (1977), 35--41.Google Scholar
- A. Ganesh, E. L. Massouli, and D. Towsley. 2005. The effect of network topology on the spread of epidemics. In INFOCOM. Miami, FL, USA, 1455--1466.Google Scholar
- Yong Ge, Hui Xiong, Alexander Tuzhilin, Keli Xiao, Marco Gruteser, and Michael J. Pazzani. 2010. An energy-efficient mobile recommender system. In KDD. Washington DC, USA, 899--908. Google ScholarDigital Library
- Jacob Goldenberg, Barak Libai, and Eitan Muller. 2001. Talk of the network: A complex systems look at the underlying process of word-of-mouth. Marketing Letters 12.3 (2001), 211--223.Google Scholar
- Gene H. Golub and Charles F. Van Loan. 1996. Matrix Computations. The Johns Hopkins University Press.Google ScholarDigital Library
- D. Gruhl, R. Guha, D. Liben-Nowell, and A. Tomkins. 2004. Information diffusion through blogspace. In WWW ’04. New York, 491--501. www.www2004.org/proceedings/docs/1p491.pdf. Google ScholarDigital Library
- Habiba Habiba. 2013. Critical Individuals in Dynamic Population Networks. Ph.D. Dissertation. Northwestern University. Google ScholarDigital Library
- Yukio Hayashi, Masato Minoura, and Jun Matsukubo. 2003. Recoverable prevalence in growing scale-free networks and the effective immunization. arXiv:cond-mat/0305549 v2 (Aug. 6 2003).Google Scholar
- David Heckerman, David Maxwell Chickering, Christopher Meek, Robert Rounthwaite, and Carl Myers Kadie. 2000. Dependency networks for collaborative filtering and data visualization. In UAI. San Francisco, CA, USA, 264--273. Google ScholarDigital Library
- Keith Henderson, Brian Gallagher, Lei Li, Leman Akoglu, Tina Eliassi-Rad, Hanghang Tong, and Christos Faloutsos. 2011. It’s who you know: Graph mining using recursive structural features. In Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, San Diego, CA, USA, 663--671. Google ScholarDigital Library
- Herbert W. Hethcote. 2000. The mathematics of infectious diseases. SIAM Rev. 42 (2000), 599--653. Google ScholarDigital Library
- Petter Holme, Beom Jun Kim, Chang No Yoon, and Seung Kee Han. 2002. Attack vulnerability of complex networks. Physical Review E 65.5 (2002), 056109.Google Scholar
- Eitan Israeli and R. Kevin Wood. 2002. Shortest-path network interdiction. Networks 40, 2 (2002), 97--111.Google ScholarCross Ref
- U. Kang, Spiros Papadimitriou, Jimeng Sun, and Hanghang Tong. 2011. Centralities in large networks: Algorithms and observations. In SDM. Mesa, AZ, USA, 119--130.Google Scholar
- Richard M. Karp. 1972. Reducibility Among Combinatorial Problems. Springer, US.Google Scholar
- George Karypis and Vipin Kumar. 1999. Multilevel -way hypergraph partitioning. In DAC. New Orleans, LA, USA, 343--348. Google ScholarDigital Library
- D. Kempe, J. Kleinberg, and E. Tardos. 2003. Maximizing the spread of influence through a social network. In KDD. Washington DC, 137--146. Google ScholarDigital Library
- Byung Cho Kim and Sunghwan Jung. 2013. Effective immunization of online networks: A self-similar selection approach. Inf. Tech. Manag. 14, 3 (2013), 257--268. Google ScholarDigital Library
- Jon M. Kleinberg. 1998. Authoritative sources in a hyperlinked environment. In ACM-SIAM Symposium on Discrete Algorithms. Google ScholarDigital Library
- Yehuda Koren. 2009. Collaborative filtering with temporal dynamics. In KDD. Paris, France, 447--456. Google ScholarDigital Library
- Ravi Kumar, Jasmine Novak, Prabhakar Raghavan, and Andrew Tomkins. 2005. On the bursty evolution of blogspace. In WWW. Chiba, Japan, 159--178. Google ScholarDigital Library
- Theodoros Lappas, Kun Liu, and Evimaria Terzi. 2009. Finding a team of experts in social networks. In KDD. Paris, France, 467--476. Google ScholarDigital Library
- Theodoros Lappas, Evimaria Terzi, Dimitrios Gunopulos, and Heikki Mannila. 2010. Finding effectors in social networks. In KDD. Washington DC, USA, 1059--1068. Google ScholarDigital Library
- Jure Leskovec, Lada A. Adamic, and Bernardo A. Huberman. 2006. The dynamics of viral marketing. In EC. ACM Press, New York, NY, USA, 228--237. Google ScholarDigital Library
- Jure Leskovec, Mary McGlohon, Christos Faloutsos, Natalie Glance, and Matthew Hurst. 2007. Cascading behavior in large blog graphs: Patterns and a model. In Society of Applied and Industrial Mathematics: Data Mining (SDM07). Mineapolis, MN, USA, 551--556.Google Scholar
- Weifa Liang, Xiaojun Shen, and Qing Hu. 2000. Finding the most vital edge for graph minimization problems on meshes and hypercubes. International Journal of Parallel and Distributed Systems and Networks 3.4 (2000), 197--205.Google Scholar
- David Liben-Nowell and Jon Kleinberg. 2007. The link prediction problem for social networks. Journal of the American Society for Information Science and Technology 58.7 (2007), 1019--1031. Google ScholarDigital Library
- Ryan Lichtenwalter, Jake T. Lussier, and Nitesh V. Chawla. 2010. New perspectives and methods in link prediction. In KDD. Washington DC, 243--252. Google ScholarDigital Library
- Chao Liu, Fan Guo, and Christos Faloutsos. 2009. BBM: Bayesian browsing model from petabyte-scale data. In KDD. Paris, France, 537--546. Google ScholarDigital Library
- Arun S. Maiya. 2011. Sampling and Inference in Complex Networks. Ph.D. Dissertation. Stanford University. Google ScholarDigital Library
- Arun S. Maiya and Tanya Y. Berger-Wolf. 2010. Sampling community structure. In WWW. Raleigh, NC, USA, 701--710. Google ScholarDigital Library
- Arun S. Maiya and Tanya Y. Berger-Wolf. 2011. Benefits of bias: Towards better characterization of network sampling. In Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, San Diego, 105--113. Google ScholarDigital Library
- Jose Marcelino and Marcus Kaiser. 2009. Reducing influenza spreading over the airline network. PLoS Currents 1 (2009).Google Scholar
- Hossein Maserrat and Jian Pei. 2010. Neighbor query friendly compression of social networks. In KDD. Washington DC, USA, 533--542. Google ScholarDigital Library
- Yasuko Matsubara, Yasushi Sakurai, B. Aditya Prakash, Lei Li, and Christos Faloutsos. 2012. Rise and fall patterns of information diffusion: Model and implications. In Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, Beijing, 6--14. Google ScholarDigital Library
- Attilio Milanese, Jie Sun, and Takashi Nishikawa. 2010. Approximating spectral impact of structural perturbations in large networks. Physical Review E 81.4 (2010), 046112.Google Scholar
- James Moody and Douglas R. White. 2002. Social cohesion and embeddedness: A hierarchical conception of social groups. Sociological Methodology (2002), 365--368.Google Scholar
- Jennifer Neville, Brian Gallagher, and Tina Eliassi-Rad. 2009. Evaluating statistical tests for within-network classifiers of relational data. In ICDM. Miami, FL, USA, 397--406. Google ScholarDigital Library
- M. E. J. Newman. 2005. A measure of betweenness centrality based on random walks. Soc. Networks 27 (2005), 39--54.Google ScholarCross Ref
- Huy Nguyen. 2013. Interactions on Complex Networks: Inference Algorithms and Applications. Ph.D. Dissertation. University of Houston.Google Scholar
- Huy Nguyen and Rong Zheng. 2013. On budgeted influence maximization in social networks. IEEE J. Select. Areas Commun. 31, 6 (2013), 1084--1094.Google ScholarCross Ref
- Caleb C. Noble and Diane J. Cook. 2003. Graph-based anomaly detection. In KDD. Washington DC, 631--636. Google ScholarDigital Library
- Lawrence Page, Sergey Brin, Rajeev Motwani, and Terry Winograd. 1998. The PageRank Citation Ranking: Bringing Order to the Web. Technical Report. Stanford Digital Library Technologies Project. Retrieved from http://dbpubs.stanford.edu/pub/1999-66 Paper SIDL-WP-1999-0120.Google Scholar
- Cynthia A. Phillips. 1993. The network inhibition problem. In STOC. San Diego, CA, USA, 776--785. Google ScholarDigital Library
- B. Aditya Prakash. 2012a. propagation and immunization in large networks. XRDS: Crossroads, The ACM Magazine for Students 19, 1 (2012), 56--59. Google ScholarDigital Library
- B. Aditya Prakash. 2012b. Understanding and Managing Propagation on Large Networks: Theory, Algorithms, and Models. Ph.D. Dissertation. Carnegie Mellon University, Pittsburgh.Google Scholar
- B. Aditya Prakash, Deepayan Chakrabarti, Michalis Faloutsos, Nicholas Valler, and Christos Faloutsos. 2012a. Threshold conditions for arbitrary cascade models on arbitrary networks. Knowledge and Information Systems 33.3 (2012), 549--575.Google Scholar
- B. Aditya Prakash, Hanghang Tong, Nicholas Valler, Michalis Faloutsos, and Christos Faloutsos. 2010. Virus propagation on time-varying networks: Theory and immunization algorithms. In ECML/PKDD (3). Barcelona, Spain, 99--114. Google ScholarDigital Library
- B. Aditya Prakash, Jilles Vreeken, and Christos Faloutsos. 2012b. Spotting culprits in epidemics: How many and which ones?. In Data Mining (ICDM), 2012 IEEE 12th International Conference on. IEEE, Brussels, Belgium, 11--20. Google ScholarDigital Library
- B. Aditya Prakash, Jilles Vreeken, and Christos Faloutsos. 2013. Efficiently spotting the starting points of an epidemic in a large graph. Knowl. Info. Sys. (2013), 1--25.Google Scholar
- M. Richardson and P. Domingos. 2002. Mining knowledge-sharing sites for viral marketing. SIGKDD. Edmonton, AB, CA, 61--70. Google ScholarDigital Library
- Kazumi Saito, Kouzou Ohara, Yuki Yamagishi, Masahiro Kimura, and Hiroshi Motoda. 2011. Learning diffusion probability based on node attributes in social networks. In Foundations of Intelligent Systems. Springer, 153--162. Google ScholarDigital Library
- Venu Satuluri and Srinivasan Parthasarathy. 2009. Scalable graph clustering using stochastic flows: Applications to community discovery. In KDD. Paris, France, 737--746. Google ScholarDigital Library
- Christian M. Schneider, Tamara Mihaljev, Shlomo Havlin, and Hans J. Herrmann. 2011. Restraining epidemics by improving immunization strategies. CoRR abs/1102.1929 (2011).Google Scholar
- Hanhuai Shan and Arindam Banerjee. 2010. Generalized probabilistic matrix factorizations for collaborative filtering. In ICDM. Sydney, Australia, 1025--1030. Google ScholarDigital Library
- Hong Shen. 1995. Finding the k most vital edges with respect to minimum spanning tree. Acta Inform. 36 (1995), 405--424.Google ScholarCross Ref
- G. W. Stewart and Ji-Guang Sun. 1990. Matrix Perturbation Theory. Academic Press.Google Scholar
- Chenhao Tan, Jie Tang, Jimeng Sun, Quan Lin, and Fengjiao Wang. 2010. Social action tracking via noise tolerant time-varying factor graphs. In KDD. Washington DC, 1049--1058. Google ScholarDigital Library
- Hanghang Tong, B. Aditya Prakash, Tina Eliassi-Rad, Michalis Faloutsos, and Christos Faloutsos. 2012. Gelling, and melting, large graphs by edge manipulation. In Proceedings of the 21st ACM International Conference on Information and Knowledge Management. ACM, Maui, Hawaii, 245--254. Google ScholarDigital Library
- Hanghang Tong, B. Aditya Prakash, Charalampos E. Tsourakakis, Tina Eliassi-Rad, Christos Faloutsos, and Duen Horng Chau. 2010. On the vulnerability of large graphs. In ICDM. Sydney, Australia, 1091--1096. Google ScholarDigital Library
- Gaurav Tuli, Chris J. Kuhlman, Madhav V. Marathe, S. S. Ravi, and Daniel J. Rosenkrantz. 2012. Blocking complex contagions using community structure. In Workshop Multiagent Interaction Netw.Google Scholar
- Nicholas Valler, B. Aditya Prakash, Hanghang Tong, Michalis Faloutsos, and Christos Faloutsos. 2011. Epidemic spread in mobile ad hoc networks: Determining the tipping point. In Networking (1). 266--280. Google ScholarDigital Library
- Nicholas Charles Valler. 2012. Spreading Processes on Networks Theory and Applications. Ph.D. Dissertation. UNIVERSITY OF CALIFORNIA.Google Scholar
- Dashun Wang, Zhen Wen, Hanghang Tong, Ching-Yung Lin, Chaoming Song, and Albert-László Barabási. 2011. Information spreading in context. In Proceedings of the 20th International Conference on World Wide Web. ACM, Hyderabad, India, 735--744. Google ScholarDigital Library
- Yang Wang, Deepayan Chakrabarti, Chenxi Wang, and Christos Faloutsos. 2003. Epidemic spreading in real networks: An eigenvalue viewpoint. In SRDS. 25--34.Google Scholar
- Xuetao Wei, Nicholas C. Valler, B. Aditya Prakash, Iulian Neamtiu, Michalis Faloutsos, and Christos Faloutsos. 2013. Competing memes propagation on networks: A network science perspective. Selected Areas in Communications, IEEE Journal on 31, 6 (2013), 1049--1060.Google Scholar
- R. Kevin Wood. 1993. Network interdiction problem. Math. Com. Model. 17, 2 (1993), 1--18. Google ScholarDigital Library
- D. Xin, J. Han, X. Yan, and H. Cheng. 2005. Mining compressed frequent-pattern sets. In VLDB. Trondheim, Norway, 709--720. Google ScholarDigital Library
- Yuki Yamagishi, Kazumi Saito, Kouzou Ohara, Masahiro Kimura, and Hiroshi Motoda. 2011. Learning attribute-weighted voter model over social networks. J. Mach. Learn. Res.-Proc. Track 20 (2011), 263--280.Google Scholar
- Xiaoxin Yin, Jiawei Han, and Philip S. Yu. 2005. Cross-relational clustering with user’s guidance. In KDD. Chicago, IL, USA, 344--353. Google ScholarDigital Library
Index Terms
- Eigen-Optimization on Large Graphs by Edge Manipulation
Recommendations
Gelling, and melting, large graphs by edge manipulation
CIKM '12: Proceedings of the 21st ACM international conference on Information and knowledge managementControlling the dissemination of an entity (e.g., meme, virus, etc) on a large graph is an interesting problem in many disciplines. Examples include epidemiology, computer security, marketing, etc. So far, previous studies have mostly focused on ...
Interplay between topology and edge weights in real-world graphs: concepts, patterns, and an algorithm
AbstractWhat are the relations between the edge weights and the topology in real-world graphs? Given only the topology of a graph, how can we assign realistic weights to its edges based on the relations? Several trials have been done for edge-weight ...
Scalable Vaccine Distribution in Large Graphs given Uncertain Data
CIKM '14: Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge ManagementGiven an noisy or sampled snapshot of a network, like a contact-network or the blogosphere, in which an infection (or meme/virus) has been spreading for some time, what are the best nodes to immunize (vaccinate)? Manipulating graphs via node removal by ...
Comments