{"title":"Target influence maximization problem under avoiding unexpected users interruption in online social network","authors":"Xiaoping Zhu , Jianming Zhu , Priyanshi Garg , Guoqing Wang","doi":"10.1016/j.tcs.2025.115513","DOIUrl":null,"url":null,"abstract":"<div><div>The effectiveness of viral marketing lies in the fact that it can activate a “chain-reaction” driven by word-of-mouth. This paper defines unexpected users’ interruption as the unintentional activation of impedimental users who disseminate negative evaluations. Such interruptions may arise during the process of selecting seed nodes intended to maximize influence spread among target users and foster brand awareness. Furthermore, it is typical to tailor promotions for specific user groups. For instance, consider an event organizer who shares an event advertisement on a social platform, aiming to capture the interest of a large local audience. To solve this problem, we devise positive and target influence maximization under the impedimental influence problem (PTIM), aiming to initiate from a set of influential seed users such that eventually, they will trigger the largest positive influence spread among target users. We prove that the objective function is neither submodular nor supermodular. Then, we decompose it into the difference between two submodular functions (DS decomposition). To solve the maximization problem of DS decomposition under cardinality constraint, we provide an explicit DS greedy algorithm with approximation guarantee. Finally, the experimental simulations on three network data sets demonstrate the effectiveness of our method.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1056 ","pages":"Article 115513"},"PeriodicalIF":1.0000,"publicationDate":"2025-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Theoretical Computer Science","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0304397525004517","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0
Abstract
The effectiveness of viral marketing lies in the fact that it can activate a “chain-reaction” driven by word-of-mouth. This paper defines unexpected users’ interruption as the unintentional activation of impedimental users who disseminate negative evaluations. Such interruptions may arise during the process of selecting seed nodes intended to maximize influence spread among target users and foster brand awareness. Furthermore, it is typical to tailor promotions for specific user groups. For instance, consider an event organizer who shares an event advertisement on a social platform, aiming to capture the interest of a large local audience. To solve this problem, we devise positive and target influence maximization under the impedimental influence problem (PTIM), aiming to initiate from a set of influential seed users such that eventually, they will trigger the largest positive influence spread among target users. We prove that the objective function is neither submodular nor supermodular. Then, we decompose it into the difference between two submodular functions (DS decomposition). To solve the maximization problem of DS decomposition under cardinality constraint, we provide an explicit DS greedy algorithm with approximation guarantee. Finally, the experimental simulations on three network data sets demonstrate the effectiveness of our method.
期刊介绍:
Theoretical Computer Science is mathematical and abstract in spirit, but it derives its motivation from practical and everyday computation. Its aim is to understand the nature of computation and, as a consequence of this understanding, provide more efficient methodologies. All papers introducing or studying mathematical, logic and formal concepts and methods are welcome, provided that their motivation is clearly drawn from the field of computing.