{"title":"Maximizing circle of trust in online social networks","authors":"Yilin Shen, Yu-Song Syu, Dung T. Nguyen, M. Thai","doi":"10.1145/2309996.2310023","DOIUrl":null,"url":null,"abstract":"As an imperative channel for fast information propagation, Online Social Networks(OSNs) also have their defects. One of them is the information leakage, i.e., information could be spread via OSNs to the users whom we are not willing to share with. Thus the problem of constructing a circle of trust to share information with as many friends as possible without further spreading it to unwanted targets has become a challenging research topic but still remained open.\n Our work is the first attempt to study the Maximum Circle of Trust problem seeking to share the information with the maximum expected number of poster's friends such that the information spread to the unwanted targets is brought to its knees. First, we consider a special and more practical case with the two-hop information propagation and a single unwanted target. In this case, we show that this problem is NP-hard, which denies the existence of an exact polynomial-time algorithm. We thus propose a Fully Polynomial-Time Approximation Scheme (FPTAS), which can not only adjust any allowable performance error bound but also run in polynomial time with both the input size and allowed error. FPTAS is the best approximation solution one can ever wish for an NP-hard problem. We next consider the number of unwanted targets is bounded and prove that there does not exist an FPTAS in this case. Instead, we design a Polynomial-Time Approximation Scheme (PTAS) in which the allowable error can also be controlled. Finally, we consider a general case with many hops information propagation and further show its #P-hardness and propose an effective Iterative Circle of Trust Detection (ICTD) algorithm based on a novel greedy function. An extensive experiment on various real-word OSNs has validated the effectiveness of our proposed approximation and ICTD algorithms.","PeriodicalId":91270,"journal":{"name":"HT ... : the proceedings of the ... ACM Conference on Hypertext and Social Media. ACM Conference on Hypertext and Social Media","volume":"30 1 1","pages":"155-164"},"PeriodicalIF":0.0000,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"HT ... : the proceedings of the ... ACM Conference on Hypertext and Social Media. ACM Conference on Hypertext and Social Media","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2309996.2310023","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
As an imperative channel for fast information propagation, Online Social Networks(OSNs) also have their defects. One of them is the information leakage, i.e., information could be spread via OSNs to the users whom we are not willing to share with. Thus the problem of constructing a circle of trust to share information with as many friends as possible without further spreading it to unwanted targets has become a challenging research topic but still remained open.
Our work is the first attempt to study the Maximum Circle of Trust problem seeking to share the information with the maximum expected number of poster's friends such that the information spread to the unwanted targets is brought to its knees. First, we consider a special and more practical case with the two-hop information propagation and a single unwanted target. In this case, we show that this problem is NP-hard, which denies the existence of an exact polynomial-time algorithm. We thus propose a Fully Polynomial-Time Approximation Scheme (FPTAS), which can not only adjust any allowable performance error bound but also run in polynomial time with both the input size and allowed error. FPTAS is the best approximation solution one can ever wish for an NP-hard problem. We next consider the number of unwanted targets is bounded and prove that there does not exist an FPTAS in this case. Instead, we design a Polynomial-Time Approximation Scheme (PTAS) in which the allowable error can also be controlled. Finally, we consider a general case with many hops information propagation and further show its #P-hardness and propose an effective Iterative Circle of Trust Detection (ICTD) algorithm based on a novel greedy function. An extensive experiment on various real-word OSNs has validated the effectiveness of our proposed approximation and ICTD algorithms.
在线社交网络作为信息快速传播的必要渠道,也有其自身的缺陷。其中之一是信息泄露,即信息可能通过osn传播给我们不愿意与之共享的用户。因此,如何构建一个信任圈,与尽可能多的朋友共享信息,而不进一步传播给不想要的目标,已经成为一个具有挑战性的研究课题,但仍然是一个开放的问题。我们的工作是第一次尝试研究最大信任圈问题,寻求与发帖者朋友的最大期望数量共享信息,从而使信息传播到不想要的目标。首先,我们考虑了一种特殊的更实际的情况,即两跳信息传播和一个不需要的目标。在这种情况下,我们证明了这个问题是np困难的,它否认了一个精确多项式时间算法的存在。因此,我们提出了一种完全多项式时间近似方案(FPTAS),它不仅可以调整任何允许的性能误差范围,而且可以在输入大小和允许误差的多项式时间内运行。对于NP-hard问题,FPTAS是最好的近似解。接下来,我们考虑不需要的目标的数量是有界的,并证明在这种情况下不存在FPTAS。相反,我们设计了一个多项式时间近似方案(PTAS),其中允许误差也可以控制。最后,我们考虑了一种具有多跳数信息传播的一般情况,进一步证明了其# p -硬度,并提出了一种有效的基于新型贪婪函数的迭代信任圆检测(ICTD)算法。在各种现实世界的osn上进行的大量实验验证了我们提出的近似和ICTD算法的有效性。