Next Article in Journal
Controlled Reflected McKean–Vlasov SDEs and Neumann Problem for Backward SPDEs
Previous Article in Journal
Ant Colony and Whale Optimization Algorithms Aided by Neural Networks for Optimum Skin Lesion Diagnosis: A Thorough Review
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

HEDV-Greedy: An Advanced Algorithm for Influence Maximization in Hypergraphs

College of Systems Engineering, National University of Defense Technology, Changsha 410073, China
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Mathematics 2024, 12(7), 1041; https://doi.org/10.3390/math12071041
Submission received: 8 January 2024 / Revised: 22 March 2024 / Accepted: 28 March 2024 / Published: 30 March 2024
(This article belongs to the Section Network Science)

Abstract

:
Influence maximization (IM) has shown wide applicability in various fields over the past few decades, e.g., viral marketing, rumor control, and prevention of infectious diseases. Nevertheless, existing research on IM primarily focuses on ordinary networks with pairwise connections between nodes, which fall short in the representation of higher-order relations. Influence maximization on hypergraphs (HIM) has received limited research attention. A novel evaluation function, which aims to evaluate the spreading influence of selected nodes on hypergraphs, i.e., expected diffusion value on hypergraph (HEDV), is proposed in this work. Then, an advanced greedy-based algorithm, termed HEDV-greedy, is proposed to select seed nodes with maximum spreading influence on the hypergraph. We conduct extensive experiments on eight real-world hypergraph datasets, benchmarking HEDV-greedy against eight state-of-the-art methods for the HIM problem. Extensive experiments conducted on real-world datasets highlight the effectiveness and efficiency of our proposed methods. The HEDV-greedy algorithm demonstrates a marked reduction in time complexity by two orders of magnitude compared to the conventional greedy method. Moreover, HEDV-greedy outperforms other state-of-the-art algorithms across all datasets. Specifically, under conditions of lower propagation probability, HEDV-greedy exhibits an average improvement in solution accuracy of 25.76%.

1. Introduction

In recent times, social media platforms like Facebook, TikTok, Twitter, and Instagram have gained widespread popularity on a global scale, catering to the increasing need for communication and social interaction. Since 2023, the impact of social media on our daily lives has continued to surge, with individuals now dedicating more than two and a half hours per day to these platforms, exceeding the time spent on traditional broadcast and cable television by 40 min [1]. This escalating engagement underscores the pivotal role these platforms play in modern communication.
Moreover, given their expansive user base and rapid information dissemination, social media channels have evolved into indispensable marketing avenues for businesses and advertisers. In a bid to maximize marketing effectiveness while minimizing costs, the strategy of viral marketing has emerged [2]. This approach involves targeting a select group of initial users within a social network and leveraging their recommendations and sharing activities to promote a product effectively. Domingos and Richardson drew inspiration from viral marketing, utilizing Markov random field to simulate the dynamics of information propagation [3]. They conceptualized the challenge as an optimization task, introducing the influence maximization (IM) problem. The IM problem seeks to strategically select a predefined number of nodes within a given network, forming a seed set, and aims to maximize influence diffusion according to a specified information propagation model. Beyond its applications in viral marketing, IM holds substantial relevance in areas like rumor control [4], the prevention of infectious diseases [5], and others [6,7,8]. In the context of rumor control, the identification of crucial nodes and the prompt implementation of interventions can effectively curtail the spread and impact of rumors. In the realm of infectious disease prevention, the identification of individuals with high transmission capabilities and the implementation of targeted treatment and control measures can effectively contain the spread of diseases.
Existing research on the IM problem primarily focuses on ordinary networks with pairwise connections between nodes. However, in scenarios involving relationships among three or more entities, ordinary networks fall short in representation. In fact, besides ordinary networks, self-similar graphs and hypergraphs can also be used to construct social networks [9]. Hypergraphs introduced by Berge utilize hyperedges to represent interactions among multiple nodes. A hyperedge can encompass multiple nodes, where the nodes within the same hyperedge are interconnected in a fully connected manner. Hypergraphs find broad applications in modeling multidimensional relationships, such as co-authorship in scientific research papers, user group relationships in social networking platforms, and the combinations of various proteins in organic compounds [10]. Despite their robust representation capabilities, research on hypergraph influence maximization (HIM) remains limited, with few studies in this area. Challenges in HIM research involve proposing novel diffusion models for hypergraphs to more accurately depict real-world spreading processes and developing solution methods that balance computational complexity and accuracy.
The greedy method, initially developed by Kempe et al. for the IM problem on ordinary networks [11], is crucial for addressing the HIM problem but suffers from high computational complexity. The primary concern is reducing the time expenditure in selecting nodes with maximum marginal benefit. Building upon the expected diffusion value (EDV) framework [12], we introduce the expected diffusion value on hypergraph (HEDV) framework, accounting for the unique topology and spreading processes of hypergraphs. HEDV approximates the global diffusion capacity of seed nodes by considering the spread within their neighbor range. The HEDV-greedy method utilizes HEDV to select seed nodes with maximum spreading influence on the hypergraph. Our algorithm leverages HEDV to approximate the marginal benefit of candidate nodes, enhancing efficiency without compromising accuracy through extensive Monte Carlo simulations. In brief, our key contributions are summarized as follows:
  • We propose a novel function, HEDV, designed to evaluate the spreading influence of seed nodes on hypergraphs. To the best of our knowledge, HEDV is the first quantitative function utilized for evaluating node influence on hypergraphs within this domain. HEDV considers both the topological structure and spreading processes, leading to highly precise evaluations.
  • Based on the HEDV function, we propose an efficient solution to the HIM problem, termed HEDV-greedy. This method represents the first attempt to combine an alternative evaluation method with greedy selection strategies for seed node selection. While avoiding the significant time overhead associated with Monte Carlo simulations, it is capable of obtaining highly accurate solutions.
  • We further conduct extensive experiments on real-world hypergraph datasets, benchmarking HEDV-greedy against other state-of-the-art methods for the HIM problem. The results demonstrate that HEDV-greedy significantly reduces time complexity by two orders of magnitude compared to traditional greedy method. Moreover, HEDV-greedy outperforms other baselines across all datasets, achieving an average improvement of 25.76%.
  • We analyze experimental results under various parameter settings, utilizing visualization techniques and non-parametric tests. The results indicate that HEDV-greedy demonstrates high stability and consistently provides superior solutions across a variety of scenarios. Furthermore, we undertake a comprehensive analysis to achieve a more profound comprehension of the factors that influence the effectiveness of the proposed method.

Organization of the Article

The remaining sections of this paper are organized as follows: Section 2 provides an overview of the hypergraphs and the existing related research, especially the HIM problem. Section 3 introduces the information diffusion model on hypergraphs used in this study, as well as a detailed description of the proposed HEDV and HEDV-greedy. Subsequently, Section 4 presents the experimental setup, including the datasets and algorithms for comparison, and analyzes the experimental results using visualization, non-parametric tests, and other methods. Finally, Section 5 provides a concise conclusion.

2. Related Works

Kempe et al. demonstrated that the IM problem in regular networks is an NP-hard problem, implying that its resolution cannot be achieved in polynomial time [11]. Over the past decade, researchers across diverse domains have undertaken extensive investigations, introducing various algorithms to address the IM problem from distinct angles. The methodologies for tackling IM issues typically fall into five main categories: greedy algorithms, heuristic solutions, approaches based on reverse influence sampling (RIS), community-based strategies, and meta-heuristic optimization algorithms.
A greedy approach was initially introduced by Kempe et al. for addressing the IM problem, whose time expenditure is deemed unacceptable. To enhance efficiency, subsequent greedy-based methods such as CELF [13], CELF++ [14], NewGreedy, MixGreedy [15], and others have been successively proposed. Despite notable reductions in running time achieved by these algorithms, they still grapple with excessive time costs when handling extensive social networks. Furthermore, the prevailing belief is that a node’s location within a network significantly influences the extent of influence propagation. Nodes closer to the network center are deemed more critical, possessing greater diffusion potential. Building on this premise, seed node selection methods inspired by centrality, such as betweenness centrality [16], degree centrality, and closeness centrality [17], have been proposed. Examples of RIS-based approaches include RIS [18], TIM/TIM+ [19], IMM [20], and SSA/D-SSA [21], which overcome the shortcomings of heuristic solutions, such as the absence of theoretical guarantees and unstable solution quality. Nonetheless, the precise control of the required number of reverse reachable sets remains an avenue for further research. Community-based approaches effectively minimize the overlap of influences among seed nodes. Examples of such approaches include CGA [22], INCIM [23], and ComPath [24]. Optimization algorithms inspired by natural phenomena or biological behaviors, known as meta-heuristics, have proven effective in tackling the IM problem. Jiang et al. introduced the EDV evaluation function, utilizing the simulated annealing (SA) algorithm to identify the most influential nodes [12]. Gong et al. proposed the local influence estimation (LIE) function, accounting for influence within the two-hop neighborhood of seed nodes. They utilized the discrete particle swarm optimization (DPSO) algorithm to optimize it [25]. While these methods enhance runtime efficiency compared to greedy strategies, challenges persist in designing precise evaluation functions and efficient optimization mechanisms.
In some instances, the conventional approach of representing intricate networks through simple or directed graphs may fall short in capturing the full complexity of real-world systems under investigation [10]. For example, consider a research collaboration network depicted as a simple graph, where nodes denote authors and an edge connects two nodes if those authors have collaborated on a paper. Within this simplified graph-based representation, we can only discern binary author collaboration, unable to identify scenarios where three or more authors have collaborated due to the inherent limitations of simple and directed graphs, which only allow for pairwise relationships. Hypergraphs offer a more natural means of representing such systems [10]. In a hypergraph, hyperedges can encompass three or more nodes, symbolizing combinations of nodes sharing specific relationships. Consequently, employing a hypergraph to represent a research collaboration network proves highly effective. While authors are still represented as nodes, hyperedges now represent combinations of authors who have collaborated on papers. By examining these hyperedges, we can conclusively detect collaboration involving multiple authors. Given the distinctive topology of hypergraphs, researchers have delved into further exploration of their network structure and topological indicators. For instance, Estrada et al. examined subgraph centrality and clustering in hypergraphs, offering illustrative examples for analysis [26]. Ma and Liu proposed four topological indicators tailored for hypergraphs, including node superdegree, superedge degree, superedge–superedge distance, and superedge overlap [27]. The current landscape of hypergraph research encompasses evolving models, information diffusion models, the HIM problem, community detection [28,29], hyperlink prediction [30], and more. This article places primary emphasis on the HIM problem.
Kempe et al. established that the IM problem is NP-hard in conventional networks [11]. The HIM problem, which can be viewed as an extension of the IM problem in conventional networks, is also NP-hard [31]. In essence, this implies that solving the HIM problem is equally computationally challenging within polynomial time. Presently, research on the IM problem in the context of hypergraphs remains limited and confronts two principal challenges: formulating effective propagation models and developing robust algorithms for selecting seed nodes.
In the realm of propagation models, Du introduced the information dissemination model based on probabilistic hypergraphs [32]. Bodó, acknowledging both community structure and the nonlinear dependence of infection pressure on the number of infected neighbors, extended the susceptible–infected–susceptible (SIS) epidemic model to hypergraphs [33]. Suo et al. utilized hypergraphs to represent clustering relationships among multiple entities and proposed two SIS-based information propagation models, incorporating reaction process strategy and contact process strategy [34]. Recognizing the dynamic nature of social networks, Jiang et al. established an SIS-based information propagation model with three dynamic processes [35]. Antelmi et al. innovatively introduced a propagation model where a hyperedge becomes infected when the number of infected nodes in the hyperedge reaches a certain threshold [36], and a node is considered infected when the number of infected hyperedges it is involved in reaches a specific threshold. Wang et al. defined various states of nodes to characterize diverse attitudes of individuals in the social information spreading process, corresponding to different spreading behaviors. Notably, the state of a node can evolve over time. To capture the dynamics of individual behaviors and information transmission, they devised a two-layer coupling mechanism termed PN-UHTR [37]. Owing to the distinct topological structure and information propagation processes of hypergraphs in comparison to ordinary networks, there exists a compelling necessity for the development of new propagation models better suited for real-world systems.
Moreover, achieving equilibrium between the time expenditure and search precision of search algorithms in the HIM problem stands as a noteworthy focus of research. Xiao et al. [38] and Kapoor et al. [39] introduced innovative multi-criteria measurement approaches. These approaches consider factors such as node degree, star degree, and betweenness to discern pivotal nodes within hypergraphs. Zhu et al. [31] employed directed hypergraphs for modeling social networks and devised a sandwich computing framework to tackle the HIM problem. Nonetheless, the time complexity associated with their methodologies is notably high. In a separate investigation, Zheng et al. [40] delved into the subset influence maximization problem within hypergraphs, presenting an enhanced greedy algorithm with an approximate ratio of 1 1 / e 1 / ( Δ + 1 ) . Additionally, Antelmi [41] proposed a series of greedy-based heuristic solutions to identify the minimum influence set in hypergraphs. In recent research, Xie et al. [42] put forward an adaptive degree discount heuristic algorithm called hyper adaptive degree pruning (HADP) to address the HIM problem. This method iteratively selects nodes with low influence overlap as seeds. Additionally, they extended various methods used to solve IM problems on ordinary networks to hypergraphs as baseline methods for comparison. Experimental results demonstrate that HADP outperforms other baseline methods in terms of effectiveness and efficiency. Despite these endeavors, a common reliance on heuristics rooted in node centrality or greedy strategies prevails in most of these methods, potentially falling short of meeting the accuracy and efficiency criteria for the HIM problem.

3. The Proposed Algorithm

3.1. SIS-Based Information Diffusion Model in Hypergraphs

Suo et al. explored the interplay of information dissemination processes and network structures on hypergraphs, proposing the potential transmission of information through reactive process (RP) or contact process (CP) strategies [34]. Their study introduced two diffusion models, aligned with these strategies, within the SIS epidemic framework. In the RP strategy, infected nodes have the potential to infect all neighboring nodes with a specified probability at each time step. In the CP strategy, activated nodes randomly choose a hyperedge they belong to and subsequently disseminate to all neighbors within the selected hyperedge, guided by a designated probability. Our contention is that the CP strategy more accurately mirrors the actual spread dynamics within social networks compared to the RP strategy. Notably, the CP strategy permits selective sharing of information within distinct groups, resembling real-world scenarios observed in social media platforms. Furthermore, the RP strategy restricts the spread dynamics, as even if multiple common hyperedges exist between an infected node and a susceptible node, the latter only has one chance to be infected by the former at a given time step. Conversely, the susceptible node should logically have a higher likelihood of propagation in such situations.
Hence, this paper adopts the susceptible–infected spreading model with contact process dynamics (SICP) to assess the efficacy of the proposed algorithm, given these considerations. The details are given in Algorithm 1 and Figure 1.
Assuming the initial time step is t = 0 , and a node v 3 is randomly designated to be in the infected state, with all other nodes remaining susceptible, by t = 1 , v 3 randomly chooses one hyperedge ( e 1 ) from its affiliations and transmits the infection to its neighboring nodes within e 1 , governed by probability β . This leads to the infection of node v 2 , prompting its transition to the infected state. Moving to t = 2 , v 3 selects hyperedge e 2 instead for propagation, successfully infecting nodes v 7 and v 8 . Meanwhile, v 2 , confined to hyperedge e 1 , fails to infect any additional nodes. Advancing to t = 3 , nodes v 2 , v 3 , v 7 , and v 8 select hyperedges e 1 , e 2 , e 3 , and e 4 , respectively, for further propagation. Consequently, nodes v 4 and v 6 become infected as a result of this multi-hyperedge spreading dynamic.
Algorithm 1: The susceptible–infected spreading model with contact process dynamics (SICP)
Input:



Output:
Seed node set S
Max time step T
Hypergraph H V , E
Spreading probability β
Infected nodes set I
1:
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
Initialization:  t 1 , I S
while  t T  do:
 for  v i   i n   I  do:
   E v i ← Hyperedges of node v i
   e i ← Randomly select from E v i
   N ( e i ) ← Nodes of hyperedge e i
  for  v j   i n   N ( e i ) \ I do:
    R Generate a number between 0 , 1 randomly
   If  R β :
     I I v j
   end
  end
 end
t t + 1
end

3.2. HEDV: A Function for Evaluating the Diffusion Capacity of Nodes on Hypergraphs

Evaluating the spreading influence of selected seed nodes on an ordinary network is a #P-hard problem. The conventional Monte Carlo method necessitates thousands or even millions of simulations to achieve a reasonably accurate estimation of the selected nodes’ diffusion capacity, leading to substantial resource and time consumption. To address this issue, Jiang et al. proposed the EDV function to approximate the diffusion capacity of seed nodes in the independent cascade (IC) spreading model [12]. The EDV function considers the local spreading process and calculates the expected number of infected neighboring nodes. It provides a good approximation of the diffusion capacity, especially when the spreading probability β is small. The EDV function is defined as follows:
E D V S = K + v i N s 1 1 p τ v i
where S represents the seed node set, K = S , is the size of S , and N s represents the direct neighbors of S (exclusive of nodes in S ). p is the spreading probability in the IC model. τ v i = S N v i represents the number of seed nodes that are the direct neighbors of v i .
Within the SICP model applied to hypergraphs, activated nodes undergo a distinctive propagation process: they randomly choose one hyperedge they participate in and disseminate to all uninfected nodes within that hyperedge with a specific probability. This mechanism markedly differs from the conventional propagation observed in regular networks. To accommodate this unique behavior, we introduce a novel evaluation function termed HEDV, building upon the foundation of the existing EDV function.
H E D V S = K + v i N s   1 v j S N v i   1 P j , i n v i , v j n v j
where v j represents the seed nodes that are also the direct neighbors of v i . P j , i represents the probability that v i is infected by v j , which in SCIP is the constant spreading probability β . n v j represents the number of hyperedges that involve v j and n v i , v j represents the number of hyperedges that simultaneously involve both v j and v i . n v i , v j / n v j represents the probability that v j selects hyperedges that involve v i to spread in. The HEDV is proposed, considering the unique topology and the SICP model on hypergraphs. The probability of v i being infected by seed node v j in the proposed HEDV is the product of spreading probability β and n v i , v j / n v j , rather than the fixed constant β in traditional EDV, which enables HEDV to make more accurate assessments.
To illustrate the computation process of HEDV, let us consider nodes v 5 and v 8 as seed nodes and refer to the hypergraph depicted in Figure 2b. Additionally, we establish a corresponding ordinary network for comparative analysis in Figure 2a, wherein the nodes within each hyperedge are interconnected. For ease of computation, we fix the maximum time step T = 1 and set the spreading probability β to 0.5. Subsequently, we compute the projected extent of influence spreading utilizing both the EDV and HEDV functions.
When using EDV, if a node is a neighbor of any seed node, it has the possibility of β of being infected by the latter. Therefore, calculating EDV on hypergraphs in Figure 2b or the corresponding ordinary network in Figure 2a is the same. The value of τ v i for nodes v 3 , v 4 , v 6 , and v 7 , which are neighbors of both seed nodes v 5 and v 8 , is equal to 2. However, for node v 9 , whose neighbors only include v 8 , the value of τ v i is equal to 1. Nodes v 1 and v 2 have no chance of being infected. Therefore, E D V ( v 5 , v 8 ) = 2 + 4 ( 1 ( 1 β ) 2 ) + 1 β = 5.5 .
For HEDV, the probability of a node v i being infected by seed node v j is the product of spreading probability β and n v i , v j / n v j , which is shown more clearly in the hypergraph in Figure 2b. Seed nodes v 5 and v 8 can select hyperedges { e 2 , e 4 } and { e 2 , e 3 } , respectively, for propagation. The probability of seed nodes v 5 and v 8 selecting hyperedges containing nodes v 3 , v 4 , v 6 , and v 7 for propagation is equal to 0.5. For node v 9 , there is a possibility of being infected only when seed node v 8 selects hyperedge e 3 for propagation. Therefore, H E D V ( v 5 , v 8 ) = 2 + 4 ( 1 ( 1 p 0.5 ) 2 ) + 1 p 0.5 = 4 .
We conduct 2000 Monte Carlo simulations on the hypergraph in Figure 2b, with a maximum time step of 1 and a spreading probability β of 0.5. The average scale of influence spreading is found to be 4.0013, which proves the accuracy of the HEDV function. Additionally, Monte Carlo takes 4.074 s, while HEDV takes 0.043 s, demonstrating the efficiency of the HEDV function.

3.3. HEDV-Greedy: Algorithm for Selecting the Seed Nodes with Maximum Influence

Kempe et al. presented the greedy method as a solution to the IM problem on regular networks [11]. This method incrementally includes nodes with the maximum marginal benefit into the seed set. Despite its notable accuracy and stability, the greedy method necessitates extensive Monte Carlo simulations for evaluating marginal benefits at each iteration, leading to considerable time overhead. In response to this, we introduce a novel approach named HEDV-greedy. This method leverages the HEDV function, as previously proposed, to offer an approximate assessment of marginal benefits, which is shown in Algorithm 2. It systematically adds nodes with the highest HEDV values to the seed set, aiming to mitigate the computational demands associated with the greedy method.
Algorithm 2: HEDV-Greedy
Input:

Output:
Size of seed nodes K
Hypergraph H ( V , E )
Seed node set S
1:
2:
3:
4:
5:
6:
Initialization:  S 0 , k 1
while  S K  do:
    v k a r g m a x v V \ S k 1 { H E D V ( S k 1 { v } ) H E D V ( S k 1 ) }
          S k S k 1 { v k }
             k k + 1
end
HEDV-greedy: We denote S k 1 as the seed nodes that are selected at round k 1 . The expected influence spread by S k 1 is given by H E D V ( S k 1 ) . The marginal benefit of candidate node v is given by H E D V ( S k 1 { v } ) H E D V ( S k 1 ) . At the beginning of the algorithm, S is set to be empty. At round k , we calculate the marginal benefit H E D V ( S k 1 { v } ) H E D V ( S k 1 ) for each candidate node v , where v V \ S k 1 . Node v k with the maximum marginal benefit is inserted into the seed set, i.e., S k S k 1 { v k } . The algorithm is terminated until the seeds set contains K nodes. The HEDV-greedy algorithm efficiently selects nodes with the maximum marginal benefit by utilizing the HEDV function. Such a strategy avoids extensive Monte Carlo simulations, resulting in improved search efficiency while ensuring the preservation of optimization quality.

4. Experiment

The efficacy and efficiency of the proposed algorithm were assessed through comprehensive experiments involving eight hypergraphs generated from real-world data. All algorithms were implemented in Python and executed on a Windows 11 PC platform, featuring an Intel Core i9-13900HX CPU (2.20 GHz) and 16 GB of memory.

4.1. Datasets

We utilized eight real-world hypergraph datasets sourced from diverse domains such as mathematics, social networks, business, medicine, biochemistry, and politics [30,43,44]. These datasets exhibit variations in size, with the number of nodes spanning from 143 to 1668, and the number of hyperedges ranging from 315 to 2351. A summary of the topological characteristics of these datasets is presented in Table 1. Further details are elaborated below, and the abbreviated names in parentheses are employed to reference the respective datasets in the subsequent sections.
Cat-edge-algebra-questions (algebra) and cat-edge-geometry-questions (geometry): The two datasets provide a description of the interaction patterns among different users on the mathematical website named MathOverflow. Cat-edge-madison-restaurant-reviews (restaurant): The dataset is derived from Yelp, an online platform for business reviews and recommendations. Email-Enron (email): The dataset contains email communication data from 150 senior executives at the Enron Corporation. It was publicly released online during the investigation conducted by the Federal Energy Regulatory Commission. Senate-committees (committees): This dataset depicts the relationships among members of the United States Senate, derived from congressional data compiled by Charles Stewart and Jonathan Woon. NDC-classes (NDC): Under the Drug Listing Act of 1972, the U.S. Food and Drug Administration disseminates data concerning all commercially available drugs regulated by the agency, resulting in the creation of the National Drug Code (NDC) Directory. Diseasome (diseasome): This dataset comprises a collection of diseases and their corresponding associated genes. iAF1260b (iAF1260b): This dataset illustrates the interrelationships between reactions and metabolics.

4.2. Algorithms for Comparison

At present, there are limited methods proposed for addressing the HIM problem. Existing algorithms often directly adapt from approaches designed for ordinary networks, neglecting the distinctive topological features of hypergraphs. In order to thoroughly assess the effectiveness of the proposed algorithms, we chose eight additional state-of-the-art methods from categories including greedy algorithms, heuristic solutions, and methods based on reverse influence sampling [42]. These selected methods underwent experimentation on the same set of datasets for comprehensive comparative analysis. Details are as follows:
General-greedy (greedy): An extension of the greedy algorithm, which was first proposed to solve the IM problem on an ordinary network. This method iteratively adds nodes that have the maximum marginal benefit for the current seeds, which are evaluated by Monte Carlo simulations. The number of Monte Carlo simulations was set to 500.
Hyper reverse influence sampling (H-RIS): An extension of the reverse influence sampling (RIS) algorithm, which solves the IM problem on ordinary networks. The algorithm samples RRS and selects the node with the highest occurrence frequency as the seed node. RRS is generated by randomly selecting nodes, performing reverse propagation on them, and collecting the encountered nodes.
Hyper single degree pruning (HSDP): A simplified degree discount heuristic algorithm that iteratively adds nodes with the highest degree to the seed node set. To minimize influence overlap, the degree of neighbors of the seed nodes is uniformly reduced as a punishment.
Hyper adaptive degree pruning (HADP): An adaptive degree discount heuristic algorithm, which is an improved version of HSDP. The algorithm applies different levels of punishment based on the number of neighbors a punished node has in the seeds. Nodes with more neighbors in the seeds receive a stronger punishment.
Hyper collective influence (H-CI): An extension of the collective influence (CI) method, which also solves the IM problem on ordinary networks. The algorithm operates based on the degree of the node itself and the node whose distance from it is l, where l is an adjustable parameter, which is set to 1 and 2 in subsequent work, referred to as H-CI (l = 1) and H-CI (l = 2), respectively. H-CI calculates the CI of all nodes and selects the seed nodes with the highest CI.
Hyper degree (H-degree): An hyperdegree-based heuristic algorithm, which calculates the hyperdegree of all nodes in the hypergraph and arranges them in descending order. Then, the K nodes with the highest rankings are chosen as the seed nodes.
Degree (degree): A degree-based heuristic algorithm, which is similar to H-degree. The algorithm calculates the degree of all nodes in the hypergraph and arranges them in descending order. Then, the K nodes with the highest rankings are chosen as the seed nodes.

4.3. Effectiveness on Real-World Datasets

To assess the performance of our proposed algorithm, we conducted comparisons with other baselines. Initially, we sequentially applied each algorithm to identify the seed node sets and recorded the corresponding time expenses. Subsequently, we utilized the Monte Carlo method to evaluate the propagation capability of each seed set. Finally, based on the propagation capability of different seed sets, we can infer the performance of the respective algorithms. The scale of influence spreading for each seed set is recorded as the average of 2000 Monte Carlo simulations. The stability of the proposed algorithm is evaluated by varying the spreading probability β and maximum time step T , with the seed set size K ranging from 1 to 30.
When β = 0.01 and T = 25 , the propagation capability of the seed sets selected by different algorithms is illustrated in Figure 3, with the x-axis representing the seed set size K and the y-axis representing the number of infected nodes. Table 2 offers the normalized area under the curve (AUC) obtained by each algorithm shown in Figure 3. It can be found that the greedy method, employing 500 Monte Carlo simulations to evaluate the marginal benefit of adding nodes, considering the global network topology and propagation process, achieves the best solution. The HEDV-greedy method enhances efficiency by evaluating the marginal benefit of nodes using HEDV, taking into account the local network topology and propagation process within the nodes’ neighborhood, outperforming other state-of-the-art algorithms across all datasets. The HEDV-greedy method achieves a maximum improvement of 56.8% on the diseasome dataset, and, respectively, obtains improvements of 20.2%, 23.6%, 23.2%, and 20.9% on the email, iAF1260b, NDC, and restaurant datasets. On average, across the eight datasets, it enhances the performance by 21.68% compared to the best-performing algorithm among the baselines.
Notably, greedy and HEDV-greedy exhibit particularly significant advantages compared to other baselines when the seed set size K is small. For instance, on the algebra, geometry, iAF1260b, and restaurant datasets, greedy and HEDV-greedy select highly influential seed nodes when K = 1 15 . This is attributed to their consideration of both network topology and the actual propagation process, unlike heuristic methods relying solely on node degree/hyperdegree or other centrality measures. This emphasizes that centrality can only offer an approximate estimate and does not fully capture a node’s true propagation capability.
Moreover, across all datasets, HADP and HSDP outperform degree, suggesting that adaptively reducing the degree of neighboring nodes near seed nodes helps diminish influence overlap and enhance the performance of solving the HIM problem. Additionally, HADP consistently outperforms HSDP, indicating that applying different degrees of punishment for penalized nodes is more effective. Furthermore, we observe that degree consistently outperforms H-degree, indicating that the number of connected nodes remains the primary factor in determining node spreading capacity. For example, a node involved in numerous hyperedges but with a low number of nodes per hyperedge may not exhibit strong propagation capability.
To better illustrate the discrepancy between greedy and HEDV-greedy, we also present the results of 2000 simulations of the two algorithms on all datasets, and include HADP as a point of reference, as shown in Figure 4. HEDV-greedy, greedy, and HADP are represented by solid lines in red, blue, and green, respectively, to indicate their average spreading scale in multiple propagation simulations. The lighter colored lines represent the simulations of each algorithm, forming three backgrounds with different colors. Figure 4 indicates that the red and blue backgrounds largely overlap, suggesting that HEDV-greedy performs very close to greedy, and even outperforms greedy when T is small. Both algorithms surpass HADP significantly.
Figure 5 depicts the distribution of the spreading scale at different time steps ( T = 1 25 ) for various algorithms when β = 0.01 and K = 30 . The spreading scale for each algorithm initially increases linearly with the number of propagation iterations and then levels off. This pattern arises because, in the early stages of propagation, most nodes are not yet infected, allowing for the seed nodes to propagate more effectively. However, as the propagation progresses, a majority of the network nodes become infected, leading to a decrease in the number of newly infected nodes and a leveling off of the spreading scale. Additionally, the different algorithms exhibit varying slopes of linear increase in the early stages, with some algorithms demonstrating rapid growth and others proceeding at a slower pace, resulting in a lower overall spreading scale by the end of T = 25 . This underscores the significance of selected seed nodes being able to propagate quickly and widely in the early stages, influencing the final spreading scale.

4.4. Efficiency

Table 3 showcases the time expenditure for selecting the seed node set ( β = 0.01 ,   T = 25 ,   K = 30 ). While the Greedy method achieves the highest spreading scale, it incurs significant time overhead, taking several days to select nodes. H-RIS and HCI (l = 2) also exhibit high computational complexity. In contrast, the H-degree and degree methods have the lowest time expenditure, followed by HADP and HSDP. However, their AUCs are relatively low. In comparison, HEDV-greedy substantially reduces running time by at least two orders of magnitude compared to the traditional greedy method, while surpassing all other baselines.

4.5. Parameters Sensitivities

In this subsection, we investigate the sensitivity of the proposed method to the parameters about the propagation probability β and time steps T in order to examine the robustness of the method. Table 4, Table 5 and Table 6, respectively, present the AUCs under the different conditions of T = 35 ,     β = 0.005 ; T = 20 ,   β = 0.02 ; and T = 30 ,   β = 0.015 . The results illustrate that the HEDV-greedy method consistently outperforms all other baselines across various parameter configurations. In comparison with the best-performing baseline, the performance of HEDV-greedy shows improvements of 25.8%, 16.8%, and 13.6% under three distinct parameter settings, respectively. Our experiment also showed that HEDV-greedy outperformed the traditional greedy method under the parameter setting of T = 35 and β = 0.005 . HEDV exhibits greater accuracy in assessing node propagation capacity, particularly when β is small. The above conclusions indicate that the HEDV-greedy method is robust to variations in propagation parameters.

4.6. Non-Parametric Test

To further scrutinize the simulation results, we conducted two non-parametric tests: the Wilcoxon signed-rank test and the Friedman test. The Wilcoxon signed-rank test compares the medians of two independent or paired samples, while the Friedman test compares the medians of three or more related samples [45]. These tests allow for us to ascertain if there are significant differences between the proposed algorithms and the benchmark algorithms. The results of these tests are presented in Table 7 and Table 8.
In the Wilcoxon signed-rank test, for each dataset, the simulation results of each algorithm can be paired with those of HEDV-greedy, forming two paired samples of size K = 30 . The absolute differences between the two samples are ranked, and the ranks are assigned with the corresponding signs of the differences to obtain positive ranks (R+) and negative ranks (R−). The signed ranks are then used as the test statistic to determine if there is a significant difference in medians between the two samples. The results across all datasets are shown in Table 7 ( β = 0.01 , T = 25 ). The P-values indicate the probability of the null hypothesis (no significant difference between the two algorithms) being true, with smaller P-values suggesting a higher likelihood of significant differences between the algorithms. Table 7 demonstrates that across all datasets, HEDV-greedy consistently exhibits significant superiority over all baselines with a p-value of 0.
In the Friedman test, for each dataset, the simulation results of all nine algorithms are ranked under the same seed size K = 1 30 , forming a total of 30 rankings. Subsequently, the average rank is calculated for each algorithm, representing their Friedman rank. The Friedman ranks are used as the test statistic to determine if there is a significant difference in medians among the algorithms. The results of the Friedman test on the datasets are shown in Table 8. HEDV-greedy consistently demonstrates a significant advantage over other baselines, aligning with the results of the Wilcoxon test. Meanwhile, the performances of HADP and HSDP consistently rank second and third. Degree and H-RIS follow, while the H-CI and H-degree methods demonstrate the lowest effectiveness.

4.7. Comprehensive Analysis

Table 9 provides a detailed description of the influence evaluation methods and seed selection strategies employed by algorithms of different categories, including greedy-based algorithms, heuristic solutions, and the proposed HEDV-greedy. A further analysis of the advantages and disadvantages of these strategies was conducted. Specifically, greedy-based algorithms utilize Monte Carlo simulations, offering high accuracy but requiring significant time overhead. Heuristic solutions assess node centrality for faster speed yet struggle to meet accuracy requirements. In contrast, the HEDV function can deliver relatively accurate results within a shorter timeframe. Regarding seed node selection, heuristic solutions directly choose the top-K nodes as seeds, leading to significant overlap in influence. On the other hand, greedy strategies iteratively select nodes with maximum marginal value (MV), greatly enhancing the accuracy of the analysis. The innovative HEDV-greedy approach pioneers a fusion methodology by integrating the heuristic information from the HEDV function with the greedy selection strategy, combining the strengths of both techniques to yield excellent results within a brief period.
Within this framework, the effectiveness of algorithms in addressing HIM problem primarily depends on two aspects: influence evaluation methods and seed selection strategies. Fast and accurate node influence evaluation methods, along with seed selection strategies that are able to minimize influence overlap to the greatest extent, are crucial to the algorithm’s performance.

5. Conclusions

Until now, scholars have presented a range of methodologies and perspectives to address the IM problem in conventional networks. These include algorithms based on greedy strategies, heuristic solutions, community-based approaches, meta-heuristic optimization algorithms, and methods utilizing reverse influence sampling. Despite these efforts, the HIM problem remains a formidable challenge with limited research focus. This study introduces an evaluation function, termed HEDV, to estimate the influence propagation scale of seed nodes on hypergraphs. The integration of HEDV into a greedy strategy yields a method named HEDV-greedy. In HEDV-greedy, HEDV serves as a metric for the marginal benefit of candidate nodes during seed node selection. To the best of our knowledge, HEDV is the pioneering quantitative function utilized for evaluating node influence on hypergraphs within this domain. Furthermore, HEDV-greedy represents the first integrated approach that combines a novel influence evaluation method with a greedy selection strategy. To validate the efficacy of the proposed algorithm, we conducted experiments comparing it with various state-of-the-art algorithms, including those from previous researchers and extensions of ordinary network algorithms. The experiments involved hypergraphs generated from real data in diverse domains, with results visualized and analyzed using the AUCs and non-parametric tests. The HEDV-greedy algorithm showcases a significant reduction in time complexity by two orders of magnitude in comparison to the traditional greedy method. Furthermore, HEDV-greedy surpasses other cutting-edge algorithms in performance across all datasets. Particularly, in scenarios with lower propagation probability, HEDV-greedy demonstrates an average enhancement in solution accuracy of 25.76%. Simultaneously, two non-parametric testing methods also confirmed that HEDV-greedy significantly outperforms all other baselines by a clear margin.
The noteworthy aspect of HEDV-greedy is the incorporation of heuristic information into a greedy strategy. Experimental results underscore that such approaches can markedly reduce time complexity while maintaining a specified level of accuracy, offering fresh perspectives on addressing the IM problem in large-scale networks. Additionally, the scarcity of methods utilizing meta-heuristic optimization algorithms for solving the HIM problem is acknowledged, primarily due to the absence of quick indicators for evaluating influence size in a given seed set on hypergraphs. The proposed approximate function, HEDV, not only addresses this gap but also opens avenues for designing various meta-heuristic optimization algorithms for HIM. As research progresses, exploration in this avenue aims to develop methods that are increasingly accurate, less time-consuming, and more robust. In the future, we will propose more efficient algorithms and apply them to real-world engineering problems to assess their practical utility.

Author Contributions

Conceptualization, H.W.; Methodology, H.W. and Q.P.; Validation, H.W. and Q.P.; Writing—original draft, H.W.; Writing—review & editing, Q.P. and J.T.; Visualization, H.W.; Supervision, Q.P. and J.T.; Project administration, J.T.; Funding acquisition, J.T. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Natural Science Foundation of China, grant number 62073330 and grant number 72101265.

Data Availability Statement

All data generated or analyzed during this study are available from the corresponding author on reasonable request.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Dong, C.; Xu, G.; Yang, P.; Meng, L. TSIFIM: A Three-Stage Iterative Framework for Influence Maximization in Complex Networks. Expert Syst. Appl. 2023, 212, 118702. [Google Scholar] [CrossRef]
  2. Song, G.; Zhou, X.; Wang, Y.; Xie, K. Influence Maximization on Large-Scale Mobile Social Network: A Divide-and-Conquer Method. IEEE Trans. Parallel Distrib. Syst. 2015, 26, 1379–1392. [Google Scholar] [CrossRef]
  3. Domingos, P.; Richardson, M. Mining the Network Value of Customers. In Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Francisco, CA, USA, 26–29 August 2001; pp. 57–66. [Google Scholar]
  4. Pei, S.; Makse, H.A. Spreading Dynamics in Complex Networks. J. Stat. Mech. 2013, 2013, P12002. [Google Scholar] [CrossRef]
  5. Li, Y.; Li, L.; Liu, Y.; Li, Q. MAHE-IM: Multiple Aggregation of Heterogeneous Relation Embedding for Influence Maximization on Heterogeneous Information Network. Expert Syst. Appl. 2022, 202, 117289. [Google Scholar] [CrossRef]
  6. Poulik, S.; Ghorai, G.; Xin, Q. Explication of Crossroads Order Based on Randic Index of Graph with Fuzzy Information. Soft Comput. 2024, 28, 1851–1864. [Google Scholar] [CrossRef]
  7. Mathew, S.; Mordeson, J.N. Connectivity Concepts in Fuzzy Incidence Graphs. Inf. Sci. 2017, 382–383, 326–333. [Google Scholar] [CrossRef]
  8. Das, S.; Poulik, S.; Ghorai, G. Picture Fuzzy ϕ-Tolerance Competition Graphs with Its Application. J. Ambient. Intell. Humaniz. Comput. 2024, 15, 547–559. [Google Scholar] [CrossRef]
  9. Kak, S. Power Series Models of Self-Similarity in Social Networks. Inf. Sci. 2017, 376, 31–38. [Google Scholar] [CrossRef]
  10. Bretto, A. Hypergraph Theory: An Introduction; Mathematical Engineering; Springer: Cham, Switzerland; Heidelberg, Germany; New York, NY, USA; Dordrecht, The Netherlands; London, UK, 2013; ISBN 978-3-319-00079-4. [Google Scholar]
  11. Kempe, D.; Kleinberg, J.; Tardos, É. Maximizing the Spread of Influence through a Social Network. In Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, 24–27 August 2003; pp. 137–146. [Google Scholar]
  12. Jiang, Q.; Song, G.; Gao, C.; Wang, Y.; Si, W.; Xie, K. Simulated Annealing Based Influence Maximization in Social Networks. Proc. AAAI Conf. Artif. Intell. 2011, 25, 127–132. [Google Scholar] [CrossRef]
  13. Leskovec, J.; Krause, A.; Guestrin, C.; Faloutsos, C.; VanBriesen, J.; Glance, N. Cost-Effective Outbreak Detection in Networks. In Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Jose, CA, USA, 12–15 August 2007; pp. 420–429. [Google Scholar]
  14. Goyal, A.; Lu, W.; Lakshmanan, L.V.S. CELF++: Optimizing the Greedy Algorithm for Influence Maximization in Social Networks. In Proceedings of the 20th International Conference Companion on World Wide Web, Hyderabad, India, 28 March–1 April 2011; pp. 47–48. [Google Scholar]
  15. Chen, W.; Wang, Y.; Yang, S. Efficient Influence Maximization in Social Networks. In Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, 28 June–1 July 2009; pp. 199–208. [Google Scholar]
  16. Estrada, E.; Rodríguez-Velázquez, J.A. Subgraph Centrality in Complex Networks. Phys. Rev. E 2005, 71, 056103. [Google Scholar] [CrossRef]
  17. Freeman, L.C. Centrality in Social Networks Conceptual Clarification. Soc. Netw. 1978, 1, 215–239. [Google Scholar] [CrossRef]
  18. Borgs, C.; Brautbar, M.; Chayes, J.; Lucier, B. Maximizing Social Influence in Nearly Optimal Time. In Proceedings of the Twenty-Fifth Annual ACM-SIAM Symposium on Discrete Algorithms, Portland, OR, USA, 5–7 January 2014; pp. 946–957. [Google Scholar]
  19. Tang, Y.; Xiao, X.; Shi, Y. Influence Maximization: Near-Optimal Time Complexity Meets Practical Efficiency. In Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data, Snowbird, UT, USA, 22–27 June 2014; pp. 75–86. [Google Scholar]
  20. Tang, Y.; Shi, Y.; Xiao, X. Influence Maximization in Near-Linear Time: A Martingale Approach. In Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, Melbourne, VIC, Australia, 31 May–4 June 2015; pp. 1539–1554. [Google Scholar]
  21. Nguyen, H.T.; Thai, M.T.; Dinh, T.N. Stop-and-Stare: Optimal Sampling Algorithms for Viral Marketing in Billion-Scale Networks. In Proceedings of the 2016 International Conference on Management of Data, San Francisco, CA, USA, 26 June–1 July 2016; pp. 695–710. [Google Scholar]
  22. Wang, Y.; Cong, G.; Song, G.; Xie, K. Community-Based Greedy Algorithm for Mining Top-K Influential Nodes in Mobile Social Networks. In Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, 25–28 July 2010; pp. 1039–1048. [Google Scholar]
  23. Bozorgi, A.; Haghighi, H.; Sadegh Zahedi, M.; Rezvani, M. INCIM: A Community-Based Algorithm for Influence Maximization Problem under the Linear Threshold Model. Inf. Process. Manag. 2016, 52, 1188–1199. [Google Scholar] [CrossRef]
  24. Rahimkhani, K.; Aleahmad, A.; Rahgozar, M.; Moeini, A. A Fast Algorithm for Finding Most Influential People Based on the Linear Threshold Model. Expert Syst. Appl. 2015, 42, 1353–1361. [Google Scholar] [CrossRef]
  25. Gong, M.; Yan, J.; Shen, B.; Ma, L.; Cai, Q. Influence Maximization in Social Networks Based on Discrete Particle Swarm Optimization. Inf. Sci. 2016, 367–368, 600–614. [Google Scholar] [CrossRef]
  26. Estrada, E.; Rodríguez-Velázquez, J.A. Subgraph Centrality and Clustering in Complex Hyper-Networks. Phys. A Stat. Mech. Its Appl. 2006, 364, 581–594. [Google Scholar] [CrossRef]
  27. Ma, N.; Liu, Y. SuperedgeRank Algorithm and Its Application in Identifying Opinion Leader of Online Public Opinion Supernetwork. Expert Syst. Appl. 2014, 41, 1357–1368. [Google Scholar] [CrossRef]
  28. Contisciani, M.; Battiston, F.; De Bacco, C. Inference of Hyperedges and Overlapping Communities in Hypergraphs. Nat. Commun. 2022, 13, 7229. [Google Scholar] [CrossRef]
  29. Ruggeri, N.; Contisciani, M.; Battiston, F.; De Bacco, C. Community Detection in Large Hypergraphs. Sci. Adv. 2023, 9, eadg9159. [Google Scholar] [CrossRef]
  30. Benson, A.R.; Abebe, R.; Schaub, M.T.; Jadbabaie, A.; Kleinberg, J. Simplicial Closure and Higher-Order Link Prediction. Proc. Natl. Acad. Sci. USA 2018, 115, E11221–E11230. [Google Scholar] [CrossRef]
  31. Zhu, J.; Zhu, J.; Ghosh, S.; Wu, W.; Yuan, J. Social Influence Maximization in Hypergraph in Social Networks. IEEE Trans. Netw. Sci. Eng. 2019, 6, 801–811. [Google Scholar] [CrossRef]
  32. Du, M. Research on Information Dissemination Model of Social Network Services Based on Probabilistic Hyper-Graph. Int. J. Signal Process. Image Process. Pattern Recognit. 2015, 8, 267–274. [Google Scholar] [CrossRef]
  33. Bodó, Á.; Katona, G.Y.; Simon, P.L. SIS Epidemic Propagation on Hypergraphs. Bull. Math. Biol. 2016, 78, 713–735. [Google Scholar] [CrossRef] [PubMed]
  34. Suo, Q.; Guo, J.-L.; Shen, A.-Z. Information Spreading Dynamics in Hypernetworks. Phys. A Stat. Mech. Its Appl. 2018, 495, 475–487. [Google Scholar] [CrossRef]
  35. Jiang, X.; Wang, Z.; Liu, W. Information Dissemination in Dynamic Hypernetwork. Phys. A Stat. Mech. Its Appl. 2019, 532, 121578. [Google Scholar] [CrossRef]
  36. Antelmi, A.; Cordasco, G.; Spagnuolo, C.; Szufel, P. Information Diffusion in Complex Networks: A Model Based on Hypergraphs and Its Analysis. In Algorithms and Models for the Web Graph; Kamiński, B., Prałat, P., Szufel, P., Eds.; Lecture Notes in Computer Science; Springer International Publishing: Cham, Switzerland, 2020; Volume 12091, pp. 36–51. ISBN 978-3-030-48477-4. [Google Scholar]
  37. Wang, J.; Wang, Z.; Yu, P.; Xu, Z. The Impact of Different Strategy Update Mechanisms on Information Dissemination under Hyper Network Vision. Commun. Nonlinear Sci. Numer. Simul. 2022, 113, 106585. [Google Scholar] [CrossRef]
  38. Xiao, Q. A Method for Measuring Node Importance in Hypernetwork Model. Res. J. Appl. Sci. Eng. Technol. 2013, 5, 568–573. [Google Scholar] [CrossRef]
  39. Kapoor, K.; Sharma, D.; Srivastava, J. Weighted Node Degree Centrality for Hypergraphs. In Proceedings of the 2013 IEEE 2nd Network Science Workshop (NSW), West Point, NY, USA, 29 April–1 May 2013; pp. 152–155. [Google Scholar]
  40. Zheng, H.; Wang, N.; Wu, J. Non-Submodularity and Approximability: Influence Maximization in Online Social Networks. In Proceedings of the 2019 IEEE 20th International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM), Washington, DC, USA, 10–12 June 2019; pp. 1–9. [Google Scholar]
  41. Antelmi, A.; Cordasco, G.; Spagnuolo, C.; Szufel, P. Social Influence Maximization in Hypergraphs. Entropy 2021, 23, 796. [Google Scholar] [CrossRef] [PubMed]
  42. Xie, M.; Zhan, X.-X.; Liu, C.; Zhang, Z.-K. An Efficient Adaptive Degree-Based Heuristic Algorithm for Influence Maximization in Hypergraphs. Inf. Process. Manag. 2023, 60, 103161. [Google Scholar] [CrossRef]
  43. Goh, K.-I.; Cusick, M.E.; Valle, D.; Childs, B.; Vidal, M.; Barabási, A.-L. The Human Disease Network. Proc. Natl. Acad. Sci. USA 2007, 104, 8685–8690. [Google Scholar] [CrossRef]
  44. King, Z.A.; Lu, J.; Dräger, A.; Miller, P.; Federowicz, S.; Lerman, J.A.; Ebrahim, A.; Palsson, B.O.; Lewis, N.E. BiGG Models: A Platform for Integrating, Standardizing and Sharing Genome-Scale Models. Nucleic Acids Res. 2016, 44, D515–D522. [Google Scholar] [CrossRef]
  45. Pan, Q.; Tang, J.; Lao, S. EDOA: An Elastic Deformation Optimization Algorithm. Appl. Intell. 2022, 52, 17580–17599. [Google Scholar] [CrossRef]
Figure 1. The susceptible–infected spreading model with contact process dynamics.
Figure 1. The susceptible–infected spreading model with contact process dynamics.
Mathematics 12 01041 g001
Figure 2. Sample hypergraph and the corresponding ordinary network.
Figure 2. Sample hypergraph and the corresponding ordinary network.
Mathematics 12 01041 g002
Figure 3. Influence spreading scale with various K   ( K = 1 30 ) for each algorithm in hypergraphs: (a) algebra; (b) diseasome; (c) email; (d) geometry; (e) iAF1260b; (f) NDC; (g) restaurant; (h) committees. We set β = 0.01 ; T = 25 .
Figure 3. Influence spreading scale with various K   ( K = 1 30 ) for each algorithm in hypergraphs: (a) algebra; (b) diseasome; (c) email; (d) geometry; (e) iAF1260b; (f) NDC; (g) restaurant; (h) committees. We set β = 0.01 ; T = 25 .
Mathematics 12 01041 g003
Figure 4. Influence spreading scale of multiple simulations with various T   ( T = 1 25 ) for HEDV-greedy, greedy, and HADP in hypergraphs: (a) algebra; (b) diseasome; (c) email; (d) geometry; (e) iAF1260b; (f) NDC; (g) restaurant; (h) committees. We set β = 0.01 ; K = 30 .
Figure 4. Influence spreading scale of multiple simulations with various T   ( T = 1 25 ) for HEDV-greedy, greedy, and HADP in hypergraphs: (a) algebra; (b) diseasome; (c) email; (d) geometry; (e) iAF1260b; (f) NDC; (g) restaurant; (h) committees. We set β = 0.01 ; K = 30 .
Mathematics 12 01041 g004
Figure 5. Influence spreading scale with various T   ( T = 1 25 ) for each algorithm in hypergraphs: (a) algebra; (b) diseasome; (c) email; (d) geometry; (e) iAF1260b; (f) NDC; (g) restaurant; (h) committees. We set β = 0.01 ; K = 30 .
Figure 5. Influence spreading scale with various T   ( T = 1 25 ) for each algorithm in hypergraphs: (a) algebra; (b) diseasome; (c) email; (d) geometry; (e) iAF1260b; (f) NDC; (g) restaurant; (h) committees. We set β = 0.01 ; K = 30 .
Mathematics 12 01041 g005
Table 1. Topological properties of the datasets.
Table 1. Topological properties of the datasets.
Hypergraphs n m d e g d H d E c d ξ ρ
Email143154225.1732.53.010.592.0740.18
Committees282315100.7719.2617.240.681.6930.36
Algebra423126878.919.536.520.81.9550.19
Diseasome5169034.631.720.646.5150.01
Restaurant56560179.758.147.660.541.9850.14
Geometry5801193164.7921.5310.470.821.7540.28
NDC1161108810.725.555.920.613.590.01
iAF1260b1668235113.265.463.870.562.6770.01
n represents the number of nodes and m represents the number of hyperedges. d e g is the average degree of nodes, while d H represents the average hyperdegree. d E is the average number of nodes contained in a hyperedge. Additionally, c is the clustering coefficient, d is the average shortest path length between two nodes, ξ represents the diameter, and ρ is the edge density of the corresponding ordinary network derived from the hypergraph.
Table 2. AUC scores obtained by each of the curves shown in Figure 3 ( T = 25 , β = 0.01 ). The maximal AUC value among all methods is shown in bold and the maximal AUC value among baselines is shown with *. The performance improvement is denoted with ↑.
Table 2. AUC scores obtained by each of the curves shown in Figure 3 ( T = 25 , β = 0.01 ). The maximal AUC value among all methods is shown in bold and the maximal AUC value among baselines is shown with *. The performance improvement is denoted with ↑.
DatasetsOur MethodBaselinesBoost
HEDV-GreedyHADPHSDPH-RISH-CI (l = 1)H-CI (l = 2)H-DegreeDegree21.7%↑
Algebra0.16000.1374 *0.11280.10840.07910.07670.07790.084616.4%↑
Diseasome0.17400.10300.10260.1110 *0.08200.08110.07740.096956.8%↑
Email0.13750.1144 *0.11400.11390.09540.09800.09750.099520.2%↑
Geometry0.12060.1134 *0.11070.11150.10420.10420.10420.10466.30%↑
iAF1260b0.18210.1473 *0.10710.07590.07540.07220.07360.081623.6%↑
NDC0.14480.11750.1216 *0.09340.09020.09060.09060.096223.2%↑
Restaurant0.13490.1116 *0.10580.10840.10030.09590.09840.105520.9%↑
Committees0.12160.1146 *0.11020.11400.10330.10200.10280.10596.10%↑
Table 3. Time cost for each algorithm. The running times are given by the average over 10 realizations; the seed set size is set as K = 30 ( T = 25 ,   β = 0.01 ). The unit of time is seconds (s).
Table 3. Time cost for each algorithm. The running times are given by the average over 10 realizations; the seed set size is set as K = 30 ( T = 25 ,   β = 0.01 ). The unit of time is seconds (s).
DatasetsRunning Time (Seconds)
HEDV-GreedyGreedyHADPHSDPH-RISH-CI (l = 1)H-CI (l = 2)H-DegreeDegree
Algebra1.07 × 1036.72 × 1058.85 × 1008.15 × 10−11.81 × 1025.93 × 10−12.26 × 1022.20 × 10−17.92 × 10−1
Diseasome3.02 × 1011.88 × 1054.50 × 10−13.16 × 10−17.80 × 1011.66 × 10−11.64 × 1022.52 × 10−15.16 × 10−1
Email1.82 × 1022.51 × 1042.38 × 1004.20 × 10−13.19 × 1012.92 × 10−13.36 × 1018.40 × 10−23.54 × 10−1
Geometry3.75 × 1032.30 × 1062.02 × 1011.26 × 1006.42 × 1021.01 × 1005.05 × 1024.84 × 10−11.80 × 100
iAF1260b3.63 × 1031.46 × 1068.01 × 1002.11 × 1008.39 × 1031.19 × 1006.30 × 1041.34 × 1002.74 × 100
NDC3.59 × 1039.03 × 1053.83 × 1001.36 × 1001.37 × 1037.68 × 10−11.98 × 1039.24 × 10−11.94 × 100
Restaurant1.05 × 1039.92 × 1054.30 × 1007.04 × 10−15.70 × 1014.02 × 10−19.80 × 1012.84 × 10−17.45 × 10−1
Committees7.82 × 1024.03 × 1055.23 × 1005.48 × 10−17.81 × 1003.80 × 10−19.91 × 1001.36 × 10−14.85 × 10−1
Table 4. AUC scores obtained by our algorithms and baselines ( T = 35 ,   β = 0.005 ). The maximal AUC value among all methods is shown in bold and the maximal AUC value among baselines is shown with *. The performance improvement is denoted with ↑.
Table 4. AUC scores obtained by our algorithms and baselines ( T = 35 ,   β = 0.005 ). The maximal AUC value among all methods is shown in bold and the maximal AUC value among baselines is shown with *. The performance improvement is denoted with ↑.
DatasetsOur MethodBaselinesBoost
HEDV-GreedyHADPHSDPH-RISH-CI (l = 1)H-CI (l = 2)H-DegreeDegree25.8%↑
Algebra0.18120.1477 *0.11080.10160.06990.06710.06860.076122.7%↑
Diseasome0.16440.10340.10340.1109 *0.08770.08700.08410.099248.2%↑
Email0.13320.1133 *0.11310.11320.09840.10070.10020.102017.6%↑
Geometry0.12960.1163 *0.11100.11080.09910.09930.09910.100211.4%↑
iAF1260b0.18720.1422 *0.10520.07930.07700.07460.07540.081731.6%↑
NDC0.14920.11320.1195 *0.08960.09370.09390.09400.098824.9%↑
Restaurant0.15600.1115 *0.10210.10740.09480.08790.09140.101439.9%↑
Committees0.12840.1169 *0.11030.11570.09970.09790.09900.10389.80%↑
Table 5. AUC scores obtained by our algorithms and baselines ( T = 20 ,   β = 0.02 ). The maximal AUC value among all methods is shown in bold and the maximal AUC value among baselines is shown with *. The performance improvement is denoted with ↑.
Table 5. AUC scores obtained by our algorithms and baselines ( T = 20 ,   β = 0.02 ). The maximal AUC value among all methods is shown in bold and the maximal AUC value among baselines is shown with *. The performance improvement is denoted with ↑.
DatasetsOur MethodBaselines Boost
HEDV-GreedyHADPHSDPH-RISH-CI (l = 1)H-CI (l = 2)H-DegreeDegree16.8%↑
Algebra0.13350.1231 *0.11220.11320.09440.09290.09350.09748.40%↑
Diseasome0.18140.1041 *0.10330.11120.07540.07420.06960.095074.3%↑
Email0.14080.1167 *0.11500.11530.09170.09490.09420.096720.7%↑
Geometry0.11530.11200.11090.1121 *0.10750.10750.10750.10772.90%↑
iAF1260b0.16600.1455 *0.10980.07740.08090.07620.07810.087114.1%↑
NDC0.13500.1249 *0.12420.10280.08640.08640.08660.09368.10%↑
Restaurant0.11580.1111 *0.10930.11030.10680.10610.10660.10894.20%↑
Committees0.11440.1127 *0.11050.11180.10750.10710.10740.10841.50%↑
Table 6. AUC scores obtained by our algorithms and baselines ( T = 30 ,   β = 0.015 ). The maximal AUC value among all methods is shown in bold and the maximal AUC value among baselines is shown with *. The performance improvement is denoted with ↑.
Table 6. AUC scores obtained by our algorithms and baselines ( T = 30 ,   β = 0.015 ). The maximal AUC value among all methods is shown in bold and the maximal AUC value among baselines is shown with *. The performance improvement is denoted with ↑.
DatasetsOur MethodBaselinesBoost
HEDV-GreedyHADPHSDPH-RISH-CI (l = 1)H-CI (l = 2)H-DegreeDegree13.6%↑
Algebra0.12680.1194 *0.11160.11360.09870.09780.09810.10086.20%↑
Diseasome0.18140.10520.10400.1113 *0.07430.07290.06800.095163.0%↑
Email0.14080.1174 *0.11530.11570.0910.09440.09370.096219.9%↑
Geometry0.11390.11170.11080.1121 *0.10850.10850.10850.10871.60%↑
iAF1260b0.15930.1424 *0.10980.08000.08440.07960.08130.089911.9%↑
NDC0.13220.1272 *0.12510.10590.08550.08530.08560.09313.90%↑
Restaurant0.11320.11090.10960.1116 *0.10800.10800.10800.10931.40%↑
Committees0.11310.1124 *0.11070.11140.10840.10820.10830.10900.60%↑
Table 7. Wilcoxon signed-rank test for all datasets. R+, R− represent the rank by which the proposed algorithm is superior and inferior to that baseline, respectively. The p-values indicate the probability of the null hypothesis being true ( β = 0.01 , T = 25 ).
Table 7. Wilcoxon signed-rank test for all datasets. R+, R− represent the rank by which the proposed algorithm is superior and inferior to that baseline, respectively. The p-values indicate the probability of the null hypothesis being true ( β = 0.01 , T = 25 ).
DatasetsBaselines
HADPHSDPH-RISH-CI (l = 1)H-CI (l = 2)H-DegreeDegree
R+R−pR+R−pR+R−pR+R−pR+R−pR+R−pR+R−p
Algebra46500465004650046500465004650046500
Diseasome46500465004650046500465004650046500
Email46500465004650046500465004650046500
Geometry46500465004650046500465004650046500
iAF1260b443220465004650046500465004650046500
NDC46500465004650046500465004650046500
Restaurant46500465004632046500465004650046500
Committees46500465004650046500465004650046500
Table 8. Friedman test for all datasets. Ranksum is the sum of the rank of the corresponding algorithm when K takes different values ( K = 1 30 ) in the dataset. Friedman rank is the average of the ranksum. General rank is the final rank of the algorithm. The optimal method is shown in bold and highlighted with *.
Table 8. Friedman test for all datasets. Ranksum is the sum of the rank of the corresponding algorithm when K takes different values ( K = 1 30 ) in the dataset. Friedman rank is the average of the ranksum. General rank is the final rank of the algorithm. The optimal method is shown in bold and highlighted with *.
DatasetsOur MethodBaselines
HEDV-GreedyHADPHSDPH-RISH-CI (I = 1)H-CI (I = 2)H-DegreeDegree
AlgebraRanksum30 *6597116180223214155
Friedman rank1.00 *2.173.233.8767.437.135.17
General rank1 *2346875
DiseasomeRanksum30 *11011072182207237132
Friedman rank1.00 *3.673.672.46.076.97.94.4
General rank1 *3.53.526785
EmailRanksum30 *8791121221183196151
Friedman rank1.00 *2.93.034.037.376.16.535.03
General rank1 *2348675
GeometryRanksum30 *82120113190191193161
Friedman rank1.00 *2.7343.776.336.376.435.37
General rank1 *2436785
iAF1260bRanksum34 *70100138176216189157
Friedman rank1.13 *2.333.334.65.877.26.35.23
General rank1 *2346875
NDCRanksum30 *9373174190189190141
Friedman rank1.00 *3.12.435.86.336.36.334.7
General rank1 *3257.567.54
RestaurantRanksum31 *96120120173221193126
Friedman rank1.03 *3.2445.777.376.434.2
General rank1 *23.53.56875
CommitteesRanksum30 *8211478182237207150
Friedman rank1.00 *2.733.82.66.077.96.95
General rank1 *3426875
Table 9. Comparison of characteristics between greedy-based algorithms, heuristic solutions, and our proposed method.
Table 9. Comparison of characteristics between greedy-based algorithms, heuristic solutions, and our proposed method.
AlgorithmsCharacteristicsOur MethodGreedy-Based AlgorithmsHeuristic Solutions
HEDV-GreedyGreedy, CELF, CELF++, etc.H-Degree, Degree, etc.
Influence evaluationMethodsHEDVMonte CarloCentrality
Efficiency-
Accuracy-
Node selectionMethodsMaximum MVGreedy strategyTop-K
Efficiency-
Accuracy-
Low overlap-
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, H.; Pan, Q.; Tang, J. HEDV-Greedy: An Advanced Algorithm for Influence Maximization in Hypergraphs. Mathematics 2024, 12, 1041. https://doi.org/10.3390/math12071041

AMA Style

Wang H, Pan Q, Tang J. HEDV-Greedy: An Advanced Algorithm for Influence Maximization in Hypergraphs. Mathematics. 2024; 12(7):1041. https://doi.org/10.3390/math12071041

Chicago/Turabian Style

Wang, Haosen, Qingtao Pan, and Jun Tang. 2024. "HEDV-Greedy: An Advanced Algorithm for Influence Maximization in Hypergraphs" Mathematics 12, no. 7: 1041. https://doi.org/10.3390/math12071041

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop