|
[1] E. Abbe and C. Sandon. Detection in the stochastic block model with multiple clusters: proof of the achievability conjectures, acyclic bp, and the informationcomputation gap. arXiv preprint arXiv:1512.09080, 2015. [2] K. Ali, C.Y. Wang, and Y.S. Chen. Boosting reinforcement learning in competitive influence maximization with transfer learning. In 2018 IEEE/WIC/ACM International Conference on Web Intelligence (WI), pages 395–400. IEEE, 2018. [3] K. Ali, C.Y. Wang, and Y.S. Chen. A novel nested qlearning method to tackle timeconstrained competitive influence maximization. IEEE Access, 7:6337–6352, 2019. [4] K. Ali, C.Y. Wang, M.Y. Yeh, and Y.S. Chen. Addressing competitive influence maximization on unknown social network with deep reinforcement learning. In 2020 IEEE/ACM International Conference on on Advances in Social Networks Analysis and Mining (ASONAM), pages 196–203. IEEE, 2020. [5] A. Barreto, D. Borsa, J. Quan, T. Schaul, D. Silver, M. Hessel, D. Mankowitz, A. Zidek, and R. Munos. Transfer in deep reinforcement learning using successor features and generalised policy improvement. In Proc. of PMLR ICML, pages 501–510, 2018. [6] F. M. Bass. A new product growth model for consumer durables. manageniient sci. 15 215227.. 1980. the relationship between diffusion rates, experience curves, and demand elasticities for consumer durable technological innovations. J. Bus,53:51–67, 1969. [7] S. BenIshay, A. Sela, and I. BenGal.“ spreadit": A strategic game of competitive diffusion through social networks. IEEE Transactions on GamesManuscript ID: TCIAIG, 2017(0046):R2, 2018. [8] S. Bharathi, D. Kempe, and M. Salek. Competitive influence maximization in social networks. In International Workshop on Web and Internet Economics, pages 306–311. Springer, 2007. [9] A. Borodin, Y. Filmus, and J. Oren. Threshold models for competitive influence in social networks. In International Workshop on Internet and Network Economics,pages 539–550. Springer, 2010. [10] M. Brautbar and M. Kearns. Local algorithms for finding interesting individuals in large networks. In Innovations in Computer Science ICS 2010, Tsinghua University, Beijing, China, January 57, pages 188–199, 2010. [11] S. Brin and L. Page. The anatomy of a largescale hypertextual web search engine. Computer networks and ISDN systems, 30(17):107–117, 1998. [12] C. Budak, D. Agrawal, and A. El Abbadi. Limiting the spread of misinformation in social networks. In Proceedings of the 20th international conference on World wide web, pages 665–674. ACM, 2011. [13] C.W. Chang, M.Y. Yeh, and K.T. Chuang. On influence maximization to target users in the presence of multiple acceptances. In Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, pages 1592–1593. ACM, 2015. [14] H.H. Chen, Y.B. Ciou, and S.D. Lin. Information propagation game: a tool to acquire humanplaying data for multiplayer influence maximization on social networks. In Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 1524–1527. ACM, 2012. [15] W. Chen, A. Collins, R. Cummings, T. Ke, Z. Liu, D. Rincon, X. Sun, Y. Wang, W. Wei, and Y. Yuan. Influence maximization in social networks when negative opinions may emerge and propagate. In SDM, volume 11, pages 379–390. SIAM, 2011. [16] W. Chen, W. Lu, and N. Zhang. Timecritical influence maximization in social networks with timedelayed diffusion process. In AAAI, volume 2012, pages 1–5,2012. [17] W. Chen, Y. Wang, and S. Yang. Efficient influence maximization in social networks. In Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 199–208. ACM, 2009. [18] W. Chen, Y. Yuan, and L. Zhang. Scalable influence maximization in social networks under the linear threshold model. In 2010 IEEE International Conference on Data Mining, pages 88–97. IEEE, 2010. [19] Y.C. Chen, W.Y. Zhu, W.C. Peng, W.C. Lee, and S.Y. Lee. Cim: Communitybased influence maximization in social networks. ACM Transactions on Intelligent Systems and Technology (TIST), 5(2):25, 2014. [20] S. Cheng, H. Shen, J. Huang, G. Zhang, and X. Cheng. Staticgreedy: solving the scalabilityaccuracy dilemma in influence maximization. In Proceedings of the 22nd ACM international conference on Information & Knowledge Management, pages 509–518. ACM, 2013. [21] T.Y. Chung, K. Ali, and C.Y. Wang. Deep reinforcement learningbased approach to tackle competitive influence maximization. In Proc. of MLG workshop, 2019. [22] A. Clark and R. Poovendran. Maximizing influence in competitive environments: a gametheoretic approach. In International Conference on Decision and Game Theory for Security, pages 151–162. Springer, 2011. [23] E. Cohen, D. Delling, T. Pajor, and R. F. Werneck. Sketchbased influence maximization and computation: Scaling up with guarantees. In Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, pages 629–638. ACM, 2014. [24] P. Domingos and M. Richardson. Mining the network value of customers. In Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining, pages 57–66. ACM, 2001. [25] N. Du, L. Song, M. G. Rodriguez, and H. Zha. Scalable influence estimation in continuoustime diffusion networks. In Advances in neural information processing systems, pages 3147–3155, 2013. [26] Y. Du. Improving deep reinforcement learning via transfer. In Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, pages 2405–2407. International Foundation for Autonomous Agents and Multiagent Systems, 2019. [27] D. Ernst, P. Geurts, and L. Wehenkel. Treebased batch mode reinforcement learning. Journal of Machine Learning Research, 6(Apr):503–556, 2005. [28] S. Eshghi, S. Maghsudi, V. Restocchi, S. Stein, and L. Tassiulas. Efficient influence maximization under network uncertainty. In IEEE INFOCOM 2019IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pages 365–371. IEEE, 2019. [29] E. EvenDar and Y. Mansour. Learning rates for qlearning. Journal of Machine Learning Research, 5(Dec):1–25, 2003. [30] A. Fazeli and A. Jadbabaie. Game theoretic analysis of a strategic model of competitive contagion and product adoption in social networks. In Decision and Control (CDC), 2012 IEEE 51st Annual Conference on, pages 74–79. IEEE, 2012. [31] F. Fernández and M. Veloso. Probabilistic policy reuse in a reinforcement learning agent. In Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems, pages 720–727. ACM, 2006. [32] S. Galhotra, A. Arora, and S. Roy. Holistic influence maximization: Combining scalability and efficiency with opinionaware models. In Proceedings of the 2016 International Conference on Management of Data, pages 743–758. ACM, 2016. [33] S. Galhotra, A. Arora, S. Virinchi, and S. Roy. Asim: A scalable algorithm for influence maximization under the independent cascade model. In Proceedings of the 24th International Conference on World Wide Web, pages 35–36. ACM, 2015. [34] J. Goldenberg, B. Libai, and E. Muller. Talk of the network: A complex systems look at the underlying process of wordofmouth. Marketing letters, 12(3):211–223, 2001. [35] J. Goldenberg, B. Libai, and E. Muller. Using complex systems analysis to advance marketing theory development: Modeling heterogeneity effects on new product growth through stochastic cellular automata. Academy of Marketing Science Review, 9(3):1–18, 2001. [36] A. Goyal, F. Bonchi, and L. V. Lakshmanan. Learning influence probabilities in social networks. In Proceedings of the third ACM international conference on Web search and data mining, pages 241–250. ACM, 2010. [37] A. Goyal, W. Lu, and L. V. Lakshmanan. Celf++: optimizing the greedy algorithm for influence maximization in social networks. In Proceedings of the 20th international conference companion on World wide web, pages 47–48. ACM, 2011. [38] A. Goyal, W. Lu, and L. V. Lakshmanan. Simpath: An efficient algorithm for influence maximization under the linear threshold model. In Data Mining (ICDM),2011 IEEE 11th International Conference on, pages 211–220. IEEE, 2011. [39] S. Goyal, H. Heidari, and M. Kearns. Competitive contagion in networks. Games and Economic Behavior, 2014. [40] M. Granovetter. Threshold models of collective behavior. American journal of sociology, 83(6):1420–1443, 1978. [41] X. He, G. Song, W. Chen, and Q. Jiang. Influence blocking maximization in social networks under the competitive linear threshold model. In SDM, pages 463–474.SIAM, 2012. [42] J. Huang, H. Sun, J. Han, H. Deng, Y. Sun, and Y. Liu. Shrink: a structural clustering algorithm for detecting hierarchical communities in networks. In Proceedings of the 19th ACM international conference on Information and knowledge management,pages 219–228. ACM, 2010. [43] J. L. Iribarren and E. Moro. Impact of human activity patterns on the dynamics of information diffusion. Physical review letters, 103(3):038702, 2009. [44] K. Jung, W. Heo, and W. Chen. Irie: Scalable and robust influence maximization in social networks. In Data Mining (ICDM), 2012 IEEE 12th International Conference on, pages 918–923. IEEE, 2012. [45] B. Karrer and M. E. Newman. Stochastic blockmodels and community structure in networks. Physical review E, 83(1):016107, 2011. [46] M. Karsai, M. Kivelä, R. K. Pan, K. Kaski, J. Kertész, A.L. Barabási, and J. Saramäki. Small but slow world: How network topology and burstiness slow down spreading. Physical Review E, 83(2):025102, 2011. [47] D. Kempe, J. Kleinberg, and É. Tardos. Maximizing the spread of influence through a social network. In Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, pages 137–146. ACM, 2003. [48] J. Kostka, Y. A. Oswald, and R. Wattenhofer. Word of mouth: Rumor dissemination in social networks. In International Colloquium on Structural Information and Communication Complexity, pages 185–196. Springer, 2008. [49] F. Krzakala, C. Moore, E. Mossel, J. Neeman, A. Sly, L. Zdeborová, and P. Zhang. Spectral redemption in clustering sparse networks. Proceedings of the National Academy of Sciences, 110(52):20935–20940, 2013. [50] A. Lancichinetti, S. Fortunato, and J. Kertész. Detecting the overlapping and hierarchical community structure in complex networks. New Journal of Physics, 11(3):033015, 2009. [51] J. F. Lawless. Statistical models and methods for lifetime data, volume 362. John Wiley & Sons, 2011. [52] A. Lazaric, M. Restelli, and A. Bonarini. Transfer of samples in batch reinforcement learning. In Proceedings of the 25th international conference on Machine learning, pages 544–551. ACM, 2008. [53] J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. VanBriesen, and N. Glance. Costeffective outbreak detection in networks. In Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 420–429. ACM, 2007. [54] J. Leskovec and A. Krevl. SNAP Datasets: Stanford large network dataset collection. http://snap.stanford.edu/data, June 2014. [55] H. Li, M. Xu, S. S. Bhowmick, C. Sun, Z. Jiang, and J. Cui. Disco: Influence maximization meets network embedding and deep learning. arXiv preprint arXiv:1906.07378, 2019. [56] L.J. Lin. Selfimproving reactive agents based on reinforcement learning, planning and teaching. Machine learning, 8(34):293–321, 1992. [57] S.C. Lin, S.D. Lin, and M.S. Chen. A learningbased framework to handle multiround multiparty influence maximization on social networks. In Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 695–704. ACM, 2015. [58] I. Litou, I. Boutsis, and V. Kalogeraki. Using locationbased social networks for timeconstrained information dissemination. In 2014 IEEE 15th International Conference on Mobile Data Management, volume 1, pages 162–171. IEEE, 2014. [59] B. Liu, G. Cong, D. Xu, and Y. Zeng. Time constrained influence maximization in social networks. In 2012 IEEE 12th International Conference on Data Mining, pages 439–448. IEEE, 2012. [60] B. Liu, G. Cong, Y. Zeng, D. Xu, and Y. M. Chee. Influence spreading path and its application to the time constrained social influence maximization problem and beyond. IEEE Transactions on Knowledge and Data Engineering, 26(8):1904–1917, 2014. [61] Y. Liu, Q. Liu, H. Zhao, Z. Pan, and C. Liu. Adaptive quantitative trading: an imitative deep reinforcement learning approach. In AAAI, 2020. [62] Y. Liu, B. Logan, N. Liu, Z. Xu, J. Tang, and Y. Wang. Deep reinforcement learning for dynamic treatment regimes on medical registry data. In 2017 IEEE International Conference on Healthcare Informatics (ICHI), pages 380–385. IEEE, 2017. [63] M. G. Madden and T. Howley. Transfer of experience between reinforcement learning environments with progressive difficulty. Artificial Intelligence Review, 21(34):375–398, 2004. [64] V. Mahajan, E. Muller, and F. M. Bass. New product diffusion models in marketing: A review and directions for research. In Diffusion of technologies and social behavior, pages 125–177. Springer, 1991. [65] S. Mihara, S. Tsugawa, and H. Ohsaki. Influence maximization problem for unknown social networks. In Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, pages 1539–1546. ACM, 2015. [66] V. Mnih, K. Kavukcuoglu, D. Silver, A. Graves, I. Antonoglou, D. Wierstra, and M. Riedmiller. Playing atari with deep reinforcement learning. arXiv preprint arXiv:1312.5602, 2013. [67] V. Mnih, K. Kavukcuoglu, D. Silver, A. A. Rusu, J. Veness, M. G. Bellemare, A. Graves, M. Riedmiller, A. K. Fidjeland, G. Ostrovski, et al. Humanlevel control through deep reinforcement learning. Nature, 518(7540):529, 2015. [68] A. Mohammadi, M. Saraee, and A. Mirzaei. Timesensitive influence maximization in social networks. Journal of Information Science, 41(6):765–778, 2015. [69] S. A. Myers and J. Leskovec. Clash of the contagions: Cooperation and competition in information diffusion. In Data Mining (ICDM), 2012 IEEE 12th International Conference on, pages 539–548. IEEE, 2012. [70] R. R. Nadakuditi and M. E. Newman. Graph spectra and the detectability of community structure in networks. Physical review letters, 108(18):188701, 2012. [71] M. E. Newman and M. Girvan. Finding and evaluating community structure in networks. Physical review E, 69(2):026113, 2004. [72] H. T. Nguyen, M. T. Thai, and T. N. Dinh. Stopandstare: Optimal sampling algorithms for viral marketing in billionscale networks. In Proceedings of the 2016 International Conference on Management of Data, pages 695–710. ACM, 2016. [73] N. Ohsaka, T. Akiba, Y. Yoshida, and K.i. Kawarabayashi. Fast and accurate influence maximization on large networks with pruned montecarlo simulations. In AAAI, pages 138–144, 2014. [74] N. Ohsaka, Y. Yamaguchi, N. Kakimura, and K.i. Kawarabayashi. Maximizing timedecaying influence in social networks. In ECML/PKDD (1), pages 132–147,2016. [75] D. Ormoneit and Ś. Sen. Kernelbased reinforcement learning. Machine learning, 49(23):161–178, 2002. [76] J. Qiu, J. Tang, H. Ma, Y. Dong, K. Wang, and J. Tang. Deepinf: Social influence prediction with deep learning. In Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pages 2110–2119.ACM, 2018. [77] A. Raghu, M. Komorowski, I. Ahmed, L. Celi, P. Szolovits, and M. Ghassemi. Deep reinforcement learning for sepsis treatment. arXiv preprint arXiv:1711.09602, 2017. [78] M. Richardson and P. Domingos. Mining knowledgesharing sites for viral marketing. In Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining, pages 61–70. ACM, 2002. [79] M. Riedmiller. Neural fitted q iteration–first experiences with a data efficient neural reinforcement learning method. In European Conference on Machine Learning, pages 317–328. Springer, 2005. [80] M. G. Rodriguez, D. Balduzzi, and B. Schölkopf. Uncovering the temporal dynamics of diffusion networks. arXiv preprint arXiv:1105.0697, 2011. [81] T. C. Schelling. Micromotives and macrobehavior. WW Norton & Company, 2006. [82] J. Shang, S. Zhou, X. Li, L. Liu, and H. Wu. Cofim: A communitybased framework for influence maximization on largescale networks. KnowledgeBased Systems, 117:88–100, 2017. [83] D. Silver, J. Schrittwieser, K. Simonyan, I. Antonoglou, A. Huang, A. Guez, T. Hubert, L. Baker, M. Lai, A. Bolton, et al. Mastering the game of go without human knowledge. Nature, 550(7676):354, 2017. [84] R. S. Sutton and A. G. Barto. Reinforcement learning: An introduction. MIT press Cambridge, 1998. [85] F. Tanaka and M. Yamamura. Multitask reinforcement learning on the distribution of mdps. In Computational Intelligence in Robotics and Automation, 2003. Proceedings. 2003 IEEE International Symposium on, volume 3, pages 1108–1113. IEEE, 2003. [86] Y. Tang, Y. Shi, and X. Xiao. Influence maximization in nearlinear time: A martingale approach. In Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, pages 1539–1554. ACM, 2015. [87] Y. Tang, X. Xiao, and Y. Shi. Influence maximization: Nearoptimal time complexity meets practical efficiency. In Proceedings of the 2014 ACM SIGMOD international conference on Management of data, pages 75–86. ACM, 2014. [88] M. Taylor, S. Whiteson, and P. Stone. Transfer learning for policy search methods. In ICML workshop on Structural Knowledge Transfer for Machine Learning, pages 1–4. Citeseer, 2006. [89] M. E. Taylor, P. Stone, and Y. Liu. Value functions for rlbased behavior transfer: A comparative study. In AAAI, volume 5, pages 880–885, 2005. [90] L. Torrey and J. Shavlik. Transfer learning. Handbook of Research on Machine Learning Applications and Trends: Algorithms, Methods, and Techniques, 1:242, 2009. [91] L. Torrey, J. Shavlik, S. Natarajan, P. Kuppili, and T. Walker. Transfer in reinforcement learning via markov logic networks. In AAAI Workshop on Transfer Learning for Complex Tasks, 2008. [92] L. Torrey, J. Shavlik, T. Walker, and R. Maclin. Relational macros for transfer in reinforcement learning. In International Conference on Inductive Logic Programming, pages 254–268. Springer, 2007. [93] K. A. TzuYuan Chung and C.Y. Wang. Deep reinforcement learningbased approach to tackle competitive influence maximization. In Proceedings of the 15th International Workshop on Mining and Learning with Graphs (MLG), 2019. [94] C. Wang, W. Chen, and Y. Wang. Scalable influence maximization for independent cascade model in largescale social networks. Data Mining and Knowledge Discovery, 25(3):545–576, 2012. [95] S. Wasserman and K. Faust. Social network analysis: Methods and applications, volume 8. Cambridge university press, 1994. [96] C. J. Watkins and P. Dayan. Qlearning. Machine learning, 8(34):279–292, 1992. [97] B. Wilder, N. Immorlica, E. Rice, and M. Tambe. Maximizing influence in an unknown social network. In ThirtySecond AAAI Conference on Artificial Intelligence, 2018. [98] B. Wilder, L. OnaschVera, J. Hudson, J. Luna, N. Wilson, R. Petering, D. Woo, M. Tambe, and E. Rice. Endtoend influence maximization in the field. In Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, pages 1414–1422. International Foundation for Autonomous Agents and Multiagent Systems, 2018. [99] A. Wilson, A. Fern, S. Ray, and P. Tadepalli. Multitask reinforcement learning: a hierarchical bayesian approach. In Proceedings of the 24th international conference on Machine learning, pages 1015–1022. ACM, 2007. [100] B. Yan, K. Song, J. Liu, F. Meng, Y. Liu, and H. Su. On the maximization of influence over an unknown social network. In Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, pages 2279–2281. International Foundation for Autonomous Agents and Multiagent Systems, 2019. [101] J. Yosinski, J. Clune, Y. Bengio, and H. Lipson. How transferable are features in deep neural networks? In Advances in neural information processing systems, pages 3320–3328, 2014. [102] J. Zhao, Q. Liu, L. Wang, and X. Wang. Competitive seedsselection in complex networks. Physica A: Statistical Mechanics and its Applications, 467:240–248,2017. |