Keywords

1 Introduction

The influence maximization problem has attracted a great attention in these last years. The main purpose of this problem is to find a set of influence users, S, that can trigger a large cascade of propagation. These users are beneficial in many application domains. A well-known application is the viral marketing. Its purpose is to promote a product or a brand through viral propagation through social networks. Then, several research works were introduced in the literature [1, 8, 14, 21] trying to find an optimal set of influence users in a given social network. However, the quality of the detected influence users stills always an issue that must be resolved.

The problem of identifying influencers was first modeled as a learning problem by Domingos and Richardson [6] in 2001. Furthermore, they defined the customer’s network value, i.e. “the expected profit from sales to other customers he may influence to buy, the customers those may influence, and so on recursively” [6]. Moreover, they considered the market to be a social network of customers. Later in 2003, Kempe et al. [14] formulated the influence problem as an optimization problem. Indeed, they introduced two influence maximization models: the Independent Cascade Model (ICM) and the Linear Threshold Model (LTM). These models estimate the expected propagation size, \(\sigma _{M}\), of a given node or set of nodes through propagation simulation models. Besides, [14] proved the NP-Hardness of the maximization of \(\sigma _{M}\). Then, they proposed the greedy algorithm to approximate the set of nodes that maximizes \(\sigma _{M}\). ICM and LTM just need the network structure to select influencers. However, these solutions are shown in [8] to be inefficient to detect good influencers.

When studying the state of the art of the influence maximization problem, we found that most of existing works use only the structure of the network to select seeds. However, the position of the user in the network is not sufficient to confirm his influence. For example, he may be a user that was active in a period of time, then, he collected many connections, and now he is no longer active. Hence, the user’s activity is an interesting parameter that must be considered while looking for influencers. Besides to the user’s activity in the network, many other important influence indicators are not considered. Among these indicators, we found the sharing and tagging activities of network users. These activities allow the propagation of social messages from one user to another. Also, the tagging activity is a good indicator of the user’s importance in the network. In fact, more he is tagged in others’ posts, more he is important for them. Therefore, considering such influence behaviors will be very beneficial to improve the quality of selected seeds.

To resolve the influencers quality issue, many influence indicators must be used together to characterize the influence that exerts one user on another [10]. An influence indicator may be the number of neighbors, the frequency of posting in the wall, the frequency of neighbor’s likes or shares, etc. Furthermore, a refined influence measure can be obtained through the fusion of two or more indicators. A robust framework of information fusion and conflict management that may be used in such a case is the framework of the theory of belief functions [23]. Indeed, this theory provides many information combination tools that are shown to be efficient [4, 24] to combine several pieces of information having different and distinct sources. Other advantages of this theory are about uncertainty, imprecision and conflict management.

In this paper, we tackle the problem of influence maximization in a social network. More specifically, our main purpose is to detect social influencers with a good quality. For this goal, we introduce a new influence measure that combines many influence indicators and considers the reliability of each indicator to characterize the user’s influence. The proposed measure is defined through the theory of belief functions. Another important contribution in the paper is that we use the proposed influence measure for influence maximization purposes. This solution allows to detect a set of influencers having a good quality and that can maximize the influence in the social network. Finally, a set of experiments is made on real data collected from Twitter to show the performance of the proposed solution against existing ones and to study the properties of the proposed influence measure.

This paper is organized as follows: related works are reviewed in Sect. 2. Indeed, we present some data-based works and existing evidential influence measures. Section 3 presents some basic concepts about the theory of belief functions. Section 4 is dedicated to explaining the proposed reliability-based influence measure. Section 5 presents a set of experiments showing the efficiency of the proposed influence measure. Finally, the paper is concluded in Sect. 6.

2 Related Works

The influence maximization is a relatively new research problem. Its main purpose is to find a set of k social users that are able to trigger a large cascade of propagation through the word of mouth effect. Since its introduction, many researchers have turned to this problem and several solutions are introduced in the literature [3, 8, 9, 14, 15]. In this section, we present some of these works.

2.1 Influence Maximization Models

The work of Kempe et al. [14] is the first to define the problem of finding influencers in a social network as a maximization problem. In fact, they defined the influence of a given user or set of users, S, as the expected number of affected nodes, \(\sigma _{M}\left( S\right) \), i.e. nodes that received the message. Furthermore, they estimated this influence through propagation simulation models which are the Independent Cascade Model (ICM) and the Linear Threshold Model (LTM). Next, they used a greedy-based solution to approximate the optimal solution. Indeed, they proved the NP-Hardness of the problem.

In the literature, many works were conducted to improve the running time when considering ICM and LTM. Leskovecet al. [17] introduced the Cost Effective Lazy Forward (CELF) algorithm that is proved to be 700 times faster than the solution of [14]. Kimura and Saito [16] proposed the Shortest-Path Model (SPM) which is a special case of the ICM. Bozorgiet al. [2] considered the community structure, i.e. a community is a set of social network users that are connected more densely to each other than to other users from other communities [22, 26], in the influence maximization problem.

The Credit Distribution model (CD) [8] is an interesting solution that investigates past propagation to select influence users. Indeed, it uses past propagation to associate to each user in the network an influence credit value. The influence spread function is defined as the total influence credit given to a set of users S from the whole network. The algorithm scans the data (past propagation) to compute the total influence credit of a user v for influencing its neighbor u. In the next step, the CELF algorithm [17] is run to approximate the set of nodes that maximizes the influence spread in the network.

2.2 Influence and Theory of Belief Functions

The theory of belief functions was used to measure the user’s influence in social networks. In fact, this theory allows the combination of many influence indicators together. Besides, it is useful to manage uncertainty and imprecision. This section is dedicated to present a brief description of existing works that use the theory of belief functions for measuring or maximizing the influence.

An evidential centrality (EVC) measure was proposed by Wei et al. [25] and it was used to estimate the influence in the network. EVC is obtained through the combination of two BBAs defined on the frame \(\left\{ high,\, low\right\} \). The first BBA defines the evidential degree centrality and the second one defines the evidential strength centrality of a given node. A second interesting, work was also introduced to measure the evidential influence, it is the work of [7]. They proposed a modified EVC measure. It considers the actual node degree instead of following the uniform distribution. Furthermore, they proposed an extended version of the semi-local centrality measure [3] for weighted networks. Their evidential centrality measure is the combined BBA distribution of the modified semi-local centrality measure and the modified EVC. The works of [7, 25] are similar in that, they defined their measures on the same frame of discernment, they used the network structure to define the influence.

Two evidential influence maximization models are recently introduced by Jendoubi et al. [10]. They used the theory of belief functions to estimate the influence that exerts one user on his neighbor. Indeed, their measure fuses several influence indicators in Twitter like the user’s position in the network, the user’s activity, etc. This paper is based on our previous work [10]. However, the novelty of this paper is that we not only combine many influence indicators to estimate the user’s influence, but also we consider the reliability of each influence indicator in characterizing the influence.

3 Theory of Belief Functions

In this section, we present the theory of belief functions, also called evidence theory or Dempster-Shafer theory. It was first introduced by Dempster [4]. Next, the mathematical framework of this theory was detailed by Shafer in his book “A mathematical theory of evidence” [23]. This theory is used in many application domains like pattern clustering [5, 19] and classification [11, 12, 18]. Furthermore, this theory is used for analyzing social networks and measuring the user’s influence [7, 10, 25].

Let us, first, define the frame of discernment which is the set of all possible decisions:

$$\begin{aligned} \varOmega =\left\{ d_{1},d_{2},...,d_{n}\right\} \end{aligned}$$
(1)

The mass function, also called basic belief assignment (BBA), \(m^{\varOmega }\), defines the source’s belief on \(\varOmega \) as follows:

$$\begin{aligned} 2^{\varOmega }\rightarrow & {} \left[ 0,1\right] \nonumber \\ A\mapsto & {} m\left( A\right) \end{aligned}$$
(2)

such that \(2^{\varOmega }=\left\{ \emptyset ,\left\{ d_{1}\right\} ,\left\{ d_{2}\right\} ,\left\{ d_{1},d_{2}\right\} ,...,\left\{ d_{1},d_{2},...,d_{n}\right\} \right\} \). The set \(2^{\varOmega }\) is called power set, i.e. the set of all subsets of \(\varOmega \). The value assigned to the subset \(A\subseteq \varOmega \), \(m\left( A\right) \), is interpreted as the source’s support or belief on A. The BBA distribution, m, must respect the following condition:

$$\begin{aligned} \sum _{A\subseteq \varOmega }m\left( A\right) =1 \end{aligned}$$
(3)

We call A focal element of m if we have \(m(A)>0\). The discounting procedure allows to consider the reliability of the information source. Let \(\alpha \in \left[ 0,1\right] \) be our reliability on the source of the BBA m, then the discounted BBA \(m^{\alpha }\) is obtained as follows:

$$\begin{aligned} {\left\{ \begin{array}{ll} m^{\alpha }\left( A\right) &{} =\alpha .m\left( A\right) ,\,\forall A\in 2^{\varOmega }\setminus \left\{ \varOmega \right\} \\ m^{\alpha }\left( \varOmega \right) &{} =1-\alpha .\left( 1-m\left( \varOmega \right) \right) \end{array}\right. } \end{aligned}$$
(4)

The information fusion is important when we want to fuse many influence indicators together in order to obtain a refined influence measure. Then, the theory of belief functions presents several combination rules. The Dempster’s rule of combination [4] is one of these rules. It allows to combine two distinct BBA distributions. Let \(m_{1}\) and \(m_{2}\) be two BBAs defined on \(\varOmega \), Dempster’s rule is defined as follows:

$$\begin{aligned} m_{1\oplus 2}\left( A\right) ={\left\{ \begin{array}{ll} \frac{{\displaystyle \sum _{B\cap C=A}}m_{1}\left( B\right) m_{2}\left( C\right) }{1-{\displaystyle \sum _{B\cap C=\emptyset }}m_{1}\left( B\right) m_{2}\left( C\right) }, &{} A\subseteq \varOmega \setminus \left\{ \emptyset \right\} \\ 0 &{} if\, A=\emptyset \end{array}\right. } \end{aligned}$$
(5)

In the next section, we present some relevant existing influence measures and influence maximization models.

4 Reliability-Based Influence Maximization

In this paper, we propose an influence measure that fuses many influence indicators. Furthermore, we assume that these indicators may do not have the same reliability in characterizing the influence. Then, some indicators may be more reliable than the others. In this section, we present the proposed reliability-based influence measure, the method we use to estimate the reliability of each indicator and the influence maximization model we use to maximize the influence in the network.

4.1 Influence Characterization

Let \(G=\left( V,E\right) \) be a social network, where V is the set of nodes such that \(u,v\in V\) and E is the set of links such that \(\left( u,v\right) \in E\). To estimate the amount of influence that exerts one user, u, on his neighbor, v, we start first by defining a set of influence indicators, \(I=\left\{ i_{1},i_{2},\ldots ,i_{n}\right\} \) characterizing the influence. These indicators may differ from a social network to another. We note that we are considering quantitative indicators. Let us take Twitter as example, we can define the following three indicators: (1) the number of common neighbors between u and v, (2) the number of times v mentions u in a tweet, (3) the number of times v retweets from u.

In the next step, we compute the value of each defined indicator for each link \(\left( u,v\right) \) in the network. Then, \(\left( u,v\right) \) will be associated with a vector of values. In a third step, we need to normalize each computed value to the range \(\left[ 0,1\right] \). This step is important as it puts all influence indicators in the same range.

In this stage, we have a vector of values of the selected influence indicators:

$$\begin{aligned} W_{\left( u,v\right) }=\left( i_{\left( u,v\right) _{1}}=w_{1},i_{\left( u,v\right) _{2}}=w_{2},\ldots ,i_{\left( u,v\right) _{n}}=w_{n}\right) \end{aligned}$$
(6)

The elements of \(W_{\left( u,v\right) }\) are in the range \(\left[ 0,1\right] \), i.e. \(w_{1},w_{2},\ldots w_{n}\in \left[ 0,1\right] \), and we define a vector \(W_{\left( u,v\right) }\) for each link \(\left( u,v\right) \) in the network. Next, we estimate a BBA for each indicator value and for each link. Then, if we have n influence indicators, we will obtain n BBA to model each of these indicators for a given link. Let us first, define \(\varOmega =\left\{ I,P\right\} \) to be the frame of discernment, where I models the influence and P models the passivity of a given user. For a given link \(\left( u,v\right) \) and a given influence indicator \(i_{\left( u,v\right) _{j}}=w_{j}\), we estimate its BBA on the fame \(\varOmega \) as follows:

$$\begin{aligned} m_{\left( u,v\right) _{j}}\left( I\right)= & {} \frac{w_{j}-\min _{\left( u,v\right) \in E}\left( i_{\left( u,v\right) _{j}}\right) }{\max _{\left( u,v\right) \in E}\left( i_{\left( u,v\right) _{j}}\right) -\min _{\left( u,v\right) \in E}\left( i_{\left( u,v\right) _{j}}\right) }\end{aligned}$$
(7)
$$\begin{aligned} m_{\left( u,v\right) _{j}}\left( P\right)= & {} \frac{\max _{\left( u,v\right) \in E}\left( i_{\left( u,v\right) _{j}}\right) -w_{j}}{\max _{\left( u,v\right) \in E}\left( i_{\left( u,v\right) _{j}}\right) -\min _{\left( u,v\right) \in E}\left( i_{\left( u,v\right) _{j}}\right) } \end{aligned}$$
(8)

After this step, the influence that exerts a user u on his neighbor v is characterized by a set of n influence BBAs. In the next section, we present the method we use to estimate the reliability of each defined BBA.

4.2 Estimating Reliability

The selected influence indicators may do not have the same reliability in characterizing the user’s influence. Then, we estimate the reliability, \(\alpha _{j}\), of each influence indicator. We assume that “the farthest from the others the indicator is, the less reliable it is”. For that purpose, we follow the approach introduced by Martin et al. [20] to estimate reliability. Besides, we note that this operator considers our assumption. In this section we detail the steps of [20] operator we used to estimate the reliability of each influence indicator in this paper.

Let us consider the link \(\left( u,v\right) \), we have a set of n BBAs to characterize the chosen influence indicators, \(\left( m_{\left( u,v\right) _{1}},m_{\left( u,v\right) _{2}},\ldots ,m_{\left( u,v\right) _{n}}\right) \). Our purpose is to estimate the reliability of each indicator against the others. To estimate the reliability, \(\alpha _{j}\), of the BBA \(m_{\left( u,v\right) _{j}}\), we start by computing the distance between \(m_{\left( u,v\right) _{j}}\) and each BBA from the rest of \(n-1\) BBAs that characterizes the influence of u on v, i.e. \(\left( m_{\left( u,v\right) _{1}},m_{\left( u,v\right) _{2}},\ldots ,m_{\left( u,v\right) _{j-1}},m_{\left( u,v\right) _{j+1}},\ldots ,m_{\left( u,v\right) _{n}}\right) \):

$$\begin{aligned} \delta _{i}^{j}=\delta (m_{j},m_{i}) \end{aligned}$$
(9)

To estimate these distances, we can use the Jousselme distance [13] as follows:

$$\begin{aligned} \delta \left( m_{j},m_{i}\right) =\sqrt{\frac{1}{2}\left( m_{j}-m_{i}\right) ^{T}\underset{=}{D}\left( m_{j}-m_{i}\right) } \end{aligned}$$
(10)

such that \(\underset{=}{D}\) is an \(2^{N}\times 2^{N}\) matrix, \(N=|\varOmega |\) and \(D\left( A,B\right) =\frac{|A\cap B|}{|A\cup B|}\).

Next, we compute the average of all obtained distance values as follows:

$$\begin{aligned} C_{j}=\frac{\delta _{j}^{1}+\delta _{j}^{2}+\ldots +\delta _{j}^{n}}{n-1} \end{aligned}$$
(11)

such that \(\left( \delta _{1},\delta _{2},\ldots ,\delta _{n}\right) \) are the distance values between \(m_{\left( u,v\right) _{j}}\)

and \(\left( m_{\left( u,v\right) _{1}},m_{\left( u,v\right) _{2}},\ldots ,m_{\left( u,v\right) _{n}}\right) \), \(\left( \delta \left( m_{j},m_{j}\right) =0\right) \). We use the average distance \(C_{j}\) to estimate the reliability, \(\alpha _{j}\), of the \(j^{\text {th}}\) influence indicator in characterizing the influence of u on v as follows:

$$\begin{aligned} \alpha _{j}=f\left( C_{j}\right) \end{aligned}$$
(12)

where f is a decreasing function. The function f can be defined as [20]:

$$\begin{aligned} \alpha _{j}=\left( 1-\left( C_{j}\right) ^{\lambda }\right) ^{1/\lambda } \end{aligned}$$
(13)

where \(\lambda >0\).

After applying all these steps, we obtain the estimated value of the BBA reliability, \(\alpha _{j}\). To consider this reliability, we apply the discounting procedure described in Eq. (4). Then, we apply these steps for all defined BBAs on every link in the network.

4.3 Influence Estimation

After discounting all BBAs of each link in the network, we use them to estimate the influence that exerts one user on his neighbor. For this purpose, let us consider the link \(\left( u,v\right) \) and its discounted set of BBAs \(\left( m_{\left( u,v\right) _{1}}^{\alpha _{1}},m_{\left( u,v\right) _{2}}^{\alpha _{2}},\ldots ,m_{\left( u,v\right) _{n}}^{\alpha _{n}}\right) \). We define the global influence BBA that exerts u on v to be the BBA that fuses all discounted BBAs defined on \(\left( u,v\right) \). For this aim, we use the Dempster’s rule of combination (see Eq. (5)) to combine all these BBAs as follows:

$$\begin{aligned} m_{\left( u,v\right) }=m_{\left( u,v\right) _{1}}^{\alpha _{1}}\oplus m_{\left( u,v\right) _{2}}^{\alpha _{2}}\oplus \ldots \oplus m_{\left( u,v\right) _{n}}^{\alpha _{n}} \end{aligned}$$
(14)

The BBA distribution \(m_{\left( u,v\right) }\) is the result of this combination.

Consequently, we define the influence that exerts u on v to be the amount of belief given to \(\left\{ I\right\} \) as:

$$\begin{aligned} Inf\left( u,v\right) =m_{\left( u,v\right) }\left( I\right) \end{aligned}$$
(15)

The novelty of this evidential influence measure is that it considers several influence indicators in a social network and it takes into account the reliability of each defined indicator against the others. Our evidential influence measure can be considered as a generalization of the evidential influence measure introduced in the work of Jendoubi et al. [10].

To maximize the influence in the network, we need to define the amount of influence that exerts a set of nodes, S, on the hole network. It is the total influence given to S for influencing all users in the network. Then, we estimate the influence of S on a user v as follows [10]:

$$\begin{aligned} Inf\left( S,v\right) ={\left\{ \begin{array}{ll} 1 &{} if\, v\in S\\ {\displaystyle \sum _{u\in S}}{\displaystyle \sum _{x\in IN\left( v\right) \cup v}}Inf\left( u,x\right) .Inf\left( x,v\right) &{} Otherwise \end{array}\right. } \end{aligned}$$
(16)

where \(Inf\left( v,v\right) =1\) and \(IN\left( v\right) \) is the set of in-neighbors of v, i.e. if \(\left( u,v\right) \) is a link in the network then u is an in-neighbor of v. Next, we define the influence spread function that computes the amount of influence of S on the network as follows:

$$\begin{aligned} \sigma \left( S\right) =\sum _{v\in V}Inf\left( S,v\right) \end{aligned}$$
(17)

To maximize the influence that exerts a set of users S on the network, we need to maximize \(\sigma \left( S\right) \), i.e. \(\underset{S}{\text {argmax}}\,\sigma \left( S\right) \). The influence maximization under the evidential model is demonstrated to be NP-Hard. Furthermore, the function, \(\sigma \left( S\right) \), is monotone and submodular. Proof details can be found in [10]. Consequently, a greedy-based solution can perform a good approximation of the optimal influence users set S. In such cases, the cost effective lazy-forward algorithm (CELF) [17] is an adaptable maximization algorithm. Besides, it needs only two passes of the network nodes and it is about 700 times faster than the greedy algorithm. More details about CELF-based solution used in this paper can be found in [10].

After the definition of the reliability-based evidential influence measure and the influence spread function, we move to the experiments. Indeed, we made a set of experiments on real data to show the performance of our solution.

5 Results and Discussion

This section is dedicated to the experiments. In fact, we crawled Twitter data for the period between the 08-09-2014 and 03-11-2014. Table 1 presents some statistics of the dataset.

Table 1. Statistics of the data set [10]

To characterize the influence users on Twitter, we choose the following three influence indicators: (1) the number of common neighbors between u and v, (2) the number of times v mentions u in a tweet, (3) the number of times v retweets from u. Next, we apply the process described above in order to estimate the amount of influence that exerts each user u on his neighbor v in the network.

To evaluate the proposed reliability-based solution, we compare the proposed solution to the evidential model of Jendoubi et al. [10]. Furthermore, we choose four comparison criteria to compare the quality of the detected influence users by each experimented model. Those criteria are the following: (1) number of accumulated follow, (2) number of accumulated mention, (3) number of accumulated retweet, (4) number of accumulated tweet. Indeed, we assume that an influence user with a good quality is a highly followed user, mentioned and retweeted several times and active in terms of tweets.

In a first experiment, we compare the behavior of the proposed measure with fixed values of indicator reliability. Figure 1 presents the obtained results for two fixed values of \(\alpha _{j}=\alpha \), which are \(\alpha _{j}=\alpha =0\) and \(\alpha _{j}=\alpha =0.2\). In Fig. 1 we have a comparison according to the four criteria, i.e. #Follow, #Mention, #Retweet and #Tweet shown in the y-axis of the sub-figures. We compare the experimented measure using the set of selected seed for each value of \(\alpha _{j}\). Besides, we fixed the size of the set S of selected influence users to 50 influencers, i.e. shown in the x-axis of each sub-figure.

According to Fig. 1, we notice that when \(\alpha =0\) (red scatter plots), the proposed reliability-based model does not detect good influencers according to the four comparison criteria. In fact, the red scatter plot (\(\alpha =0\)) is very near to the x-axis in the case of the four criteria, which means that the detected influencer are neither followed, nor mentioned, nor retweeted. Besides, they are not very active in terms of tweets. However, we see a significant improvement especially when \(\alpha =0.2\) (blue scatter plots). Indeed, the detected influencers are highly followed as they have about 14k accumulated followers in total. Besides, the model detected some highly mentioned and retweeted influencers, especially starting from the \(25^{\text {th}}\) detected influencer. Finally, the influence users selected when \(\alpha =0.2\) are more active in terms of tweets than those selected when \(\alpha =0\).

This first experiment shows the importance of the reliability parameter, \(\alpha \), in detecting influencers with good quality. In fact, we see that when we consider that all indicators are totally reliable in characterizing the influence (the case when \(\alpha =0\)), we notice that the proposed model detects influencers with very bad quality. However, when we reduce this reliability (\(\alpha =0.2\)) we notice some quality improvement.

Fig. 1.
figure 1

Comparison of the reliability-based evidential model with three \(\alpha \) fixed value (Color figure online)

Fig. 2.
figure 2

Comparison between the proposed reliability-based solution and the evidential model of [10]

In a second experiment, we used the process described in Sect. 4.2 to estimate the reliability of each BBA in the network. Then, each BBA in our network is discounted using its own estimated reliability parameter. We note that the parameter \(\lambda \) in Eq. (13) was fixed to \(\lambda =5\). To fix this value, we made a set of experiments with different values of \(\lambda \) and the best results are given with \(\lambda =5\). Furthermore, we compare our reliability-based evidential model (also called evidential model with discounting) to the evidential model proposed by [10]. In fact, this last model is the nearest in its principle to the proposed solution in this paper. Besides, we fixed the size of the set S of selected influence users to 50 influencers. Figure 2 presents a comparison between the two experimented models in terms of #Follow, #Mention, #Retweet and #Tweet (shown in the y-axis of the sub-figures).

According to Fig. 2, we note that the two experimented models detect good influencers (shown in the x-axis). However, we see that the best compromise between the four criteria is given by the proposed reliability-based evidential model. In terms of accumulated #Follow, we notice that the most followed influencers are detected by the evidential model, also, our reliability-based model detected highly followed influencers. In terms of #Mention, we see that the evidential model starts detecting some mentioned influencers after detecting about 10 users that are not mentioned. However, the proposed reliability-based model starts detecting highly mentioned users from the first detected influencer. Furthermore, we see a similar behavior in the sub-figure showing the accumulated #Retweet. Indeed, the proposed solution detects highly retweeted influencers from the first user. In the last sub-figure that presents the comparison according to the accumulated #Tweet, the best results are those of the proposed reliability-based model.

This second experiment shows the effectiveness of the proposed reliability-based influence measure against the evidential influence measure of [10]. In fact, the best influence maximization model is always the model that detects the best influencers at first. Indeed, in an influence maximization problem we need generally to minimize the number of selected influencers in order to minimize the cost. For example, this is important in a viral marketing campaign as it helps the marketer to minimize the cost of his campaign and to maximize his benefits. Furthermore, our influence maximization solution gives the best compromise between the four criteria, i.e. #Follow, #Mention, #Retweet and #Tweet.

From these experiments we can conclude that the reliability parameter is important if we want to measure the influence in a social network through the consideration of several influence indicators. Indeed, we may have some influence indicators that are more reliable in characterizing the influence of the others. Furthermore, the proposed solution is efficient in detecting influencers with a good compromise between all chosen influence indicators.

6 Conclusion

To conclude, this paper introduces a new reliability-based influence measure. The proposed measure fuses many influence indicators in the social network. Furthermore, it can be adapted for several social networks. Another important contribution of the paper is that we consider the reliability of each chosen influence indicator to characterize the influence. Indeed, we propose to apply a distance-based operator that estimates the reliability of each indicator against to the others and considers the assumption that “the farthest from the others the indicator is, the less reliable it is”. Besides, we use the proposed reliability-based measure with an existing influence maximization model. Finally, we present two experiments that show the importance of the reliability parameter and the effectiveness of the reliability-based influence maximization model against the evidential model of Jendoubi et al. [10]. Indeed, we obtained a good compromise in the quality of detected influencers and we had good results according to the four influence criteria, i.e. #Follow, #Mention, #Retweet and #Tweet.

For future works, we will search to test our influence maximization solution on other social networks. Then, we will collect more data from Facebook and Google Plus and we will prove the performance of the proposed reliability-based influence maximization model. A second important perspective is about the influence maximization within communities. In fact, social networks are generally characterized by a community structure. Then, the main idea is to take profit from this characteristic and to search to select a minimum number of influence users and to minimize the time spent to detect them.