Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

A review on graphical evolutionary game for information diffusion on social networks

A review on graphical evolutionary game for information diffusion on social networks Purpose – With the recent development of science and technology, research on information diffusion has become increasingly important. Design/methodology/approach – To analyze the process of information diffusion, researchers have proposed a framework with graphical evolutionary game theory (EGT) according to the theory of biological evolution. Findings – Through this method, one can study and even predict information diffusion. Originality/value – This paper summarizes three existing works using graphical EGT to discuss how to obtain the static state and the dynamics of information diffusion in social network. Keywords Crowd-sourced design and engineering, Information diffusion, Crowdsourced Big Data and analytics, Evolutionary game, Models and methods for Crowd Science and Engineering Paper type General review 1. Introduction Over the past several decades, accompanied by the rapid development of the internet and mobile communications, social networks are becoming increasingly popular among numerous individuals. Every second, millions of users are interacting, which is giving rise to the development of various kinds of information. It is therefore critical to understand how such a huge amount of information diffuses over social networks for the development of social networks. Many researchers have been studying information diffusion from different perspectives. Originally, information diffusion was proposed to solve the problem of attacks of computer virus (Pastor-Satorras and Vespignani, 2001)(Gruhl et al., 2004). People later realized that information diffusion could be an independent research topic. Early works about information diffusion focused on the dynamics of information diffusion from both the © Benliu Qiu and Ningxuan Zhang. Published in International Journal of Crowd Science. Published by Emerald Publishing Limited. This article is published under the Creative Commons Attribution (CC BY 4.0) licence. Anyone may reproduce, distribute, translate and create derivative works of this article (for both commercial and non-commercial purposes), subject to full attribution to the original International Journal of Crowd publication and authors. The full terms of this licence may be seen at http://creativecommons.org/ Science licences/by/4.0/legalcode pp. 259-271 Emerald Publishing Limited This paper is supported by the National Key Research and Development Program of China 2398-7294 (2017YFB1400100). DOI 10.1108/IJCS-06-2018-0011 macroscopic and microscopic perspectives (Gruhl et al., 2004). Later, researchers studied IJCS how users’ behaviors were affected by social networks (Centola, 2010). Machine learning 2,3 was used to find the global influence of individuals in diffusion (Yang and Leskovec, 2010). How to restrain private information diffusion by important information links was investigated by Kimura et al. (2009) and Ilyas et al. (2011). The authors discussed how to find the nodes that have more influence over others (Kimura et al., 2007). Recently, as Facebook and Twitter have become increasingly popular, an analysis was conducted to predict future trends on the basis of data obtained from Twitter (Yang and Counts, 2010) (Leskovec). Game theory has also been used to analyze this process (Chen and Liu, 2012). The graphical evolutionary game theory (EGT) framework was proposed to model and analyze interaction among users in social network (Jiang et al., 2014a, 2014b), and the coordination game was utilized to analyze the diffusion process (Vega-Redondo, 2007). The stability of information diffusion was obtained by means of different methods (Wang et al., 2010a, 2010b, 2010c; Kim and Yoneki, 2012). It was shown that users with different number of followers can have different influences (Beevolve, 2012). Information diffusion over social networks is similar to biological evolution, and thus, the graphical EGT can be used to analyze and model how information diffuses over social networks. EGT has been widely adopted in various areas including image interpolation (Chen et al.,2011), as well as wireless communications and networking (Wang et al., 2010a, 2010b, 2010c; Jiang et al., 2013; Tembine et al., 2010; Wiecek et al., 2011). In this paper, we summarized the key results of studies (Jiang et al., 2014a, 2014b) and (Cao et al.,2016)to illustrate how the graphical EGT can be used to model information diffusion. The rest of this paper is organized as follows. In Section 2, information diffusion is discussed in detail. Some basic concepts about graphical EGT are given in Section 3. Then in Section 4, the model built with graphical EGT is discussed. Static and dynamic diffusion processes with the corresponding experimental results are shown in Section 5. Section 6 draws the conclusion of this paper. 2. Information diffusion To understand information diffusion, the information should be defined. When weather prediction tells us it will be sunny tomorrow or teachers solve our confusion about an incomprehensible concept, we instinctively feel that we have received information. It is widely agreed that information is any entity or form that resolves uncertainty or provides an answer for any question. Despite information being present since the birth of humankind, the measurement of information was discussed only in in 1948 by C. E. Shannon in the book A Mathematical Theory of Communication. Just as the information has been with human for so long, so is the information diffusion. This is because where there is information, there is information diffusion. With the rapid development of the internet and mobile communications, information diffusion over social networks is faster and broader. For example, sham information has great possibilities of becoming a rumor as soon as it is released in a social network. In a traditional social network, there may be adequate time for response and stopping the rumor. However, in contemporary social network, more efforts are needed to stop rumors. Studying information diffusion over social network can help us discover the common characteristics of communities for precise commercial advertisement and pointed political canvassing. In all, the study of information diffusion can be applied to various domains. There are two examples. Donald Trump, the President of the USA, has the habit of tweeting for the country. As the president of the world’s superpower, his words on the internet have the ability of creating waves. If we can predict how the information released by Trump is diffused on the internet or among the people, then we can better evaluate the influence Information caused of his tweets. What does it mean? It means, in the financial world, we will diffusion on macroscopically be able to more quickly and accurately predict fluctuations in the stock, social which can prove to be financially beneficial. Except predicting the diffusion states, we have networks the ability to deduce the characteristic of a group of people who are forwarding or not through known diffusion states at any moment. This can be used to tell candidates to give corresponding speeches to different groups of voters. It is also possible that the popularity rating can be raised. Besides this, the model of users, which is obtained by analyzing the existing diffusion actions of users in the past, can be applied to advertise on the internet more accurately, which may create billions of wealth, as it has done for Google. 3. Graphical evolutionary game theory The basic concepts of graphical EGT will be introduced in this section (Smith, 1982), which will be used to analyze information diffusion in the next section (Jiang et al., 2014a, 2014b) and (Cao et al.,2016). In EGT, a game is played for many times by players who are chosen randomly from a large population. In this theory, a player changes his strategy according to others’ strategies and his characteristics. We call the dynamics as “replicator dynamics” which is the most important concept in EGT. Replicators, who can represent the population, may reproduce his strategy under some specific rules. For example, there is new information about a football star. One person who is a football fan may originally prefer to forward this information, but when he finds that all of his friends are not concerned about such information, he may change his strategy from forwarding to not forwarding. In this example, we can see that the strategies of neighbors can influence one’s decision. Different from traditional game theory, EGT pays more attention to the dynamics than to stability of the strategies of the whole population. In EGT, all players will have some periods of strategic interactions to reach a final equilibrium, known as the evolutionary stable state (ESS). In the social network, people may not interact with all users. Therefore, a graph is generally used to represent the relationship among users. In this graph, we use “fitness” (Nowak and Sigmund, 2004) to describe players’ interactions with others, which is relative to their payoff. Players change their strategies according to three strategy update rules (Ohtsukia and Nowak, 2006), including birth–death (BD), death–birth (DB) and imitation (IM) rules. Figure 1 illustrates the general process of these three update rules (Jiang et al., 2014a, 2014b). In Figure 1(a), we can see in the BD update rule, a node is chosen from the population with a probability according to their fitness. Then the strategy of the chosen node will replace one of its neighbor’s strategy. In the DB update rule, we randomly choose a node to abandon its strategy and get one of its neighbor’s strategy with the probability according to their fitness, which is shown in Figure 1(b). In IM update rule, every node chooses one action: either it abandons or retains its strategy with the probability according to their fitness, as shown in Figure 1(c). 4. EGT formulation of information diffusion Let us consider how to translate a typical social network with the language of graphical EGT. Any users in the social network can be regarded as a node in a graph. The relationship between users corresponds to the edges of graph. In a word, a graph structure can be used to describe the social network topology. Because information diffusion is studied over the social network, it is assumed that any user has only two strategies to choose from: to forwarding information or to not (S or S ). Here, a question can be raised naturally: How do f n we describe the utility from forwarding or not? As has been done in graphical EGT, fitness IJCS 2,3 Figure 1. (a) BD update rule; (b) DB update rule and (c) IM update rule (Nowak and Sigmund, 2004) can be used to represent the utility from forwarding or not, which is defined as p =(1  a)B þ aU, where U is the payoff matrix and B is the user’s baseline fitness. In the study of information diffusion, the payoff matrix can be written as: S S S u u , where u denotes the payoff when one user and his neighbor both use f ff nf ff S u u n fn nn strategy S ; u ; u and u are defined in a similar way. Note that the payoff matrix is nn f fn nf considered symmetric; therefore, the central user and his neighbor both have the same fitness when they use the reverse strategy, i.e. u ¼ u . The payoffs are further normalized fn nf within interval (0, 1), which means 0 < u ; u ; u < 1. The payoff can be regarded as the nn ff fn popularity of a user or the hit rate of a website by forwarding this information. For example, if the information is about recent hot news, it is known that forwarding it will get more popularity than not forwarding. So under this circumstance, we have u > u > u .On ff fn nn the contrary, if the information is useless for most of us, u < u < u can be obtained. ff fn nn The decision of users is determined by not only the payoff but also by the user’s internal property, i.e. the baseline fitness B. The parameter a in the fitness is a representation of the selection intensity. It is within interval (0, 1). When it is close to 0, the corresponding selection is a weak selection (Ohtsuki et al.,2007), while when a ! 1, it denotes a strong selection, in which the payoff determines the fitness. The results shown here are based on the assumption of the weak selection. The reason is that every user is involved in so many games that any game just influences a user a little. Given a social network, let p and p denote the percentages of users to forwarding or f n Information not, respectively, in the population. Similarly, let p ; p and p denote the percentages of ff fn nn diffusion on edges, where both users are forwarding, one is forwarding and the other is not and both social users are not forwarding, respectively. With the basic knowledge of the probability theory, networks one has: p þ p ¼ 1, p þ p ¼ 1, p þ p ¼ 1, p p ¼ p p , p ¼ p p , n f fjf njf fjn njn f njf njf f ff f fjf p ¼ p p , p ¼ p p þ p p . It is obvious that all variables above can be denoted by nn n njn fn f njf n fjn p and p . f ff 5. Theorems for information diffusion over social networks To characterize the information diffusion over social network with graphical EGT, the two most important things are the evolutionary stable states (ESSs) and the evolutionary dynamics. As discussed above, the states of a social network can be determined by _ _ p and p . Thus, the following analysis will focus on p ; p ; p and p . The first result f ff f ff f ff is about the population dynamics (Jiang et al., 2014a, 2014b). Theorem 1: The population dynamics of information diffusion over a uniform degree network under BD strategy update rule and weak selection scenario can be described as follows: ðÞ a k  2 _ ðÞ p ¼ p 1  p a p þ b þ o a ; (1) f f f 1 f 1 ðÞ k  1 ðÞ a ¼ k  2 u  2u þ u ; 1 ff fn nn where ðÞ ðÞ b ¼ u þ k  2 u  k  1 u : 1 nn ff fn Theorem 2: The population dynamics of information diffusion over non-uniform degree networks under the BD strategy update rule and weak selection scenario can be described as follows: ðÞðÞ a k  1 k  2 k ðÞ p 5 p 1  p a p þ b þ o a ; (2) f f f 2 f 2 ðÞ k  k < ðÞ a 5 k  2 k u  2u þ u ; 2 ff fn nn where 2 2 ðÞ ðÞ b 5 k u þ k  2 k u  k  k u 2 ff fn nn: From equations (1) and (2), it can be seen that p is not related with N, i.e. the network has the scale-free property, which indicates that the results do not depend on the number of users in the whole network as long as it is large enough. It can be seen that the population dynamics in the uniform and non-uniform degree networks are similar. The only difference 2 2 between them is k and k are changed to k and k in the non-uniform network, which means that the non-uniform network can be treated as a uniform network. Although the above two theorems are based on the BD update rule, it has been shown that the population dynamics of information diffusion over uniform degree networks under the BD strategy update rule, the DB strategy update rule and the imitation strategy update rule are equivalent when the network degree is sufficiently large and under the weak selection scenario (Jiang et al., IJCS 2014a, 2014b). 2,3 To validate the theorems over a homogeneous social network, the following payoff matrices PM1, PM2, PM3 and PM4 are used to derive the theoretical results and compare with simulation results. Case 1: PM1: u > u > u ff fn nn S S f n S 0:80:6 S 0:60:4 Case 2: PM2: u > u > u fn ff nn S S f n S 0:60:8 S 0:80:4 Case 3: PM3: u > u > u fn nn ff S S f n S 0:40:8 S 0:80:6 Case 4: PM4: u > u > u nn fn ff S S f n S 0:40:6 S 0:60:8 For Case 1: u > u > u , the user and his neighbor who both forward information can ff fn nn achieve the largest payoff, so it can be predicted that the users will choose the forwarding strategy, making all users in the network forward it gradually. For Case 4, u > u > u , nn fn ff the final state of the network will be the complete opposite to that of Case 1, i.e. nobody will choose to forward information. The final stable states of Case 2 and Case 3 are between those of Case 1 and Case 4. The network state of the two cases will gradually converge to a final state which is between 0 and 1. In Figure 2, the four continuous curves and four groups of discrete points represent the population dynamics derived by the theory and simulation, respectively. It can be seen that the simulations agree with the theoretical results. The small gaps are due to the ignorance of the dependence between network states and network degree. In all four cases, the global network states all converge to the stable state, known as the ESSs. Information diffusion on social networks Figure 2. Simulation results for the real-world Facebook network. When the population dynamics equals to zero, the whole network reaches a stable state. Therefore, making equations (1) and (2) equal to 0, one can get the expression of ESSs of both uniform and non-uniform degree networks, which are shown below (Jiang et al., 2014a, 2014b). Theorem 3: In an N-users social network which can be characterized by a graph with uniform degree k, if each user updates his/her information forward strategy using the IM update rules, the evolutionary stable network states can be summarized as follows: 1; ifu > u > u > ff fn nn 0; ifu > u > u nn fn ff p ¼ (3) >ðÞ ðÞ > k  2 u þ u  k  1 u fn ff nn > ; else: ðÞ 2u  k  2 u  u fn ðÞ ff nn Similarly, for non-uniform degree network, we can obtain the following theorem (Jiang et al., 2014a, 2014b). Theorem 4: In an N-users social network which can be characterized by a graph with ðÞ degree distribution l k , if each user updates his/her information forward strategy using the BD update rule, the evolutionary stable network states can be summarized as follows: > 1; ifu > u > u ff fn nn; > 0; ifu > u > u ; nn fn ff * k p (4) u  u þ u  u ðÞ fn nn ðÞ ff nn k  2 ! ; else 2u  u  u fn ff nn k  2 The results are consistent with the intuition. If one can get more utility from forwarding information regardless of the neighbors’ strategies, he will definitely forward this information, i.e. the probability of forwarding is one in the steady state. Similarly, a steady * loss will make nobody want to forward information, which is described by p ¼ 0. For the IJCS situations between two extremities above, the ESS will be determined by the exact value of 2,3 u ; u and u , and one can have a general impression through the simulation results as ff fn nn shown below. Figure 3 illustrates the graph structure and the degree characteristics of a Facebook sub- network, which consists of ten subgraphs. With the payoff matrix given above, the simulation results and theoretical results of the ten subgraphs are shown in Figure 4. The horizontal red line and the cyan line show the ESSs of Case 1 and Case 4, while the green one and the brown one show the ESSs of Case 2 and Case 3.The gaps between simulation and theoretical results of Case 2 and Case 3 are from the neglected dependence between the network state and the network degree. From the results, it can be seen that the theory is consistent with the simulation. Figure 3. Graph structure and degree characteristic of the Facebook network used for experiment Figure 4. Experiment results of ESSs for Facebook network The theorems above characterize the social networks with the same type of users. The Information study of the information diffusion over heterogeneous social network is also conducted diffusion on (Cao et al., 2016). Two different situations need to be considered: the unknown user type social model and the known user type model. For the unknown user type model, each user networks does not know the exact type of the neighbors and tends to consider them the same as itself. For the known user type model, each user knows the exact type of the neighbors and thus their decisions. For the unknown user type model over heterogeneous social network, the following theorem can be derived (Cao et al.,2016). Theorem 5: (Evolutionary dynamics): In the unknown user type model, the ðÞ evolutionary dynamics for the network states p i and p are given in the equations as f f follows: 1 1 a _ ðÞ ðÞ p i ¼ p  p i þ p p  1 f f f f f N N N 1 1 ðÞ ðÞ D i k  3 þ 2k p þ 1  k þ D i k  1 ; (5) f n 1 1 p ¼ p p  1 D k  3 þ 2k p þ 1  k þ D k  1 ; (6) f f f n X X M M ðÞ ðÞ ðÞ ðÞ where D :¼ qi D i and D :¼ qi D i : n n i51 i51 Theorem 6: (ESSs): In the unknown user type model, the ESSs of the network are as follows: 0; if u > u nn fn 1; if u < u * ff fn p ¼ (7) no > 1 ðÞ >D 1  k þ D k  1 > ; if max u ; u < u ; ff fn fn ðÞ D k  3 þ 2 k " # * * * * * 1 1 ðÞ ðÞ ðÞ p i ¼ p þ ap p  1 D i k  3 þ 2k p þ 1  k Þþ D i ð k  1Þ ; f f f f f (8) ðÞ ðÞ where u 5 qi u i and u ; u are sinilarly defined: ff ff fn nn i51 For the known user type model, the following theorems can be obtained (Cao et al.,2016). ðÞ Theorem 7: In the known user type model, the population dynamics p i and the relationship dynamics p ðÞ i; l for i 6¼ l and i ¼ l are given as follows: ff IJCS 2,3 ak ðÞ ðÞ ðÞ ðÞ ðÞ p i  p i p i; i p i; i þ p i; i f njf njn fjf qjðÞ p ðÞ j; i u ðÞ i; j þ p ðÞ j; i u ðÞ i; j fjf ff njf fn j¼1 p ðÞ j; i u ðÞ i; j  p ðÞ j; i u ðÞ i; j ; (9) fjn nf njn nn "# ðÞ 2 p l ðÞ ðÞ ðÞ p ðÞ i; l ¼ qi ql p i 1  p ðÞ i; i  1  p ðÞ i; l  p ðÞ l; i ff f fjf fjf fjf ðÞ N p i "# ðÞ 2 p i ðÞ ðÞ ðÞ ðÞ ðÞ ðÞ þ qi ql p l 1  p l; l  1  p l; i  p i; l ; f fjf fjf fjf N ðÞ p l (10) _ ðÞ ðÞ ðÞ p ðÞ i; l ¼ q i p i 1  p ðÞ i; i p i  p ðÞ i; i : (11) ff f fjf f fjf ðÞ Np i Figure 5 shows the simulation results of the population dynamics for unknown user type model, where it can be seen that theoretical results are consistent with the simulation results. The small gap is probably because of the ignorance of higher orders of a. These results are ðÞ ðÞ ðÞ ðÞ based on the parameters: u 1 ¼ 0:4; u 2 ¼ 0:2; u 1 ¼ 0:6; u 2 ¼ 0:4; ff ff fn fn ðÞ ðÞ ðÞ ðÞ u 1 ¼ 0:3; u 2 ¼ 0:5; N ¼ 1000; k ¼ 20; q 1 ¼ q 2 ¼ 0:5; a ¼ 0:05: nn nn Figure 5. Simulation results of the evolution dynamics for the unknown user type Figure 6 shows the results for the known user type model. As one can see, the population Information dynamics of known type users make a very large difference than those of unknown type diffusion on users, which indicates the necessity of type classification. In this simulation, the payoff social matrix is chosen as follows with other parameters N = 1,000, k = 20, q(1) = 0.5518, q(2) = networks 0.4482, a ¼ 0:05. "# "# 0:5882 0:0116 0:9619 0:7370 u ¼ ; u ¼ ; ff fn 0:8688 0:1590 0:5595 0:7180 "# "# 0:9339 0:9864 0:2479 0:3385 u ¼ ; u ¼ ; nf nn 0:3288 0:4593 0:6570 0:2437 Figure 6. Simulation results of the evolution dynamics for the known user type Figure 7. Prediction of future diffusion dynamics The prediction of the future diffusion dynamics is also illustrated in Figure 7. It can be seen IJCS that the graphical EGT can well predict the diffusion dynamics in the future based on past 2,3 data. 6. Conclusion In this paper, we summarized three papers (Jiang et al., 2014a, 2014b and Cao et al., 2016)to discuss how to use the graphical evolutionary game theory to analyze the static state and the dynamics of information diffusion in social network. References Beevolve (2012), “An exhaustive study of twitter users across the world”, available at: www.beevolve. com/twitter-statistics/ Cao, X., Chen, Y., Jiang, C. and Ray Liu, K.J. (2016), “Evolutionary information diffusion over heterogeneous social networks”, IEEE Transactions on Signal and Information Processing over Networks, Vol. 2 No. 4, pp. 595-610. Centola, D. (2010), “The spread of behavior in an online social network experiment”, Science, Vol. 329 No. 5996, pp. 1194-1197. Chen, Y. and Liu, K.J.R. (2012), “Understanding microeconomic behaviors in social networking: an engineering view”, IEEE Signal Processing Magazine, Vol. 29 No. 2, pp. 53-64. Chen, Y., Gao, Y. and Liu, K.J.R. (2011), “An evolutionary game-theoretic approach for image interpolation”,in Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference on, IEEE, pp. 989-992. Gruhl, D., Guha, R., Liben-Nowell, D. and Tomkins, A. (2004), “Information diffusion through blogspace”,in Proceedings of the 13th international conference on World Wide Web (WWW), pp. 491-501. Ilyas, M.U., Shafiq, M.Z., Liu, A.X. and Radha, H. (2011), “A distributed and privacy preserving algorithm for identifying information hubs in social networks”,in Proceedings. IEEE, INFOCOM, 2011, pp. 561-565. Jiang, C., Chen, Y. and Ray Liu, K.J. (2014a), “Graphical evolutionary game for information diffusion over social networks”, IEEE Journal of Selected Topics in Signal Processing,Vol.8 No. 4, pp. 524-536. Jiang, C., Chen, Y. and Ray Liu, K.J. (2014b), “Evolutionary dynamics of information diffusion over social networks”, IEEE Trans. Signal Process, Vol. 6 No. 17, pp. 4573-4586., September. 1. Jiang, C., Chen, Y., Gao, Y. and Liu, K.J.R. (2013), “Joint spectrum sensing and access evolutionary game in cognitive radio networks”, IEEE Transactions on Wireless Communications, Vol. 12 No. 5, pp. 2470-2483. Kim, H. and Yoneki, E. (2012), “Influential neighbors selection for information diffusion in online social networks”,in Computer Communications and Networks (ICCCN), 2012 21st International Conference on, IEEE, pp. 1-7. Kimura, M., Saito, K. and Motoda, H. (2009), “Blocking links to minimize contamination spread in a social network”, ACM Transactions on Knowledge Discovery from Data ( Data), Vol. 3 No. 2, pp. 91-9:23. Kimura, M., Saito, K. and Nakano, R. (2007), “Extracting influential nodes for information diffusion on a social network”,in Proceedings. AAAI Conference. Artif. Intell, pp. 1371-1376. Nowak, M.A. and Sigmund, K. (2004), “Evolutionary dynamics of biological games”, Science (New York, N.Y.), Vol. 303 No. 5659, pp. 793-799. Ohtsuki, H., Nowak, M.A. and Pacheco, J.M. (2007), “Breaking the symmetry between interaction and Information replacement in evolutionary dynamics on graphs”, Physical Review Letters, Vol. 98 No. 10, diffusion on p. 108106. social Ohtsukia, H. and Nowak, M.A. (2006), “The replicator equation on graphs”, Journal of Theoretical networks Biology, Vol. 243 No. 1, pp. 86-97. Pastor-Satorras, R. and Vespignani, A. (2001), “Epidemic spreading in scalefree networks”, Physical Review Letters, Vol. 86 No. 14, pp. 3200-3203. Smith, J.M. (1982), Evolution and the Theory of Games, Cambridge University Press, Cambridge. Tembine, H., Altman, E., El-Azouzi, R. and Hayel, Y. (2010), “Evolutionary games in wireless networks”, IEEE Transactions on Systems, Man, and Cybernetics. Part B, Cybernetics: a Publication of the IEEE Systems, Man, and Cybernetics Society), Vol. 40 No. 3, pp. 634-646. Vega-Redondo, F. (2007), Complex Social Networks, Cambridege University, Cambridge. Wang, B., Liu, K.J.R. and Clancy, T.C. (2010a), “Evolutionary cooperative spectrum sensing game: how to collaborate?”, IEEE Transactions on Communications, Vol. 58 No. 3, pp. 890-900. Wang, B., Wu, Y. and Liu, K.J.R. (2010b), “Game theory for cognitive radio networks: an overview”, Computer. Network, Vol. 54 No. 14, pp. 2537-2561. Wang, Y., Cong, G., Song, G. and Xie, K. (2010c), “Community-based greedy algorithm for mining top-k influential nodes in mobile social networks”,in Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 1039-1048. Wiecek, P., Altman, E. and Hayel, Y. (2011), “Stochastic state dependent population games in wireless communication”, IEEE Transactions on Automatic Control, Vol. 56 No. 3, pp. 492-505. Yang, J. and Counts, S. (2010), “Predicting the speed, scale, range of information diffusion in twitter”,in Proc. 4th Int. AAAI Conf. Weblogs and Social Media, pp. 355-358. Yang, J. and Leskovec, J. (2010), “Modeling information diffusion in implicitnetworks”,in Data Mining (ICDM), 2010 IEEE 10th International Conference on, IEEE, pp. 599-608. Corresponding author Benliu Qiu can be contacted at: 2016020902016@std.uestc.edu.cn For instructions on how to order reprints of this article, please visit our website: www.emeraldgrouppublishing.com/licensing/reprints.htm Or contact us for further details: permissions@emeraldinsight.com http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png International Journal of Crowd Science Emerald Publishing

A review on graphical evolutionary game for information diffusion on social networks

Loading next page...
 
/lp/emerald-publishing/a-review-on-graphical-evolutionary-game-for-information-diffusion-on-x1mVsghsjd

References (27)

Publisher
Emerald Publishing
Copyright
© Benliu Qiu and Ningxuan Zhang.
ISSN
2398-7294
DOI
10.1108/ijcs-06-2018-0011
Publisher site
See Article on Publisher Site

Abstract

Purpose – With the recent development of science and technology, research on information diffusion has become increasingly important. Design/methodology/approach – To analyze the process of information diffusion, researchers have proposed a framework with graphical evolutionary game theory (EGT) according to the theory of biological evolution. Findings – Through this method, one can study and even predict information diffusion. Originality/value – This paper summarizes three existing works using graphical EGT to discuss how to obtain the static state and the dynamics of information diffusion in social network. Keywords Crowd-sourced design and engineering, Information diffusion, Crowdsourced Big Data and analytics, Evolutionary game, Models and methods for Crowd Science and Engineering Paper type General review 1. Introduction Over the past several decades, accompanied by the rapid development of the internet and mobile communications, social networks are becoming increasingly popular among numerous individuals. Every second, millions of users are interacting, which is giving rise to the development of various kinds of information. It is therefore critical to understand how such a huge amount of information diffuses over social networks for the development of social networks. Many researchers have been studying information diffusion from different perspectives. Originally, information diffusion was proposed to solve the problem of attacks of computer virus (Pastor-Satorras and Vespignani, 2001)(Gruhl et al., 2004). People later realized that information diffusion could be an independent research topic. Early works about information diffusion focused on the dynamics of information diffusion from both the © Benliu Qiu and Ningxuan Zhang. Published in International Journal of Crowd Science. Published by Emerald Publishing Limited. This article is published under the Creative Commons Attribution (CC BY 4.0) licence. Anyone may reproduce, distribute, translate and create derivative works of this article (for both commercial and non-commercial purposes), subject to full attribution to the original International Journal of Crowd publication and authors. The full terms of this licence may be seen at http://creativecommons.org/ Science licences/by/4.0/legalcode pp. 259-271 Emerald Publishing Limited This paper is supported by the National Key Research and Development Program of China 2398-7294 (2017YFB1400100). DOI 10.1108/IJCS-06-2018-0011 macroscopic and microscopic perspectives (Gruhl et al., 2004). Later, researchers studied IJCS how users’ behaviors were affected by social networks (Centola, 2010). Machine learning 2,3 was used to find the global influence of individuals in diffusion (Yang and Leskovec, 2010). How to restrain private information diffusion by important information links was investigated by Kimura et al. (2009) and Ilyas et al. (2011). The authors discussed how to find the nodes that have more influence over others (Kimura et al., 2007). Recently, as Facebook and Twitter have become increasingly popular, an analysis was conducted to predict future trends on the basis of data obtained from Twitter (Yang and Counts, 2010) (Leskovec). Game theory has also been used to analyze this process (Chen and Liu, 2012). The graphical evolutionary game theory (EGT) framework was proposed to model and analyze interaction among users in social network (Jiang et al., 2014a, 2014b), and the coordination game was utilized to analyze the diffusion process (Vega-Redondo, 2007). The stability of information diffusion was obtained by means of different methods (Wang et al., 2010a, 2010b, 2010c; Kim and Yoneki, 2012). It was shown that users with different number of followers can have different influences (Beevolve, 2012). Information diffusion over social networks is similar to biological evolution, and thus, the graphical EGT can be used to analyze and model how information diffuses over social networks. EGT has been widely adopted in various areas including image interpolation (Chen et al.,2011), as well as wireless communications and networking (Wang et al., 2010a, 2010b, 2010c; Jiang et al., 2013; Tembine et al., 2010; Wiecek et al., 2011). In this paper, we summarized the key results of studies (Jiang et al., 2014a, 2014b) and (Cao et al.,2016)to illustrate how the graphical EGT can be used to model information diffusion. The rest of this paper is organized as follows. In Section 2, information diffusion is discussed in detail. Some basic concepts about graphical EGT are given in Section 3. Then in Section 4, the model built with graphical EGT is discussed. Static and dynamic diffusion processes with the corresponding experimental results are shown in Section 5. Section 6 draws the conclusion of this paper. 2. Information diffusion To understand information diffusion, the information should be defined. When weather prediction tells us it will be sunny tomorrow or teachers solve our confusion about an incomprehensible concept, we instinctively feel that we have received information. It is widely agreed that information is any entity or form that resolves uncertainty or provides an answer for any question. Despite information being present since the birth of humankind, the measurement of information was discussed only in in 1948 by C. E. Shannon in the book A Mathematical Theory of Communication. Just as the information has been with human for so long, so is the information diffusion. This is because where there is information, there is information diffusion. With the rapid development of the internet and mobile communications, information diffusion over social networks is faster and broader. For example, sham information has great possibilities of becoming a rumor as soon as it is released in a social network. In a traditional social network, there may be adequate time for response and stopping the rumor. However, in contemporary social network, more efforts are needed to stop rumors. Studying information diffusion over social network can help us discover the common characteristics of communities for precise commercial advertisement and pointed political canvassing. In all, the study of information diffusion can be applied to various domains. There are two examples. Donald Trump, the President of the USA, has the habit of tweeting for the country. As the president of the world’s superpower, his words on the internet have the ability of creating waves. If we can predict how the information released by Trump is diffused on the internet or among the people, then we can better evaluate the influence Information caused of his tweets. What does it mean? It means, in the financial world, we will diffusion on macroscopically be able to more quickly and accurately predict fluctuations in the stock, social which can prove to be financially beneficial. Except predicting the diffusion states, we have networks the ability to deduce the characteristic of a group of people who are forwarding or not through known diffusion states at any moment. This can be used to tell candidates to give corresponding speeches to different groups of voters. It is also possible that the popularity rating can be raised. Besides this, the model of users, which is obtained by analyzing the existing diffusion actions of users in the past, can be applied to advertise on the internet more accurately, which may create billions of wealth, as it has done for Google. 3. Graphical evolutionary game theory The basic concepts of graphical EGT will be introduced in this section (Smith, 1982), which will be used to analyze information diffusion in the next section (Jiang et al., 2014a, 2014b) and (Cao et al.,2016). In EGT, a game is played for many times by players who are chosen randomly from a large population. In this theory, a player changes his strategy according to others’ strategies and his characteristics. We call the dynamics as “replicator dynamics” which is the most important concept in EGT. Replicators, who can represent the population, may reproduce his strategy under some specific rules. For example, there is new information about a football star. One person who is a football fan may originally prefer to forward this information, but when he finds that all of his friends are not concerned about such information, he may change his strategy from forwarding to not forwarding. In this example, we can see that the strategies of neighbors can influence one’s decision. Different from traditional game theory, EGT pays more attention to the dynamics than to stability of the strategies of the whole population. In EGT, all players will have some periods of strategic interactions to reach a final equilibrium, known as the evolutionary stable state (ESS). In the social network, people may not interact with all users. Therefore, a graph is generally used to represent the relationship among users. In this graph, we use “fitness” (Nowak and Sigmund, 2004) to describe players’ interactions with others, which is relative to their payoff. Players change their strategies according to three strategy update rules (Ohtsukia and Nowak, 2006), including birth–death (BD), death–birth (DB) and imitation (IM) rules. Figure 1 illustrates the general process of these three update rules (Jiang et al., 2014a, 2014b). In Figure 1(a), we can see in the BD update rule, a node is chosen from the population with a probability according to their fitness. Then the strategy of the chosen node will replace one of its neighbor’s strategy. In the DB update rule, we randomly choose a node to abandon its strategy and get one of its neighbor’s strategy with the probability according to their fitness, which is shown in Figure 1(b). In IM update rule, every node chooses one action: either it abandons or retains its strategy with the probability according to their fitness, as shown in Figure 1(c). 4. EGT formulation of information diffusion Let us consider how to translate a typical social network with the language of graphical EGT. Any users in the social network can be regarded as a node in a graph. The relationship between users corresponds to the edges of graph. In a word, a graph structure can be used to describe the social network topology. Because information diffusion is studied over the social network, it is assumed that any user has only two strategies to choose from: to forwarding information or to not (S or S ). Here, a question can be raised naturally: How do f n we describe the utility from forwarding or not? As has been done in graphical EGT, fitness IJCS 2,3 Figure 1. (a) BD update rule; (b) DB update rule and (c) IM update rule (Nowak and Sigmund, 2004) can be used to represent the utility from forwarding or not, which is defined as p =(1  a)B þ aU, where U is the payoff matrix and B is the user’s baseline fitness. In the study of information diffusion, the payoff matrix can be written as: S S S u u , where u denotes the payoff when one user and his neighbor both use f ff nf ff S u u n fn nn strategy S ; u ; u and u are defined in a similar way. Note that the payoff matrix is nn f fn nf considered symmetric; therefore, the central user and his neighbor both have the same fitness when they use the reverse strategy, i.e. u ¼ u . The payoffs are further normalized fn nf within interval (0, 1), which means 0 < u ; u ; u < 1. The payoff can be regarded as the nn ff fn popularity of a user or the hit rate of a website by forwarding this information. For example, if the information is about recent hot news, it is known that forwarding it will get more popularity than not forwarding. So under this circumstance, we have u > u > u .On ff fn nn the contrary, if the information is useless for most of us, u < u < u can be obtained. ff fn nn The decision of users is determined by not only the payoff but also by the user’s internal property, i.e. the baseline fitness B. The parameter a in the fitness is a representation of the selection intensity. It is within interval (0, 1). When it is close to 0, the corresponding selection is a weak selection (Ohtsuki et al.,2007), while when a ! 1, it denotes a strong selection, in which the payoff determines the fitness. The results shown here are based on the assumption of the weak selection. The reason is that every user is involved in so many games that any game just influences a user a little. Given a social network, let p and p denote the percentages of users to forwarding or f n Information not, respectively, in the population. Similarly, let p ; p and p denote the percentages of ff fn nn diffusion on edges, where both users are forwarding, one is forwarding and the other is not and both social users are not forwarding, respectively. With the basic knowledge of the probability theory, networks one has: p þ p ¼ 1, p þ p ¼ 1, p þ p ¼ 1, p p ¼ p p , p ¼ p p , n f fjf njf fjn njn f njf njf f ff f fjf p ¼ p p , p ¼ p p þ p p . It is obvious that all variables above can be denoted by nn n njn fn f njf n fjn p and p . f ff 5. Theorems for information diffusion over social networks To characterize the information diffusion over social network with graphical EGT, the two most important things are the evolutionary stable states (ESSs) and the evolutionary dynamics. As discussed above, the states of a social network can be determined by _ _ p and p . Thus, the following analysis will focus on p ; p ; p and p . The first result f ff f ff f ff is about the population dynamics (Jiang et al., 2014a, 2014b). Theorem 1: The population dynamics of information diffusion over a uniform degree network under BD strategy update rule and weak selection scenario can be described as follows: ðÞ a k  2 _ ðÞ p ¼ p 1  p a p þ b þ o a ; (1) f f f 1 f 1 ðÞ k  1 ðÞ a ¼ k  2 u  2u þ u ; 1 ff fn nn where ðÞ ðÞ b ¼ u þ k  2 u  k  1 u : 1 nn ff fn Theorem 2: The population dynamics of information diffusion over non-uniform degree networks under the BD strategy update rule and weak selection scenario can be described as follows: ðÞðÞ a k  1 k  2 k ðÞ p 5 p 1  p a p þ b þ o a ; (2) f f f 2 f 2 ðÞ k  k < ðÞ a 5 k  2 k u  2u þ u ; 2 ff fn nn where 2 2 ðÞ ðÞ b 5 k u þ k  2 k u  k  k u 2 ff fn nn: From equations (1) and (2), it can be seen that p is not related with N, i.e. the network has the scale-free property, which indicates that the results do not depend on the number of users in the whole network as long as it is large enough. It can be seen that the population dynamics in the uniform and non-uniform degree networks are similar. The only difference 2 2 between them is k and k are changed to k and k in the non-uniform network, which means that the non-uniform network can be treated as a uniform network. Although the above two theorems are based on the BD update rule, it has been shown that the population dynamics of information diffusion over uniform degree networks under the BD strategy update rule, the DB strategy update rule and the imitation strategy update rule are equivalent when the network degree is sufficiently large and under the weak selection scenario (Jiang et al., IJCS 2014a, 2014b). 2,3 To validate the theorems over a homogeneous social network, the following payoff matrices PM1, PM2, PM3 and PM4 are used to derive the theoretical results and compare with simulation results. Case 1: PM1: u > u > u ff fn nn S S f n S 0:80:6 S 0:60:4 Case 2: PM2: u > u > u fn ff nn S S f n S 0:60:8 S 0:80:4 Case 3: PM3: u > u > u fn nn ff S S f n S 0:40:8 S 0:80:6 Case 4: PM4: u > u > u nn fn ff S S f n S 0:40:6 S 0:60:8 For Case 1: u > u > u , the user and his neighbor who both forward information can ff fn nn achieve the largest payoff, so it can be predicted that the users will choose the forwarding strategy, making all users in the network forward it gradually. For Case 4, u > u > u , nn fn ff the final state of the network will be the complete opposite to that of Case 1, i.e. nobody will choose to forward information. The final stable states of Case 2 and Case 3 are between those of Case 1 and Case 4. The network state of the two cases will gradually converge to a final state which is between 0 and 1. In Figure 2, the four continuous curves and four groups of discrete points represent the population dynamics derived by the theory and simulation, respectively. It can be seen that the simulations agree with the theoretical results. The small gaps are due to the ignorance of the dependence between network states and network degree. In all four cases, the global network states all converge to the stable state, known as the ESSs. Information diffusion on social networks Figure 2. Simulation results for the real-world Facebook network. When the population dynamics equals to zero, the whole network reaches a stable state. Therefore, making equations (1) and (2) equal to 0, one can get the expression of ESSs of both uniform and non-uniform degree networks, which are shown below (Jiang et al., 2014a, 2014b). Theorem 3: In an N-users social network which can be characterized by a graph with uniform degree k, if each user updates his/her information forward strategy using the IM update rules, the evolutionary stable network states can be summarized as follows: 1; ifu > u > u > ff fn nn 0; ifu > u > u nn fn ff p ¼ (3) >ðÞ ðÞ > k  2 u þ u  k  1 u fn ff nn > ; else: ðÞ 2u  k  2 u  u fn ðÞ ff nn Similarly, for non-uniform degree network, we can obtain the following theorem (Jiang et al., 2014a, 2014b). Theorem 4: In an N-users social network which can be characterized by a graph with ðÞ degree distribution l k , if each user updates his/her information forward strategy using the BD update rule, the evolutionary stable network states can be summarized as follows: > 1; ifu > u > u ff fn nn; > 0; ifu > u > u ; nn fn ff * k p (4) u  u þ u  u ðÞ fn nn ðÞ ff nn k  2 ! ; else 2u  u  u fn ff nn k  2 The results are consistent with the intuition. If one can get more utility from forwarding information regardless of the neighbors’ strategies, he will definitely forward this information, i.e. the probability of forwarding is one in the steady state. Similarly, a steady * loss will make nobody want to forward information, which is described by p ¼ 0. For the IJCS situations between two extremities above, the ESS will be determined by the exact value of 2,3 u ; u and u , and one can have a general impression through the simulation results as ff fn nn shown below. Figure 3 illustrates the graph structure and the degree characteristics of a Facebook sub- network, which consists of ten subgraphs. With the payoff matrix given above, the simulation results and theoretical results of the ten subgraphs are shown in Figure 4. The horizontal red line and the cyan line show the ESSs of Case 1 and Case 4, while the green one and the brown one show the ESSs of Case 2 and Case 3.The gaps between simulation and theoretical results of Case 2 and Case 3 are from the neglected dependence between the network state and the network degree. From the results, it can be seen that the theory is consistent with the simulation. Figure 3. Graph structure and degree characteristic of the Facebook network used for experiment Figure 4. Experiment results of ESSs for Facebook network The theorems above characterize the social networks with the same type of users. The Information study of the information diffusion over heterogeneous social network is also conducted diffusion on (Cao et al., 2016). Two different situations need to be considered: the unknown user type social model and the known user type model. For the unknown user type model, each user networks does not know the exact type of the neighbors and tends to consider them the same as itself. For the known user type model, each user knows the exact type of the neighbors and thus their decisions. For the unknown user type model over heterogeneous social network, the following theorem can be derived (Cao et al.,2016). Theorem 5: (Evolutionary dynamics): In the unknown user type model, the ðÞ evolutionary dynamics for the network states p i and p are given in the equations as f f follows: 1 1 a _ ðÞ ðÞ p i ¼ p  p i þ p p  1 f f f f f N N N 1 1 ðÞ ðÞ D i k  3 þ 2k p þ 1  k þ D i k  1 ; (5) f n 1 1 p ¼ p p  1 D k  3 þ 2k p þ 1  k þ D k  1 ; (6) f f f n X X M M ðÞ ðÞ ðÞ ðÞ where D :¼ qi D i and D :¼ qi D i : n n i51 i51 Theorem 6: (ESSs): In the unknown user type model, the ESSs of the network are as follows: 0; if u > u nn fn 1; if u < u * ff fn p ¼ (7) no > 1 ðÞ >D 1  k þ D k  1 > ; if max u ; u < u ; ff fn fn ðÞ D k  3 þ 2 k " # * * * * * 1 1 ðÞ ðÞ ðÞ p i ¼ p þ ap p  1 D i k  3 þ 2k p þ 1  k Þþ D i ð k  1Þ ; f f f f f (8) ðÞ ðÞ where u 5 qi u i and u ; u are sinilarly defined: ff ff fn nn i51 For the known user type model, the following theorems can be obtained (Cao et al.,2016). ðÞ Theorem 7: In the known user type model, the population dynamics p i and the relationship dynamics p ðÞ i; l for i 6¼ l and i ¼ l are given as follows: ff IJCS 2,3 ak ðÞ ðÞ ðÞ ðÞ ðÞ p i  p i p i; i p i; i þ p i; i f njf njn fjf qjðÞ p ðÞ j; i u ðÞ i; j þ p ðÞ j; i u ðÞ i; j fjf ff njf fn j¼1 p ðÞ j; i u ðÞ i; j  p ðÞ j; i u ðÞ i; j ; (9) fjn nf njn nn "# ðÞ 2 p l ðÞ ðÞ ðÞ p ðÞ i; l ¼ qi ql p i 1  p ðÞ i; i  1  p ðÞ i; l  p ðÞ l; i ff f fjf fjf fjf ðÞ N p i "# ðÞ 2 p i ðÞ ðÞ ðÞ ðÞ ðÞ ðÞ þ qi ql p l 1  p l; l  1  p l; i  p i; l ; f fjf fjf fjf N ðÞ p l (10) _ ðÞ ðÞ ðÞ p ðÞ i; l ¼ q i p i 1  p ðÞ i; i p i  p ðÞ i; i : (11) ff f fjf f fjf ðÞ Np i Figure 5 shows the simulation results of the population dynamics for unknown user type model, where it can be seen that theoretical results are consistent with the simulation results. The small gap is probably because of the ignorance of higher orders of a. These results are ðÞ ðÞ ðÞ ðÞ based on the parameters: u 1 ¼ 0:4; u 2 ¼ 0:2; u 1 ¼ 0:6; u 2 ¼ 0:4; ff ff fn fn ðÞ ðÞ ðÞ ðÞ u 1 ¼ 0:3; u 2 ¼ 0:5; N ¼ 1000; k ¼ 20; q 1 ¼ q 2 ¼ 0:5; a ¼ 0:05: nn nn Figure 5. Simulation results of the evolution dynamics for the unknown user type Figure 6 shows the results for the known user type model. As one can see, the population Information dynamics of known type users make a very large difference than those of unknown type diffusion on users, which indicates the necessity of type classification. In this simulation, the payoff social matrix is chosen as follows with other parameters N = 1,000, k = 20, q(1) = 0.5518, q(2) = networks 0.4482, a ¼ 0:05. "# "# 0:5882 0:0116 0:9619 0:7370 u ¼ ; u ¼ ; ff fn 0:8688 0:1590 0:5595 0:7180 "# "# 0:9339 0:9864 0:2479 0:3385 u ¼ ; u ¼ ; nf nn 0:3288 0:4593 0:6570 0:2437 Figure 6. Simulation results of the evolution dynamics for the known user type Figure 7. Prediction of future diffusion dynamics The prediction of the future diffusion dynamics is also illustrated in Figure 7. It can be seen IJCS that the graphical EGT can well predict the diffusion dynamics in the future based on past 2,3 data. 6. Conclusion In this paper, we summarized three papers (Jiang et al., 2014a, 2014b and Cao et al., 2016)to discuss how to use the graphical evolutionary game theory to analyze the static state and the dynamics of information diffusion in social network. References Beevolve (2012), “An exhaustive study of twitter users across the world”, available at: www.beevolve. com/twitter-statistics/ Cao, X., Chen, Y., Jiang, C. and Ray Liu, K.J. (2016), “Evolutionary information diffusion over heterogeneous social networks”, IEEE Transactions on Signal and Information Processing over Networks, Vol. 2 No. 4, pp. 595-610. Centola, D. (2010), “The spread of behavior in an online social network experiment”, Science, Vol. 329 No. 5996, pp. 1194-1197. Chen, Y. and Liu, K.J.R. (2012), “Understanding microeconomic behaviors in social networking: an engineering view”, IEEE Signal Processing Magazine, Vol. 29 No. 2, pp. 53-64. Chen, Y., Gao, Y. and Liu, K.J.R. (2011), “An evolutionary game-theoretic approach for image interpolation”,in Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference on, IEEE, pp. 989-992. Gruhl, D., Guha, R., Liben-Nowell, D. and Tomkins, A. (2004), “Information diffusion through blogspace”,in Proceedings of the 13th international conference on World Wide Web (WWW), pp. 491-501. Ilyas, M.U., Shafiq, M.Z., Liu, A.X. and Radha, H. (2011), “A distributed and privacy preserving algorithm for identifying information hubs in social networks”,in Proceedings. IEEE, INFOCOM, 2011, pp. 561-565. Jiang, C., Chen, Y. and Ray Liu, K.J. (2014a), “Graphical evolutionary game for information diffusion over social networks”, IEEE Journal of Selected Topics in Signal Processing,Vol.8 No. 4, pp. 524-536. Jiang, C., Chen, Y. and Ray Liu, K.J. (2014b), “Evolutionary dynamics of information diffusion over social networks”, IEEE Trans. Signal Process, Vol. 6 No. 17, pp. 4573-4586., September. 1. Jiang, C., Chen, Y., Gao, Y. and Liu, K.J.R. (2013), “Joint spectrum sensing and access evolutionary game in cognitive radio networks”, IEEE Transactions on Wireless Communications, Vol. 12 No. 5, pp. 2470-2483. Kim, H. and Yoneki, E. (2012), “Influential neighbors selection for information diffusion in online social networks”,in Computer Communications and Networks (ICCCN), 2012 21st International Conference on, IEEE, pp. 1-7. Kimura, M., Saito, K. and Motoda, H. (2009), “Blocking links to minimize contamination spread in a social network”, ACM Transactions on Knowledge Discovery from Data ( Data), Vol. 3 No. 2, pp. 91-9:23. Kimura, M., Saito, K. and Nakano, R. (2007), “Extracting influential nodes for information diffusion on a social network”,in Proceedings. AAAI Conference. Artif. Intell, pp. 1371-1376. Nowak, M.A. and Sigmund, K. (2004), “Evolutionary dynamics of biological games”, Science (New York, N.Y.), Vol. 303 No. 5659, pp. 793-799. Ohtsuki, H., Nowak, M.A. and Pacheco, J.M. (2007), “Breaking the symmetry between interaction and Information replacement in evolutionary dynamics on graphs”, Physical Review Letters, Vol. 98 No. 10, diffusion on p. 108106. social Ohtsukia, H. and Nowak, M.A. (2006), “The replicator equation on graphs”, Journal of Theoretical networks Biology, Vol. 243 No. 1, pp. 86-97. Pastor-Satorras, R. and Vespignani, A. (2001), “Epidemic spreading in scalefree networks”, Physical Review Letters, Vol. 86 No. 14, pp. 3200-3203. Smith, J.M. (1982), Evolution and the Theory of Games, Cambridge University Press, Cambridge. Tembine, H., Altman, E., El-Azouzi, R. and Hayel, Y. (2010), “Evolutionary games in wireless networks”, IEEE Transactions on Systems, Man, and Cybernetics. Part B, Cybernetics: a Publication of the IEEE Systems, Man, and Cybernetics Society), Vol. 40 No. 3, pp. 634-646. Vega-Redondo, F. (2007), Complex Social Networks, Cambridege University, Cambridge. Wang, B., Liu, K.J.R. and Clancy, T.C. (2010a), “Evolutionary cooperative spectrum sensing game: how to collaborate?”, IEEE Transactions on Communications, Vol. 58 No. 3, pp. 890-900. Wang, B., Wu, Y. and Liu, K.J.R. (2010b), “Game theory for cognitive radio networks: an overview”, Computer. Network, Vol. 54 No. 14, pp. 2537-2561. Wang, Y., Cong, G., Song, G. and Xie, K. (2010c), “Community-based greedy algorithm for mining top-k influential nodes in mobile social networks”,in Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 1039-1048. Wiecek, P., Altman, E. and Hayel, Y. (2011), “Stochastic state dependent population games in wireless communication”, IEEE Transactions on Automatic Control, Vol. 56 No. 3, pp. 492-505. Yang, J. and Counts, S. (2010), “Predicting the speed, scale, range of information diffusion in twitter”,in Proc. 4th Int. AAAI Conf. Weblogs and Social Media, pp. 355-358. Yang, J. and Leskovec, J. (2010), “Modeling information diffusion in implicitnetworks”,in Data Mining (ICDM), 2010 IEEE 10th International Conference on, IEEE, pp. 599-608. Corresponding author Benliu Qiu can be contacted at: 2016020902016@std.uestc.edu.cn For instructions on how to order reprints of this article, please visit our website: www.emeraldgrouppublishing.com/licensing/reprints.htm Or contact us for further details: permissions@emeraldinsight.com

Journal

International Journal of Crowd ScienceEmerald Publishing

Published: Dec 13, 2018

Keywords: Crowd-sourced design and engineering; Information diffusion; Crowdsourced Big Data and analytics; Evolutionary game; Models and methods for Crowd Science and Engineering

There are no references for this article.