Next Article in Journal
A Finite Regime Analysis of Information Set Decoding Algorithms
Next Article in Special Issue
Approximating the Temporal Neighbourhood Function of Large Temporal Graphs
Previous Article in Journal
A Convex Optimization Algorithm for Electricity Pricing of Charging Stations
Previous Article in Special Issue
Guidelines for Experimental Algorithmics: A Case Study in Network Analysis
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Recommending Links to Control Elections via Social Influence

1
Gran Sasso Science Institute, 67100 L’Aquila, Italy
2
ISI Foundation, 10126 Turin, Italy
*
Author to whom correspondence should be addressed.
Algorithms 2019, 12(10), 207; https://doi.org/10.3390/a12100207
Submission received: 15 July 2019 / Revised: 13 September 2019 / Accepted: 23 September 2019 / Published: 1 October 2019

Abstract

:
Political parties recently learned that they must use social media campaigns along with advertising on traditional media to defeat their opponents. Before the campaign starts, it is important for a political party to establish and ensure its media presence, for example by enlarging their number of connections in the social network in order to assure a larger portion of users. Indeed, adding new connections between users increases the capabilities of a social network of spreading information, which in turn can increase the retention rate and the number of new voters. In this work, we address the problem of selecting a fixed-size set of new connections to be added to a subset of voters that, with their influence, will change the opinion of the network’s users about a target candidate, maximizing its chances to win the election. We provide a constant factor approximation algorithm for this problem and we experimentally show that, with few new links and small computational time, our algorithm is able to maximize the chances to make the target candidate win the elections.

1. Introduction

Over the past few years, political parties learned that, along with advertising on traditional mediums such as television and newspapers, they must use social media campaigns to defeat their opponents. Many real-life examples exist that show how the political intervention effect in social media [1,2,3,4]. One of the most effective examples of political digital marketing is the recent presidential US election where a study shows that 92% percent of people remembered the pro-Trump fake news, and 23% percent of them remembered the pro-Clinton fake news [5]. Another example, in 2017, where automated accounts in social networks spread a considerable portion of political-related content, mostly fake news, trying to influence the French election [2].
Before the campaign starts, it is important for a political party to establish and ensure its media presence. For example, and this is the case we study in this paper, they can enlarge their number of connections in the social network in order to assure a larger portion of users. Indeed, adding new connections between users increases the capabilities of a social network of spreading information which in turn can increase the retention rate and the number of new voters.
There is an extensive literature on manipulating elections without considering the underlying social network structure; we point the reader to a recent survey [6]. Although there have been few studies that exploits opinion diffusion on social networks in order to manipulate elections, we review them in Section 2.
In this work, we focus on a variant of the election control problem via social influence, introduced in [7]. We consider the scenario in which users of a social network have to vote for elections, i.e., each voter has a preference list over the set of candidates. Based on the model by Wilder et al. [7], there is a subset of users who want to propagate a campaign, i.e., a message, among the users of the network with the aim of changing voters’ opinions about a target candidate. Our goal is to study the case in which an external manipulator can decide to add new links in the network in order to change the outcome and make a specific candidate win.

Original Contribution

We study the problem of selecting a fixed-size set of new connections to a subset of voters who, with their influence, will change the opinion of the network’s users about a target candidate, maximizing its chances to win the election. We provide a ( 1 1 / e ) -approximation algorithm for the problem of maximizing the score of a target candidate by showing submodularity, where e is the base of the natural logarithm. We exploit such property to provide a 1 3 ( 1 1 / e ) -approximation algorithm for the constructive election control problem. Finally, we present an experimental study on heterogeneous real-world networks to validate the model and assess the capability of the algorithm.

2. Related Work

In the literature, there are few studies that exploit social influence in order to solve the problem of constructive/destructive election control considering the social connections between users. This problem consists in changing voters’ opinions with the aim of maximizing/minimizing the margin of victory of target candidate with respect to its most voted opponent.
Wilder et al. [7] considered the Independent Cascade Model [8] as diffusion process in both the constructive and destructive control scenarios providing algorithmic and hardness results, respectively, for maximizing the margin and the probability of victory.
Corò et al. studied the same problem under the Linear Threshold Model [8] and arbitrary scoring rules [9,10]. In both cases, the election control problem can be solved with an approximation factor of 1 3 ( 1 1 / e ) in the constructive scenario and 1 2 ( 1 1 / e ) in the destructive one. Moreover, Faliszewski et al. [11] studied a variant of the Linear Threshold Model with weighted vertices; in their scenario, each node of the graph is a group of voters with a specific list of candidates and there is an edge between two nodes if they differ by the ordering of a single pair of adjacent candidates. Bredereck et al. [12] instead focused on a simple Linear Threshold Model, where each node holds a binary opinion, each edge has the same fixed weight, and all vertices have a threshold fixed to 1 / 2 ; in this scenario, they studied how to manipulate, by means of bribing nodes or adding/deleting edges, the network in order to have control on the majority opinion, i.e., having more than 50% of nodes with the same opinion.
Recently, few studies considered the problem of modifying the network structure in order to minimize/maximize the information diffusion. D’Angelo et al. [13] introduced the Influence Maximization with Augmentation problem (IMA) that consists in adding a limited number of edges incident to a given set of nodes in order to maximize their capability of spreading information under the Independent Cascade Model. They proved that such problem is NP -hard to approximate within a factor greater than 1 1 / 2 e and provide an approximation algorithm that almost matches such upper bound. Furthermore, D’Angelo et al. [14] studied a similar problem for which the budget could be spent to buy either seeds or edges according to a cost function, providing two approximation algorithms that depend on the cost of the edges. Sheldon et al. [15] studied the problem of adding nodes in a network to maximize the diffusion in a network. They showed that their problem is not submodular and proposed exact integer programming formulations. Recently, Amelkin et al. [16] studied the problem of disabling opinion control in a social network by strategically altering the network’s users’ Eigen centralities by recommending new connections between the users. Zhang et al. [17] considered the problem of removing either edges or nodes from the network with the aim of minimizing the information diffusion and developed algorithms with rigorous performance guarantees and good empirical performance. Finally, experimental studies show that increasing the connectivity or the centrality of a node, by adding edges to the graph, lead also to an increase in the expected number of nodes that the diffusion process is able to reach [18,19,20].

3. Preliminaries

The Influence Maximization Problem

The Influence Maximization Problem, introduced by Kempe et al. [21] in 2003, studies a social network, represented by a weighted directed graph G = ( V , E , p ) , where the set of nodes V represent the users, the set of edges E represent social links between users, and the weight function p : V × V [ 0 , 1 ] represents the influence between users. The goal is then to find a set of influential nodes of size B that can maximize the spread of information. The influence is defined based on the information diffusion process among users.
There are many different models to study these processes on graphs, one of the most used being the Independent Cascade Model (ICM) [21]. Given a graph G = ( V , E , p ) and an initial set of nodes A 0 , usually referred as seeds, the diffusion process proceeds iteratively in a synchronous way along a discrete time-axis, starting from A 0 . Such set can be seen, for example, as the initial supporters of a product (or an opinion) that start to propagate it in a social network. Let A t V be the set of nodes active at time t, then, for each node u A t \ A t 1 , a neighbor node v of u is activated at time t + 1 with probability p u v , independently, for each edge ( u , v ) E . Then, v A t + 1 if and only if v A t or one of the above independent events is realized. We say that the process has quiesced at the first time t ˜ such that the set of active nodes would not change in the next round, i.e., time t ˜ is such that A t ˜ = A t ˜ + 1 . We define the eventual set of active nodes as A : = A t ˜ . In this case, the goal is to maximize the set A, i.e., the set of active nodes at the end of the process.
Kempe et al. showed that the distribution of the set of active nodes A in the graph starting with A 0 under the ICM process is equivalent to the distribution of reachable nodes from the same set A 0 in the set of random graphs called live-edge graphs (see Proof of Theorem 4.5 in [8]). A live-edge graph G = ( V , E ) is built as follows: Given a graph G = ( V , E , p ) , every edge ( u , v ) E is selected to be inserted to E independently at random with a probability proportional to its weight p u v . This equivalent model allow them to provide two important results.
First, they conjectured that evaluating the expected number of active nodes under ICM is # P -complete, which was later proved by Chen et al. [22]. However, it can be efficiently approximated by using a polynomial number of live-edge graphs ([8], Proposition 4.1). Moreover, under the live-edge model, the problem of selecting the initial seed set of nodes in order to maximize the diffusion is submodular (for a ground set N, a function z : 2 N R is submodular if for any two sets S , T such that S T N and for any element e N \ T it holds that z ( S { e } ) z ( S ) z ( T { e } ) z ( T ) ) [8]. Hence, exploiting a classical result [23], the influence maximization problem admits a 1 1 / e approximation using a simple greedy hill-climbing approach that, starting with an empty solution, for B iterations, selects the node that gives the maximal marginal gain on the objective function with respect the solution computed so far.

4. Problem Statement

Consider the scenario in which users of a social network have to vote for elections. In this work, we study the case in which an external manipulator can decide to add new links in the network in order to change the outcome of the elections and make a specific candidate win.
We represent the underlying connections between users as a directed graph G = ( V , E ) . Let C = { c 1 , , c m } be the set of m candidates; we refer to our target candidate, i.e., the one that we want to make win the elections, as c . Each voter v V has a list of preferences for the elections represented as a function π v : C { 1 , , m } that represents the position of a given candidate in the preference list of v, e.g., π v ( c i ) = 3 for a given candidate c i means that in the preference list of voter v such candidate is ranked as third.
In this work, we use the model presented by Wilder et al. [7]: We use the Independent Cascade Mode as a model for influence diffusion, i.e., each edge ( u , v ) E has an associated probability p u v , that is the probability to influence the neighbor. Then, the process works as follow: Starting from the seed set, when a voter v is reached by the social influence, i.e., there exists a path from a seed to v, it shifts the ranking of the target candidate by one position up. If c is already in first position, i.e., π v ( c ) = 1 , the message has no effect but the node still shares the message with its neighbors. At the end of the process, each voter v V casts a vote for their first ranked candidate, i.e., we consider plurality as voting system. Under plurality rule, each voter can only express a single preference among the candidates and that with the plurality of the votes wins, i.e., it is sufficient to have the highest number of votes and there is no need of an absolute majority (50% + 1 of votes).
Recall that in the problem of election control we want to maximize the chances of the target candidate to win the elections. To achieve that, we maximize its expected Margin of Victory (MoV) with respect to the most voted opponent, akin to that defined in [7]. Let us first define the set of voters that rank candidate c i in the jth position as V c i j = { v V : π v ( j ) = c i } . Note that initially candidate c i has | V c i 1 | votes. After the ICM process has quiesced, the position of c in the preference list of each influenced node is changed by one position up, except for the voters that already have c in the first position from the beginning.
Given the set of seed nodes A 0 and the set S of edges added to G, we define the score of candidate c i as F A 0 ( c i , S ) . Initially, i.e., before the process starts, the score of a candidate c i is equivalent to the number of voters that have c i in first position, i.e., F ( c i , ) = | V c i 1 | . Note that, under this model, we can write the new score of c , i.e., the score after the process has quiesced, by the use of live-edge graphs. In fact, the score can be expressed by the number of voters that had c in first position before the process plus the expected number of reachable nodes in live-edge graphs that had c in second position, starting from the seed set A 0 . Recall that a live-edge graph X = ( V , E ) is a subset of graph G where each edge ( u , v ) E is selected to be part of E independently at random with a probability p u v . Hence, X has probability to be sampled equal to P ( X ) = e E p u v e E \ E ( 1 p u v ) . Let us define R A 0 ( X , V c i 2 ) as the set of reachable nodes in set V c 2 from the seed set A 0 in live-edge graph X and G ( S ) define the set of all possible live-edge graphs. Finally,
F A 0 ( c , S ) = X G ( S ) P ( X ) | R A 0 ( X , V c 2 ) | + | V c 1 | .
Finally, we define M o V A 0 ( S ) as the expected increase of the difference between the score of c and that of the most voted opponent. Formally, if c and c ^ are the candidates, different from c , with the highest score before and after the process has quiesced, respectively, then the M o V is defined as
M o V A 0 ( S ) = F A 0 ( c , S ) F A 0 ( c ^ , S ) ( F ( c , ) F ( c , ) ) = | V c 1 | | V c 1 | ( F A 0 ( c ^ , S ) F A 0 ( c , S ) ) .
Let B N be the initial budget, i.e., the maximum size of the set edges that the manipulator can add to G; the election control problem asks to find a set of edges S ( A 0 × V ) \ E , of size at most B, that maximizes the MoV, i.e.,
arg max S ( A 0 × V ) \ E : | S | B M o V A 0 ( S )
Roughly, we aim to maximize the expected number of votes by which c wins the election; however, note that not only candidate c gain a vote, but another candidate loses a vote and we need to keep track of the number of votes lost by each other candidate. The definition of MoV given above take into consideration this fact by comparing the votes gained by c and the number of votes of the candidate with the largest starting and smallest loss in votes.
As a running example, let us consider five voters v 1 , , v 5 and three candidates C = { c , c 2 , c 3 } . Let three voters have p v i ( c 2 ) = 1 , p v i ( c 3 ) = 2 , p v i ( c ) = 3 , for i 1 , , 3 and two have p v i ( c 2 ) = 1 , p v i ( c ) = 2 , p v i ( c 3 ) = 3 , for i = 4 , 5 . Since we are considering the plurality rule, we have that the scores of c , c 2 , c 3 following the elections are 0 , 5 , 0 .
Now, consider being able to influence voters 3 and 4 using the process presented by Wilder et al., which is the one we consider in this paper. Then, c is able to move one position up in π v 4 and π v 5 and the new scores are 2 , 3 , 0 and the value of is M o V = 5 0 ( 3 2 ) = 4 . We can make the following observations in this simple example: (1) even if we failed to make the target candidate win the elections, the value of is at its maximum value in this instance, i.e., even the optimal solution, would not have been able to make c win; and (2) since, under this model, we can only move the target candidate up to one position, influencing the first three voters would not have changed the outcome of the elections and the scores would have still been 0 , 5 , 0 .

5. Approximation Result

In this section, we first show that the change in score of the candidate c is a monotone and submodular function. This allows us to give a constant factor approximation using the result given in [24]. The authors proved that, if a solution approximates the change in score of the target candidate within a factor α , then this solution provides a α / 3 approximation to the MoV.
Let us first denote the change in score of candidate c as
g A 0 + ( c , S ) = F A 0 ( c , S ) F A 0 ( c , ) = X G ( S ) P ( X ) | R A 0 ( X , V c i 2 ) |
It directly follows that the function g A 0 + ( c , S ) is a non-negative linear combination of functions R A 0 ( X , V c 2 ) . In the next lemma, we show that R A 0 ( X , V c 2 ) in live-edge X is a monotone submodular function of the initial set of nodes A 0 . This allows us to prove that also g A 0 + ( c , S ) is monotone and submodular with respect to A 0 (Theorem 1).
Lemma 1.
Given a set of nodes A 0 V , two live-edge graphs X , Y s.t. E X E Y and E Y \ E X A 0 × V , and an edge ( u , v ) ( A 0 × V ) \ ( E E Y ) . Then,
| R A 0 ( Y + , V c 2 ) \ R A 0 ( Y , V c 2 ) | | R A 0 ( X + , V c 2 ) \ R A 0 ( X , V c 2 ) | ,
where X + = X { ( u , v ) } and Y + = Y { ( u , v ) } .
Proof. 
Note that we can decompose R A 0 ( X + , V c 2 ) = | R A 0 ( X , V c 2 ) | + | R A 0 ( { ( u , v ) } , V c 2 ) | | R A 0 ( X { ( u , v ) } , V c 2 ) | and R A 0 ( Y + , V c 2 ) = | R A 0 ( Y , V c 2 ) | + | R A 0 ( { ( u , v ) } , V c 2 ) | | R A 0 ( Y { ( u , v ) } , V c 2 ) | . Then, since E X E Y and E Y \ E X A × V we have that R A 0 ( X , V c 2 ) R A 0 ( Y , V c 2 ) and R A 0 ( X { ( u , v ) } , V c 2 ) R A 0 ( Y { ( u , v ) } , V c 2 ) . Thus,
| R A 0 ( Y + , V c 2 ) | | R A 0 ( Y , V c 2 ) | = | R A 0 ( { ( u , v ) } , V c 2 ) | | R A 0 ( Y { ( u , v ) } , V c 2 ) | | R A 0 ( { ( u , v ) } , V c 2 ) | | R A 0 ( X { ( u , v ) } , V c 2 ) | = | R A 0 ( X + , V c 2 ) | | R A 0 ( X , V c 2 ) | .  
We can now prove the following theorem.
Theorem 1.
Given a graph G = ( V , E ) , a seed set A 0 , g A 0 + ( c , S ) is monotonically increasing submodular function of sets S ( A 0 × V ) \ E .
Proof. 
First, we need to prove that g A 0 + ( c , S ) is a monotonically increasing function, formally g A 0 + ( c , S { ( u , v ) } ) g A 0 + ( c , S ) , for each edge ( u , v ) ( A 0 × V ) \ ( E S ) .
g A 0 + ( c , S { ( u , v ) } ) g A 0 + ( c , S ) = X G ( S e ) P ( X ) | R A 0 ( X , V c 2 ) | X G ( S ) P ( X ) | R A 0 ( X , V c 2 ) | = X G ( S ) P ( X ) p u v | R A 0 ( X + , V c 2 ) | + P ( X ) ( 1 p u v ) | R A 0 ( X , V c 2 ) | P ( X ) | R A 0 ( X , V c 2 ) | = X G ( S ) P ( X ) p u v | R A 0 ( X + , V c 2 ) | P ( X ) p u v | R A 0 ( X , V c 2 ) | = X G ( S ) P ( X ) p u v | R A 0 ( X + , V c 2 ) | | R A 0 ( X , V c 2 ) | 0 .
The last equation holds since R A 0 ( X , V c 2 ) R A 0 ( X + , V c 2 ) .
To prove submodularity, we show that for each pair of sets S , T such that S T ( A 0 × V ) \ E and, for each edge ( u , v ) ( A 0 × V ) \ ( E T ) , the increment in the expected number of influenced nodes that edge ( u , v ) causes in S { ( u , v ) } is larger than the increment it produces in T { ( u , v ) } , that is g A 0 + ( c , S { ( u , v ) } ) g A 0 + ( c , S ) g A 0 + ( c , T { ( u , v ) } ) g A 0 + ( c , T ) .
Given two sets of edges S , T , such that S T , for each live-edge graph X in G ( S ) we denote by G ( T , X ) the set of live-edge graphs in G ( T ) that have X as a subgraph and possibly contain other edges in T \ S . In other words, a live-edge graph in G ( T , X ) has been generated with the same outcomes as X on the coin flips in the edges of E S and it has other outcomes for edges in T \ S .
g A 0 + ( c , T { ( u , v ) } ) g A 0 + ( c , T ) = Y G ( T ) P ( Y ) p u v | R A 0 ( Y + , V c 2 ) | | R A 0 ( Y , V c 2 ) | = X G ( S ) Y G ( T , X ) P ( Y ) p u v | R A 0 ( Y + , V c 2 ) | | R A 0 ( Y , V c 2 ) | .
Since, for each X G ( S ) , Y G ( T , X ) P ( Y ) = P ( X ) Y G ( T \ S , X ) P ( Y ) = P ( X ) and by Lemma 1, then
g A 0 + ( c , T { ( u , v ) } ) g A 0 + ( c , T ) = X G ( S ) Y G ( T , X ) P ( Y ) p u v | R A 0 ( Y + , V c 2 ) | | R A 0 ( Y , V c 2 ) | X G ( S ) P ( X ) p u v | R A 0 ( X + , V c 2 ) | | R A 0 ( X , V c 2 ) | = g A 0 + ( c , S { ( u , v ) } ) g A 0 + ( c , S ) .  
This result provide us with the fact that a simple greedy hill-climbing approach gives a constant factor approximation to the problem of maximizing g + ( c , A 0 , S ) , where the constant is 1 1 e ϵ . By combining this result and applying Theorem 3 in [24], here reported as Theorem 2, we obtain a 1 3 1 1 e ϵ -approximation algorithm for the election control problem.
Theorem 2 holds for any scoring rule, i.e., plurality included, and for any model in which the manipulator has the ability to change only the position of a target candidate for a subsets of voters and the increment in score of such candidate is at least equal to the decrement in score of the other candidates. Our model satisfy all of these hypotheses since the manipulator is only able to modify the lists of the voters that are active during the ICM process, i.e., the nodes that are reachable from the seed set. Moreover, using the model from Wilder et al. [7], the manipulator can only change the score of the target candidate by increasing its position in the preference list up by one position. This also implies that the increment in score of c is at least equal to the decrement in scoring of the other candidates since the new score of c can also be defined as the scores lost by the other candidates, i.e., F A 0 ( c , S ) = | V c 1 | + X G P ( X ) c C \ c | R A 0 ( X , V c 2 V c 1 ) | .
Theorem 2
([24]). An α-approximation algorithm for the problem of maximizing the increment in score of a target candidate gives an α 3 -approximation to the election control problem.
Corollary 1.
There is an algorithm that outputs a solution S that satisfies
M o V A 0 ( S ) 1 3 1 1 e ϵ M o V A 0 ( S * ) ,
where S * denotes an optimal solution of size B to maximizing M o V .

6. Improving the Running Time

In the previous section, we proved that there exists an algorithm that approximate M o V A 0 ( S ) up to a constant factor by showing that the change in score of the target candidate c is monotone and submodular with respect to sets S ( A 0 × V ) \ E (Theorem 1). It follows that Greedy (Algorithm 1) finds a set S of edges whose value g A 0 + ( c , S ) is at least 1 1 / e times the one of an optimal solution [23].
Algorithm 1:Greedy
Algorithms 12 00207 i001
As it is stated, Algorithm 1 is clearly infeasible, in terms of running time, for very large real networks, having a computational complexity of O ( B · | V | · | E | · R ) , where R is the number of simulations, i.e., live-edge graphs, needed to compute an approximation for g A 0 + ( c , S ) . Recall that calculating the expected number of active nodes is # P -complete but can be approximated by using a polynomial number of live-edge graphs [8,22].
Since our Algorithm 1 is a modified version of the algorithm Greedy2 presented in [25], whose aim was to maximize the influence diffusion in a social network, we can exploit the same reduction to the Limited Seed Selection problem (LSS) that aims at finding a subset of the initial active users in order to maximize the expected number of influenced users. This reduction allows us to adapt the algorithm presented in [26] in such a way that it finds a subset of a given limited set of edges, i.e., S ( A 0 × V ) .

7. Experimental Study

In this section, we present some experimental results that show how our approximation algorithm performs on real-world networks.
We chose several heterogeneous social and communication networks that are suitable for our problem, taken from KONECT [27], ArnetMiner [28] and SNAP [29] repositories. The size of the graphs are reported in Table 1.
We considered three different scenarios, each with a different number of candidates, i.e., | C | = 2 , 5 , 10 . For each scenario, we assigned a random preference list to each node of the networks. Moreover, we chose 0.1 % of the nodes in V as seeds and set the budget to B = 10 · | A 0 | . We generated the probabilities to the edges according to the weighted model presented by Kempe et al. [21], i.e., for each edge ( u , v ) , assign p u v = 1 / N v , where N v is the number of incoming neighbour of node v. Note that, for these experiments, the seed nodes were chosen uniformly at random.
All our experiments were performed on a computer equipped with two Intel Xeon E5-2643 CPUs (six cores clocked at 3.4 GHz) and 128 GB RAM; our programs were implemented in C++ (gcc compiler v4.8.2 with optimization level O3).
In Table 2, we report: Δ ( ) and Δ ( S ) that are the differences in MoV of c with respect to the most voted opponent before and after the edge addition, i.e., Δ ( ) = F A 0 ( c , ) F A 0 ( c , ) and Δ ( S ) = F A 0 ( c , S ) F A 0 ( c ^ , S ) , where c and c ^ are the candidates, different from c , with the highest score before and after the process has quiesced; I is the relative increment of MoV after the edge addition computed as I = Δ ( S ) Δ ( ) Δ ( ) × 100 ; and T is the time in seconds. Note that negative values in Δ ( ) means that the target candidate c was not winning before we used our algorithm.
To prove the capability of our proposed algorithm, we compared the value of MoV in a graph augmented by using Algorithm 1 and in the same graph augmented by using several alternative baselines that connect the given seed set to a set of B nodes chosen accordingly: PrefAtt (PA) selects nodes according to the Preferential Attachment model [30,31]; Jaccard (J) selects the nodes with the highest Jaccard [32] coefficient; Degree (D) selects the nodes with the highest out-degree; Topk (TopK) selects the nodes with the highest harmonic centrality [33]; and Prob (Prob) selects nodes adding the edges with the highest probability. Note that some of these algorithms are well-known algorithms used for link recommendation. For each graph, we report in Table 3 and Table 4 the relative increment of MoV, defined above as I. The experiments clearly show that our proposed algorithm outperforms all the alternative baselines with respect to the final value of MoV.
Figure 1 shows the effectiveness of the algorithm in the scenario with m = 5 candidates running for the elections compared with the other approaches on the Twitter network. Note that this scenario is the “hardest” one among the considered ones, since it has the value of Δ ( ) = 238.7 , i.e., the target candidate is not winning before the process starts, and Twitter is the largest network among the ones we considered.

8. Conclusions

Using social media to influence elections is a major concern in our society and for this reason it is important to study this phenomenon in order to prevent attacks from manipulators. Our result might be a further step to understand and prevent these situations in real-life.
In this work, we address the problem of selecting a fixed-size set of new connections to a subset of voters that, with their influence, will change the opinion of the network’s users about a target candidate, maximizing its chances to win the election. We provide a ( 1 1 / e ) -approximation algorithm for the problem of maximizing the score of a target candidate by showing submodularity. We then exploit such property to provide a 1 3 ( 1 1 / e ) -approximation algorithm for the constructive election control problem. Finally, we present an experimental study on several heterogeneous real-world networks to validate the model and assess the capability of the algorithm comparing our proposed solution with other link recommendation algorithms and showing its effectiveness.
Our results open several research directions. It could be interesting to study the same approach on different models, e.g., changing the model of diffusion, or using different voting rules, e.g., Borda rule that is used, as stated in Wikipedia, in elections by educational institutions or for granting sports awards in the United States. Moreover, future work should concentrate also in uncertainty models for the diffusion process, for example in robust influence maximization where weights on the edges are not known but a probability distribution is given in input.

Author Contributions

Conceptualization, F.C., G.D. and Y.V.; methodology, F.C., G.D. and Y.V.; software, F.C., G.D. and Y.V.; validation, F.C., G.D. and Y.V.; formal analysis, F.C., G.D. and Y.V.; investigation, F.C., G.D. and Y.V.; data curation, Y.V.; writing-original draft preparation, F.C.; writing-review and editing, F.C., G.D. and Y.V.; funding acquisition, G.D.

Funding

This research was partially funded by the Italian MIURPRIN 2017 Project ALGADIMAR “Algorithms, Games, and Digital Markets”.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Bond, R.M.; Fariss, C.J.; Jones, J.J.; Kramer, A.D.I.; Marlow, C.; Settle, J.E.; Fowler, J.H. A 61-million-person experiment in social influence and political mobilization. Nature 2012, 489, 295. [Google Scholar] [CrossRef] [PubMed]
  2. Ferrara, E. Disinformation and social bot operations in the run up to the 2017 French presidential election. First Monday 2017, 22. [Google Scholar] [CrossRef] [Green Version]
  3. Kreiss, D. Seizing the moment: The presidential campaigns’ use of Twitter during the 2012 electoral cycle. New Media Soc. 2016, 18, 1473–1490. [Google Scholar] [CrossRef]
  4. Stier, S.; Bleier, A.; Lietz, H.; Strohmaier, M. Election Campaigning on Social Media: Politicians, Audiences, and the Mediation of Political Communication on Facebook and Twitter. Political Commun. 2018, 35, 50–74. [Google Scholar] [CrossRef] [Green Version]
  5. Allcott, H.; Gentzkow, M. Social Media and Fake News in the 2016 Election; Working Paper 23089; National Bureau of Economic Research: Cambridge, MA, USA, 2017. [Google Scholar] [CrossRef]
  6. Faliszewski, P.; Rothe, J.; Moulin, H. Control and Bribery in Voting. In Handbook of Computational Social Choice; Cambridge University Press: Cambridge, UK, 2016; pp. 146–168. [Google Scholar] [CrossRef]
  7. Wilder, B.; Vorobeychik, Y. Controlling Elections through Social Influence. In Proceedings of the AAMAS 2018 17th International Conference on Autonomous Agents and MultiAgent Systems, Stockholm, Sweden, 10–15 July 2018; pp. 265–273. [Google Scholar]
  8. Kempe, D.; Kleinberg, J.M.; Tardos, É. Maximizing the Spread of Influence through a Social Network. Theory Comput. 2015, 11, 105–147. [Google Scholar] [CrossRef]
  9. Corò, F.; Cruciani, E.; D’Angelo, G.; Ponziani, S. Vote For Me!: Election Control via Social Influence in Arbitrary Scoring Rule Voting Systems. In Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems AAMAS ’19, Montrea, QC, Canada, 13–17 May 2019; pp. 1895–1897. [Google Scholar]
  10. Corò, F.; Cruciani, E.; D’Angelo, G.; Ponziani, S. Exploiting Social Influence to Control Elections Based on Scoring Rules. In Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, IJCAI, Macao, China, 10–16 August 2019; pp. 201–207. [Google Scholar] [CrossRef]
  11. Faliszewski, P.; Gonen, R.; Koutecký, M.; Talmon, N. Opinion Diffusion and Campaigning on Society Graphs. In Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, IJCAI-18. International Joint Conferences on Artificial Intelligence Organization, Stockholm, Germany, 13–19 July 2018; pp. 219–225. [Google Scholar] [CrossRef]
  12. Bredereck, R.; Elkind, E. Manipulating Opinion Diffusion in Social Networks. In Proceedings of the 26th International Joint Conference on Artificial Intelligence, Melbourne, Australia, 19–25 August 2017; pp. 894–900. [Google Scholar]
  13. D’Angelo, G.; Severini, L.; Velaj, Y. Recommending links through influence maximization. Theor. Comput. Sci. 2019, 764, 30–41. [Google Scholar] [CrossRef] [Green Version]
  14. D’Angelo, G.; Severini, L.; Velaj, Y. Selecting Nodes and Buying Links to Maximize the Information Diffusion in a Network. In Proceedings of the 42nd International Symposium on Mathematical Foundations of Computer Science, Aalborg, Denmark, 21–25 August 2017; pp. 75:1–75:14. [Google Scholar] [CrossRef]
  15. Sheldon, D.; Dilkina, B.; Elmachtoub, A.N.; Finseth, R.; Sabharwal, A.; Conrad, J.; Gomes, C.; Shmoys, D.; Allen, W.; Amundsen, O.; et al. Maximizing the spread of cascades using network design. In Proceedings of the Twenty-Sixth Conference on Uncertainty in Artificial Intelligence, Catalina Island, CA, USA, 8–11 July 2010. [Google Scholar]
  16. Amelkin, V.; Singh, A.K. Fighting Opinion Control in Social Networks via Link Recommendation. In Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, Anchorage, AK, USA, 4–8 August 2019. [Google Scholar]
  17. Zhang, Y.; Adiga, A.; Vullikanti, A.; Prakash, B.A. Controlling propagation at group scale on networks. In Proceedings of the 2015 IEEE International Conference on Data Mining (ICDM), Atlantic City, NJ, USA, 14–17 November 2015. [Google Scholar]
  18. Crescenzi, P.; D’angelo, G.; Severini, L.; Velaj, Y. Greedily improving our own closeness centrality in a network. ACM Trans. Knowl. Discov. Data 2016, 11, 9. [Google Scholar] [CrossRef]
  19. Parotsidis, N.; Pitoura, E.; Tsaparas, P. Centrality-aware link recommendations. In Proceedings of the Ninth ACM International Conference on Web Search and Data Mining, San Francisco, CA, USA, 22–25 February 2016. [Google Scholar]
  20. Papagelis, M. Refining social graph connectivity via shortcut edge addition. ACM Trans. Knowl. Discov. Data 2015, 10, 12. [Google Scholar] [CrossRef]
  21. Kempe, D.; Kleinberg, J.M.; Tardos, É. Maximizing the spread of influence through a social network. In Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, 24–27 August 2003; pp. 137–146. [Google Scholar] [CrossRef]
  22. Chen, W.; Wang, C.; Wang, Y. Scalable influence maximization for prevalent viral marketing in large-scale social networks. In Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, 25–28 July 2010; pp. 1029–1038. [Google Scholar] [CrossRef]
  23. Nemhauser, G.L.; Wolsey, L.A.; Fisher, M.L. An analysis of approximations for maximizing submodular set functions-I. Math. Program. 1978, 14, 265–294. [Google Scholar] [CrossRef]
  24. Aboueimehrizi, M.; Corò, F.; Cruciani, E.; D’Angelo, G. Election Control with Voters’ Uncertainty: Hardness and Approximation Results. arXiv 2019, arXiv:1905.04694. [Google Scholar]
  25. Corò, F.; D’Angelo, G.; Velaj, Y. Recommending Links to Maximize the Influence in Social Networks. In Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, IJCAI, Macao, China, 10–16 August 2019; pp. 2195–2201. [Google Scholar] [CrossRef]
  26. Cohen, E.; Delling, D.; Pajor, T.; Werneck, R.F. Sketch-based Influence Maximization and Computation: Scaling Up with Guarantees. In Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, Shanghai, China, 3–7 November 2014. [Google Scholar]
  27. Kunegis, J. KONECT-The Koblenz Network Collection. In Proceedings of the International World Wide Web Conferen, Rio de Janeiro, Brazi, 13–17 May 2013. [Google Scholar]
  28. Arnetminer. Available online: http://arnetminer.org (accessed on 15 January 2015).
  29. Leskovec, J.; Krevl, A. SNAP Datasets: Stanford Large Network Dataset Collection. 2014. Available online: http://snap.stanford.edu/data (accessed on 28 September 2019).
  30. Bollobás, B.; Borgs, C.; Chayes, J.; Riordan, O. Directed scale-free graphs. In Proceedings of the Fourteenth Annual ACM-SIAM Symposium on Discrete Algorithms, Baltimore, MD, USA, 12–14 January 2003. [Google Scholar]
  31. Newman, M.E. Clustering and preferential attachment in growing networks. Phys. Rev. E 2001, 64, 025102. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  32. Jaccard, P. Étude comparative de la distribution florale dans une portion des Alpes et des Jura. Bull. Soc. Vaudoise Sci. Nat. 1901, 37, 547–579. [Google Scholar]
  33. Boldi, P.; Vigna, S. Axioms for centrality. Internet Math. 2014, 10, 222–262. [Google Scholar] [CrossRef]
Figure 1. Value of Δ ( S ) in Twitter Network.
Figure 1. Value of Δ ( S ) in Twitter Network.
Algorithms 12 00207 g001
Table 1. Real-world networks.
Table 1. Real-world networks.
Name | V | | E |
Software Engineering (SE)314114,787
Theoretical CS (TCS)417214,272
High-Performance Comp. (HPC)486935,036
Wiki-Vote (Wiki)7115103,689
Computer Graphic (CGM)833641,925
Computer Networks (CN)942053,003
Artificial Intelligence (AI)27,617268,460
Slashdot (Sl)51,083130,370
Epinions (Epi)75,879508,837
Slashdot-Zoo (Sl-z)79,116515,397
Twitter465,017834,797
Table 2. Results for real-world networks. Δ ( ) = F A 0 ( c , ) F A 0 ( c , ) and Δ ( S ) = F A 0 ( c , S ) F A 0 ( c ^ , S ) , where c and c ^ are the candidates, different from c , with the highest score before and after the process has quiesced.
Table 2. Results for real-world networks. Δ ( ) = F A 0 ( c , ) F A 0 ( c , ) and Δ ( S ) = F A 0 ( c , S ) F A 0 ( c ^ , S ) , where c and c ^ are the candidates, different from c , with the highest score before and after the process has quiesced.
| C | = 2 | C | = 5 | C | = 10
G Δ ( ) Δ ( S ) I T Δ ( ) Δ ( S ) I T Δ ( ) Δ ( S ) I T
SE6.65330.884878.01%0.7023.03106.79363.76%0.83−26.3113.02149.48%1.12
TCS−57.61305.47630.22%0.95−15.8774.41568.99%1.13−22.2334.05253.16%1.44
HPC−32.31470.101554.99%1.16−33.4196.28388.15%1.26−14.8037.35352.35%1.87
Wiki−32.39680.642201.34%3.68−28.80140.87589.14%4.03−27.4149.01278.80%5.80
CN−38.081144.903106.47%3.15−57.77243.39521.32%3.6112.83122.41854.42%5.04
CGM−0.54846.73157 × 10 3 %2.43−52.16157.97402.87%2.57−10.0892.881021.20%4.02
AI221.073394.041435.27%14.037.24816.5011,179.65%14.6210.78362.163259.92%21.22
Sl150.592958.491864.54%41.33−16.43750.204664.81%48.0254.87493.46799.25%57.78
Sl-z523.6511,613.942117.86%70.36130.742941.962150.17%81.6112.481115.278837.80%118.94
Epi365.455700.391459.81%80.6147.681465.612974.00%98.9716.76691.974027.51%123.17
Twitter1665.35363 × 10 3 109 × 10 3 %717.66−238.790 × 10 3 190 × 10 3 %790.26166.537,739113 × 10 3 %746.86
Table 3. Baseline results for real-world networks.
Table 3. Baseline results for real-world networks.
GGreedyPref. AttachmentJaccard
| C | 251025102510
SE4878.01363.76149.48895.0062.2525.25757.5042.9724.79
TCS630.22568.99253.16154.79136.0051.79110.1290.6723.43
HPC1554.99388.15352.3547.2210.2214.33174.8342.9840.19
Wiki2201.34589.14278.80959.02266.30125.44240.1267.0738.78
CN3106.47521.32854.42565.6392.67181.23249.3937.8484.84
CGM157 × 10 3 402.871021.2018 × 10 3 48.84107.1621 × 10 3 58.00115.80
AI1435.2712 × 10 3 3259.9258.13468.75135.8095.40715.93228.99
Sl1864.544664.81799.25302.27680.2291.69292.41673.3087.54
Sl-z2117.862150.178837.80758.46760.913495.03159.30172.30776.79
Epi1459.812974.004027.51371.26707.52905.31222.93447.97541.20
Twitter109 × 10 3 190 × 10 3 113 × 10 3 10,423.8816,858.2011,472.569824.0118,093.8312,013.41
Table 4. Baseline results for real-world networks.
Table 4. Baseline results for real-world networks.
GDegreeTopKProb
| C | 251025102510
SE1005.1869.0827.941852.49135.5454.451408.16110.7744.69
TCS171.96155.6457.31150.14144.4948.14257.26196.7167.87
HPC49.8010.4814.92232.4657.0646.01402.9591.8792.15
Wiki1322.04359.21173.851336.46370.66180.50304.5065.1336.57
CN1058.30165.02349.461082.34187.46351.23661.83108.42163.51
CGM27 × 10 3 73.03158.0918 × 10 3 47.00119.3644 × 10 3 118.67280.47
AI84.67677.83197.02264.102067.03625.05349.742612.15795.94
Sl306.53697.8693.54336.11757.73102.47569.151266.83169.13
Sl-z778.30778.933587.66585.11643.202946.73366.46365.021770.74
Epi255.76488.91625.85275.55525.05673.50372.59713.16887.83
Twitter8609.8317,899.7911,862.668497.199795.907198.48208.64−373.04247.40

Share and Cite

MDPI and ACS Style

Corò, F.; D’Angelo, G.; Velaj, Y. Recommending Links to Control Elections via Social Influence. Algorithms 2019, 12, 207. https://doi.org/10.3390/a12100207

AMA Style

Corò F, D’Angelo G, Velaj Y. Recommending Links to Control Elections via Social Influence. Algorithms. 2019; 12(10):207. https://doi.org/10.3390/a12100207

Chicago/Turabian Style

Corò, Federico, Gianlorenzo D’Angelo, and Yllka Velaj. 2019. "Recommending Links to Control Elections via Social Influence" Algorithms 12, no. 10: 207. https://doi.org/10.3390/a12100207

APA Style

Corò, F., D’Angelo, G., & Velaj, Y. (2019). Recommending Links to Control Elections via Social Influence. Algorithms, 12(10), 207. https://doi.org/10.3390/a12100207

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop