Previous Article in Journal
A Pattern-Oriented Ontology and Workflow Modeling Approach for the Sui Move Programming Language
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Interest as the Engine: Leveraging Diverse Hybrid Propagation for Influence Maximization in Interest-Based Social Networks

College of Information and Artificial Intelligence (College of Industrial Software), Yangzhou University, Yangzhou 225009, China
*
Author to whom correspondence should be addressed.
Information 2026, 17(1), 3; https://doi.org/10.3390/info17010003
Submission received: 2 November 2025 / Revised: 10 December 2025 / Accepted: 16 December 2025 / Published: 19 December 2025

Abstract

Influence maximization is a crucial research domain in social network analysis, playing a vital role in optimizing information dissemination and managing online public opinion. Traditional IM models focus on network topology, often overlooking user heterogeneity and server-driven propagation dynamics, which often leads to limited model adaptability. To overcome these shortcomings, this study proposes the “Social–Interest Hybrid Influence Maximization” (SIHIM) problem, which explicitly models the joint influence of social topology and user interest in server-mediated propagation, aiming to enhance the effectiveness of information propagation by integrating users’ social relationships and interest preferences. To model this problem, we develop a Server-Based Independent Cascading (SB-IC) model that captures the dynamics of influence propagation. Based on this model, we further propose a novel hybrid centrality algorithm named Pascal Centrality (PaC), which integrates both topological and interest-based attributes to efficiently identify key seed nodes while minimizing influence overlap. Experimental evaluations on ten real-world social network datasets demonstrate that PaC improves influence spread by 5.22% under the standard IC model and by 7.04% under the SB-IC model, outperforming nine state-of-the-art algorithms. These findings underscore the effectiveness and adaptability of the proposed algorithm in complex scenarios.

Graphical Abstract

1. Introduction

In recent years, with the rapid development of the internet, social networks have gradually become an important platform for information dissemination and social interaction [1]. The Influence Maximization (IM) problem is one of the hottest research directions in the field of social networks [2]. The concept of the IM problem originated from viral marketing, where companies rewarded influential users to encourage them to promote products within their social circles. The objective of this problem is to select the most influential users in the network as seed nodes to maximize the scope of information dissemination, thereby achieving broader information diffusion and more effective marketing promotion [3].
Domingos and Richardson’s seminal [4] work established the foundation for Influence Maximization by introducing the concept of “expected network value.” This expanded the view of customer value beyond independent attributes to include social influence, and they utilized a Markov random field model to formalize and maximize this combined value. This work laid the ideological foundation for influence maximization. Building upon this, Kempe et al. [5] were the first to formally define the Influence Maximization (IM) problem as a discrete optimization problem. In their study, they systematically analyzed and popularized the Independent Cascade (IC) model and the Linear Threshold (LT) model, establishing them as the theoretical cornerstone of the field. The intellectual roots of the LT model, in particular, can be traced back to the earlier work of Granovetter [6] on collective behavior. Furthermore, Kempe et al. [5] proved that the IM problem is NP-hard under both the IC and LT models. Additionally, IM research has drawn upon classic propagation models from epidemiology, such as the SIR and SIS models [7]. These models were originally developed to describe the spread of infectious diseases, but their underlying concepts and methodologies have been widely adopted in studies of influence propagation.
Traditional IM methods primarily rely on users’ social networks, specifically analyzing the friendship relationships between users to identify nodes with greater influence. Common methods include greedy algorithms [5,8,9,10,11,12,13,14,15], heuristic methods [16,17,18,19,20,21,22,23,24,25,26,27], and others. Kempe et al. [5] first proposed a greedy algorithm called Greedy, which constructs a seed set by progressively selecting the most influential nodes. However, this method has high computational complexity. To improve computational efficiency, Leskovec et al. [8] and Goyal et al. [9] proposed the CELF and CELF++ methods, respectively. Although these methods enhance computational efficiency to some extent, they remain unsuitable for large-scale networks. Consequently, researchers have introduced various computationally efficient heuristic centrality metrics from network analysis, such as degree centrality [16], K-Shell [17], and closeness centrality [18], for the rapid and approximate identification of high-influence nodes. These centrality-based approaches can efficiently locate nodes with high centrality values; however, they often fail to account for interactions between nodes and struggle to avoid the influence overlap problem. Additionally, methods such as graph neural networks [28,29,30], reinforcement learning [31,32], and community detection [2] have been partially utilized by some scholars in IM problem research.
Traditional IM problems typically treat nodes in a network as homogeneous in their reception of information, regardless of content, ignoring differences in users’ interest preferences. However, this simplifying assumption often has limitations in practical applications, as users’ interest preferences significantly influence the efficiency and scope of influence spreading. In recent years, to more accurately model real-world information propagation mechanisms, researchers have increasingly focused on IM problems incorporating users’ interest preferences. Currently, IM research, which integrates users’ interest, primarily focuses on the Topic-aware Influence Maximization (TIM) problem [33,34,35,36,37,38,39,40,41,42]. TIM optimizes the information dissemination process by introducing users’ preferences for different topics, making dissemination strategies more aligned with users’ actual needs and interests. Additionally, Li et al. [33] proposed an influence maximization problem based on interest coverage maximization, aiming to enhance the overall influence spreading by maximizing the coverage of users’ interests. However, existing research primarily focuses on word-of-mouth dissemination patterns between users, neglecting the influence propagation generated by Servers in Interest-Based Social Networks (ISNs) through interest-based content recommendations.
In traditional social networks, information dissemination typically follow a word-of-mouth pattern among acquaintances; only direct user-to-user ties are taken into account. ISNs, by contrast, allow users to be influenced not only by their immediate social neighbors but also by like-minded others with whom they share no direct connection. By leveraging individuals’ interest preferences, these platforms recommend content favored by users with similar interests, thereby substantially accelerating information diffusion, enriching its modalities, and delivering content that more precisely matches users’ interests. For example, in ISNs like BiliBili and TikTok, users may share information about a particular topic with their friends because they are interested in it. At the same time, Servers also recommend topics to users based on their interests. This dissemination mechanism breaks through the limitations of traditional networks, where users must engage in direct interaction with one another. As a result, existing solutions to IM problems are unable to accurately simulate the information dissemination process in ISNs.
The research on Influence Maximization primarily encompasses two aspects: the design of propagation models and the design of Influence Maximization algorithms. Focusing on the scope of this paper, we need to address the following problems:
  • How to define an information propagation model within ISNs. This model must be capable of modeling not only the information propagation between users but also the platform’s interest-based information delivery to users.
  • How to design an Influence Maximization algorithm suitable for ISNs. This algorithm needs to select a set of highly influential nodes in the Interest-driven Social Network while also mitigating the influence overlap problem as much as possible.
Based on the above background, this study defines the problem of maximizing influence in ISN as the “Social–Interest Hybrid Influence Maximization Problem” (SIHIM) and models the influence propagation process in ISNs as the Server-Based Independent Cascade (SB-IC) model. Meanwhile, we innovatively propose an effective method for identifying influential nodes in ISNs using centrality, namely PaC (Pascal Centrality). Specifically, the main contributions of this study are as follows:
  • We first define the SIHIM problem, considering influence propagation under both “node–node” and “Server–node” mechanisms. We prove that its objective function is monotonic and submodular and that influence estimation for this problem is NP-hard.
  • We design a propagation model named Server-Based Independent Cascade (SB-IC), which fully considers the impact of users’ interest characteristics on influence propagation. This enables more accurate modeling of the information propagation process in ISNs.
  • We propose a new IM algorithm called PaC. This method fully considers the multi-attribute characteristics of nodes, thereby accurately identifying influential nodes in the network while effectively avoiding the problem of influence overlap between nodes.
  • We conducted extensive experiments on ten real-world datasets, comparing our proposed algorithm with several recent high-performance algorithms. The results demonstrate that our algorithm achieved an average improvement in influence spreading by 5.22% and 7.04% on the IC model and SB-IC model, respectively, compared to the other nine comparison algorithms.
The remainder of this paper is organized as follows. Section 2 reviews the related work. Section 3 presents the problem definition of SIHIM and the proposed SB-IC model. Section 4 details the PaC algorithm. Section 5 reports the experimental results and analysis. Finally, Section 6 concludes the paper and discusses future research.

2. Related Work

In this section, we provide a brief overview of the relevant work on solutions to IM problems, including greedy-based methods, heuristic-based methods, and Influence maximization with users’ interests.

2.1. Greedy-Based Methods

The greedy algorithm is one of the most representative methods for IM, primarily achieved by iteratively selecting nodes that yield the greatest marginal gain as seed nodes. The theoretical foundation of this class of methods stems from the pioneering work of Kempe et al. [5] in 2003, who proved that under certain conditions, the IM problem exhibits sub-modularity. This means that using a greedy algorithm can guarantee obtaining an approximation of at least ( 1 1 / e ) of the optimal solution. Although the greedy algorithm they proposed has strong theoretical guarantees, its high computational cost limits its application scenarios. To improve algorithm efficiency, Leskovec et al. [8] proposed the CELF algorithm, which significantly enhances efficiency by leveraging monotonic sub-modularity. Subsequently, Chen et al. [10] introduced the NewGreedy and MixedGreedy algorithms, which select edges based on the influence factor between nodes to construct a new subgraph. During subsequent influence expectation calculations, influence propagation is performed only on the optimized subnetwork, thereby improving efficiency. The StaticGreedy [11] and UBLF [12] algorithms further reduce the number of Monte Carlo simulations by utilizing static snapshots and quickly estimating upper bounds for influence propagation, respectively, thereby significantly improving computational efficiency.
As social networks and other information networks continue to expand, the number of nodes and edges may reach hundreds of millions or even billions, making it challenging for even the most advanced greedy algorithms to obtain solutions within a reasonable timeframe. To address this challenge, researchers are exploring additional strategies, such as parallel and distributed computing methods, as well as utilizing graph decomposition techniques to reduce the scale of the problem. Biswas et al. [13] developed a novel influence maximization algorithm to identify a set of seed nodes in complex networks. This algorithm uses the VIKOR method to filter out low-influence nodes from candidate seeds and introduces the EDV function with submodular properties into the greedy algorithm framework. Yang et al. [14] derived an independent cascading model based on ternary closures to study the influence maximization problem and further proposed a heuristic influence maximization algorithm that evaluated a node’s expected propagation influence by comprehensively considering ternary closure-weighted propagation probabilities and ternary closure-weighted degrees. Based on multi-dimensional attributes such as users’ social relationships, historical records, and topological structures, Li et al. [15] put forward a cross-comparison improved K-kernel heuristic algorithm based on heterogeneous information entropy to identify the most influential seed set in a hypergraph. Although these improved greedy algorithms have achieved significant improvements in efficiency, they still face challenges when dealing with large-scale networks.

2.2. Heuristic-Based Methods

Heuristic methods provide a relatively efficient approach to estimating and selecting the set of seed nodes with the greatest influence by simplifying the complexity of the problem when maximizing influence. The core idea of heuristic algorithms is to utilize the topological structure features of a network, such as node centrality metrics, to predict node influence. These algorithms typically select seed nodes based on their centrality metrics. For example, Degree Centrality (DC) [16] posits that a node’s influence is proportional to the number of nodes it is connected to. This method is simple and intuitive, suitable for scenarios where information propagation probabilities are assumed to be equal. The K-Shell decomposition method [17] partitions a network into multiple layers, such that nodes within the same layer share an identical coreness number. This method highlights that a node’s potential influence is determined by its position (rather than just its degree) within the network topology. Nodes residing in the innermost core layer—the one with the highest K-Shell value—are considered to have significant influential potential due to their central location, and are likely to play a critical role in information dissemination. Freeman proposed two classic algorithms based on global information from the perspective of the shortest path between nodes: betweenness centrality [19] and closeness centrality [20]. Betweenness centrality suggests that the more times a node appears on the shortest path between all nodes in the network, the more important it is in the information dissemination process. Closeness centrality measures a node’s influence by quantifying the average shortest distance between the node and the remaining nodes in the network. This algorithm asserts that the shorter the average shortest distance between a node and the remaining nodes, the faster the information transmission speed from that node as a source and the higher the node’s importance ranking. Lei et al. [21] quantified a node’s influence by analyzing changes in network structure after node removal, combining information from first and second-order neighboring nodes and using Tsallis entropy to measure influence.
However, relying solely on a single node attribute is insufficient for complex and diverse network structures. Agneessens et al. [22] introduced a generalized centrality method that considered information from a node’s direct neighbors and the distances between each pair of nodes to identify key nodes in a network. Besides, Li et al. [23] developed the GGC model to pick up the most influential nodes in a network, taking into account the closeness between a node and its neighboring nodes through the local clustering coefficient. Ullah [24] presented the NPIC algorithm, which identifies the most influential key nodes in a network by evaluating both the local attributes of nodes and the path information between nodes. Ibnoulouaf et al. [25] formulated a multi-attribute centrality metric to address the influential node identification problem, integrating the position information of nodes in the network and the local information of their nearest neighbors. Additionally, some scholars have attempted to rank the importance of nodes by simultaneously considering both local and global information in the network. Ullah et al. [26,27] proposed the LGC and LSS algorithms to identify key nodes in a network, which simultaneously account for both local and global network information to enhance accuracy. Inspired by potential energy, the EPC [18] centrality method was also introduced for identifying key nodes in a network, reflecting not only the local influence of a node but also aggregating the influence of surrounding nodes to ensure a comprehensive assessment of a node’s influence.

2.3. Influence Maximization with Users’ Interests

To better model the spread of influence in real life, an increasing number of scholars are attempting to model the influence propagation process using users’ interest factors. Recognizing that users exert varying levels of influence across different topics, Aslay et al. [34] introduced the TIM problem, which accounts for users’ interest topics. They also proposed an efficient indexing framework called INFLEX that can process TIM queries in milliseconds. Building on this work, Chen et al. [35] developed two topic-aware influence maximization algorithms: Best Effort and Topic Sample. The Best Effort algorithm estimates the upper limit of each user’s influence and uses these limits to prune users with lower influence, thereby efficiently selecting seed users. The Topic Sample algorithm precomputes the influence distribution for some topics and uses this precomputed information to estimate upper and lower bounds, enabling rapid selection of seed users. Bingöl et al. [36] investigated a topic-based influence calculation approach designed to recognize social interactions and postings of a limited number of users, aiming to discover and sustain the dynamic trends and activities of influential users under limited resources. Qin et al. [37] expanded the topic-aware model to the community level and introduced the community-topic feature-based dynamic social network influence maximization algorithm CFDI, aimed at diminishing the computational complexity of the dynamic IM problem.
Traditional topic-aware models primarily ignore users’ actual interest in marketing information or lack specific quantification of users’ interest. To address this, Galhotra et al. [38] proposed a comprehensive solution called Holistic Influence Maximization (HIM), which introduces the Opinion-cum-Interaction (OI) model. This model simultaneously considers nodes’ personal opinions and the probability of interaction between nodes to more realistically simulate the information dissemination process. Cai et al. [39] further investigated target user groups based on HIM, considering network relationships, spatial relationships, and preference similarities among users. They proposed the Target-aware HIM problem to better adapt to the complex requirements of real-world application scenarios. Additionally, Li et al. [33] conceived the Topic-Aware Information Coverage Maximization problem to maximize the sum of the expected numbers of active and known nodes in a topic-aware social network.
Recent research focuses on improving the efficiency and adaptability of TIM. To address issues such as high online query latency, significant indexing overhead, or reliance on static parameters in existing solutions, several studies have proposed efficient approaches. Tang et al. [43] combined hashing and sketching techniques, achieving significant efficiency improvements in both offline and online phases. Halal et al. [44] integrated deep reinforcement learning with graph attention networks, modeling the topical nature of diffusion using real cascade data and accelerating queries via cross-attention mechanisms. Ahmadikia et al. [45] employed reinforcement learning to dynamically adjust the weights of node centrality measures, adapting to different network structures and enhancing solution robustness and scalability. In terms of underlying modeling, Sang et al. [46] constructed dynamic heterogeneous graphs to uniformly describe spatio-temporal information interactions, improving the accuracy of cascade prediction. Chakraborty et al. [47] innovatively introduced a topic and opinion-infused hypergraph model, enhancing diffusion efficiency through novel seed selection criteria and propagation settings.
Beyond discussing influence propagation for specific topics, Li et al. [40] proposed an influence maximization method based on group sentiment to study the multidimensional characteristics of information propagation influenced by users’ sentiment and group features. They addressed the Two-Factor Information Propagation (TFIP) model. Huang et al. [41] formulated the SentiRank method, which constructs an emotion map considering positive and negative sentiment systems from social networks to identify sentiment leaders. Zareie [42] calculated the degree of users’ interest in marketing information by computing the Jeffrey divergence between users’ interest vectors and marketing information vectors, and put forward the IMUD method to maximize information propagation in viral marketing. However, while the aforementioned methods consider node heterogeneity, they overlook the influence propagation resulting from users’ interest-based recommendations by Servers, making it difficult to simulate influence propagation in ISNs.

3. Model and Problem Definition

In this section, we first introduce ISNs and the SB-IC propagation model, along with their related definitions. We then formally describe the SIHIM problem in ISNs.

3.1. Interest-Driven Social Network and Diffusion Model

Unlike traditional social networks, Interest-driven Social Networks (ISNs) such as TikTok and BiliBili do not rely solely on direct user interactions to transmit information. Instead, Servers in these ISNs can actively deliver messages to users based on their interests. Inspired by [48] and based on the IC model, this paper proposes a new propagation model, SB-IC, to describe the influence propagation process in ISNs. The SB-IC model utilizes Server nodes to model the interest-based information delivery in ISNs.
The ISN can be represented as G = ( V , E , I ) , where V = { 1 , 2 , , n } denotes the set of all nodes in the network; E V × V denotes the set of all edges in the network; if there is a directed edge from node u to node v, it is denoted as ( u , v ) E ; I = ( i 1 , i 2 , , i n ) denotes the set of interest vectors for all nodes in the network.
The SB-IC model defines two states for nodes: inactive and active. At the initial moment t = 0 , only the seed nodes are in the active state, while all other nodes are in the inactive state. At any time step t > 0 , nodes that were activated at time t 1 will simultaneously propagate their influence through the following two propagation methods:
  • Information propagation based on social relationships: Each node u activated at time step t 1 will attempt to activate its inactive neighbor node v with probability p N .
  • Information propagation based on node interests: The Servers will attempt to activate each inactive interest neighbor node w of node u that was activated at time step t 1 with probability p I .
If a node is successfully activated, its status changes from inactive to active. The process continues iteratively until no new nodes can be activated in the network. As illustrated in Figure 1.
In the SB-IC model, the influence of a node can be spread not only to neighboring nodes but also to nodes that are not directly connected but have more similar interests. The model defines the interest neighbor set to reflect the potential interaction relationships between users based on interest similarity. Given an interest-based social network G = ( V , E , I ) , for each node u in the network, its interest neighbor set IN u can be obtained by Equation (1):
IN u = { v v V , v Γ u , rank ( v , u ) PI u }
where IN u denotes the interest neighbor set of node u, Γ u denotes the set of direct neighbors of node u, rank ( v , u ) denotes the interest similarity rank between nodes v and u, and PI u denotes the potential interest neighbors of node u.
In ISNs, the potential influence of a node is usually closely related to its position in the network. The more high-quality neighboring nodes a node has and the more central its position in the network, the greater its potential influence. To more comprehensively measure the potential influence of a node, this paper proposes the concept of Potential Interest Expansion Degree (PIED). The formula for calculating PIED is as follows:
PIED u = d u · ks u × cloness u
cloness u = 2 E u d u ( d u 1 )
where d u represents the degree of node u, ks u represents the K-Shell value of node u, Γ u represents the set of neighboring nodes of node u, and cloness u represents the local clustering coefficient of u, which is defined as shown in Equation (3), where E u is the actual number of edges between node u and its neighboring nodes.
In ISNs, Servers typically prioritize recommending information from other users with similar interests to users based on the degree of interest similarity, thereby enhancing the precision of information dissemination. In the SB-IC model, interest similarity is calculated based on the interest vectors of any two distinct nodes in the network, with values ranging from [0, 1]. The closer the value is to 1, the more similar the interests of the two nodes; the closer the value is to 0, the greater the difference in interests. Given the interest vectors i u = [ i u 1 , i u 2 , , i u k , , i u h ] and i v = [ i v 1 , i v 2 , , i v k , , i v h ] , the similarity between nodes u and v, Sim ( u , v ) , can be calculated using Equation (4):
Sim ( u , v ) = i = 1 h i u i · i v i i = 1 h ( i u i ) 2 · i = 1 h ( i v i ) 2
where u , v V , i u , i v I , and i u k and i v k represent the k-th dimensional interest vectors of node u and node v, respectively.

3.2. Problem Definition

The IM problem focuses on how to select seeds with the greatest influence based on the interaction relationships between nodes, while ignoring the impact of user interests on influence propagation. In contrast, the SIHIM problem considers the dual influence propagation mechanism of user propagation and Servers’ recommendations, making it more suitable for real-world ISNs.
To formally define the SIHIM problem, let σ N ( · ) denote the influence function based on social relationships, and σ I ( · ) denote the influence function based on node interests. Given a seed set S, let σ N ( S ) denote the influence propagation value based on social relationships, and σ I ( S ) denote the influence propagation value based on node interests. Then, the SIHIM problem can be formally defined as follows:
Definition 1 (Social–Interest Hybrid Influence Maximization Problem). 
Given an interest-based social network G, a propagation model SB-IC, and a positive integer k ( k = 1 , 2 , , n ), the SIHIM problem aims to find an optimal seed set S * of size k such that the sum of σ N ( S ) and σ I ( S ) is maximized, i.e.:
S * = a r g m a x S V , | S | = k σ N ( S ) + σ I ( S )
Since Kempe et al. [5] have proven that the influence maximization problem based on the traditional independent cascade (IC) model is NP-hard, when only social-relationship-based propagation is considered in the network, the SB-IC model degenerates into the traditional IC model. Therefore, the influence maximization problem under the SB-IC model is identical to the classical IM problem, whose NP-hardness has been thoroughly proven. Additionally, the SB-IC model is designed based on the traditional IC model with a propagation mechanism based on interest similarity, which does not reduce the problem’s complexity, so the influence maximization problem under the SB-IC model is also an NP-hard problem.
In the SIHIM problem, let the total influence propagation be σ ( S ) = σ N ( S ) + σ I ( S ) , where σ N ( S ) denotes the influence based on social relationships propagation and σ I ( S ) denotes the influence based on interests propagation. Then, the SIHIM problem based on the SB-IC model is monotonic and submodular.
Proof. 
(1)
Monotonicity of the SIHIM problem
For any seed sets S and T, if S T , then the influence σ N ( S ) based on social relationships propagation is monotonic. Because the traditional IC model has proven its monotonicity [5], i.e., σ N ( S ) σ N ( T ) . Similarly, the influence based on interest propagation σ I ( S ) also exhibits monotonicity. The reason is that σ I ( S ) depends on the size of the seed set and interest similarity. A larger seed set T covers all propagation paths of S and may introduce new paths, thus σ I ( S ) σ I ( T ) . In summary, σ ( S ) σ ( T ) , so the SB-IC model exhibits monotonicity.
(2)
Sub-modularity of SIHIM problem
In the SIHIM problem, the sub-modularity of the SB-IC model is considered for any sets S T and e T . Kempe et al. [5] have proven that the IC model satisfies the submodular property, so the propagation σ N ( S ) based on social relationships is submodular, i.e., σ N ( S { e } ) σ N ( S ) σ N ( T { e } ) σ N ( T ) . For the interest-based propagation influence σ I ( S ) , since the calculation of interest similarity is based on cosine similarity, which has a normalization property, the marginal gain of the newly added node e for S decreases as S increases. Therefore, σ ( S { ϵ } ) σ ( S ) σ ( T { ϵ } ) σ ( T ) , thereby the sub-modularity of the SB-IC model is proved. □

4. Proposed Method

In this section, we propose a heuristic algorithm for addressing maximization problems in ISNs. Firstly, we describe the overall framework of the algorithm, and then elaborate on some of its details.

4.1. The Framework of Pascal Centrality

The adoption of physical-world principles and mathematical formulas for algorithm design is a prevalent and potent paradigm within IM research, as evidenced by prior work such as [18,23]. The propagation of influence in a network is a typical process of communication dynamics, where the influence of key nodes plays a crucial role in information dissemination. Inspired by the characteristics of pressure transmission in fluid mechanics, this study treats key nodes as the “source points” of influence propagation. According to Pascal’s law, changes in fluid pressure can be transmitted without loss through the fluid medium in all directions. Similarly, the influence of key nodes can efficiently diffuse along the network’s connection paths to other nodes. Based on the above principles, this section models the propagation of influence among nodes in a network. The liquid density ρ , which characterizes the local influence profile of nodes and captures their ability to directly activate neighbors, represents the local characteristics of nodes in the network. The gravitational acceleration g describes the global characteristics of nodes. This metric effectively quantifies these characteristics and provides a stable, interpretable framework for global assessment, and the relative height Δ h , which modulates the interactions between nodes and addresses the influence overlap problem through a dynamic adjustment mechanism, indicates the interactions between nodes. Therefore, the pressure at node u can be expressed as:
P u = ρ u · g u · Δ h u
Figure 2 shows the complete process of the proposed interest social network analysis and PaC calculation method.
  • Obtain the propagation matrix: The algorithm first constructs a Pascal centrality propagation matrix based on the initial propagation probabilities between nodes.
  • Assess the initial influence: The algorithm then calculates the density and gravitational acceleration of each node to perform a preliminary assessment of the node’s influence.
  • Select seed nodes: After completing the preliminary assessment, the algorithm iteratively updates the relative height of each node and finally outputs the node sequence based on the size of the PaC value.
Figure 2. Flowchart of PaC algorithm.
Figure 2. Flowchart of PaC algorithm.
Information 17 00003 g002

4.2. Propagation Matrix

In the real world, there are significant differences in the ability of different users to accept information. These differences depend not only on the recipient’s own ability to accept information but also on the source of the information. Even when faced with the same information, users’ willingness to accept it varies depending on the channel through which they obtain it. To quantify these differences, we propose the concept of propagation probability matrix. In SIHIM problems, the influence propagation of nodes mainly includes two methods: the influence of interest propagation and the influence of social relationship propagation. Based on this, the propagation matrix of nodes can be formulated as Equation (7):
P M = P M I + P M N
where P M denotes the propagation probability matrix of the interest social network G, P M I denotes the probability matrix of G based on interest propagation, and P M N denotes the social relation probability matrix.

4.3. Assess the Initial Influence

A node’s influence is determined by both its local influence and global influence. Local influence establishes the foundation of a node’s influence within its neighborhood, while global characteristics determine the node’s position within the network. PaC performs an initial assessment of a node’s influence based on its local and global influence. For any node u G , its energy Q u is calculated by multiplying the node’s density ρ u by its acceleration g u , as shown in Equation (8):
Q u = ρ u · g u
In Equation (8), ρ u is used to describe the influence within the node’s domain of node u. It is determined by two parts: the local activation expectation L A E u and the connectivity factor c f u of node u. The calculation of ρ u is as follows:
ρ u = L A E u × c f u
It has been proven that the influence of a node decreases exponentially with distance from the node [49]. Therefore, the size of the local activation expectation value of node u within one hop is an important factor in node influence, and its calculation formula is shown in Equation (10):
L A E u = M u · P M · 1
Among them, 1 is a column vector of length | V | with all elements being 1, P M is the propagation probability matrix, and the vector M u is the mapping of node u in P M , where M u = [ m 1 , m 2 , , m u , , m n ] = [ 0 , 0 , , m u , , 0 ] = [ 0 , 0 , , 1 , , 0 ] . However, considering only the local activation expectation value may overlook the connections between neighboring nodes. To more accurately estimate a node’s local influence, we propose the local connectivity factor. The connectivity factor c f u is a metric that measures the connectivity between node u and its neighboring nodes in G. It combines node degree and the number of triangles to comprehensively evaluate node importance from both direct influence and information flow capacity. c f u for node u is shown in Equation (11).
c f u = d u + α u d u
where, d u is the degree of node u, and α u is the number of triangles formed by node u.
The influence of a node depends not only on its own attributes but also on the influence of neighboring nodes. In fact, nodes with higher local activation expectations are more likely to have higher importance. However, the status of a node in a network is difficult to reflect by its local influence alone. Therefore, to more comprehensively measure the global influence of a node, we use the gravitational acceleration g u of node u to measure the global influence of node u, thereby reflecting the status of node u in the network. The calculation method is as follows:
g u = v V \ { u } , dist ( u , v ) r L A E v dist ( u , v ) 2
The gravitational acceleration g u of node u is obtained by calculating the weighted sum of the local activation expectation value L A E v of node v within the truncated radius r and the inverse of the square of the distance dist ( u , v ) between node u and node v. Specifically, the global influence contribution of node v to node u is directly proportional to its local activation expectation value and inversely proportional to the square of the distance between node v and node u. This calculation method comprehensively considers the local influence of nodes and their spatial distribution in the network, thereby more accurately reflecting the global influence of node u and its position in the network, and preliminarily evaluating the influence of nodes through Equation (8).

4.4. Seed Node Selection

After calculating the initial influence of all nodes, the next step is to select seed nodes based on these evaluation results. However, the selection of seed nodes is essentially a complex combinatorial optimization problem. If seed nodes are selected directly based on the initial influence evaluation results, the overlapping influence between nodes will lead to an optimistic estimate of the overall influence, thereby reducing the overall effectiveness of the algorithm. To address this issue, we designed a relative height Δ h during the seed node selection phase to reduce influence overlap and thereby improve the overall performance of the algorithm. The relative height Δ h u of node u is calculated as follows:
Δ h u = 1 b B , v V \ B , dist ( b , v ) r 1 e p · dist ( b , v )
Among them, p is a free parameter between ( 0 , 1 ) , and b is any node in the current optimal node list B. This formula calculates the Δ h to dynamically assess the interactions between nodes, thereby reducing the problem of influence overlapping. The overall procedure of the algorithm is shown in Algorithm 1:
Algorithm 1 Pascal Centrality.
  1:
Input:  G = ( V , E , I ) , the number of seeds k
  2:
Output: seed set S
  3:
Initialize:
  4:
S = , B = [ ]
  5:
Get the Propagation Matrix according to Equation (7)
  6:
for each node u V  do
  7:
      Calculate the preliminary influence assessment of node u by Equation (8)
  8:
end for
  9:
while  | B | < | V |  do
10:
      for each node u V  do
11:
            Calculate the Relative Height of node u by Equation (13)
12:
            Calculate the PaC of node u by Equation (6)
13:
            Select the node with the highest PaC value and add it to the list B
14:
      end for
15:
end while
16:
Select the top k nodes from list B and add them to set S
17:
return S

4.5. Complexity Analysis of the PaC Algorithm

Time Complexity Analysis: The computational cost of the PaC algorithm mainly focuses on three stages: constructing the propagation matrix, assessing the initial influence, and selecting seed nodes. Firstly, when constructing the propagation probability matrix P M , the algorithm leverages the sparse characteristics of interest-based social networks and employs a sparse storage structure for initialization, with a time complexity of O ( | E | ) . Second, during the initial influence assessment, the local activation expectation L A E is computed via sparse matrix-vector multiplication, with complexity O ( | E | ) ; the gravitational acceleration g u for each node requires traversing all nodes within the truncated radius r, with the total computation cost for all nodes denoted as C g . In the worst case, O ( | V | 2 ) , while it is typically much smaller when r is bounded and the network is locally sparse. Finally, during the seed selection stage, the relative height Δ h of all nodes is calculated only once during initialization. In subsequent iterations, Δ h is incrementally updated for all candidate nodes affected by each newly added seed, with each update costing Δ h . A max-heap structure is used to maintain PaC values for efficiently selecting the node with the highest score, with selection cost per iteration bounded by O ( log | V | ) . Consequently, selecting k seeds has a total complexity of O ( k · | V | ) . Considering all three stages, the overall time complexity of the PaC algorithm can be expressed as O ( | E | + C g + k · | V | ) . Under the worst-case scenario for C g and assuming k = | V | , this complexity simplifies to O ( | E | + | V | 2 ) . The dominant term is therefore O ( | V | 2 ) .
Space Complexity Analysis: The space consumption of the PaC algorithm primarily comes from storing the network structure, the propagation matrix, and node-related attributes. The input network is represented by an adjacency list, occupying O ( | E | + | V | ) space. The sparse propagation probability matrix P M requires O ( | E | ) space. During the computation process, intermediate variables such as local activation expectation L A E , density ρ , gravitational acceleration g, relative height Δ h , and PaC value need to be maintained for each node, all stored in list form, occupying O ( | V | ) space. Additional auxiliary structures, including the max-heap and the selected seed set, also require O ( | V | ) space. Therefore, without caching all r-hop neighborhoods and reusing temporary traversal structures, the total space complexity of the algorithm is O ( | E | + | V | ) which is dominated by the network topology and the sparse propagation matrix.

5. Performance Analysis

To systematically validate the research objectives of this paper, we propose the following core research hypotheses, which will be tested in subsequent experiments.
Hypothesis 1. 
The proposed SB-IC model is capable of modeling the information propagation process in interest-based social networks more accurately, thereby achieving a larger influence propagation range than the traditional IC model under the same seed set.
Hypothesis 2. 
The proposed PaC, by integrating both topological and interest attributes of nodes, can identify a set of seed nodes with greater influence compared to existing mainstream algorithms.
Hypothesis 3. 
The relative height Δ h mechanism in the PaC can effectively reduce influence overlap among seed nodes and optimize their distribution.
To evaluate the performance of the proposed PaC algorithm in ISNs, we conducted experiments on nine real-world social networks. Every experiment was conducted using the identical computer setup to guarantee the impartiality of the comparative analysis. The experiments were implemented and executed using the Python 3.9 programming language and the NetworkX library. The computer configuration used for the experiments was as follows: Intel Core i5 13400F 2.5 GHz processor (10 cores), Windows 11 operating system, and 32 GB of memory. This configuration provided sufficient computational power and memory support for the experiments, ensuring their accuracy and efficiency.

5.1. Datasets and Compared Algorithms

Guided by the aforementioned hypotheses, we conducted experiments on real-world networks, including dolphins [50], dublin [50], crime-moreno [50], hamsterster [50], citeseer [50], politician [50], US-Grid [50], pgp [50], indochina-2004 [50] and Sinanet [51]. These networks encompass a variety of relationships, such as data contact networks, social friendships, and Facebook follow relationships, providing diverse data for performance testing. Since there are currently no datasets that include interest vectors, we randomly generated a 10-dimensional vector for each node to simulate and validate the experiments. The datasets are detailed below, with some key parameters summarized in Table 1, where | V | and | E | represent the number of nodes and edges in the network, respectively; d ^ and d represent the maximum degree and average degree in the network, respectively; k represents the maximum k-core value of the network; and c represents the local clustering coefficient of the network:
  • dolphins: The social network of 62 bottlenose dolphins in New Zealand was constructed based on their frequent interaction patterns.
  • dublin: This network records the contact network of an influenza outbreak at a school in Dublin.
  • crime-moreno: This network is constructed based on the relationships between criminal cases and suspects, victims, witnesses, and other parties involved.
  • Hamsterster: This represents a social network dataset containing anonymized friendships and family relationships among users, sourced from real-world interactions.
  • Citeseer: This network is composed of citation relationships among 3312 publications across six categories.
  • Politician: This includes mutual-follow data between blue-badge-certified pages crawled from Facebook.
  • US-Grid: This is an undirected graph constructed using information about power grids in western US states.
  • pgp: This dataset records the interaction and relationship network among users of the Pretty Good Privacy algorithm.
  • indochina-2004: A large-scale web-crawling dataset covering webpage data from domain names in Indochina countries.
  • Sinanet: This network is constructed based on the follower/followee relationships between microblog users extracted from Sina Weibo, along with their interests characterized by topic distributions in 10 forums.
Table 1. The detailed information of datasets.
Table 1. The detailed information of datasets.
Network | V | | E | d ^ d kc
dolphins62159125.12940.259
dublin41027655013.488170.456
crime-moreno8291473253.55430.006
hamsterster242616,63027313.710240.538
citeseer32644536992.77970.145
politician590841,70632314.119310.385
US-Grid49416594192.66950.080
pgp10,68224,3172054.553310.266
indochina-200411,35847,6061998.383490.710
Sinanet349028,65779916.5313200.179
In our experiment, we compared the performance of nine algorithms—DC [16], K-Shell [17], GGC [23], LSS [27], LGC [26], NPIC [24] EPC [18], RCNN [30], and ToupleGDD [32]—with the proposed PaC method. The following is a brief introduction to these algorithms, outlining their basic concepts and methods.
  • DC (1994): DC evaluates the importance of a node based on its degree, i.e., the number of edges connected to the node. Nodes with higher degrees are deemed more influential in the network, as they can directly influence more other nodes.
  • K-Shell (2010): K-Shell assesses a node’s robustness and connectivity by iteratively removing nodes with degrees below a certain threshold. The higher a node’s K-Shell value, the more influential it is within the network.
  • LGC (2021): LGC identifies critical nodes in complex networks by integrating both local and global topological information, effectively overcoming the limitations of focusing solely on local structure or global information.
  • GGC (2021): GGC measures a node’s propagation capability by combining its local clustering coefficient and degree. This approach is more comprehensive than traditional gravity models and enables more accurate identification of influential nodes in complex networks.
  • LSS (2023): LSS is a novel heuristic algorithm that evaluates a node’s influence by combining degree centrality, K-Shell values, and node connectivity. It features low computational complexity and requires no parameter tuning.
  • NPIC (2024): NPIC assesses a node’s influence by integrating local attributes and global path information, providing a comprehensive method for evaluating node importance.
  • EPC (2024): EPC is a complex-network key-node identification method based on potential centrality. It comprehensively considers both local and global topological information and measures the influence of nodes based on their degree and distance.
  • RCNN (2020): RCNN is a complex network key node identification method based on graph convolutional networks. It converts the critical node identification problem into a regression problem, utilizes adjacency matrices and convolutional neural networks to learn and predict node influence.
  • ToupleGDD (2024): ToupleGDD is an influence maximization method based on deep reinforcement learning. It incorporates three coupled graph neural networks and double deep Q-networks, uses personalized DeepWalk for node embedding, and optimizes seed selection policies through reinforcement learning.

5.2. The Comparison of Influence Spreading

The influence spreading refers to the propagation range when influence propagation reaches a steady state under a given number of seed nodes, reflecting the extent of influence that a given seed set can ultimately cover. To compare the influence spreading of seed sets mined by the PaC algorithm in networks with different seed node scales, we designed experiments based on the scale of the dataset. Specifically, for smaller datasets (e.g., dolphins, dublin, and crime-moreno), we selected seed nodes ranging from 2 to 24 with a step size of 2; for larger datasets (e.g., hamsterster, citeseer, politician, US-Grid, pgp, and indochina-2004), we selected seed nodes ranging from 5 to 60 with a step size of 5 as initial activation nodes. In terms of the propagation model, we adopted the SB-IC model. To avoid rapid diffusion of influence in the network due to excessively high propagation probabilities, we adjusted the activation probabilities p N and p I of node u for node v based on differences in network topology. Specifically, p N and p I are calculated as d / d 2 and ( d / d 2 · Sim ( u , v ) ) , respectively, where d and d 2 represent the average degree and the mean square of the degree of the network, respectively, and Sim ( u , v ) denotes the interest similarity between nodes u and v. To ensure the reliability of the results, we performed 10,000 Monte Carlo simulations and calculated the average influence spreading as the final metric. The experimental results are illustrated in Figure 3.
Figure 3 illustrates the performance comparison of different algorithms in terms of influence spread under the SB-IC model, with the red curve representing the PaC algorithm. Across the nine datasets evaluated, the PaC algorithm demonstrates a notable average improvement of 7.04% in influence spreading compared to the other nine benchmark algorithms. The performance advantage of PaC is particularly significant in the indochina-2004 network, where it achieves a remarkable improvement of 22.25%. However, in the hamsterster network, the performance gain of PaC is relatively limited at just 0.9%, which may be attributed to the low network density of hamsterster affecting algorithm effectiveness. Despite this exception, PaC exhibits substantial performance enhancements in most scenarios. Concurrently, we observe that the performance of RCNN tends to degrade as network scale increases, a phenomenon particularly evident in the pgh and indochina-2004 networks. This decline can be attributed to the challenge faced by graph embedding-based methods in capturing complex network structures as network size grows, ultimately leading to compromised generalization performance. Additionally, as depicted in Figure 3, the advantage of the PaC in influence spreading becomes increasingly pronounced as the number of seed nodes increases. This trend can be attributed to the influence overlapping effect. When the number of seed nodes is small, the influence overlapping effect is not yet prominent, and thus the PaC algorithm’s advantages are not fully realized. However, as the number of seed nodes increases, influence overlapping becomes more pronounced. The PaC effectively mitigates this overlap by evaluating interactions between nodes, thereby demonstrating higher performance with a larger number of seed nodes.
In addition, to verify the applicability of the algorithm on the IC model, the SB-IC model was replaced with the IC propagation model, the propagation probability was set to p = d / d 2 , and 10,000 Monte Carlo simulations were conducted on the IC model. The average value was taken as the final influence spreading result. The experimental results of the influence spreading are shown in Figure 4.
Figure 4 presents the performance of different algorithms in terms of influence spreading under the IC model, with the red curve representing the PaC algorithm. Across nine datasets, the PaC algorithm consistently demonstrated superior influence spreading performance compared to other benchmark algorithms in most cases, achieving an average improvement of 5.22%. Notably, it attained a significant enhancement of up to 18.21% in the indochina-2004 network, while a modest average increase of 0.1% was observed in the hamsterster network. As the network scale expanded and structural complexity increased (e.g., in politician, pgh, and indochina-2004 datasets), the performance of the RCNN algorithm declined. This was primarily due to its difficulty in effectively fitting the intricate network structures to accurately model the influence spreading process. Meanwhile, the K-Shell algorithm exhibited specific trends in the hamsterster, pgp, and indochina-2004 datasets: before the number of seeds exceeds a threshold, the improvement in influence spreading is relatively slow; however, once the number of seeds reaches a tipping point, influence spreading improves rapidly before leveling off. This phenomenon can be attributed to the K-Shell algorithm’s seed node selection strategy. The algorithm tends to select key nodes with high K-Shell values as seed nodes. When the number of seeds is small, although key nodes have high individual influence, their influence ranges overlap significantly, leading to slow growth in influence spreading. Once the number of seeds reaches the threshold, the K-Shell algorithm shifts to selecting edge nodes, whose influence ranges overlap less with key nodes, significantly expanding the influence range and causing the expansion rate to rise rapidly. However, as the number of seed nodes continues to increase, the algorithm resumes selecting key nodes with influence ranges that overlap significantly with existing seed nodes, resulting in reduced expansion of new influence ranges and a subsequent flattening of expansion rate growth. In contrast, the PaC algorithm’s curve is the smoothest, indicating its superiority in avoiding influence overlapping compared to other algorithms. Additionally, as the number of seed nodes grows, the PaC algorithm’s advantage over other comparison algorithms becomes increasingly pronounced, further demonstrating its ability to effectively avoid influence overlapping and achieve more efficient influence spreading.

5.3. The Comparison of Influence Propagation Rate

The influence propagation rate compares how the influence spreading changes over time given a certain number of seed nodes, reflecting the efficiency of influence diffusion over time. To further compare the propagation capabilities of the proposed method with other methods, we selected the top 20 nodes from the node sets obtained by each algorithm as the initial activation nodes for the SB-IC model and observed the total number of activated nodes in the SB-IC model over 25 timesteps. The activation probabilities p N and p I of node u activating node v on different networks were set as d / d 2 and ( d / d 2 · Sim ( u , v ) ) , respectively. We conducted 10,000 Monte Carlo simulations and took the average value as the final result of influence propagation. The experimental results on nine real-world datasets are shown in Figure 5.
Figure 5 illustrates the temporal change in influence propagation when the first 20 nodes are selected as the initial activation nodes for the SB-IC model. The red curve represents the temporal change in influence using the PaC algorithm. Although the PaC algorithm’s influence may not be optimal during the initial stages of propagation, its performance consistently outperforms other algorithms as the propagation process stabilizes. In terms of propagation speed and steady-state influence coverage, the PaC algorithm demonstrates superior propagation efficiency compared to the other nine comparison algorithms across eight networks: dolphins, dublin, crime-moreno, citeseer, politician, US-Grid, pgp, and indochina-2004. Particularly in the dolphins, crime-moreno, citeseer, US-Grid, and indochina-2004 networks, the PaC algorithm’s performance is especially outstanding. However, in the hamsterster network, when the influence propagation in the network has not yet reached a steady state, the PaC algorithm’s performance is comparable to that of DC, GGC, LSS, LGC, NPIC, and EPC. This is primarily because the hamsterster network contains a large number of nodes with degree 1, while a small number of nodes occupy the core positions of the network, making it difficult to establish a significant lead during the initial stages of propagation. However, as the propagation process progresses, by the 7th time step, the propagation ranges of other algorithms gradually stabilize, while the PaC algorithm’s propagation range continues to grow, ultimately achieving a steady-state influence coverage range that remains superior to that of other comparison algorithms. Research indicates that the PaC algorithm possesses a significant advantage in terms of absolute influence coverage.

5.4. The Comparison of Coverage Redundancy

According to the literature [52], the more dispersed the distribution of seed nodes, the smaller the overlapping areas of their propagation influence become, thereby making the propagation effects triggered by the seed nodes more pronounced. To quantify the dispersion of seed nodes, we used the average distance between seed nodes as a metric. A larger average distance indicates that the seed nodes are more dispersed, resulting in smaller overlapping influence areas. Specifically, we calculated the average of the shortest paths between seed nodes to represent this distance. If there was no path between nodes u and v, the shortest path between nodes u and v was defined as r + 1 , where r was the network diameter. Table 2 shows the average distance corresponding to different numbers of seed nodes in nine real networks.
As indicated by the results in Table 2, the PaC algorithm we proposed outperforms the other nine algorithms in both the dolphins and crime-moreno networks. In the seven networks of dublin, hamsterster, citeseer, politician, pgp, and indochina-2004, the PaC algorithm also demonstrates superior performance compared to other algorithms in the majority of cases. Through the analysis of Table 2, we also found that as the number of seed nodes selected in the network increases, the advantage of the PaC algorithm in terms of average distance becomes increasingly evident, showing a more pronounced superiority over other algorithms. However, in the US-Grid network, the PaC algorithm’s optimal average distance is second only to the DC algorithm.
As shown in Table 3, the US-Grid is characterized by an extremely low density (0.0005), together with a low average number of triangles (0.3953) and a low average clustering coefficient (0.08010). These metrics collectively reveal a topology that can be described as a “tree-star” hybrid structure. The sparse connectivity inherent in such a topology reduces redundant paths, thereby simplifying path-selection decisions. Furthermore, this structure naturally designates a small set of high-degree nodes as key nodes. Consequently, the DC algorithm can leverage these hub nodes effectively, which explains its improved average-path-length performance in this network. However, across most datasets, the PaC algorithm demonstrates a significant advantage over the nine comparison algorithms in terms of avoiding influence overlapping.

5.5. Ablation Experiment

To verify the effectiveness of the PaC algorithm in reducing the problem of influence overlapping by measuring the interaction relationships between seed nodes, we conducted experiments comparing the average distance between seed nodes using the PaC algorithm and the PaC-h algorithm. The PaC-h algorithm removed the relative height Δ h component from the PaC algorithm and directly selectd the k nodes with the highest influence values as seed nodes after completing the initial influence assessment. The experimental results are shown in Figure 6.
Figure 6 clearly illustrates the comparison between the PaC and the PaC-h in terms of average distance. In the figure, the yellow bar and the green bar represent the average distance between nodes under different numbers of seed nodes for the PaC and the PaC-h, respectively. The experimental results demonstrate that under all tested conditions, the average distance achieved by the PaC is consistently better than that of the PaC-h algorithm. Unlike the PaC-h, which only performs an initial influence assessment, the PaC further considers the interactions between seed nodes. By incorporating a well-designed Δ h , the PaC effectively mitigates the issue of influence overlapping, resulting in a more dispersed distribution of the selected seed nodes. This strategic design enables the PaC to better balance node influence and distribution uniformity when selecting seed nodes, thereby significantly enhancing the overall influence spreading effect.
Furthermore, we conducted a detailed comparison of the substantial impact of different values of the free parameter p on the influence spreading of the PaC algorithm to evaluate its sensitivity to this parameter. We selected 10, 20, and 30 nodes as the initially activated nodes in the SB-IC model, and assigned the free parameter p = d / d 2 , p = 0.1 , p = 0.5 , and also examined the case where the free parameter p was removed. The total number of activated nodes in the SB-IC model was observed after the information propagation reached a steady state. Monte Carlo simulations were performed 10,000 times, and the average value was taken as the final result of influence propagation.
As evidenced by the results in Table 4, when the free parameter p = d / d 2 , the algorithm demonstrates superior performance across all nine datasets, significantly outperforming the control groups (where p = 0.1 , p = 0.5 , or the parameter p is entirely removed). Concurrently, the most pronounced performance degradation is observed upon the removal of the free parameter p, with an average decline of 18.79%. This declining trend is most prominent in the US-Grid dataset, where the average performance drop reaches 47.91%. Specifically, for the US-Grid dataset with 20 initially selected seed nodes, the PaC algorithm achieves a 59.45% improvement over the PaC-p variant. This remarkable discrepancy arises because, in the absence of the parameter p, the metric Δ h u fails to effectively capture the interactions between nodes. Consequently, the algorithm exhibits a bias towards selecting nodes with high initial influence. Due to the presence of influence overlap effects, this bias can trap the algorithm in local optima during seed selection, preventing it from identifying the global optimal solution.

5.6. The Comparison of Influence Spreading on ISNs

To validate the performance of algorithms and diffusion models in real ISNs, we conducted a comparative evaluation on the Sinanet dataset, measuring the influence spreading of the PaC method against nine other baseline algorithms under both the SB-IC and IC models. The Sinanet dataset is constructed as a microblog user relationship network extracted from the sina-microblog website. It characterizes user interests by leveraging topic distributions derived from user activities across 10 forums, with these distributions obtained through the LDA topic model. The comparative results are illustrated in Figure 7.
In the Sinanet, the PaC achieved performance improvements of 2.25% and 0.1% in terms of influence spreading under the SB-IC and IC models, respectively. This effectively demonstrates the applicability and effectiveness of our algorithm and model in ISNs. However, it should be noted that the Sinanet was constructed by extracting user relationships limited to within three layers, which restricted the depth of the network. This structural constraint may have limited the full performance potential of PaC from being realized. Furthermore, compared to other algorithms, both K-shell and RCNN showed limitations in sufficiently identifying key nodes within the network. The K-shell method demonstrates a fundamental limitation in its reliance on core decomposition, which fails to discriminate nodes with identical core values—a critical shortcoming in networks containing structurally equivalent nodes. This simplification undermines its discriminative capacity, leading to suboptimal node rankings. RCNN exhibits notable limitations in generalizability when deployed across heterogeneous network topologies. The method’s strong dependency on localized structural features—while effective for homogeneous networks—impedes its adaptability to networks with divergent topological characteristics, such as scale-free or hierarchical structures. This constraint arises from the model’s insufficient capacity to encapsulate global influence propagation patterns, particularly in dynamic or large-scale networks where topological complexity escalates.

5.7. Statistical Comparison of PaC and DC Performance

To evaluate the performance of the PaC, we compared it with the DC on the SB-IC model using 10,000 Monte Carlo simulations for each method. Given the large sample size—which satisfies the Central Limit Theorem—and the confirmation of homogeneity of variances via Levene’s test ( F = 0.074 , p = 0.785 ), an independent-samples t-test was conducted to examine the difference in mean performance between the two algorithms. The results are presented in Table 5.
The independent-samples t-test revealed that PaC significantly outperformed DC, with t ( 19 , 998 ) = 4.14 , p < 0.001 . Specifically, the mean score of PaC ( M = 100.95 , S D = 10.91 ) was 0.64 points higher than that of DC ( M = 100.31 , S D = 10.94 ). The 95% confidence interval for this mean difference was [0.34, 0.94], which does not include zero. These results indicate that PaC exhibits a statistically significant and stable performance advantage over DC on the SB-IC model.
The SB-IC model and the PaC algorithm designed in this study can provide support for optimizing recommendation systems in e-commerce platforms. For instance, they enable dynamic adjustment of display strategies for related products, reducing influence overlap in word-of-mouth propagation. Simultaneously, by integrating findings from eWOM credibility researches [53,54], platforms can further incorporate user emotional response data, thereby refining marketing strategies and enhancing service efficiency.

6. Conclusions

This paper investigates the influence maximization problem in Interest-Based Social Networks (ISNs). Considering the impact of user interest preferences and server recommendation mechanisms on information diffusion, we first defined a “Social–Interest Hybrid Influence Maximization” (SIHIM) problem that integrates users’ social relationships and interest preferences. We then constructed a Server-Based Independent Cascading (SB-IC) model to simulate the influence propagation process. Evaluations based on influence spread and experiments on real-world datasets demonstrate that the proposed SB-IC model can more effectively model influence propagation in interest-based social networks compared to the conventional IC model. Furthermore, we propose the Pascal Centrality (PaC) method, which incorporates multi-attribute node features to identify key influential nodes in the network. Extensive experiments on nine real-world datasets showed that the proposed PaC method significantly outperforms baseline approaches, achieving average influence spread improvements of 7.04% under the SB-IC model and 5.22% under the IC model, surpassing nine other baseline methods. Additionally, ablation studies were conducted, fully verifying the role of relative height Δ h alleviating influence overlap. In summary, this research provides a comprehensive solution for the influence maximization problem in interest-based social networks, and its superiority was thoroughly validated through extensive experiments.
The managerial implications of this study lie in providing a novel perspective for enterprises to conduct targeted marketing and public opinion management on interest-based social platforms. By synergistically considering social influence and interest matching, businesses can more precisely identify high-value influencers, optimize the allocation of marketing budgets, and achieve a dual dissemination effect combining word-of-mouth recommendations and platform-driven propagation. However, the current approach still has certain limitations, primarily including insufficient adaptability to the dynamic nature of user interests, an oversimplified simulation of complex platform recommendation algorithms, and a reliance on static network assumptions that cannot fully capture fully capture the dynamic evolution of network structures.
In future research, we plan to introduce social simulation techniques to construct dynamic models that better reflect real-world social networks, thereby further validating the applicability and effectiveness of the proposed method in complex network environments. Additionally, we will explore the method based on deep learning and data mining techniques to predict changes in user interests, thereby optimizing the selection strategy for seed nodes.

Author Contributions

Formal analysis, J.L. and W.L.; Resources, J.L. and W.L.; Writing—review & editing, J.L., W.L., W.J., J.Y. and L.C.; Conceptualization, J.L., W.L. and W.J.; Methodology, J.L., W.L. and W.J.; Investigation, J.L., W.J. and J.Y.; Software, J.L., W.L., W.J. and J.Y.; Validation, J.L., W.L. and W.J.; Data curation, J.L., W.J. and J.Y.; Writing—original draft, J.L., W.J., J.Y. and L.C.; Project administration, J.L., W.J., J.Y. and L.C.; Supervision, W.L., W.J., J.Y. and L.C.; Visualization, J.L. and W.L.; Funding acquisition, J.L. and W.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Academic Degree and Postgraduate Education Reform Project of Jiangsu Province (No. SJCX24_2220) and the National Natural Science Foundation of China (Nos. 61971233 and 61702441).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

All datasets used in this paper can be downloaded at Network Repository (https://networkrepository.com, accessed on 26 August 2025).

Acknowledgments

We gratefully acknowledge the Network Repository (https://networkrepository.com) for providing the datasets used in this study.

Conflicts of Interest

The authors declare no conflict of interest. Funders did not interfere in the research process.

Abbreviations

The following abbreviations are used in this manuscript:
IMInfluence Maximization
ICIndependent Cascade
LTLinear Threshold
TIMTopic-aware Influence Maximization
ISNInterest-Based Social Network
SIHIMSocial–Interest Hybrid Influence Maximization Problem
SB-ICServer-Based Independent Cascad
PaCPascal Centrality
DCDegree Centrality
HIMHolistic Influence Maximization
OIOpinion-cum-Interaction
TFIPTwo-Factor Information Propagation
PIEDPotential Interest Expansion Degree

References

  1. Yanchenko, E.; Murata, T.; Holme, P. Influence maximization on temporal networks: A review. Appl. Netw. Sci. 2024, 9, 16. [Google Scholar] [CrossRef]
  2. Guo, C.; Li, W.; Liu, F.; Zhong, K.; Wu, X.; Zhao, Y.; Jin, Q. Influence maximization algorithm based on group trust and local topology structure. Neurocomputing 2024, 564, 126936. [Google Scholar] [CrossRef]
  3. Jaouadi, M.; Romdhane, L.B. A survey on influence maximization models. Expert Syst. Appl. 2024, 248, 123429. [Google Scholar] [CrossRef]
  4. Richardson, M.; Domingos, P. Mining knowledge-sharing sites for viral marketing. In Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Edmonton, AB, Canada, 23–26 July 2002; pp. 61–70. [Google Scholar] [CrossRef]
  5. Kempe, D.; Kleinberg, J.; Tardos, É. Maximizing the spread of influence through a social network. In Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, 24–27 August 2003; pp. 137–146. [Google Scholar] [CrossRef]
  6. Granovetter, M. Threshold models of collective behavior. Am. J. Sociol. 1978, 83, 1420–1443. [Google Scholar] [CrossRef]
  7. Vargas-De-León, C. On the global stability of SIS, SIR and SIRS epidemic models with standard incidence. Chaos Solitons Fractals 2011, 44, 1106–1110. [Google Scholar] [CrossRef]
  8. Leskovec, J.; Krause, A.; Guestrin, C.; Faloutsos, C.; VanBriesen, J.; Glance, N. Cost-effective outbreak detection in networks. In Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Jose, CA, USA, 12–15 August 2007; pp. 420–429. [Google Scholar] [CrossRef]
  9. Goyal, A.; Lu, W.; Lakshmanan, L.V. Celf++ optimizing the greedy algorithm for influence maximization in social networks. In Proceedings of the 20th International Conference Companion on World Wide Web, Hyderabad, India, 28 March–1 April 2011; pp. 47–48. [Google Scholar] [CrossRef]
  10. Chen, W.; Wang, Y.; Yang, S. Efficient influence maximization in social networks. In Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, 28 June–1 July 2009; pp. 199–208. [Google Scholar] [CrossRef]
  11. Cheng, S.; Shen, H.; Huang, J.; Zhang, G.; Cheng, X. Staticgreedy: Solving the scalability-accuracy dilemma in influence maximization. In Proceedings of the 22nd ACM International Conference on Information & Knowledge Management, San Francisco, CA, USA, 27 October–1 November 2013; pp. 509–518. [Google Scholar] [CrossRef]
  12. Zhou, C.; Zhang, P.; Zang, W.; Guo, L. On the upper bounds of spread for greedy algorithms in social network influence maximization. IEEE Trans. Knowl. Data Eng. 2015, 27, 2770–2783. [Google Scholar] [CrossRef]
  13. Biswas, T.K.; Abbasi, A.; Chakrabortty, R.K. A two-stage VIKOR assisted multi-operator differential evolution approach for Influence Maximization in social networks. Expert Syst. Appl. 2022, 192, 116342. [Google Scholar] [CrossRef]
  14. Yang, J.; Wang, Z.; Rui, X.; Chai, Y.; Yu, P.S.; Sun, L. Triadic closure sensitive influence maximization. ACM Trans. Knowl. Discov. Data 2023, 17, 1–26. [Google Scholar] [CrossRef]
  15. Li, B.; Zhu, L. Turing instability analysis of a reaction–diffusion system for rumor propagation in continuous space and complex networks. Inf. Process. Manag. 2024, 61, 103621. [Google Scholar] [CrossRef]
  16. Freeman, L.C.; Roeder, D.; Mulholland, R.R. Centrality in social networks: II. Experimental results. Soc. Netw. 1979, 2, 119–141. [Google Scholar] [CrossRef]
  17. Garas, A.; Schweitzer, F.; Havlin, S. A k-shell decomposition method for weighted networks. New J. Phys. 2012, 14, 083030. [Google Scholar] [CrossRef]
  18. Ullah, A.; Din, S.U.; Khan, N.; Mawuli, C.B.; Shao, J. Towards investigating influencers in complex social networks using electric potential concept from a centrality perspective. Inf. Fusion 2024, 109, 102439. [Google Scholar] [CrossRef]
  19. Freeman, L.C. A set of measures of centrality based on betweenness. Sociometry 1977, 40, 35–41. [Google Scholar] [CrossRef]
  20. Freeman, L.C. Centrality in social networks conceptual clarification. Soc. Netw. 1978, 1, 215–239. [Google Scholar] [CrossRef]
  21. Lei, M.; Cheong, K.H. Node influence ranking in complex networks: A local structure entropy approach. Chaos Solitons Fractals 2022, 160, 112136. [Google Scholar] [CrossRef]
  22. Agneessens, F.; Borgatti, S.P.; Everett, M.G. Geodesic based centrality: Unifying the local and the global. Soc. Netw. 2017, 49, 12–26. [Google Scholar] [CrossRef]
  23. Li, H.; Shang, Q.; Deng, Y. A generalized gravity model for influential spreaders identification in complex networks. Chaos Solitons Fractals 2021, 143, 110456. [Google Scholar] [CrossRef]
  24. Ullah, A.; Sheng, J.; Wang, B.; Din, S.U.; Khan, N. Leveraging neighborhood and path information for influential spreaders recognition in complex networks. J. Intell. Inf. Syst. 2024, 62, 377–401. [Google Scholar] [CrossRef]
  25. Ibnoulouafi, A.; El Haziti, M.; Cherifi, H. M-centrality: Identifying key nodes based on global position and local degree variation. J. Stat. Mech. Theory Exp. 2018, 2018, 073407. [Google Scholar] [CrossRef]
  26. Ullah, A.; Wang, B.; Sheng, J.; Long, J.; Khan, N.; Sun, Z. Identifying vital nodes from local and global perspectives in complex networks. Expert Syst. Appl. 2021, 186, 115778. [Google Scholar] [CrossRef]
  27. Ullah, A.; Shao, J.; Yang, Q.; Khan, N.; Bernard, C.M.; Kumar, R. LSS: A locality-based structure system to evaluate the spreader’s importance in social complex networks. Expert Syst. Appl. 2023, 228, 120326. [Google Scholar] [CrossRef]
  28. Hu, Q.; Jiang, J.; Xu, H.; Kassim, M. IMNE: Maximizing influence through deep learning-based node embedding in social network. Swarm Evol. Comput. 2024, 88, 101609. [Google Scholar] [CrossRef]
  29. Yu, E.Y.; Wang, Y.P.; Fu, Y.; Chen, D.B.; Xie, M. Identifying critical nodes in complex networks via graph convolutional networks. Knowl.-Based Syst. 2020, 198, 105893. [Google Scholar] [CrossRef]
  30. Ling, C.; Jiang, J.; Wang, J.; Thai, M.T.; Xue, R.; Song, J.; Qiu, M.; Zhao, L. Deep graph representation learning and optimization for influence maximization. In Proceedings of the International Conference on Machine Learning, PMLR, Honolulu, HI, USA, 23–29 July 2023; pp. 21350–21361. Available online: https://proceedings.mlr.press/v202/ling23b.html (accessed on 1 November 2025).
  31. Zhong, Y.; Wang, S.; Liang, H.; Wang, Z.; Zhang, X.; Chen, X.; Su, C. ReCovNet: Reinforcement learning with covering information for solving maximal coverage billboards location problem. Int. J. Appl. Earth Obs. Geoinf. 2024, 128, 103710. [Google Scholar] [CrossRef]
  32. Chen, T.; Yan, S.; Guo, J.; Wu, W. ToupleGDD: A fine-designed solution of influence maximization by deep reinforcement learning. IEEE Trans. Comput. Soc. Syst. 2023, 11, 2210–2221. [Google Scholar] [CrossRef]
  33. Li, Z.; Du, H.; Li, X. Topic-aware information coverage maximization in social networks. IEEE Trans. Comput. Soc. Syst. 2023, 11, 1722–1732. [Google Scholar] [CrossRef]
  34. Aslay, C.; Barbieri, N.; Bonchi, F.; Baeza-Yates, R. Online Topic-aware Influence Maximization Queries. In Proceedings of the 17th International Conference on Extending Database Technology, EDBT, Athens, Greece, 24–28 March 2014; pp. 295–306. [Google Scholar] [CrossRef]
  35. Chen, S.; Fan, J.; Li, G.; Feng, J.; Tan, K.l.; Tang, J. Online topic-aware influence maximization. Proc. VLDB Endow. 2015, 8, 666–677. [Google Scholar] [CrossRef]
  36. Bingöl, K.; Eravcı, B.; Etemoğlu, Ç.Ö.; Ferhatosmanoğlu, H.; Gedik, B. Topic-based influence computation in social networks under resource constraints. IEEE Trans. Serv. Comput. 2016, 12, 970–986. [Google Scholar] [CrossRef]
  37. Qin, X.; Zhong, C.; Yang, Q. An influence maximization algorithm based on community-topic features for dynamic social networks. IEEE Trans. Netw. Sci. Eng. 2021, 9, 608–621. [Google Scholar] [CrossRef]
  38. Galhotra, S.; Arora, A.; Roy, S. Holistic influence maximization: Combining scalability and efficiency with opinion-aware models. In Proceedings of the 2016 International Conference on Management of Data, San Francisco, CA, USA, 26 June–1 July 2016; pp. 743–758. [Google Scholar] [CrossRef]
  39. Cai, T.; Li, J.; Mian, A.; Li, R.H.; Sellis, T.; Yu, J.X. Target-aware holistic influence maximization in spatial social networks. IEEE Trans. Knowl. Data Eng. 2020, 34, 1993–2007. [Google Scholar] [CrossRef]
  40. Li, W.; Li, Y.; Liu, W.; Wang, C. An influence maximization method based on crowd emotion under an emotion-based attribute social network. Inf. Process. Manag. 2022, 59, 102818. [Google Scholar] [CrossRef]
  41. Huang, J.; Lan, B.; Nong, J.; Pang, G.; Hao, F. SentiRank: A Novel Approach to Sentiment Leader Identification in Social Networks Based on the D-TFRank Model. Electronics 2025, 14, 2751. [Google Scholar] [CrossRef]
  42. Zareie, A.; Sheikhahmadi, A.; Jalili, M. Identification of influential users in social networks based on users’ interest. Inf. Sci. 2019, 493, 217–231. [Google Scholar] [CrossRef]
  43. Tang, Q.; Guo, P.; Guo, J. GraphHash: Topic-Aware Influence Maximization Using Hash. In Proceedings of the 2024 IEEE International Conference on Big Data (BigData), Washington, DC, USA, 15–18 December 2024; pp. 7183–7192. [Google Scholar] [CrossRef]
  44. Halal, T.; Cautis, B.; Groz, B.; Gao, R. Topic-aware influence maximization with deep reinforcement learning and graph attention networks. Data Min. Knowl. Discov. 2025, 39, 71. [Google Scholar] [CrossRef]
  45. Ahmadikia, M.H.; Roayaei, M. Dynamic Adaptive Parametric Social Network Analysis Using Reinforcement Learning: A Case Study in Topic-Aware Influence Maximization. IEEE Access 2025, 13, 129372–129384. [Google Scholar] [CrossRef]
  46. Sang, C.Y.; Chen, J.J.; Liao, S.G. DyHGTCR-Cas: Learning unified spatio-temporal features based on dynamic heterogeneous graph neural network for information cascade prediction. Inf. Process. Manag. 2025, 62, 104029. [Google Scholar] [CrossRef]
  47. Chakraborty, A.; Mukherjee, N. Topic and opinion infused hypergraphs for influence maximization. Phys. Lett. A 2025, 545, 130507. [Google Scholar] [CrossRef]
  48. Vombatkere, K.; Mousavi, S.; Zannettou, S.; Roesner, F.; Gummadi, K.P. Tiktok and the art of personalization: Investigating exploration and exploitation on social media feeds. In Proceedings of the ACM Web Conference 2024, Singapore, 13–17 May 2024; pp. 3789–3797. [Google Scholar] [CrossRef]
  49. Katz, L. A new status index derived from sociometric analysis. Psychometrika 1953, 18, 39–43. [Google Scholar] [CrossRef]
  50. Jiang, L.; Zhao, X.; Ge, B.; Xiao, W.; Ruan, Y. An efficient algorithm for mining a set of influential spreaders in complex networks. Phys. A Stat. Mech. Its Appl. 2019, 516, 58–65. [Google Scholar] [CrossRef]
  51. Jia, C.; Li, Y.; Carson, M.B.; Wang, X.; Yu, J. Node attribute-enhanced community detection in complex networks. Sci. Rep. 2017, 7, 2626. [Google Scholar] [CrossRef]
  52. Rossi, R.; Ahmed, N. The network data repository with interactive graph analytics and visualization. Proc. AAAI Conf. Artif. Intell. 2015, 29, 4292–4293. [Google Scholar] [CrossRef]
  53. Pan, X.; Hou, L.; Liu, K. The effect of product distance on the eWOM in recommendation network. Electron. Commer. Res. 2022, 22, 901–924. [Google Scholar] [CrossRef]
  54. Bogdan, A.; Dospinescu, N.; Dospinescu, O. Beyond credibility: Understanding the mediators between electronic word-of-mouth and purchase intention. arXiv 2025, arXiv:2504.05359. [Google Scholar] [CrossRef]
Figure 1. The propagation process of the SB-IC model. (a) At the initial stage of the propagation process, only the seed node v 1 is in an activated state, while all other nodes are in a non-activated state; (b) In the subsequent time step, the newly activated node v 1 attempts to activate its inactive neighboring nodes { v 2 , v 3 , v 4 } with probability p N , and concurrently, the Servers detect the state change of v 1 and attempt to activate its interest neighboring node v 8 with probability p I .
Figure 1. The propagation process of the SB-IC model. (a) At the initial stage of the propagation process, only the seed node v 1 is in an activated state, while all other nodes are in a non-activated state; (b) In the subsequent time step, the newly activated node v 1 attempts to activate its inactive neighboring nodes { v 2 , v 3 , v 4 } with probability p N , and concurrently, the Servers detect the state change of v 1 and attempt to activate its interest neighboring node v 8 with probability p I .
Information 17 00003 g001
Figure 3. Influence Spreading of k Seed Nodes on Nine Real-World Networks for Different Algorithms under the SB-IC Model.
Figure 3. Influence Spreading of k Seed Nodes on Nine Real-World Networks for Different Algorithms under the SB-IC Model.
Information 17 00003 g003
Figure 4. Influence spreading of k seed nodes on nine real-world networks for different algorithms under the IC model.
Figure 4. Influence spreading of k seed nodes on nine real-world networks for different algorithms under the IC model.
Information 17 00003 g004
Figure 5. The propagation influence at time t on nine real-world networks for different algorithms.
Figure 5. The propagation influence at time t on nine real-world networks for different algorithms.
Information 17 00003 g005
Figure 6. The mean distance between each pair of seeds for PaC and PaC-h Algorithms.
Figure 6. The mean distance between each pair of seeds for PaC and PaC-h Algorithms.
Information 17 00003 g006
Figure 7. Influence spreading of k seed nodes on Sinanet network for different algorithms under the SB-IC and IC model.
Figure 7. Influence spreading of k seed nodes on Sinanet network for different algorithms under the SB-IC and IC model.
Information 17 00003 g007
Table 2. Influence spreading comparison across datasets and algorithms.
Table 2. Influence spreading comparison across datasets and algorithms.
DatasetkAlgorithms
PaCDCKShellGGCLSSLGCNPICEPC
dolphins25.5005.0005.0005.0005.0005.0005.0005.000
44.5003.3753.3753.3753.8753.2503.2503.250
63.9443.3892.7222.7783.2222.8892.8892.889
83.5633.3132.9062.7192.7502.5942.5942.594
103.3403.0602.8602.4802.602.902.6402.820
123.1813.1252.7082.4032.5562.9582.4442.958
143.2653.0312.7452.5512.5002.7452.7452.745
163.3522.9062.7032.4842.5082.6332.6332.633
183.5562.9752.8462.6302.4632.7592.7592.759
203.6252.9052.8902.6052.3752.7452.7452.745
223.8682.8722.8512.5742.3222.6942.6862.686
243.9312.8162.7922.6112.4172.6562.6562.656
dublin25.5006.0005.5006.0006.0006.0005.5006.000
43.8753.8753.5003.5003.6253.8753.6253.875
63.1113.1112.7783.0003.1673.1672.9443.111
83.0942.8752.3752.7192.7502.8752.5632.875
102.9202.7602.1002.6802.5002.6402.3602.620
123.0562.6811.9722.5422.4442.6392.1942.528
143.0102.6631.9182.4902.3372.5612.0512.561
162.9142.5311.8202.4302.3202.4692.0392.492
182.9752.5621.7102.3772.2902.4441.9632.444
203.0502.5001.6452.3502.3002.4651.9052.400
223.1402.4751.6492.3602.2642.4261.8552.426
243.2292.5241.5972.5002.3022.4171.9132.385
crime-moreno27.0007.0006.0007.0007.0007.0007.0007.000
44.7504.7503.8754.7504.7504.7504.7504.750
64.3894.0563.4444.0564.0564.0564.0564.056
84.0633.9383.1563.7813.7813.9693.7813.969
103.9603.7002.9603.6203.5803.7003.7003.700
123.9173.6672.8193.5563.5563.6673.6673.667
143.9293.5922.7143.5203.4903.5103.5103.510
163.8913.6022.6333.4693.4533.5083.5083.508
183.8833.5682.5683.3953.3833.5003.4573.457
203.9103.5352.5053.3803.3153.4803.4453.445
223.9423.5212.6033.3393.3353.4463.4463.446
243.9833.5452.7123.3373.3583.4653.4413.441
hamsterster53.1603.4003.0003.2403.0803.2403.2403.240
102.5002.4002.0002.3002.4202.4002.3002.400
152.3332.1291.6672.0842.1472.1292.1292.129
202.3502.0101.5001.9402.0351.9701.9751.970
252.3021.9441.4001.9021.9381.9441.8861.922
302.3161.9221.8361.8731.9331.9071.8671.907
352.5641.9042.0551.8471.9091.8931.8281.883
402.6361.8932.1951.8391.8841.8931.8011.873
452.7941.8922.2461.8461.8531.8781.7791.844
502.8181.8682.2181.8371.8621.8501.7921.839
552.8311.8362.2051.8301.8531.8371.7741.825
602.9361.8162.1861.8221.8471.8161.7701.813
citeseer57.5608.8406.8408.5207.0808.7607.0008.520
106.9805.7204.1405.3204.4005.7204.4605.360
156.7965.4713.2224.3423.5784.9734.2444.644
206.7355.3802.9604.0553.1704.3553.6754.360
256.6675.1952.8823.7462.9874.0183.3873.995
306.5785.7042.7763.7472.8823.9693.2823.818
356.5825.3462.7703.6482.7884.3503.1373.761
407.0465.2553.6453.5532.7014.6303.2843.878
457.1575.1404.1843.6512.6804.5123.3984.108
507.2714.9784.0403.8382.7054.3843.4234.262
557.5304.9643.8983.7402.7014.4203.3464.281
607.6614.9283.7793.8822.8574.3913.3074.171
politician53.8004.4403.8804.2003.8004.3603.8004.360
103.2002.8602.5602.8202.5602.8202.7202.820
153.2222.8582.0402.4042.2362.5022.4492.502
203.0402.7801.8402.2902.0402.4802.2552.480
252.9782.6611.7232.2701.9602.3472.1072.315
303.0472.5471.6962.2691.9472.4421.9842.347
353.0832.5201.6122.2821.9812.4872.0172.370
403.1562.5291.6032.2432.0892.4212.0542.390
453.2092.4921.5842.2862.1262.4152.0752.360
503.2402.5061.5582.2952.1522.3982.1012.382
553.3042.5281.5492.2792.1492.4672.0592.428
603.3192.5651.5402.3072.2172.4972.1372.497
US-Grid521.64026.04010.52017.40010.68015.24017.56015.240
1016.16019.0806.04012.8209.68012.68016.62011.300
1516.08415.9787.09810.88410.71611.60416.16411.604
2016.25015.5257.08010.88013.33012.10015.33011.625
2516.18117.4706.67012.67013.70712.01414.74711.611
3016.19617.3116.11812.23112.71312.30914.54412.180
3516.01916.4325.76711.82812.81711.54014.82211.356
4016.23915.7486.36512.22613.89911.33314.64411.726
4515.96015.5119.61112.61614.70512.00314.37111.597
5015.77916.33812.36512.83514.87811.86514.66611.865
5515.96116.75314.54812.75214.84512.12914.65811.760
6015.97416.62715.97213.08115.17212.08214.67911.711
pgp56.1206.3605.806.3605.9605.9605.9605.960
104.2804.6803.4603.9603.6403.9403.7803.940
153.8274.0402.6273.5163.0003.3642.9913.364
203.8803.5552.2303.2052.6453.1702.6303.100
253.9793.3172.0022.9782.4662.9902.3892.949
304.0473.2911.8492.9402.5223.0442.3512.787
354.0243.2421.7492.9092.4192.9562.3652.783
404.1513.1161.6852.8152.4642.9602.3092.736
454.3183.0341.7262.7842.4212.9342.2112.714
504.2822.9841.9362.8532.3972.9312.1212.793
554.3192.9251.9922.8932.3772.8962.1322.751
604.4492.8852.0342.8712.3832.8292.1412.767
indochina-200458.0807.9206.4008.2408.7207.2006.4007.200
106.1605.9403.7005.6405.5204.6603.7004.660
155.7245.2002.8005.1734.2933.8133.2093.813
205.6205.2602.3504.8154.3153.4252.8603.210
255.3635.2062.0804.6113.7793.4562.4993.456
305.2564.8961.9004.4203.4003.5072.2933.293
355.1444.5961.7714.3773.2293.4452.4603.198
405.0954.2941.6754.3163.3443.6092.3653.336
455.1464.0901.6004.1183.3234.0412.6553.670
505.1514.0761.5404.0393.3183.9112.6603.911
555.1203.9152.4464.0053.3263.7862.7843.759
605.2683.9193.0833.9373.3123.7083.2983.696
Table 3. Network Data Statistics of US-Grid.
Table 3. Network Data Statistics of US-Grid.
Density0.0005
Maximum degree19
Average number of triangles0.3953
Average clustering coefficient0.08010
Table 4. Comparison of the influence spreading of free parameter p in the PaC algorithm.
Table 4. Comparison of the influence spreading of free parameter p in the PaC algorithm.
(a) dolphins(b) dublin(c) crime-moreno
PaCPaC,
p = 0.1
PaC,
p = 0.5
PaC-pPaCPaC,
p = 0.1
PaC,
p = 0.5
PaC-pPaCPaC,
p = 0.1
PaC,
p = 0.5
PaC-p
1029.7928.3529.5127.66124.49118.06122.07113.8075.3872.1274.0071.12
2039.7636.7338.4835.61146.21141.58143.25128.28109.61105.71108.78104.11
3047.8742.5247.1841.16162.57154.81160.66140.68138.69133.81136.09125.75
(d) hamsterster(e) citeseer(f) politician
PaCPaC,
p = 0.1
PaC,
p = 0.5
PaC-pPaCPaC,
p = 0.1
PaC,
p = 0.5
PaC-pPaCPaC,
p = 0.1
PaC,
p = 0.5
PaC-p
10168.09166.19164.04163.54168.12134.66152.84128.58330.06298.21331.31267.98
20208.69194.71205.25192.78214.75181.55209.99161.76422.59355.27417.38351.22
30236.48224.51236.28212.51248.97209.03244.10172.37474.58434.98459.09375.31
(g) US-Grid(h) pgp(i) indochina-2004
PaCPaC,
p = 0.1
PaC,
p = 0.5
PaC-pPaCPaC,
p = 0.1
PaC,
p = 0.5
PaC-pPaCPaC,
p = 0.1
PaC,
p = 0.5
PaC-p
10226.36197.74216.78167.65524.56500.50522.18500.711245.811220.871228.701195.42
20317.27287.24307.78198.98593.33531.56564.49506.631319.111278.301302.221220.15
30386.11352.54378.62258.71647.42539.63623.83530.571371.871322.951355.901236.27
Table 5. Statistical comparison of performance between PaC and DC algorithms.
Table 5. Statistical comparison of performance between PaC and DC algorithms.
MetricPaCDC
Sample size (n)10,00010,000
Mean (M)100.95100.31
Standard deviation ( S D )10.9110.94
95% CI of the mean[100.74, 101.16][100.09, 100.52]
Mean difference ( Δ M )0.64
95% CI of the mean difference[0.34, 0.94]
t-statistic4.14
Degrees of freedom ( d f )19,998
p-value 3.435607 × 10 5
* Note: CI = confidence interval.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Li, J.; Liu, W.; Jiang, W.; Yang, J.; Chen, L. Interest as the Engine: Leveraging Diverse Hybrid Propagation for Influence Maximization in Interest-Based Social Networks. Information 2026, 17, 3. https://doi.org/10.3390/info17010003

AMA Style

Li J, Liu W, Jiang W, Yang J, Chen L. Interest as the Engine: Leveraging Diverse Hybrid Propagation for Influence Maximization in Interest-Based Social Networks. Information. 2026; 17(1):3. https://doi.org/10.3390/info17010003

Chicago/Turabian Style

Li, Jian, Wei Liu, Wenxin Jiang, Jinhao Yang, and Ling Chen. 2026. "Interest as the Engine: Leveraging Diverse Hybrid Propagation for Influence Maximization in Interest-Based Social Networks" Information 17, no. 1: 3. https://doi.org/10.3390/info17010003

APA Style

Li, J., Liu, W., Jiang, W., Yang, J., & Chen, L. (2026). Interest as the Engine: Leveraging Diverse Hybrid Propagation for Influence Maximization in Interest-Based Social Networks. Information, 17(1), 3. https://doi.org/10.3390/info17010003

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop