IEEE Computational Intelligence Magazine - February 2023 - 53

Each transformation is assigned an evolutionary solver. Three
major components of MTEFIM are conducted via: 1)
estimating the potential relationship across transformations
based on the degree of overlap across individuals of different
populations, 2) transferring individuals across populations
adaptively according to the inter-transformation relationship,
and 3) selecting the final output seed set containing all the
transformation's knowledge. The effectiveness ofMTEFIM is
validated on both benchmarks and real-world social networks.
The experimental results show that MTEFIM can efficiently
utilize the potentially transferable knowledge across multiple
transformations to achieve highly competitive performance
compared to several popular IM-specific methods. The
implementation of MTEFIM can be accessed through the
external link in the footnote.1
I. Introduction
S
ocial networks are employed to describe the communication
in convention and connection between people
in a word-of-mouth manner [1]. With the rapid
increase in the number ofusers, new online social network
sites or apps such as Twitter, MicroBlog, TikTok, and
Instagram have become the mainstream networking platforms
for people to share and exchange ideas, providing great convenience
for marketers to target prospective customers [2], [3].
In recent years, the rise of these websites or apps has
boosted a complete industrial chain in social media marketing,
including influencers and marketing agencies [4]. Influencers,
such as Charli D' Amelio and Addison Rae, have tens of millions
of followers on TikTok. Usually, these influencer marketing
agencies promote their products by collaborating with
initial influencers (such as actors and celebrities), which is
proven effective and successful by the market. Finding influencers
who can help engage new consumers exponentially is
essential to the success ofinfluencer marketing [5]. Coincidentally,
this issue also appears in a series of practical applications
in political campaigns [6] and epidemic analyses [7], which is at
the core ofthe influence maximization (IM) problem.
The above IM problem intends to select a group of users
from social networks, called a seed set, to maximize the spread
of influence under an information diffusion process [8]. Some
popular models have been proposed to study the diffusion process,
such as the independent cascade (IC) [9], weighted cascade
(WC) [10], and linear threshold (LT) [11], which
simulate the independent or collective behavior of the seed
set. Since information production is interfered by a variety of
social or biological factors in different problems, existing works
tend to employ network structure information to find those
influencers under these models [12]. Domingos et al. [8] first
formalized IM as an NP-hard combinatorial optimization
problem, which shows that only the optimal set with a certain
1[Online]. Available: https://github.com/xiaofangxd/MTEFIM
degree of approximation could be found. Domingos et al. [8]
further proposed a series ofgreedy-based IM algorithms. Theoretical
results show that under the IC model, the greedy
method can produce an optimal solution with an accuracy of
no less than 11/e. Then, several algorithms are developed to
address the inefficiency and insufficient scalability of the
greedy method. Leskovec et al. [13] proposed an improved
greedy algorithm with a " Cost-Efficient Lazy Forward
(CELF) " strategy, which is reported to be 700 times faster than
the greedy method. Goyal et al. [14] further extended
CELFþþ by considering the submodularity property of IM.
In addition, Chen et al. [10] proposed a new greedy algorithm
to conduct the diffusion process on a network after pruning.
However, these simulation-based greedy methods require
thousands of Monte Carlo simulations to evaluate influence
spread, which is unattainable in practice.
To overcome the limitations ofsimulation-based methods,
several heuristic methods have been presented to handle largescale
networks. A simple ranking idea can be employed to select
the seed set, such as using degree, PageRank [15], and distance
centrality [16]. Chen et al. [10] designed a degree discount heuristic
method, which assumes that the influence spread increases
with the user's degree. Wang et al. [17] further extended to a
generalized degree discount heuristic. However, these approximation
methods may be quite different from the influence diffusion
process (see the experimental analysis in [9], [10]).
In the last decade, a series ofmeta-heuristic algorithms have
been proposed to solve IM problems due to their superiority in
solving NP-hard problems, such as the simulated annealing (SA)
and the evolutionary algorithm (EA). These methods have
excellent performance on many real-world networks. Jiang et al.
[18] proposed a cheap approximate model, named the expected
diffusion value (EDV), to replace the diffusion process and optimize
the objective by the SA algorithm. Lee et al. [19] introduced
an approximation model for the diffusion process by
limiting the spread on users with two hops ofthe seed set. Gong
et al. [20] reduced the search space for IM problems by using
community information in a social network, and proposed a
memetic algorithm to optimize the two-hop influence spread,
called TIS in this article. In addition, Gong et al. [21] proposed a
discrete particle swarm optimization algorithm to optimize the
local influence estimation (LIE) that approximates the 2-hop
influence spread. Wang et al. [22] presented a new influence estimation
model by considering the estimate and variance ofusers
in a 2-hop neighborhood, called IEEV in this article. Singh et al.
[23] introduced a learning-based particle swarm optimization for
IM and extended the EDV to approximate two-desired areas. In
addition, an ant colony algorithm [24] is proposed to optimize
the local influence evaluation. Li et al. [25] presented a discrete
crow search algorithm based on the network topology structure.
Ma et al. [26] proposed a novel evolutionary deep reinforcement
learning algorithm for IM problems in complex networks, where
the IM problem is transformed into a continuous weight optimization
problem ofdeep Q-networks. Furthermore, many methods
combining reinforcement learning and network embedding
FEBRUARY 2023 | IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE 53
https://github.com/xiaofangxd/MTEFIM

IEEE Computational Intelligence Magazine - February 2023

Table of Contents for the Digital Edition of IEEE Computational Intelligence Magazine - February 2023

Contents
IEEE Computational Intelligence Magazine - February 2023 - Cover1
IEEE Computational Intelligence Magazine - February 2023 - Cover2
IEEE Computational Intelligence Magazine - February 2023 - Contents
IEEE Computational Intelligence Magazine - February 2023 - 2
IEEE Computational Intelligence Magazine - February 2023 - 3
IEEE Computational Intelligence Magazine - February 2023 - 4
IEEE Computational Intelligence Magazine - February 2023 - 5
IEEE Computational Intelligence Magazine - February 2023 - 6
IEEE Computational Intelligence Magazine - February 2023 - 7
IEEE Computational Intelligence Magazine - February 2023 - 8
IEEE Computational Intelligence Magazine - February 2023 - 9
IEEE Computational Intelligence Magazine - February 2023 - 10
IEEE Computational Intelligence Magazine - February 2023 - 11
IEEE Computational Intelligence Magazine - February 2023 - 12
IEEE Computational Intelligence Magazine - February 2023 - 13
IEEE Computational Intelligence Magazine - February 2023 - 14
IEEE Computational Intelligence Magazine - February 2023 - 15
IEEE Computational Intelligence Magazine - February 2023 - 16
IEEE Computational Intelligence Magazine - February 2023 - 17
IEEE Computational Intelligence Magazine - February 2023 - 18
IEEE Computational Intelligence Magazine - February 2023 - 19
IEEE Computational Intelligence Magazine - February 2023 - 20
IEEE Computational Intelligence Magazine - February 2023 - 21
IEEE Computational Intelligence Magazine - February 2023 - 22
IEEE Computational Intelligence Magazine - February 2023 - 23
IEEE Computational Intelligence Magazine - February 2023 - 24
IEEE Computational Intelligence Magazine - February 2023 - 25
IEEE Computational Intelligence Magazine - February 2023 - 26
IEEE Computational Intelligence Magazine - February 2023 - 27
IEEE Computational Intelligence Magazine - February 2023 - 28
IEEE Computational Intelligence Magazine - February 2023 - 29
IEEE Computational Intelligence Magazine - February 2023 - 30
IEEE Computational Intelligence Magazine - February 2023 - 31
IEEE Computational Intelligence Magazine - February 2023 - 32
IEEE Computational Intelligence Magazine - February 2023 - 33
IEEE Computational Intelligence Magazine - February 2023 - 34
IEEE Computational Intelligence Magazine - February 2023 - 35
IEEE Computational Intelligence Magazine - February 2023 - 36
IEEE Computational Intelligence Magazine - February 2023 - 37
IEEE Computational Intelligence Magazine - February 2023 - 38
IEEE Computational Intelligence Magazine - February 2023 - 39
IEEE Computational Intelligence Magazine - February 2023 - 40
IEEE Computational Intelligence Magazine - February 2023 - 41
IEEE Computational Intelligence Magazine - February 2023 - 42
IEEE Computational Intelligence Magazine - February 2023 - 43
IEEE Computational Intelligence Magazine - February 2023 - 44
IEEE Computational Intelligence Magazine - February 2023 - 45
IEEE Computational Intelligence Magazine - February 2023 - 46
IEEE Computational Intelligence Magazine - February 2023 - 47
IEEE Computational Intelligence Magazine - February 2023 - 48
IEEE Computational Intelligence Magazine - February 2023 - 49
IEEE Computational Intelligence Magazine - February 2023 - 50
IEEE Computational Intelligence Magazine - February 2023 - 51
IEEE Computational Intelligence Magazine - February 2023 - 52
IEEE Computational Intelligence Magazine - February 2023 - 53
IEEE Computational Intelligence Magazine - February 2023 - 54
IEEE Computational Intelligence Magazine - February 2023 - 55
IEEE Computational Intelligence Magazine - February 2023 - 56
IEEE Computational Intelligence Magazine - February 2023 - 57
IEEE Computational Intelligence Magazine - February 2023 - 58
IEEE Computational Intelligence Magazine - February 2023 - 59
IEEE Computational Intelligence Magazine - February 2023 - 60
IEEE Computational Intelligence Magazine - February 2023 - 61
IEEE Computational Intelligence Magazine - February 2023 - 62
IEEE Computational Intelligence Magazine - February 2023 - 63
IEEE Computational Intelligence Magazine - February 2023 - 64
IEEE Computational Intelligence Magazine - February 2023 - 65
IEEE Computational Intelligence Magazine - February 2023 - 66
IEEE Computational Intelligence Magazine - February 2023 - 67
IEEE Computational Intelligence Magazine - February 2023 - 68
IEEE Computational Intelligence Magazine - February 2023 - 69
IEEE Computational Intelligence Magazine - February 2023 - 70
IEEE Computational Intelligence Magazine - February 2023 - 71
IEEE Computational Intelligence Magazine - February 2023 - 72
IEEE Computational Intelligence Magazine - February 2023 - 73
IEEE Computational Intelligence Magazine - February 2023 - 74
IEEE Computational Intelligence Magazine - February 2023 - 75
IEEE Computational Intelligence Magazine - February 2023 - 76
IEEE Computational Intelligence Magazine - February 2023 - 77
IEEE Computational Intelligence Magazine - February 2023 - 78
IEEE Computational Intelligence Magazine - February 2023 - 79
IEEE Computational Intelligence Magazine - February 2023 - 80
IEEE Computational Intelligence Magazine - February 2023 - 81
IEEE Computational Intelligence Magazine - February 2023 - 82
IEEE Computational Intelligence Magazine - February 2023 - 83
IEEE Computational Intelligence Magazine - February 2023 - 84
IEEE Computational Intelligence Magazine - February 2023 - 85
IEEE Computational Intelligence Magazine - February 2023 - 86
IEEE Computational Intelligence Magazine - February 2023 - 87
IEEE Computational Intelligence Magazine - February 2023 - 88
IEEE Computational Intelligence Magazine - February 2023 - 89
IEEE Computational Intelligence Magazine - February 2023 - 90
IEEE Computational Intelligence Magazine - February 2023 - 91
IEEE Computational Intelligence Magazine - February 2023 - 92
IEEE Computational Intelligence Magazine - February 2023 - 93
IEEE Computational Intelligence Magazine - February 2023 - 94
IEEE Computational Intelligence Magazine - February 2023 - 95
IEEE Computational Intelligence Magazine - February 2023 - 96
IEEE Computational Intelligence Magazine - February 2023 - 97
IEEE Computational Intelligence Magazine - February 2023 - 98
IEEE Computational Intelligence Magazine - February 2023 - 99
IEEE Computational Intelligence Magazine - February 2023 - 100
IEEE Computational Intelligence Magazine - February 2023 - 101
IEEE Computational Intelligence Magazine - February 2023 - 102
IEEE Computational Intelligence Magazine - February 2023 - 103
IEEE Computational Intelligence Magazine - February 2023 - 104
IEEE Computational Intelligence Magazine - February 2023 - Cover3
IEEE Computational Intelligence Magazine - February 2023 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com