IEEE Computational Intelligence Magazine - February 2023 - 55

A. IM in Social Networks
A social network is modeled as a graph G¼ (V, E), where V¼
{1, 2, .. ., v}and E¼ {eij j i,j2V} are accordingly the node-set
and edge set ofthe network [42]. Given a seed set A2Vwith k
seed nodes, a probabilistic influence spread model returns the
expected number of nodes influenced by the seeds, which is
denoted as s(A). Many models are proposed to describe the
influence spread process under different scenarios, such as the IC,
WC, and LT models. The IC model is one ofthe most widely
studied diffusion models, and many proxy models are developed
to approximate this model [43], [44]. Therefore, this article
chooses the ICmodel to describe the influence spread process.
In the IC model [9], all the nodes are either active or inactive.
Activated nodes influence inactive nodes through connections
between nodes with a propagation probability p.
Considering a seed set A2Vwith k nodes, the influence spread
process can be expressed as follows. In the first step, k seeds in A
are active and saved in set A1. At step t, given the propagation
probabilityp (u, v) ofthe edge euv, a node u2At-1 may activate an
inactive neighbor v with the probability p. Note that u only has
one chance to activate its neighbors. Those successfully activated
nodes are saved in the set At. The above influence spread process
stops when At ¼. Then, the number of active nodes in the
influence spread process is defined as the influence spread s (A)
ofseed set A under the IC model.
IM can be considered as the following discrete problem
[45]: Given a social network G ¼ (V, E) and the size of seed
set k, the goal ofthe IM problem is to select a seed set A under
an influence spread model such that,
arg max s AðÞ s:t: Ajj ¼ k
AV
(1)
where j A j is the size of set A. To solve the above IM problem,
tens of thousands ofMonte Carlo simulations are used to
estimate the influence spread process of any given seed set,
which is very time-consuming [43]. In the next section, two
popular proxy models, EDV and TIS, are introduced to
approximate influence spread s to replace the expensive
Monte Carlo simulation process.
B. Proxy Models for Meta-Heuristic Methods
EDV [18]. For a small propagation probability p in the IC
model, EDV estimates the expected number of nodes influenced
by seed set A with k seeds through,
EDV AðÞ ¼ k þ
b2NB AðÞnA
X
1 1pðÞd bðÞ
;
(2)
where NBðAÞ¼ A [fbj9a 2 A; eab 2 Eg represents one-hop
neighbors of the seed set A, and dðbÞ¼jfaja 2 A; eab 2 Egj
represents the influence from A to b. j j is the number ofelements
in the set. This formula essentially extracts the edge
and node information ofN(A) to form a subgraph to quickly
evaluate the influence spread. A series of existing efforts use
meta-heuristic algorithms to optimize EDV or its variants,
The fitness landscapes of these two
optimization tasks are indeed highly
similar because these proxy models all
consider the neighbor information of
the seed set, leading to a large amount
of available knowledge between the
optimization processes of the different
proxy models.
such as the SA [18], the particle swarm optimization (PSO)
[23], [46], and the ant colony optimization [24]. Compared
with heuristic-based methods, these methods can quickly find
more accurate solutions in real-world networks.
TIS [20]. For the IC model, TIS estimates the influence
spread ofthe seed set A by the 2-hop neighborhood through,
TIS AðÞ ¼
X
a2A
b ¼
TIS afg
@
X
a2A
X
a2A
X
b2NaðÞ\A
X
X
b2NaðÞ=A c2NbðÞ\A= afg
where N () denotes the 1-hop nodes cover of seed, p (a, b)
represents the propagation probability between the active
node a and the inactive node b, and a(b) represents the 1-hop
influence spread of the node b. In (3), the first term evaluates
the sum of the 2-hop influence spread of seeds in A. The second
and third terms consider the potential redundant influences
between the seeds. TIS considers the information of the
seed neighbors and the neighbors' neighbors to quickly
approximate the influence spread of the seed set, which has
been widely extended to solve IM problems on different types
of networks [25], [47]. Based on TIS, some proxy models are
proposed, such as LIE [21], [48], and IEEV [22].
Since different proxy models consider different neighbor
information on the seed set, the use ofEDV and TIS may lead
to different search behaviors with similar characteristics, thus
resulting in different performance on specific problems. The
EDV and the TIS have been emphasized in previous studies,
so this article chooses them as alternative transformations of
IM problems. Furthermore, in Section V. E, more comparative
experiments are provided to illustrate the rationale for
choosing EDV and TIS.
C.MTFO
Given S alternate formulations {f1,f2, ...,fS} ofa target minimization
taskf, the MTFO problem can be formalized as [32],
min
x
fi xðÞ; i ¼ 1; 2; ... ; S
s:t: x ¼ x1; x2; ... ; xm 0
2 D
(4)
FEBRUARY 2023 | IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE 55
pa; bðÞpb; cðÞ
pa; bðÞ a bðÞpb; aðÞ
ðÞ
1
A b;
(3)

IEEE Computational Intelligence Magazine - February 2023

Table of Contents for the Digital Edition of IEEE Computational Intelligence Magazine - February 2023

Contents
IEEE Computational Intelligence Magazine - February 2023 - Cover1
IEEE Computational Intelligence Magazine - February 2023 - Cover2
IEEE Computational Intelligence Magazine - February 2023 - Contents
IEEE Computational Intelligence Magazine - February 2023 - 2
IEEE Computational Intelligence Magazine - February 2023 - 3
IEEE Computational Intelligence Magazine - February 2023 - 4
IEEE Computational Intelligence Magazine - February 2023 - 5
IEEE Computational Intelligence Magazine - February 2023 - 6
IEEE Computational Intelligence Magazine - February 2023 - 7
IEEE Computational Intelligence Magazine - February 2023 - 8
IEEE Computational Intelligence Magazine - February 2023 - 9
IEEE Computational Intelligence Magazine - February 2023 - 10
IEEE Computational Intelligence Magazine - February 2023 - 11
IEEE Computational Intelligence Magazine - February 2023 - 12
IEEE Computational Intelligence Magazine - February 2023 - 13
IEEE Computational Intelligence Magazine - February 2023 - 14
IEEE Computational Intelligence Magazine - February 2023 - 15
IEEE Computational Intelligence Magazine - February 2023 - 16
IEEE Computational Intelligence Magazine - February 2023 - 17
IEEE Computational Intelligence Magazine - February 2023 - 18
IEEE Computational Intelligence Magazine - February 2023 - 19
IEEE Computational Intelligence Magazine - February 2023 - 20
IEEE Computational Intelligence Magazine - February 2023 - 21
IEEE Computational Intelligence Magazine - February 2023 - 22
IEEE Computational Intelligence Magazine - February 2023 - 23
IEEE Computational Intelligence Magazine - February 2023 - 24
IEEE Computational Intelligence Magazine - February 2023 - 25
IEEE Computational Intelligence Magazine - February 2023 - 26
IEEE Computational Intelligence Magazine - February 2023 - 27
IEEE Computational Intelligence Magazine - February 2023 - 28
IEEE Computational Intelligence Magazine - February 2023 - 29
IEEE Computational Intelligence Magazine - February 2023 - 30
IEEE Computational Intelligence Magazine - February 2023 - 31
IEEE Computational Intelligence Magazine - February 2023 - 32
IEEE Computational Intelligence Magazine - February 2023 - 33
IEEE Computational Intelligence Magazine - February 2023 - 34
IEEE Computational Intelligence Magazine - February 2023 - 35
IEEE Computational Intelligence Magazine - February 2023 - 36
IEEE Computational Intelligence Magazine - February 2023 - 37
IEEE Computational Intelligence Magazine - February 2023 - 38
IEEE Computational Intelligence Magazine - February 2023 - 39
IEEE Computational Intelligence Magazine - February 2023 - 40
IEEE Computational Intelligence Magazine - February 2023 - 41
IEEE Computational Intelligence Magazine - February 2023 - 42
IEEE Computational Intelligence Magazine - February 2023 - 43
IEEE Computational Intelligence Magazine - February 2023 - 44
IEEE Computational Intelligence Magazine - February 2023 - 45
IEEE Computational Intelligence Magazine - February 2023 - 46
IEEE Computational Intelligence Magazine - February 2023 - 47
IEEE Computational Intelligence Magazine - February 2023 - 48
IEEE Computational Intelligence Magazine - February 2023 - 49
IEEE Computational Intelligence Magazine - February 2023 - 50
IEEE Computational Intelligence Magazine - February 2023 - 51
IEEE Computational Intelligence Magazine - February 2023 - 52
IEEE Computational Intelligence Magazine - February 2023 - 53
IEEE Computational Intelligence Magazine - February 2023 - 54
IEEE Computational Intelligence Magazine - February 2023 - 55
IEEE Computational Intelligence Magazine - February 2023 - 56
IEEE Computational Intelligence Magazine - February 2023 - 57
IEEE Computational Intelligence Magazine - February 2023 - 58
IEEE Computational Intelligence Magazine - February 2023 - 59
IEEE Computational Intelligence Magazine - February 2023 - 60
IEEE Computational Intelligence Magazine - February 2023 - 61
IEEE Computational Intelligence Magazine - February 2023 - 62
IEEE Computational Intelligence Magazine - February 2023 - 63
IEEE Computational Intelligence Magazine - February 2023 - 64
IEEE Computational Intelligence Magazine - February 2023 - 65
IEEE Computational Intelligence Magazine - February 2023 - 66
IEEE Computational Intelligence Magazine - February 2023 - 67
IEEE Computational Intelligence Magazine - February 2023 - 68
IEEE Computational Intelligence Magazine - February 2023 - 69
IEEE Computational Intelligence Magazine - February 2023 - 70
IEEE Computational Intelligence Magazine - February 2023 - 71
IEEE Computational Intelligence Magazine - February 2023 - 72
IEEE Computational Intelligence Magazine - February 2023 - 73
IEEE Computational Intelligence Magazine - February 2023 - 74
IEEE Computational Intelligence Magazine - February 2023 - 75
IEEE Computational Intelligence Magazine - February 2023 - 76
IEEE Computational Intelligence Magazine - February 2023 - 77
IEEE Computational Intelligence Magazine - February 2023 - 78
IEEE Computational Intelligence Magazine - February 2023 - 79
IEEE Computational Intelligence Magazine - February 2023 - 80
IEEE Computational Intelligence Magazine - February 2023 - 81
IEEE Computational Intelligence Magazine - February 2023 - 82
IEEE Computational Intelligence Magazine - February 2023 - 83
IEEE Computational Intelligence Magazine - February 2023 - 84
IEEE Computational Intelligence Magazine - February 2023 - 85
IEEE Computational Intelligence Magazine - February 2023 - 86
IEEE Computational Intelligence Magazine - February 2023 - 87
IEEE Computational Intelligence Magazine - February 2023 - 88
IEEE Computational Intelligence Magazine - February 2023 - 89
IEEE Computational Intelligence Magazine - February 2023 - 90
IEEE Computational Intelligence Magazine - February 2023 - 91
IEEE Computational Intelligence Magazine - February 2023 - 92
IEEE Computational Intelligence Magazine - February 2023 - 93
IEEE Computational Intelligence Magazine - February 2023 - 94
IEEE Computational Intelligence Magazine - February 2023 - 95
IEEE Computational Intelligence Magazine - February 2023 - 96
IEEE Computational Intelligence Magazine - February 2023 - 97
IEEE Computational Intelligence Magazine - February 2023 - 98
IEEE Computational Intelligence Magazine - February 2023 - 99
IEEE Computational Intelligence Magazine - February 2023 - 100
IEEE Computational Intelligence Magazine - February 2023 - 101
IEEE Computational Intelligence Magazine - February 2023 - 102
IEEE Computational Intelligence Magazine - February 2023 - 103
IEEE Computational Intelligence Magazine - February 2023 - 104
IEEE Computational Intelligence Magazine - February 2023 - Cover3
IEEE Computational Intelligence Magazine - February 2023 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com