IEEE Computational Intelligence Magazine - February 2023 - 61

TABLE I The basic characteristics of five real-world networks
used in this article.
TABLE II Comparison of the statistical results of the
influence spread (Average Standard) obtained by MTEFIM
and MTEFIM-NK over 20 independent runs.
NETWORKS
Email URIV
Hamsterster
Ego-facebook
Fb-pages-public-figure
NetHEPT
1.1K
2.4K
4.0K
j VjjE j
5.5K
11.6K
15.2K
16.6K
88K
67K
58.9K
AC
0.220
0.538
0.605
0.179
0.346
P
0.05
0.03
0.02
0.04
0.05
A. Experiment Setting
1) Datasets
The performance ofMTEFIM is validated on a well-known synthetic
network and five real-world networks [54], [55], [56], [57],
including GN-Network, Email URIV, Hamsterster, Ego-facebook,
Fb-pages-public-figure, and NetHEPT2. The GN networks
are employed to represent modular networks with four
communities and 128 nodes, where each node has the same
degree of16. The parameter m is used to control the number of
links between communities. All baselines are tested on a GN
benchmark network with m¼ 1 in this article. Email URIV is the
category ofemail networks. The Hamsterster network represents
the friendships and family connections between members of the
website http://www.hamsterster.com. The Ego-facebook network
consists of friends lists from survey participants using Facebook.
The large-scale Fb-pages-public-figure network describes
Facebook page networks of different categories. The large-scale
NetHEPT is a collaborative network of paper co-authors. The
basic characteristics ofthese networks are shown in Table I, where
jVj and j Ej denote the number of nodes and edges, respectively.
ACis the average clustering coefficient. The ICmodel, as a
widely popular influence spread model, is employed in this article.
According to j Vj and AC,the configuration of the activation
probability p in the ICmodel is listed in Table I. In addition, EDV
and TIS, two popular proxy models, are selected as alternative
transformations ofIMproblems.
2)Methods
To demonstrate the effectiveness of knowledge transfer in
MTEFIM, MTEFIM-NK, a variant version of MTEFIM, is
constructed by removing the knowledge transfer process
(Lines 10
13 in Algorithm 1). In addition, four popular
EMTO methods are regarded as comparison algorithms to
illustrate the effectiveness of the proposed knowledge transfer
strategy, including MFEA [33], MFEAII [36], EMEA [34],
and SBEA [35]. MFEA, the first one tailored for the MTO
problem, has been applied to many practical problems [58],
[59], [60], [61]. MFEAII tries to minimize the negative transfer
tendency across tasks, to improve knowledge utilization in
MFEA. EMEA, an explicit EMTO algorithm, performs individual
transfers across tasks using a denoising autoencoder.
SBEA is a novel many-task optimization algorithm inspired by
2[Online]. Available: https://networkrepository.com
NETWORKS
GN-Network
K
3
MTEFIM
MTEFIM-NK
10.3960.044 9.2240.206(-)
Email URIV
12 34.2090.105 32.0430.117(-)
21 50.9950.193 48.6580.286(-)
30 63.5960.161 61.8430.572(-)
46.9630.373 45.4760.452(-)
94.7140.683()
3
12 94.7140.000
Hamsterster
21 124.070.810 122.7691.242(-)
30 146.7760.574 145.3410.729(-)
202.3820.021 202.3360.025()
231.6530.000()
12 231.6530.000
Ego-facebook
21 255.1631.043 252.6191.143(-)
30 270.0740.962 267.9611.549(-)
868.3030.000()
3
868.3030.000
Fb-pages-public-figure 3
12 923.1778.409 889.9766.652(-)
21 932.3734.190 923.0040.179(-)
30 949.30910.298 924.2213.575(-)
1168.3770.906 1165.7271.112(-)
NetHEPT
12 1183.9863.894 1170.8901.143(-)
21 1203.1104.854 1178.0630.863(-)
30 1225.2327.250 1181.3784.460(-)
45.4110.001 40.0061.402(-)
3
-//þ
12 116.4930.144 102.9090.250(-)
21 158.6830.944 154.8921.833(-)
30 194.2120.862 187.4532.202(-)
0/4/20
-
the symbiosis in biocoenosis. All methods use the same genetic
operators and SOSS proposed in this article for a fair comparison.
The population size in MFEA and MFEAII is 200, and
the population size of each transformation in the other methods
is set to 100. The probabilities of crossover and mutation
are accordingly set to 1.0 and 1/k. The maximum number of
function evaluations in all methods is set to 5000S, where S
is the number oftransformations.
Eight popular methods for the IM problem are selected as
baselines to verify the performance of MTEFIM, including
Degree [62],PageRank[63],SDD [10],CELFþþ [14], EDVEA
[18],TISEA [19],MA-IM [20],and EDRL-LM[26].Degree,
PageRank, and SDD are three popular heuristic methods. These
methods sort nodes according to different indicators and then
select the top k nodes as the seed set. CELFþþ is an improved
greedy algorithm that exploits the sub-modularity ofthe objective
function. The number ofMonte-Carlo simulations is set to 10000
in this method. Three popular genetic operator-based EAs are
taken as comparison algorithms. The optimization objectives of
EDVEA and TISEA are accordingly EDV and TIS. The same
genetic operators are employed in these methods for a fair comparison.
MA-IM is a popular memetic algorithm for the IM problem
FEBRUARY 2023 | IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE 61
3
http://www.hamsterster.com https://networkrepository.com

IEEE Computational Intelligence Magazine - February 2023

Table of Contents for the Digital Edition of IEEE Computational Intelligence Magazine - February 2023

Contents
IEEE Computational Intelligence Magazine - February 2023 - Cover1
IEEE Computational Intelligence Magazine - February 2023 - Cover2
IEEE Computational Intelligence Magazine - February 2023 - Contents
IEEE Computational Intelligence Magazine - February 2023 - 2
IEEE Computational Intelligence Magazine - February 2023 - 3
IEEE Computational Intelligence Magazine - February 2023 - 4
IEEE Computational Intelligence Magazine - February 2023 - 5
IEEE Computational Intelligence Magazine - February 2023 - 6
IEEE Computational Intelligence Magazine - February 2023 - 7
IEEE Computational Intelligence Magazine - February 2023 - 8
IEEE Computational Intelligence Magazine - February 2023 - 9
IEEE Computational Intelligence Magazine - February 2023 - 10
IEEE Computational Intelligence Magazine - February 2023 - 11
IEEE Computational Intelligence Magazine - February 2023 - 12
IEEE Computational Intelligence Magazine - February 2023 - 13
IEEE Computational Intelligence Magazine - February 2023 - 14
IEEE Computational Intelligence Magazine - February 2023 - 15
IEEE Computational Intelligence Magazine - February 2023 - 16
IEEE Computational Intelligence Magazine - February 2023 - 17
IEEE Computational Intelligence Magazine - February 2023 - 18
IEEE Computational Intelligence Magazine - February 2023 - 19
IEEE Computational Intelligence Magazine - February 2023 - 20
IEEE Computational Intelligence Magazine - February 2023 - 21
IEEE Computational Intelligence Magazine - February 2023 - 22
IEEE Computational Intelligence Magazine - February 2023 - 23
IEEE Computational Intelligence Magazine - February 2023 - 24
IEEE Computational Intelligence Magazine - February 2023 - 25
IEEE Computational Intelligence Magazine - February 2023 - 26
IEEE Computational Intelligence Magazine - February 2023 - 27
IEEE Computational Intelligence Magazine - February 2023 - 28
IEEE Computational Intelligence Magazine - February 2023 - 29
IEEE Computational Intelligence Magazine - February 2023 - 30
IEEE Computational Intelligence Magazine - February 2023 - 31
IEEE Computational Intelligence Magazine - February 2023 - 32
IEEE Computational Intelligence Magazine - February 2023 - 33
IEEE Computational Intelligence Magazine - February 2023 - 34
IEEE Computational Intelligence Magazine - February 2023 - 35
IEEE Computational Intelligence Magazine - February 2023 - 36
IEEE Computational Intelligence Magazine - February 2023 - 37
IEEE Computational Intelligence Magazine - February 2023 - 38
IEEE Computational Intelligence Magazine - February 2023 - 39
IEEE Computational Intelligence Magazine - February 2023 - 40
IEEE Computational Intelligence Magazine - February 2023 - 41
IEEE Computational Intelligence Magazine - February 2023 - 42
IEEE Computational Intelligence Magazine - February 2023 - 43
IEEE Computational Intelligence Magazine - February 2023 - 44
IEEE Computational Intelligence Magazine - February 2023 - 45
IEEE Computational Intelligence Magazine - February 2023 - 46
IEEE Computational Intelligence Magazine - February 2023 - 47
IEEE Computational Intelligence Magazine - February 2023 - 48
IEEE Computational Intelligence Magazine - February 2023 - 49
IEEE Computational Intelligence Magazine - February 2023 - 50
IEEE Computational Intelligence Magazine - February 2023 - 51
IEEE Computational Intelligence Magazine - February 2023 - 52
IEEE Computational Intelligence Magazine - February 2023 - 53
IEEE Computational Intelligence Magazine - February 2023 - 54
IEEE Computational Intelligence Magazine - February 2023 - 55
IEEE Computational Intelligence Magazine - February 2023 - 56
IEEE Computational Intelligence Magazine - February 2023 - 57
IEEE Computational Intelligence Magazine - February 2023 - 58
IEEE Computational Intelligence Magazine - February 2023 - 59
IEEE Computational Intelligence Magazine - February 2023 - 60
IEEE Computational Intelligence Magazine - February 2023 - 61
IEEE Computational Intelligence Magazine - February 2023 - 62
IEEE Computational Intelligence Magazine - February 2023 - 63
IEEE Computational Intelligence Magazine - February 2023 - 64
IEEE Computational Intelligence Magazine - February 2023 - 65
IEEE Computational Intelligence Magazine - February 2023 - 66
IEEE Computational Intelligence Magazine - February 2023 - 67
IEEE Computational Intelligence Magazine - February 2023 - 68
IEEE Computational Intelligence Magazine - February 2023 - 69
IEEE Computational Intelligence Magazine - February 2023 - 70
IEEE Computational Intelligence Magazine - February 2023 - 71
IEEE Computational Intelligence Magazine - February 2023 - 72
IEEE Computational Intelligence Magazine - February 2023 - 73
IEEE Computational Intelligence Magazine - February 2023 - 74
IEEE Computational Intelligence Magazine - February 2023 - 75
IEEE Computational Intelligence Magazine - February 2023 - 76
IEEE Computational Intelligence Magazine - February 2023 - 77
IEEE Computational Intelligence Magazine - February 2023 - 78
IEEE Computational Intelligence Magazine - February 2023 - 79
IEEE Computational Intelligence Magazine - February 2023 - 80
IEEE Computational Intelligence Magazine - February 2023 - 81
IEEE Computational Intelligence Magazine - February 2023 - 82
IEEE Computational Intelligence Magazine - February 2023 - 83
IEEE Computational Intelligence Magazine - February 2023 - 84
IEEE Computational Intelligence Magazine - February 2023 - 85
IEEE Computational Intelligence Magazine - February 2023 - 86
IEEE Computational Intelligence Magazine - February 2023 - 87
IEEE Computational Intelligence Magazine - February 2023 - 88
IEEE Computational Intelligence Magazine - February 2023 - 89
IEEE Computational Intelligence Magazine - February 2023 - 90
IEEE Computational Intelligence Magazine - February 2023 - 91
IEEE Computational Intelligence Magazine - February 2023 - 92
IEEE Computational Intelligence Magazine - February 2023 - 93
IEEE Computational Intelligence Magazine - February 2023 - 94
IEEE Computational Intelligence Magazine - February 2023 - 95
IEEE Computational Intelligence Magazine - February 2023 - 96
IEEE Computational Intelligence Magazine - February 2023 - 97
IEEE Computational Intelligence Magazine - February 2023 - 98
IEEE Computational Intelligence Magazine - February 2023 - 99
IEEE Computational Intelligence Magazine - February 2023 - 100
IEEE Computational Intelligence Magazine - February 2023 - 101
IEEE Computational Intelligence Magazine - February 2023 - 102
IEEE Computational Intelligence Magazine - February 2023 - 103
IEEE Computational Intelligence Magazine - February 2023 - 104
IEEE Computational Intelligence Magazine - February 2023 - Cover3
IEEE Computational Intelligence Magazine - February 2023 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com