Next Article in Journal
Multi-objective Beam-ACO for Maximising Reliability and Minimising Communication Overhead in the Component Deployment Problem
Next Article in Special Issue
On Multidimensional Congestion Games
Previous Article in Journal
A Clustering Routing Algorithm Based on Improved Ant Colony Optimization Algorithms for Underwater Wireless Sensor Networks
Previous Article in Special Issue
Graph Planarity by Replacing Cliques with Paths
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Multi-Winner Election Control via Social Influence: Hardness and Algorithms for Restricted Cases

by
Mohammad Abouei Mehrizi
* and
Gianlorenzo D'Angelo
*
Computer Science Department, Gran Sasso Science Institute (GSSI), Viale Francesco Crispi, 67100 L’Aquila AQ, Italy
*
Authors to whom correspondence should be addressed.
Submission received: 4 September 2020 / Revised: 28 September 2020 / Accepted: 29 September 2020 / Published: 2 October 2020
(This article belongs to the Special Issue Graph Algorithms and Applications)

Abstract

:
Nowadays, many political campaigns are using social influence in order to convince voters to support/oppose a specific candidate/party. In election control via social influence problem, an attacker tries to find a set of limited influencers to start disseminating a political message in a social network of voters. A voter will change his opinion when he receives and accepts the message. In constructive case, the goal is to maximize the number of votes/winners of a target candidate/party, while in destructive case, the attacker tries to minimize them. Recent works considered the problem in different models and presented some hardness and approximation results. In this work, we consider multi-winner election control through social influence on different graph structures and diffusion models, and our goal is to maximize/minimize the number of winners in our target party. We show that the problem is hard to approximate when voters’ connections form a graph, and the diffusion model is the linear threshold model. We also prove the same result considering an arborescence under independent cascade model. Moreover, we present a dynamic programming algorithm for the cases that the voting system is a variation of straight-party voting, and voters form a tree.

1. Introduction

Social media is an integral part of nowadays life. No one can ignore the effect of social media on different aspects of our life. Many people from all around the world are using social networks to provide/use various services like teaching/learning, spreading information, events’ announcements, and advertising. It has been shown that two-thirds of American adults get news on social mediaSM [1]. It is easy to find evidence that a social influence (SI) started by few users has influenced many people. Then, social media is a kind of cheap means to spread a message among many users. Note that the power of social media is not just like spreading a message or advertising. Its power comes from the fact that a user will receive news from those who have enough authority to change his opinion, like close friends, family members, and colleagues. Since using social influence is effective and cheap, it has been attracting the attention of many political campaigns and candidates to target the user’s opinion through SI. They disseminate a piece of information to change voters’ opinion. Many real case studies show that campaigns used social influence to change the voters’ opinion [2,3,4,5]. For example, Allcott and Gentzkow showed that 92% of Americans remembered pro-Trump false news, and 23% remembered pro-Clinton fake news [6].
There are two well-known diffusion models used in social influence called linear threshold model (LTM) and Independent Cascade Model (ICM) [7]. In LTM, a voter accepts a message if the sum over his incoming neighbors’ influence, who already accepted the message, is high enough. On the other hand, in ICM, a voter will accept a message if at least one of his incoming neighbors, who already accepted the message, can convince him to accept it (please see Section 2 for a formal definition of LTM and ICM).
In this paper, we consider the multi-winner election control via social influence problem. We are given a social network of voters, a limited budget, a set of candidates each belongs to a party, a dynamic diffusion model to spread a message among the voters, and an attacker/manipulator who supports/opposes a party. When we use LT diffusion model, we assume that the attacker knows the probability that each voter wants to vote for each candidate. To take into account the incoming influence of each node v, we use an updating rule based on the incoming influence from the node’s incoming activated neighbors, akin to [8]. On the other hand, when we use ICM, we assume the attacker knows the exact preferences list of all voters. When a node/voter becomes active/influenced/infected, in constructive (resp. destructive) case, it will promote (resp. demote) the position of the target candidates in its/his preference list, akin to [9,10] (see Section 3 for formal definition).
Regarding both LTM and ICM, there will be several winners, and they will be elected according to the overall candidates’ scores after the diffusion. In the constructive (resp. destructive) case, the attacker wants to find a set of nodes (voters), according to its budget, to start the diffusion and change the voters’ opinion to maximize (resp. minimize) the number of winners from his target party. In fact, in a given directed graph, we should find some diffusion starters to influence the voters such that the difference between the number of winners from our target party, w.r.t. the number of winners in the opponent party with the most winners, after and before the diffusion is maximized (resp. minimized). We present some results, including hardness of approximation, approximation, and polynomial-time exact algorithms considering some well-known objective functions on different structures.
Related works. There are many articles regarding voting manipulation (see the survey in [11]). The problem of finding a set of limited seed nodes from a given graph to maximize the expected number of influenced nodes is known as Influence Maximization (IM) problem. There exists an extensive literature about it, too [12]. Domingos and Richardson [13,14] introduced the IM problem, and Kempe et al. formalized it [7,15]. On the other hand, few works consider both of them together, i.e., the election control through social influence problem.
Wilder and Vorobeychik introduced the election control through SI problem regarding single-winner elections [10]. They investigated maximizing margin of victory (MoV) and probability of victory (PoV), where MoV is the difference of the score between the target candidate and the most voted opponent after and before the diffusion. The problem is considered under ICM. They showed maximizing MoV is N P -hard, and presented a 1 1 e -approximation algorithm concerning the optimal solution. Furthermore, for maximizing PoV, they showed that it is N P -hard to approximate the problem within any constant factor. Corò et al. [16,17] extended the work using any non-increasing scoring function under LTM. They demonstrated the same approximation factor for it. Abouei Mehrizi et al. considered the problem when the attacker knows a probability distribution over the candidates instead of the exact preferences list, under LTM [8]. They showed that maximizing/minimizing the expected probability to vote for a target candidate is hard to approximate within any constant factor under unique game with small set expansion conjecture. They also presented some constant factor approximation algorithms for a relaxed version of the problem. Abouei Mehrizi and D’Angelo showed that in multi-winner elections, when the manipulator wants to maximize/minimize the number of winners in his target party, the problem is inapproximable under ICM, except P = N P [9]. They also presented some constant factor approximation algorithms when the voting system is similar to the straight-party voting.
Bredereck and Elkind considered some different models, like bribing nodes/voters, adding or deleting edges under LTM. They showed that the problem is hard in those models. They also presented some polynomial-time algorithms for specific cases of the problem [18]. Castiglioni et al. investigated similar models under ICM. They showed that the problem is hard even in restricted structures. Regarding the bribing nodes to influence other voters, they proved that the election control is hard even if the given graph is a line. Furthermore, considering the edge removal/addition case, they demonstrated that the problem is hard even if the attacker has an infinite budget [19]. Faliszewsk et al. considered the problem where each voter has a preference list. Each node of the graph is representative of all users with the same opinions. There is an edge between two nodes if their opinion differs by the place of an adjacent pair of candidates. They used LTM and proved that maximizing the number of votes for the target candidate is N P -hard and fixed parameter tractable with respect to the number of candidates [20]. Furthermore, there is another model in which voters have a preference list over candidates, and voters will change their preference list according to the majority of their neighbors’ opinions [21,22,23].
Outline and our results. In Section 2, we define the most prominent diffusion models in the literature (called LTM and ICM) that we used in this paper. Section 3 defines our model and objective functions formally. We show that our problem is hard to approximate within any factor in a general graph when the diffusion model is LTM in Section 4. Section 5 contains the same result when the diffusion model is ICM, and the given graph is in the form of an arborescence, i.e., edges are from leaves to root of the tree. Moreover, in Section 6, we investigate the problem while the voting system is a variation of straight-party voting, where voters can vote for the parties. In other words, voters have a preference list (or probability distribution) over the candidates, but they can vote for the parties instead of candidates. We presented a polynomial-time algorithm based on the dynamic programming approach to find the maximum difference of votes for our target party before and after diffusion. It also gives a 1 3 and 1 2 -approximation algorithms for maximizing MoV in constructive and destructive models, respectively. Finally, we will discuss the results and future works in Section 7.

2. Background

In this section, we introduce two diffusion models that we have used in this paper, called linear threshold model (LTM) and independent cascade model (ICM) presented by Kemp et al. [7,15]. They are the most prominent dynamic diffusion models used in literature (see a survey on the topic [24]).

2.1. Linear Threshold Model

We are given a directed graph G = ( V , E ) . Each edge ( u , v ) E has a weight b u , v [ 0 , 1 ] . The sum of the incoming weight to each node v V is at most one, i.e., u N v i b u , v 1 , where N v i is the set of incoming neighbors of v. Furthermore, each node v V has a threshold t v [ 0 , 1 ] which is generated uniformly at random.
In this model, the diffusion will start from a set of nodes S V known as seed nodes. At the first step, just the seed nodes will become active/influenced/infected, and all other nodes are inactive. Let us show A i as the set of nodes that are active at step i, i.e., A 1 = S . The activation process, for each step i > 1 , is as follows: all nodes in A i 1 will remain active at step i, i.e., A i 1 A i ; moreover, each inactive node v V \ A i 1 will become active if the sum of the weight from its incoming activated neighbors is not less than its threshold, i.e., for each node v V \ A i 1 , it will be in A i if u N v i b u , v t v . The diffusion process will proceed in utmost | V | discrete steps, and it will stop as soon as no extra node becomes active, i.e., it stops at step k > 1 if A k = A k 1 . We use A S as the set of activated nodes after the diffusion process started from the set of seed nodes S. In what follows, to increase the readability of this article, when we say after S, it means after the diffusion process started from a set of seed nodes S. Note that the thresholds are not a part of the input, and they will be generated uniformly at random and independently when we run the process. Furthermore, the process is random, and several executions on the same graph may get different results for A S .
Kemp et al. [7] defined the IM problem as: Given a graph G = ( V , E ) and a budget B | V | . Find a set of seed nodes S V , ( | S | B ) so that the expected | A S | is maximized. They proved that the problem is N P -hard under LTM. Moreover, they showed that a greedy algorithm can solve the problem approximately within a factor of 1 1 e ϵ , where ϵ is any small constant and fixed number.

2.2. Independent Cascade Model

Consider a graph G = ( V , E ) with a weight b u , v [ 0 , 1 ] on each edge ( u , v ) E . The same as LTM, all nodes are inactive, and at the first step the seed nodes S V become active. Let us define S i as the nodes that were inactive at step i 1 and became active at step i, then S 1 = S . At each step i > 1 , each node v S i 1 will try to activate its outgoing neighbors with the probability of the edge between them. In other words, consider N v o as the set of outgoing neighbors of node v; for each u N v o , node v tries to activate u with the probability b v , u . If v has multiple outgoing neighbors, it tries to activate them in an arbitrary order. Note that a node becomes active once, let us say at step k, and try to activate its outgoing neighbors exactly once, at step k + 1 .
Kemp et al. [7] considered the IM under ICM. They showed that the greedy algorithm works for this model, too. They also demonstrated that it is N P -hard to approximate the problem within any factor better than 1 1 e .

3. Multi-Winner Election Control: Models and Objective Functions

In this section, we consider the Multi-Winner Election Control, where some parties are running for an election so that more than one candidate will be elected as the winner, like a parliament election. We consider t different parties C 1 , , C t , each of them contains k different candidates, i.e., C i = { c 1 i , , c k i } , 1 i t . We use C for the set of all candidates, i.e., C = i = 1 t C i . Furthermore, without loss of generality, we assume C 1 is our target party. Note that there will be exactly k winners for the election.

3.1. Multi-Winner Election Control under LTM

In this model, we investigate the case that the adversary does not know the preferences list of the voters; instead of that, for each voter, the attacker has a probability distribution over all candidates. This model is similar to the model known as probabilistic linear threshold ranking (PLTR) defined in [8]. Since most voters do not reveal their preferences in social media, then it is a realistic assumption.
The adversary tries to maximize/minimize the number of winners in his target party. For each node v V , we show π v as the probability distribution of the voter/node v over all candidates; we define π v ( c ) as the probability that the voter v votes for a specific candidate c C . Then for every node v V , and candidate c C we have π v ( c ) [ 0 , 1 ] , and c C π v ( c ) = 1 .
In LTM, each node has an incoming influence, which shows the amount of pressure from incoming neighbors to support/oppose a target party. We use this incoming influence of node v V to change its probability distribution. Let us define π ˜ v as the probability distribution of node v after S. Respectively, π ˜ v ( c ) is the probability that node v will vote for candidate c C after S. We use A S to show the set of nodes that will become active after S.
We consider a single message which spreads among the voters. The message contains some constructive/destructive information targeting all candidates in the target party. When a node v becomes active, its probability distribution will change according to the incoming influence from its activated neighbors. We have to normalize the vector in order to make sure that the sum of the probabilities is equal to one, after S. For constructive model the probability distribution of a node v A S changes as follows.
c C 1 : π ˜ v ( c ) = π v ( c ) + 1 | C 1 | u A S N v i b u v 1 + u A S N v i b u v , c C \ C 1 : π ˜ v ( c ) = π v ( c ) 1 + u A S N v i b u v .
Recall that N v i is the set of incoming neighbors of node v. Furthermore, considering the destructive case, the probability distribution of an active node v A S will change as follows.
c C 1 : π ˜ v ( c ) = π v ( c ) 1 + u A S N v i b u v c C \ C 1 : π ˜ v ( c ) = π v ( c ) + 1 | C \ C 1 | u A S N v i b u v 1 + u A S N v i b u v
By these changes (and normalization), we guarantee that the sum of the probability for each node is equal to 1. In both constructive and destructive cases, the probability distribution of inactive nodes v V \ A S will not change after S, i.e., π ˜ v = π v .
Let us define the expected number of votes for candidate c C after S, as F ( c , S ) = E A S [ v V π ˜ v ( c ) ] ; similarly, F ( c , Ø ) = E [ v V π v ( c ) ] is the expected number of votes for candidate c C before any diffusion.
Example 1.
Assume there are two parties supporting two candidates each, i.e., C = C 1 C 2 , C 1 = { c 1 1 , c 2 1 } , C 2 = { c 1 2 , c 2 2 } . There are five nodes in the given graph G = ( V , E ) , where their connections form a star and the weight of all edges is one, i.e., ( v 1 , v 2 ) , ( v 1 , v 3 ) , ( v 1 , v 4 ) , ( v 1 , v 5 ) E , b v 1 , v 2 = b v 1 , v 3 = b v 1 , v 4 = b v 1 , v 5 = 1 . Let us consider the probability distribution of each node v V as π v = π v ( c 1 1 ) , π v ( c 2 1 ) , π v ( c 1 2 ) , π v ( c 2 2 ) . We set the probability distribution of all nodes as 1 8 , 1 8 , 3 8 , 3 8 . Then before any diffusion, the candidates’ score is
F ( c 1 1 , Ø ) = F ( c 2 1 , Ø ) = 5 8 , F ( c 1 2 , Ø ) = F ( c 2 2 , Ø ) = 15 8 ,
and none of our target candidates have less score than their opponents. Consider the constructive model in which the adversary’s budget is one, i.e., he can select one node to influence the voters and change their opinion. Since the node v 1 V is the most influential node in the graph, the adversary selects it as his seed node. It activates all nodes in the graph, and their probability distribution will be updated as follows.
π ˜ v 1 = 1 8 , 1 8 , 3 8 , 3 8 , π ˜ v 2 = π ˜ v 3 = π ˜ v 4 = π ˜ v 5 = 5 16 , 5 16 , 3 16 , 3 16 ,
and the expected number of votes for the candidates is
F ( c 1 1 , S ) = F ( c 2 1 , S ) = 11 8 , F ( c 1 2 , S ) = F ( c 2 2 , S ) = 9 8 ,
and our target candidates’ score is more than their opponents’ score.

3.2. Multi-Winner Election Control under ICM

Our model is similar to the work presented in [9]. We briefly mention the model bellow. In this model, despite LTM, we assume that the attacker knows the voters’ preference list. Each voter v V has a preferences list π v . Abusing the notations, 1 π v ( c ) t k is the rank of candidate c in the preference list of the voter v. After the diffusion, inactive voters will keep their original opinions, i.e., v V \ A S : π ˜ v = π v ; however, the activated voters will change their preferences list as follows. Remind that A S is the set of activated nodes after S.
  • Constructive: For each node v A S and for each target candidate c C 1 , the new position of c in π ˜ v is
    π ˜ v ( c ) = π v ( c ) 1 i f c C \ C 1 s . t . π v ( c ) < π v ( c ) π v ( c ) o t h e r w i s e ,
    also, for other candidates c C \ C 1 , if there is a candidate c C \ C 1 s.t. π v ( c ) = π v ( c ) + 1 , then we set π ˜ v ( c ) = π v ( c ) ; otherwise the new rank of the candidate c will be calculated as follows.
    π ˜ v ( c ) = π v ( c ) + | { c C 1 | π v ( c ) > π v ( c ) ( c ¯ C \ C 1 : π v ( c ) < π v ( c ¯ ) < π v ( c ) ) } | .
  • Destructive: For each node v A S and for each target candidate c C 1 , we have
    π ˜ v ( c ) = π v ( c ) + 1 i f c C \ C 1 s . t . π v ( c ) > π v ( c ) π v ( c ) o t h e r w i s e ,
    while for c C \ C 1 , if there exists a candidate c C \ C 1 s.t. π v ( c ) = π v ( c ) 1 we set π ˜ v ( c ) = π v ( c ) , otherwise we have
    π ˜ v ( c ) = π v ( c ) | { c C 1 | π v ( c ) < π v ( c ) ( c ¯ C \ C 1 : π v ( c ) < π v ( c ¯ ) < π v ( c ) ) } | .
In this article, we consider the plurality scoring rule for simplicity, where just the most preferred candidate of each voter gets one score. However, the results can be extended for any non-increasing scoring function, e.g., k-approval, anti-plurality, and Borda’s rule [25]. Let us denote by F ( c , Ø ) , F ( c , S ) , the expected score of candidate c before and after S, respectively; formally, c C : F ( c , Ø ) = v V 1 π v ( c ) = 1 , F ( c , S ) = E A S v V 1 π ˜ v ( c ) = 1 . (If we want to generalize the problem and consider any non-increasing scoring function g ( · ) , the functions would be defined as F ( c , Ø ) = v V g ( π v ( c ) ) , F ( c , S ) = E A S [ v V g ( π ˜ v ( c ) ) ] ).
Example 2.
Consider the graph G and candidates C in Example 1. Let set the voters’ preference list as follows.
π v 1 = c 1 1 c 2 1 c 1 2 c 2 2 , π v 2 = c 1 2 c 2 1 c 1 1 c 2 2 , π v 3 = c 2 2 c 1 2 c 1 1 c 2 1 , π v 4 = c 1 2 c 2 1 c 1 1 c 2 2 , π v 5 = c 2 2 c 1 1 c 1 2 c 2 1 ,
where a b means a is preferred to b. The candidates’ score before any diffusion is
F ( c 1 1 , Ø ) = 1 , F ( c 2 1 , Ø ) = 0 , F ( c 1 2 , Ø ) = F ( c 2 2 , Ø ) = 2 ,
and before any diffusion, both of our target candidates have less score than their opponents. Consider the constructive case where the adversary’s budget is one. The same as Example 1, the adversary selects the node v 1 as a seed node, and it activates all nodes in the graph. After S, the voters update their preference list as follows.
π v 1 = c 1 1 c 2 1 c 1 2 c 2 2 , π v 2 = c 2 1 c 1 1 c 1 2 c 2 2 , π v 3 = c 2 2 c 1 1 c 2 1 c 1 2 , π v 4 = c 2 1 c 1 1 c 1 2 c 2 2 , π v 5 = c 1 1 c 2 2 c 2 1 c 1 2 ,
and the candidates’ score will be as follows.
F ( c 1 1 , S ) = F ( c 2 1 , S ) = 2 , F ( c 1 2 , S ) = 0 , F ( c 2 2 , S ) = 1 ,
and both of the target candidates get more vote than their opponents.

3.3. Objective Functions

In this paper, our goal is to maximize/minimize the number of winners from our target party. Then the objective functions are the same as [9]. Considering both IC and LT models, we define F ( C 1 , S ) as the number of candidates in C 1 that are among the winners. Formally, consider a set of given activated nodes A S , which became active after S. Let us define F A S ( c ) as the expected number of votes that candidate c will receive while A S is the set of activated nodes. We set Y A S ( c ) as the number of candidates c C \ { c } where the expected number of their votes is less than c. In order to consider the tie-breaking rule, if F A S ( c i j ) = F A S ( c i j ) , then c i j has more priority than c i j if j < j , or j = j i < i . Then Y A S ( c ) is defined as
Y A S ( c i j ) = | { c i j C | F A S ( c i j ) > F A S ( c i j ) ( F A S ( c i j ) = F A S ( c i j ) ( j < j ( j = j i < i ) ) } | .
By this definition, we define F ( C 1 , S ) as the expected number of winners from party C 1 , i.e., F ( C 1 , S ) = E A S c C 1 1 Y A S ( c ) ( t 1 ) k .
Now, let us define the first objective function as Difference of Winners (DoW), where is the difference between the number of winners in our target party before and after S. Formally, in constructive (resp., destructive) model we define D o W c (resp., D o W d ) as
D o W c ( C 1 , S ) = F ( C 1 , S ) F ( C 1 , Ø ) , D o W d ( C 1 , S ) = F ( C 1 , Ø ) F ( C 1 , S ) .
The problem of constructive difference of winners (CDW) asks for finding a set of seed nodes S ( | S | B ) to maximize D o W c ( C 1 , S ) . Similarly, destructive difference of winners (DDW) refers to the problem of finding a set of seed node S ( | S | B ) to maximize D o W d ( C 1 , S ) .
As the second objective function, we define a more compelling one called Margin of Victory (MoV). For constructive case, we define it as DoW plus the difference between the number of winners in the opponent parties with the most winners after and before S. Formally, for constructive (resp., destructive) case, we define M o V c (resp., M o V d ) as
M o V c ( C 1 , S ) = F ( C 1 , S ) F ( C A S , S ) F ( C 1 , Ø ) F ( C B , Ø ) , M o V d ( C 1 , S ) = F ( C 1 , Ø ) F ( C B , Ø ) F ( C 1 , S ) F ( C A S , S ) ,
where C B , C A S , respectively, are the opponent parties with the most winner before and after S.
The constructive margin of victory (CMV) problem is looking for a set of seed nodes S ( | S | B ) in order to maximize M o V c ( C 1 , S ) . Similarly, destructive margin of victory (DMV) refers to the problem of finding a set of seed nodes S ( | S | B ) to maximize M o V d ( C 1 , S ) .

4. Multi-Winner Election Control on Graph under LTM

It is proven that the problem is N P -hard to approximate within any factor of approximation using ICM [9]. In this part, we prove the same statement considering LTM.
Theorem 1.
It is N P -hard to approximate CMV and CDW within any factor on a given graph under LTM.
Proof. 
Let us reduce the vertex cover (VC) problem to any approximation algorithm for CDW (reps., CMV). In VC, we are given an undirected graph G = ( V , E ) and an integer k; the decision question is: Is there a set of nodes V V ( | V | k ) so that for each edge ( u , v ) E , at least one of its vertices are in V ? Assume I ( G , B ) is a given instance for VC problem, where G = ( V , E ) is the given graph, and B is an integer value. We create an instance I ( G , B ) for CDW (reps., CMV) so that G = ( V V V , E ) is the graph build from G, and B is also the budget for our problem. Let us consider a case where there are two parties and four candidates, i.e., t = k = 2 , C = C 1 C 2 , C 1 = { c 1 1 , c 2 1 } , C 2 = { c 1 2 , c 2 2 } . We fix the order of candidates in the probability distribution of the voter v as π v = ( π v ( c 1 1 ) , π v ( c 2 1 ) , π v ( c 1 2 ) , π v ( c 2 2 ) ) , and build G as follows.
  • For each undirected edge ( u , v ) E add two directed edges ( u , v ) , ( v , u ) to E . Set the weight of each incoming edge to a node v V as 1 | N v i | . By this the sum over weight of all incoming edges is equal to one, i.e., v V : u N v i b u , v = 1 .
  • For each node v V , add two more nodes v , v to V , V , respectively. Furthermore, add an edge ( v , v ) to E with b v , v = 1 . Formally, v V : v V , v V , ( v , v ) E s . t . b v , v = 1 . Note that nodes in V are isolated.
  • Set the preferences list of the nodes as follows.
    v V , π v = ( 1 2 , 1 2 , 0 , 0 ) , v V , π v = ( 1 2 , 0 , 1 2 , 0 ) , v V , π v = ( 0 , 0 , 1 2 , 1 2 ) .
By this reduction, the score of candidates before any diffusion is F ( c 1 1 , Ø ) = F ( c 1 2 , Ø ) = | V | , F ( c 2 1 , Ø ) = F ( c 2 2 , Ø ) = 1 2 | V | . Then F ( C 1 , Ø ) = F ( C 2 , Ø ) = 1 .
Note that in this reduction a node v will become active deterministically, if either it is selected as a seed node, or all of its incoming neighbors are selected as the seed nodes. Then if we can find a set of seed nodes S V so that it activates all nodes in V deterministically, the seed set S is also an answer for the corresponding VC problem.
In any approximation algorithm, we know that S V after the diffusion; otherwise, if there is a node v V S we can replace it with its incoming neighbor v V such that ( v , v ) E and we get at least the same value for M o V c , D o W c . Furthermore, if there exists a node v V S one of the following situations holds:
  • There exists an inactive node v V \ A S after the diffusion S. In this case, we can substitute v for v and then we get at least the same D o W c , M o V c .
  • There is no inactive node v V \ A S . In this case, according to the nodes’ probability distribution, when all nodes in V become active, the value of M o V c and D o W c is maximum. Then even if we remove v from S it does not change the value of M o V c or D o W c . By the way, in this situation, if there exist any node v V \ A S we replace v with it, otherwise we replace it with a node v V \ S .
Then from now on, we assume S V .
If all nodes in V become active, since they have an outgoing edge to all nodes v V with probability one, then all nodes in V V will become active, and the score of the candidates will be as follows.
F ( c 1 1 , S ) = | V | , F ( c 2 1 , S ) = F ( c 1 2 , S ) = 3 4 | V | , F ( c 2 2 , S ) = 1 2 | V | .
Then F ( C 1 , S ) = 2 , F ( C 2 , S ) = 0 , D o W c ( C 1 , S ) > 0 , M o V c ( C 1 , S ) > 0 , and any approximation algorithm will return a positive value, then the answer of I will be YES.
On the other hand, if there is a node v V , which is inactive after the diffusion, i.e., v V \ A S , the score of candidates will be as follows.
F ( c 1 1 , S ) = | V | , F ( c 2 1 , S ) < 3 4 | V | , F ( c 1 2 , S ) > 3 4 | V | , F ( c 2 2 , S ) = 1 2 | V | .
Then F ( C 1 , S ) = F ( C 2 , S ) = 1 , D o W c ( C 1 , S ) = M o V c ( C 1 , S ) = 0 , and any approximation algorithm will return zero, then the answer of I will be NO.
For the other direction, note that if we can find a set of nodes S V , which is an answer for I , using the same set of nodes, we can activate all nodes in V V and D o W c ( C 1 , S ) > 0 , M o V c ( C 1 , S ) > 0 .
To extend the proof for any number of parties (t) and candidates (k), we need to assign the probability distribution as follows, and the same approach concludes the proof for any t , k > 2 . The same as before, the order of the candidates in probability distribution of a voter v is π v = ( π v ( c 1 1 ) , , π v ( c k 1 ) , π v ( c 1 2 ) , , π v ( c k 2 ) , , π v ( c 1 t ) , , π v ( c k t ) ) .
v V , π v = ( 1 k , 1 k , , 1 k k , 0 , , 0 k ( t 1 ) ) , v V , π v = ( 1 k , 1 k , , 1 k k 1 , 0 , 1 k , 0 , , 0 k ( t 1 ) 1 ) , v V , π v = ( 0 , , 0 k , 1 k , , 1 k k , 0 , , 0 k ( t 2 ) ) .
 □
The following theorem proves the same statement for the destructive case of the problem.
Theorem 2.
It is N P -hard to approximate DMV and DDW within any factor on a given graph under LTM.
Proof. 
The reduction is similar to the constructive case. Consider the case where t = k = 2 . We should set the voters’ probability distributions such that one of our target candidates be among the losers before and after any diffusion. Furthermore, another target candidate is among the winners before any dissemination; however, he will lose the election if and only if all nodes in the connected part of the graph become active. Please note that, since our target candidates have more priority than the others, we need one more node to be able to do that.  □

5. Multi-Winner Election Control on Arborescence under ICM

In this section, instead of a general graph, we consider an arborescence structure. We are given a tree G = ( V , E ) and a budget B where the directed edges are from leaves towards the root under ICM. We are asked to find at most B seed nodes to maximize M o V c and D o W c .
It has been shown that the problem in inapproximable on a general graph, except P = N P [9]. Bharathi et al. conjectured that the IM problem considering ICM on arborescence is N P -hard [26]. Lu et al. proved that the conjecture is true [27], while Wang et al. showed that the IM problem accepts a polynomial-time algorithm on arborescence under LTM [28]. In the following, we show that our problem is hard to approximate within any factor of approximation on arborescence under ICM.
Theorem 3.
It is N P -hard to find an approximation algorithm for CMV and CDW on arborescence under ICM.
Proof. 
We show the hardness by reducing the IM problem to our problem. Given an instance I ( T , B ) of IM problem where T = ( V , E ) is the tree (arborescence), and B is the budget. Let us define the decision version of the problem as follows: is there at most B seed nodes so that it activates all nodes of the tree in expected?
We consider the case where there are two parties and each of them have just two candidates, i.e., C = C 1 C 2 , C 1 = { c 1 1 , c 2 1 } , C 2 = { c 1 2 , c 2 2 } . Furthermore, for simplicity, we consider the plurality scoring rule. The proof can be extended for any number of parties and candidates using any non-increasing scoring function, akin to [29].
Let us create an instance of our problem I ( T , B ) as follows, where T = ( V V V , E ) is a tree, and B is the same budget for both problems.
  • For each node v V we add two more nodes v , v to V , V , respectively, i.e., v V : v V , v V .
  • For each node v V we add an edge ( v , v ) to E where b v , v = 1 .
  • Set the preference list of all nodes as follows.
    v V : c 1 2 c 2 2 c 1 1 c 2 1 , v V : c 2 2 c 1 2 c 2 1 c 1 1 , v V : c 1 2 c 1 1 c 2 1 c 2 2
Clearly, seed nodes will be selected from V, i.e., S V ; otherwise, if there is a node v S V , then the node is useless and does not affect D o W c or M o V c . If there is a node v S V , we can replace it with its incoming neighbor and get at least the same value for D o W c and M o V c .
Using aforementioned polynomial-time reduction, if there exists a set of nodes S V ( | S | B ) so that M o V c > 0 (resp. D o V c > 0 ), then the node will activate all nodes in V V . Hence, we can select the same set and they will activate all nodes in T; then the answer of I will be YES. On the other hand, if M o V c = 0 (resp. D o W c = 0 ), it means there is no seed set can activate all nodes in V V ; then the answer of I is NO. More formally, before any diffusion the score of candidates is
F ( c 1 1 , Ø ) = F ( c 2 1 , Ø ) = 0 , F ( c 1 2 , Ø ) = 2 | V | , F ( c 2 2 , Ø ) = | V | .
Then, none of the candidates in our target party will be elected as winner. After S, if there exists an inactive node in V V , then the the score of candidates will be as follows:
F ( c 1 1 , S ) < | V | , F ( c 2 1 , S ) = 0 , F ( c 1 2 , S ) > | V | , F ( c 2 2 , S ) = | V | .
In this case also, none of our target candidates will be among the winners, and M o V c = D o W c = 0 . However, if all nodes in V V become active after S, the score of the candidates will be as follows and one of our target candidates ( c 1 1 ) will be elected as winner and any approximation algorithm will return M o V c > 0 (resp. D o W c > 0 ). It concludes the prove.
F ( c 1 1 , S ) = | V | , F ( c 2 1 , S ) = 0 , F ( c 1 2 , S ) = | V | , F ( c 2 2 , S ) = | V | .
 □
The following theorem demonstrates the same hardness of approximation for the destructive case of our problem.
Theorem 4.
It is N P -hard to find an approximation algorithm for DMV and DDW on arborescence under ICM.
Proof. 
The prove for the destructive case is similar to the constructive one. Consider I in Theorem 3, we need to set the preferences list of the nodes so that all of our target candidates win the election before any diffusion; however, after the diffusion, one of them (let us say c C 1 ) will lose if and only if all nodes in V V become active. Note that since our target candidates have more priority than the others, we need one more isolated node to ensure that c will lose the election after the diffusion. Following the same approach concludes the statement.  ☐

6. Multi-Winner Election Control on Tree Using Straight-Party Voting

In this part, we consider the problem on a variation of the straight-party voting system (also called straight-ticket voting) in which the voters can vote for a party instead of candidates [30,31]. This model is used in many real elections [32,33]. The multi-winner election control problem via social influence under ICM and a general graph is considered in [9]. They showed that the problem is hard, and presented some constant factor approximation using straight-party voting system. In this section, we consider the problem on a tree where the edges are directed from root to the leaves.
In the rest of this section, we assume the given tree is a binary tree as we can convert any tree T to a binary tree T by adding O ( n ) fake nodes. However, our algorithm can use the fake nodes to navigate the tree, but they neither have a probability distribution (preference list) nor can be selected as a seed node. To ensure that the fake nodes will not change the diffusion process on the tree, the weight of each incoming edge to each fake node should be equal to one. Moreover, the weight of an edge from a fake node to an original node is equal to the weight of the original node’s incoming edge in T.
In the following, we present some dynamic programming (DP) algorithm to maximize D o V c s p v (and D o V d s p v ). Given a tree T = ( V , E ) , and budge B, the idea is that for a fixed node v V and budget k ( 0 k B ), we calculate the maximum outcome from the sub-tree rooted at v, among the following cases: First, select the node v and try to find the other k 1 seed nodes in its children. Second, do not select v and look for k seed nodes in its children.
We define r ( v ) , l ( v ) , f ( v ) , respectively, as the right child, left child, and the parent (father) of the node v. In Section 6.1 we consider the problem under LTM, and in Section 6.2 the problem is investigated under ICM.

6.1. Multi-Winner Election Control Using Straight-Party Voting under LTM

In this section, the voters have preferences list over the candidates. However, they vote for a party proportional to the probability of voting for all candidates in each party. Let us define F s p v ( C 1 , Ø ) , F s p v ( C 1 , S ) , as the sum of the scores for our target party C 1 before and after S, respectively. Formally they are defined as follows.
F s p v ( C 1 , Ø ) = E v V c C 1 π v ( c ) , F s p v ( C 1 , S ) = E A S v V c C 1 π ˜ v ( c ) .
The same as before we define the objective function MoV and difference of votes (DoV), for constructive case, as follows.
D o V c s p v ( C 1 , S ) = F s p v ( C 1 , S ) F s p v ( C 1 , Ø ) , M o V c s p v ( C 1 , S ) = F s p v ( C 1 , S ) F s p v ( C A S , S ) F s p v ( C 1 , Ø ) F s p v ( C B , Ø ) ,
while C B and C A S are the most voted opponent party before and after S, respectively. For destructive model the objective functions are defined as
D o V d s p v ( C 1 , S ) = F s p v ( C 1 , Ø ) F s p v ( C 1 , S ) , M o V d s p v ( C 1 , S ) = F s p v ( C 1 , Ø ) F s p v ( C B , Ø ) F s p v ( C 1 , S ) F s p v ( C A S , S ) .

6.1.1. Maximizing DoV in Straight-Party Voting under LTM

We define F v as the set of possible probabilities that the node f ( v ) may become active. More precisely, consider all nodes in the path from root to the v as F v = { v 0 , v 1 , , v t = f ( v ) } (recall that f ( v ) is the parent of v). If none of the nodes in F v are selected as a seed node, then the probability that f ( v ) becomes active by his incoming influence is zero. If just the root ( v 0 ) is selected as the seed node, then the probability that f ( v ) becomes active is i = 0 i < t b v i , v i + 1 ; also, if v 1 is selected as a seed node but none of the nodes v i , 2 i t , are selected as a seed node, the probability that f ( v ) becomes active by its parent is i = 1 i < t b v i , v i + 1 , and so on; all these probabilities belong to F v .
Let us define D o V c ( v , k , S , p ) as the maximum value of the sum over the difference of probability to vote for our target party after and before S in the sub-tree rooted at v while p F v is the probability that its parent is active, and the budget is k. Furthermore, all selected seed nodes will be in S. In other words, D o V c ( v , k , S , p ) = m a x { D o V c s p v ( C 1 , S ) } in the sub-tree rooted at v while it will become active with probability p · b f ( v ) , v and | S | k . The formal definition of D o V c ( v , k , S , p ) is as follows:
D o V c ( v , k , S , p ) = m a x { m a x k = 0 k D o V c r ( v ) , k , S , p · b f ( v ) , v + D o V c l ( v ) , k k , S , p · b f ( v ) , v + p · b f ( v ) , v · D v , m a x k = 0 k 1 D o V c r ( v ) , k , S { v } , 1 + D o V c l ( v ) , k k 1 , S { v } , 1 + D v } ,
where D v is the increased score of our target party made by the node v if it becomes active, which is
D v = c C 1 π v ( c ) + 1 | C 1 | · p · b f ( v ) , v 1 + p · b f ( v ) , v π v ( c ) .
We can calculate and store the values in a two-dimensional array A [ B + 1 , | V | ] where the rows are the budgets (starting from zero to B), and the columns are the nodes of the tree presented as the BFS reverse order, and each cell ( i , j ) ( 0 i B , 0 j < | V | ) of the array refers to another array A [ | F v j | ] . Then in the worst case, since the budget B, and | F v j | (for any v j V ) are at most equal to | V | , then we can solve the problem in polynomial time using O ( | V | 3 ) memory. Note that we have to fill the matrix A left-to-right and top-down, while for each cell of it we can fill the corresponding array A in any order.
As the base cases, for each leaf v V , and p F v , if k > 0 we set D o V c ( v , k , S , p ) = D v , otherwise, if k = 0 we have D o V c ( v , k , S , p ) = p · b f ( v ) , v · D v which is the difference of the probability to vote for our party after and before diffusion S, made by the node v. In fact, if the budget is greater than zero, the node will become active for sure, and we need to consider the difference of scores, but if the budget is zero we cannot select it as a seed node and the value should be multiplied by the probability that the node will become active, i.e., p · b f ( v ) , v . We also define D o V c ( n u l l , k , S , p ) = 0 , that is, the value of D o V c for a null reference is zero. It is useful when a node has just left (resp. right) child, then the value of the function for its right (resp. left) child, regardless of the other parameters, is zero. The pseudo-code of the DP is presented in Algorithm 1, which calculates the maximum D o V c s p v ; by small changes, it can find the seed nodes too. Note that the final answer will be calculated by D o V c ( v r o o t , B , Ø , 0 ) where v r o o t is the root node of the tree, B is the budget, Ø represents that we have no seed node so far, and 0 means the parent of the root node will be activated with zero probability. The following theorem shows that the DP works well.
Algorithm 1: Calculating maximum DoV c for e given tree T and budget B when the diffusion model is LTM and voting system is straight-party voting.
Algorithms 13 00251 i001
Theorem 5.
Given a tree T = ( V , E ) and budget B, the DP Equation (3) finds a set of seed nodes S ( | S | B ) to maximize D o V c s p v .
Proof. 
Consider the matrix A [ B + 1 , | V | ] where each cell A [ k , v ] point to another array A where the columns are all possible probabilities that f ( v ) will become active. Calculating all possible probabilities for the array A , we have at most | F v | columns for each node v V and budget 0 k B , and for each of them, we need to calculate and store the maximum D o V c .
Please note that if f ( v ) becomes active, it can activate v with a probability equal to the weight of the edge between them ( b f ( v ) , v ). It holds because each node has just one incoming edge (its parent), and the threshold of the node will be generated uniformly at random. Then the probability that the threshold of the node v be less than (or equal) to the weight of the incoming edge is b f ( v ) , v .
Let us show that all values in the arrays will be calculated correctly, by induction. To see that, consider the base cases. For each leaf v V , the node cannot activate any other node as it has no outgoing edge. Then, these nodes cannot change the probability distribution of other nodes. In other words, each leaf will change just its own probability distribution. If k = 0 , it means that we cannot select the node as a seed node, and we need to consider the probability of activating the node, because just activated nodes can update their probability distribution after the diffusion. Then if k = 0 , we have D o V c ( v , k , S , p ) = p · b f ( v ) , v · D v , where D v is the difference of the party’s score if the node v becomes active (defined in Equation (4)), and p · b f ( v ) , v is the probability that the node will be activated by its parent. On the other hand, if k > 0 , we can select v as a seed node, and it will be activated with the probability of one, then we have D o V c ( v , k , S , p ) = D v . Using the updating rule (defined in Section 3.1), and the definition of D o V c s p v (defined in Equation (1)), the base cases are true.
Let us define ( i , j ) < ( i , j ) if j < j , or j = j i < i . We have shown that all arrays A related to the base cases filled out correctly. Now by induction step, assume all related arrays related to pair ( i , j ) smaller than ( i , j ) are correctly calculated. In order to calculate the A related to A [ i , j ] , for each column p F v j we use following formula
D o V c ( v j , i , S , p ) = m a x { m a x k = 0 i D o V c r ( v j ) , k , S , p · b f ( v j ) , v j + D o V c l ( v j ) , i k , S , p · b f ( v j ) , v j + p · b f ( v j ) , v j · D v j , m a x k = 0 i 1 D o V c r ( v j ) , k , S { v j } , 1 + D o V c l ( v j ) , i k 1 , S { v j } , 1 + D v j } ,
in which the first maximization considers the maximum value among all possible cases that we do not select the node v j as a seed node, and the second one considers the maximum value among all possible cases that we choose v j as a seed node. The last term in each maximization is the increased amount of D o V c in the node v j , which is according to the probability that v j will become active. Note that in the above formula, we are using the value of D o V c for the children of v j , and the nodes are sorted as the BFS reverse order, then all required values are correctly calculated before, and we are selecting the maximum value among all possible cases. Then D o V c ( v j , i , S , p ) will find the maximum possible value of D o V c s p v correctly and concludes the proof. □
For the destructive model, we define D o V d ( v , k , S , p ) as the maximum difference of probability to vote for our target party before and after S in the sub-tree rooted at v, while the budget is k and p F v is the probability that f ( v ) will become active. Formally, we define D o V d ( v , k , S , p ) as follows.
D o V d ( v , k , S , p ) = m a x { m a x k = 0 k D o V d r ( v ) , k , S , p · b f ( v ) , v + D o V d l ( v ) , k k , S , p · b f ( v ) , v + p · b f ( v ) , v · D v , m a x k = 0 k 1 D o V d r ( v ) , k , S { v } , 1 + D o V d l ( v ) , k k 1 , S { v } , 1 + D v } ,
where D v = c C 1 π v ( c ) π v ( c ) 1 + p · b f ( v ) , v is the difference that the node v can apply. Moreover, for the base cases of the problem, for each leaf v V , and each probability p F v , if k = 0 we need to consider the probability that the node will become active, then D o V d ( v , k , S , p ) = p · b f ( v ) , v · D v ; otherwise, if k > 0 , we have D o V d ( v , k , S , p ) = D v . Furthermore, we set D o V c ( n u l l , k , S , p ) = 0 . The same as constructive case, for implementation we need a tow-dimensional array A [ B + 1 , | V | ] . Moreover, for each cell ( i , j ) , 0 i B , 0 j < | V | , we keep another array A [ | F v j | ] , where F v j is the set of possible probabilities that the node f ( v j ) can become active. The following theorem shows that by filling the matrix A left-to-right and up-down direction, we can find the optimal answer for D o V d s p v .
Theorem 6.
Given a tree T = ( V , E ) and a budget B, using the DP Equation (5), we can find a set of seed nodes S ( | S | B ) to maximize D o V d s p v .
Proof. 
The proof is similar to Theorem 5, except for the base cases and the way of updating each activated node’s probability distribution after the diffusion. Since a leaf cannot activate any other node, the only change that it can make is updating its own probability distribution. According to the updating rule (in Section 3.1), and the definition of D o V d s p v (defined in Equation (2)), the base cases hold. Furthermore, by induction, we can see that the DP Equation (5) will find the maximum value of D o V d s p v correctly.  □

6.1.2. Maximizing MoV in Straight-Party Voting under LTM

In order to maximize M o V c s p v we have to know C A S , i.e., the most voted opponent party after S. We have no problem to find the most voted opponent party before any diffusion ( C B ); however, to find the most voted opponent party after S we need to have the optimal set of seed nodes that maximizes M o V c s p v , and to find the optimal set of seed nodes we need the most voted opponent party (parties), which is a defective cycle.
To deal with this problem, someone may say that we consider C i , 2 i t as the most voted opponent party after S, and solve the related DP; after finding the outcome for all t 1 parties, we select the maximum result as the output. Nevertheless, this is not true in all cases. Consider a case that there are two opponent parties, and each of them has half of the votes before any diffusion. If we consider each of them as the most voted opponent after the diffusion, we will get a wrong outcome as they both can be the most voted opponent after different diffusion processes. In fact, we need to consider multiple parties as the most voted opponent party.
By the way, it has been shown that by maximizing D o V c s p v we get a 1 3 -approximation factor for maximizing M o V c s p v . Moreover, by maximizing D o V d s p v we get a 1 2 -approximation answer for maximizing M o V d s p v [8].

6.2. Multi-Winner Election Control Using Straight-Party Voting under ICM

As we saw in previous section (in LTM), each node v becomes active either by being among the seed nodes or by the incoming influence from its parent f ( v ) . Since there is just one incoming edge for each node v V , and the threshold of the nodes t v is generated uniformly at random, then the probability that its threshold be less than or equal to the incoming weight ( b f ( v ) , v ) is equal to b f ( v ) , v . In other words, the node will become active from its parent with the probability that its parent f ( v ) is active, times the weight of the edge between them. On the other side, in ICM, a node v becomes active if it is either selected as a seed node or its parent f ( v ) is activated and tries to influence v with the probability b f ( v ) , v . Then in a tree, the activation processes in both LTM and ICM are the same.
However, the updating rule is entirely different in them. In other words, in LTM, voters have a probability distribution over the candidates, and the activated nodes will update the probability of voting for candidates regarding the influence from activated incoming neighbors, while in ICM, voters have an exact preferences list over candidates, and the activated nodes promote/demote the position of some candidates in their preference list, regardless of neighbors (see Section 2 for a formal definition).
Since the diffusion process in ICM is the same as LTM, we focus more on updating part of the problem to maximize D o V c s p v . Recall that we consider the plurality scoring rule for simplicity; however, it is possible to extend the results to any non-increasing scoring function. Then the scoring function F s p v for our target party is defined as follows. (To extend the result using any non-increasing scoring function g ( · ) , we should define the functions as F s p v ( C 1 , Ø ) = v V c C 1 g ( π v ( c ) ) , F s p v ( C 1 , S ) = E A S v V c C 1 g ( π ˜ v ( c ) ) .)
F s p v ( C 1 , Ø ) = v V c C 1 1 π v ( c ) = 1 , F s p v ( C 1 , S ) = E A S v V c C 1 1 π ˜ v ( c ) = 1 ,
and the objective functions for the constructive and destructive cases of our problem are the same as Equations (1) and (2), respectively.

6.2.1. Maximizing DoV in Straight-Party Voting under ICM

In this case, node v can increase our target party’s score by one, if none of our target candidates are in the first position before any diffusion, and one of them is in the second position of the voter’s preference list. In other words, the voter v may increase the score of our target party if c C 1 , c C \ C 1 : π v ( c ) = 1 π v ( c ) = 2 ; otherwise, the node v can influence its children and change their opinion, but it cannot affect the target party’s score. We call this condition as pre-condition and show it by v . We define F v as the set of all possible probabilities that the node v may become active (Please note that the definition of F v in ICM is different from LTM). Consider a sub-tree rooted at v V , budget k, seed set S, and p F v , we define D o V c ( v , k , S , p ) as follows.
D o V c ( v , k , S , p ) = m a x { m a x k = 0 k { D o V c ( r ( v ) , k , S , p · b v , r ( v ) ) + D o V c ( l ( v ) , k k , S , p · b v , l ( v ) ) } + p · 1 v , m a x k = 0 k 1 { D o V c ( r ( v ) , k , S { v } , b v , r ( v ) ) + D o V c ( l ( v ) , k k 1 , S { v } , b v , l ( v ) ) } + 1 v } .
As the base cases of the problem, for each leaf v V , budget zero, and p F v as the probability that v will become active, we set D o V c ( v , k , S , p ) = p · 1 v , and for the same parameters except a budget k > 0 we set D o V c ( v , k , S , p ) = 1 v . (To extend the algorithm for any non-increasing scoring function g ( · ) , we need to define the base cases, respectively, as D o V c ( v , k , S , p ) = p · ( c C 1 , c C \ C 1 : π v ( c ) < π v ( c ) g ( π v ( c ) 1 ) g ( π v ( c ) ) ) and D o V c ( v , k , S , p ) = c C 1 , c C \ C 1 : π v ( c ) < π v ( c ) g ( π v ( c ) 1 ) g ( π v ( c ) ) .) The same as before, for each reference to a node which does not exists ( n u l l ), we define D o V c ( n u l l , k , S , p ) = 0 . In order to implement the DP Equation (6), the idea is the same as Algorithm 1. The following theorem shows that it calculates the maximum D o V c s p v in polynomial-time.
Theorem 7.
Given a tree T = ( V , E ) , and budget B, the DP Equation (6) gives a set of seed nodes S ( | S | B ) which maximizes D o V c s p v .
Proof. 
In DP Equation (6), there is a maximization over two other maximization formulae. The first one considers the case that we do not select v as a seed node; in this case, we consider the probability that node v will become active, i.e., p F v . The second maximization considers selecting v as a seed node; in this state, v will be activated with probability equal to one. In both cases, the node may increase the function’s value if the pre-condition holds; otherwise, it can influence its children. The same as previous proves, we show that it works by induction.
Consider a two-dimensional array A [ B + 1 , | V | ] where rows are the budgets from zero to B, and columns are the nodes in BFS reveres order. Each cell A [ i , j ] ( 0 i B , 0 j < | V | ) refers to another array A with the size of | F v j | . We calculate each array related to each cell ( i , j ) left-to-right and up-down direction.
To show that the base cases are correct, note that the leaves cannot activate any other node. Their only effect is by becoming active and changing their own opinion. Then there are two cases if the pre-condition holds for a leaf v: First, the budget is more than zero, then v can be a seed node and increase the amount of D o V c by one. Second, if the budget is zero, v can increment D o V c with the probability of becoming active through its parent, i.e., in expected, it will be p · 1 v where p F v is the probability that v will be activated through its parent. Note that if the pre-condition does not hold, the leaf cannot make any effect, and in both cases, its effect is equal to zero.
Let us say ( i , j ) < ( i , j ) if j < j , or j = j i < i . As the step of induction, assume that all cells ( i , j ) smaller that ( i , j ) are filled correctly for 0 i B , 0 j < | V | . In order to calculate the array A related to the cell ( i , j ) , for each p F v j we have to calculate the result of the following function.
D o V c ( v j , i , S , p ) = m a x { m a x k = 0 i { D o V c ( r ( v j ) , k , S , p · b v j , r ( v j ) ) + D o V c ( l ( v j ) , i k , S , p · b v j , l ( v j ) ) } + p · 1 v , m a x k = 0 i 1 { D o V c ( r ( v j ) , k , S { v j } , b v j , r ( v j ) ) + D o V c ( l ( v j ) , i k 1 , S { v j } , b v j , l ( v j ) ) } + 1 v } .
There is a maximization over two cases. Let us check each case separately. The first case considers all possible cases to split the budget into two parts for its children r ( v j ) and l ( v j ) (the first and second terms) when v j is not selected as a seed node. It finds the split with the maximum outcome using the D o V c of its children, which are calculated correctly. In this case, since the node v j is not a seed node, then the probability that its right (resp. left) child will become active is p · b v j , r ( v j ) (resp. p · b v j , l ( v j ) ). The fixed-term is the amount of change that the node v j can afford to maximize our target party’s score. If the pre-condition holds, then with the probability of p it will increase the score by one, that is p · 1 v .
The second maximization investigates the same situation except that it selects v j as a seed node (if i > 0 ) and uses the value D o V c of its children to find the best split for the i 1 remaining budgets. In this case, the node v j can increase our party’s score by one (if the pre-condition holds) as it is selected as a seed node and will be activated for sure. (To generalize the proof using any non-increasing scoring function g ( · ) , we should change the updating part of each maximization (the fixed part) as p · ( c C 1 , c C \ C 1 : π v ( c ) < π v ( c ) g ( π v ( c ) 1 ) g ( π v ( c ) ) ) and c C 1 , c C \ C 1 : π v ( c ) < π v ( c ) g ( π v ( c ) 1 ) g ( π v ( c ) ) , respectively.) Note that all corresponding values for the children of v j are correctly calculated before because the nodes are sorted as BFS reverse order. Finally, it finds the maximum value among the two cases. □
For the destructive case of the problem, we define pre-condition v as c C 1 : π v ( c ) = 1 . Then for a node v, if it becomes active and v holds, the node will decrease the party’s score by one; otherwise, v cannot change it. For each sub-tree rooted at v, budget k, and p F v , let us define D o V d ( v , k , S , p ) as follows.
D o V d ( v , k , S , p ) = m a x { m a x k = 0 k { D o V d ( r ( v ) , k , S , p · b v , r ( v ) ) + D o V d ( l ( v ) , k k , S , p · b v , l ( v ) ) } + p · 1 v , m a x k = 0 k 1 { D o V d ( r ( v ) , k , S { v } , b v , r ( v ) ) + D o V d ( l ( v ) , k k 1 , S { v } , b v , l ( v ) ) } + 1 v } .
Note that the definition is exactly the same as constructive case except for the pre-condition. Furthermore the base cases are the same as before if we substitute v for v . The prove of the following theorem is similar to the Theorem 7; then we omit it to avoid repetition.
Theorem 8.
Given a tree T = ( V , E ) , and budget B, the DP Equation (7) gives a set of seed nodes S ( | S | B ) which maximizes D o V d s p v .

6.2.2. Maximizing MoV in Straight-Party Voting under ICM

Similar to Section 6.1.2, we do not know the most scored parties after the diffusion started from a set of optimal seed nodes. However, it has been shown that by maximizing D o V c s p v (resp. D o V d s p v ) we get a 1 3 (resp. 1 2 ) approximation algorithm for maximizing M o V c s p v (resp. M o V d s p v ) [9].

7. Discussion

Controlling election via social influence is one of the most crucial parts of each democratic election. It has been shown that many campaigns are using this powerful tool to influence the voters and change their opinion during elections. In this work, we considered the multi-winner election control utilizing social influence so that the attacker tries to maximize/minimize the number of winners from his target party, concerning the party with the most winners.
We exhibited different results, including hardness of approximation, approximation guarantee, and optimal solutions for our problem considering different structures, diffusion models, and voting systems. In ICM, each voter has a preference list over the candidates and will vote for one or more candidate according to the voting rule, e.g., plurality, Borda’s rule, k-approval, and anti-plurality. In this case, the influenced voters change their opinion by promoting/demoting the candidates’ position in their preference list. On the other hand, in LTM, we consider that the voters have a probability distribution over all candidates. Each voter votes for one or more candidates proportional to the probability of voting for them. In this model, the activated voters change their opinion based on the incoming activated neighbors’ influence.
We proved the problem is hard to approximate within any factor when the structure is a general graph, and the diffusion model is LTM. We also considered the problem when the structure is an arborescence, and the diffusion process follows the ICM rules. We showed that the problem is inapproximable within any factor, except P = N P . Another structure that we investigated is a tree where the voting system is a variation of straight-party voting. We presented a polynomial-time algorithm to maximize the expected score of our target party regarding both LT and IC diffusion models. It yields that we can get a 1 3 -approximation factor for maximizing MoV in constructive case, and 1 2 -approximation factor concerning MoV in the destructive model.
The results of this paper open several research directions. Considering the multi-winner election control through social influence on arborescence, when the diffusion model is LTM can be an exciting research problem. We conjecture that maximizing both objective functions (MoV and DoW) is hard; however, there exists a polynomial-time algorithm for the IM problem on arborescence under LTM. We plan to consider maximizing MoV in straight-party voting to either present an optimal solution or provide a hardness result regarding both constructive and destructive cases. Furthermore, maximizing DoV on the bidirected trees, where a child can activate its parent too, can be impressive. We conjecture that the problem accepts a polynomial-time algorithm following a similar dynamic programming approach.

Author Contributions

Conceptualization, M.A.M. and G.D.; methodology, M.A.M. and G.D.; software, M.A.M. and G.D.; validation, M.A.M. and G.D.; formal analysis, M.A.M. and G.D.; investigation, M.A.M. and G.D.; resources, M.A.M. and G.D.; data curation, M.A.M. and G.D.; writing–original draft preparation, M.A.M. and G.D.; writing–review and editing, M.A.M. and G.D.; visualization, M.A.M and G.D.; supervision, G.D.; project administration, G.D.; funding acquisition, G.D. All authors have read and agreed to the published version of the manuscript.

Funding

This work has been partially supported by the Italian MIUR PRIN 2017 Project ALGADIMAR “Algorithms, Games, and Digital Markets”.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Matsa, K.E.; Shearer, E. News Use Across Social Media Platforms 2018; Pew Research Center: Washington, DC, USA, 2018. [Google Scholar]
  2. Bond, R.M.; Fariss, C.J.; Jones, J.J.; Kramer, A.D.I.; Marlow, C.; Settle, J.E.; Fowler, J.H. A 61-million-person experiment in social influence and political mobilization. Nature 2012, 489, 295. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  3. Ferrara, E. Disinformation and social bot operations in the run up to the 2017 French presidential election. First Monday 2017, 22. [Google Scholar] [CrossRef] [Green Version]
  4. Kreiss, D. Seizing the moment: The presidential campaigns’ use of Twitter during the 2012 electoral cycle. New Media Soc. 2016, 18, 1473–1490. [Google Scholar] [CrossRef]
  5. Stier, S.; Bleier, A.; Lietz, H.; Strohmaier, M. Election Campaigning on Social Media: Politicians, Audiences, and the Mediation of Political Communication on Facebook and Twitter. Political Commun. 2018, 35, 50–74. [Google Scholar] [CrossRef] [Green Version]
  6. Allcott, H.; Gentzkow, M. Social media and fake news in the 2016 election. J. Econ. Perspect. 2017, 31, 211–236. [Google Scholar] [CrossRef] [Green Version]
  7. Kempe, D.; Kleinberg, J.; Tardos, E. Maximizing the Spread of Influence through a Social Network. Theory Comput. 2015, 11, 105–147. [Google Scholar] [CrossRef]
  8. Abouei Mehrizi, M.; Corò, F.; Cruciani, E.; D’Angelo, G. Election control through social influence with unknown preferences. In Proceedings of the 2020 International Computing and Combinatorics Conference, Atlanta, GA, USA, 29–31 August 2020; Springer: Berlin/Heidelberg, Germany, 2020; pp. 397–410. [Google Scholar]
  9. Abouei Mehrizi, M.; D’Angelo, G. Multi-winner election control via social influence. In Proceedings of the Structural Information and Communication Complexity—27th International Colloquium (SIROCCO 2020), Paderborn, Germany, 29 June–1 July 2020; Richa, A.W., Scheideler, C., Eds.; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2020; Volume 12156, pp. 331–348. [Google Scholar] [CrossRef]
  10. Wilder, B.; Vorobeychik, Y. Controlling elections through social influence. In Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems (AAMAS), Stockholm, Sweden, 10–15 July 2018; pp. 265–273. [Google Scholar]
  11. Faliszewski, P.; Rothe, J.; Moulin, H. Control and Bribery in Voting; Handbook of Computational Social Choice; Cambridge University Press: Cambridge, UK, 2016; pp. 146–168. [Google Scholar]
  12. Banerjee, S.; Jenamani, M.; Pratihar, D.K. A survey on influence maximization in a social network. Knowl. Inf. Syst. 2020, 62, 3417–3455. [Google Scholar] [CrossRef] [Green Version]
  13. Domingos, P.; Richardson, M. Mining the network value of customers. In Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Francisco, CA, USA, 26–29 August 2001; ACM: New York, NY, USA, 2001; pp. 57–66. [Google Scholar]
  14. Richardson, M.; Domingos, P. Mining knowledge-sharing sites for viral marketing. In Proceedings of the 2002 ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Edmonton, AB, USA, 23–26 July 2001; ACM: New York, NY, USA, 2001; pp. 61–70. [Google Scholar]
  15. Kempe, D.; Kleinberg, J.; Tardos, É. Maximizing the spread of influence through a social network. In Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, 24–27 August 2003; pp. 137–146. [Google Scholar]
  16. Corò, F.; Cruciani, E.; D’Angelo, G.; Ponziani, S. Exploiting social influence to control elections based on scoring rules. In Proceedings of the 28th International Joint Conference on Artificial Intelligence (IJCAI), Macao, China, 10–16 August 2019. [Google Scholar]
  17. Corò, F.; Cruciani, E.; D’Angelo, G.; Ponziani, S. Vote for me!: Election control via social influence in arbitrary scoring rule voting systems. In Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems (AAMAS ’19), Montreal, QC, Canada, 13–17 May 2019; International Foundation for Autonomous Agents and Multiagent Systems: Richland, SC, USA, 2019; pp. 1895–1897. [Google Scholar]
  18. Bredereck, R.; Elkind, E. Manipulating opinion diffusion in social networks. In Proceedings of the 26th International Joint Conference on Artificial Intelligence (IJCAI), Melbourne, Australia, 19–25 August 2017; pp. 894–900. [Google Scholar]
  19. Castiglioni, M.; Ferraioli, D.; Gatti, N. Election control in social networks via edge addition or removal. In Proceedings of the 2020 AAAI Conference on Artificial Intelligence, New York, NY, USA, 7–12 February 2020; pp. 1878–1885. [Google Scholar]
  20. Faliszewski, P.; Gonen, R.; Koutecký, M.; Talmon, N. Opinion diffusion and campaigning on society graphs. In Proceedings of the 27th International Joint Conference on Artificial Intelligence (IJCAI), Stockholm, Sweden, 13–19 July 2018; pp. 219–225. [Google Scholar]
  21. Auletta, V.; Caragiannis, I.; Ferraioli, D.; Galdi, C.; Persiano, G. Minority becomes majority in social networks. In Proceedings of the 11th Web and Internet Economics (WINE), Amsterdam, The Netherlands, 9–12 December 2015; Springer: Berlin/Heidelberg, Germany, 2015; pp. 74–88. [Google Scholar]
  22. Brill, M.; Elkind, E.; Endriss, U.; Grandi, U. Pairwise diffusion of preference rankings in social networks. In Proceedings of the 25th International Joint Conference on Artificial Intelligence (IJCAI), New York, NY, USA, 9–15 July 2016; pp. 130–136. [Google Scholar]
  23. Botan, S.; Grandi, U.; Perrussel, L. Propositionwise opinion diffusion with constraints. In Proceedings of the 4th AAMAS Workshop (EXPLORE), Sao Paulo, Brazil, 8 May 2017. [Google Scholar]
  24. Li, Y.; Fan, J.; Wang, Y.; Tan, K. Influence Maximization on Social Graphs: A Survey. IEEE Trans. Knowl. Data Eng. 2018, 30, 1852–1872. [Google Scholar] [CrossRef]
  25. Brandt, F.; Conitzer, V.; Endriss, U.; Lang, J.; Procaccia, A.D. Handbook of Computational Social Choice, 1st ed.; Cambridge University Press: New York, NY, USA, 2016. [Google Scholar]
  26. Bharathi, S.; Kempe, D.; Salek, M. Competitive influence maximization in social networks. In International Workshop on Web and Internet Economics; Springer: Berlin/Heidelberg, Germany, 2007; pp. 306–311. [Google Scholar]
  27. Lu, Z.; Zhang, Z.; Wu, W. Solution of Bharathi–Kempe–Salek conjecture for influence maximization on arborescence. J. Comb. Optim. 2017, 33, 803–808. [Google Scholar] [CrossRef]
  28. Wang, A.; Wu, W.; Cui, L. On Bharathi–Kempe–Salek conjecture for influence maximization on arborescence. J. Comb. Optim. 2016, 31, 1678–1684. [Google Scholar] [CrossRef]
  29. Abouei Mehrizi, M.; D’Angelo, G. Multi-Winner Election Control via Social Influence. arXiv 2020, arXiv:2005.04037. [Google Scholar]
  30. Campbell, B.A.; Byrne, M.D. Straight-party voting: What do voters think? IEEE Trans. Inf. Forensics Secur. 2009, 4, 718–728. [Google Scholar] [CrossRef]
  31. Kritzer, H.M. Roll-Off in State Court Elections: Change Over Time and the Impact of the Straight-Ticket Voting Option. J. Law Court 2016, 4, 409–435. [Google Scholar] [CrossRef]
  32. Ruhl, J.; Mcdonald, R. Party Politics And Elections In Latin America; Taylor & Francis: Abingdon, UK, 2019. [Google Scholar]
  33. Hershey, M. Party Politics in America; Taylor & Francis: Abingdon, UK, 2017. [Google Scholar]

Share and Cite

MDPI and ACS Style

Abouei Mehrizi, M.; D'Angelo, G. Multi-Winner Election Control via Social Influence: Hardness and Algorithms for Restricted Cases. Algorithms 2020, 13, 251. https://0-doi-org.brum.beds.ac.uk/10.3390/a13100251

AMA Style

Abouei Mehrizi M, D'Angelo G. Multi-Winner Election Control via Social Influence: Hardness and Algorithms for Restricted Cases. Algorithms. 2020; 13(10):251. https://0-doi-org.brum.beds.ac.uk/10.3390/a13100251

Chicago/Turabian Style

Abouei Mehrizi, Mohammad, and Gianlorenzo D'Angelo. 2020. "Multi-Winner Election Control via Social Influence: Hardness and Algorithms for Restricted Cases" Algorithms 13, no. 10: 251. https://0-doi-org.brum.beds.ac.uk/10.3390/a13100251

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop