2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)最新文献

筛选
英文 中文
The fragility of Twitter social networks against suspended users Twitter社交网络面对被暂停用户的脆弱性
Wei Wei, K. Joseph, Huan Liu, Kathleen M. Carley
{"title":"The fragility of Twitter social networks against suspended users","authors":"Wei Wei, K. Joseph, Huan Liu, Kathleen M. Carley","doi":"10.1145/2808797.2809316","DOIUrl":"https://doi.org/10.1145/2808797.2809316","url":null,"abstract":"Social media is rapidly becoming one of the mediums of choice for understanding the cultural pulse of a region; e.g., for identifying what the population is concerned with and what kind of help is needed in a crisis. To assess this cultural pulse it is critical to have an accurate assessment of who is saying what in social media. However, social media is also the home of malicious users engaged in disruptive, disingenuous, and potentially illegal activity. A range of users, both human and non-human, carry out such social cyber-attacks. We ask, to what extent does the presence or absence of such users influence our ability to assess the cultural pulse of a region? We conduct a series of experiments to analyze the fragility of social network assessments based on Twitter data by comparing changes in both the structural and content results when suspended users are left in and taken out. Because a Twitter account can be suspended for various reasons including spamming or spreading ideas that can lead to extremism or terrorism, we separately assess the impacts of removing apparent spam bots and apparent extremists. Experimental results demonstrate that Twitter-based network structures and content are unstable, and can be highly impacted by the removal of suspended users. Further, the results exhibit regional and temporal variation that may be related to the political situation or civil unrest. We also provides guidance on the differential impact of different types of potentially suspend-able users.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123827797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
An evaluation of self-training styles for domain adaptation on the task of splice site prediction 剪接位置预测任务领域自适应的自我训练风格评价
Nic Herndon, Doina Caragea
{"title":"An evaluation of self-training styles for domain adaptation on the task of splice site prediction","authors":"Nic Herndon, Doina Caragea","doi":"10.1145/2808797.2808809","DOIUrl":"https://doi.org/10.1145/2808797.2808809","url":null,"abstract":"We consider the problem of adding a large unlabeled sample from the target domain to boost the performance of a domain adaptation algorithm when only a small set of labeled examples are available from the target domain. In particular, we consider the problem setting motivated by the task of splice site prediction. For this task, annotating a genome using machine learning requires a lot of labeled data, whereas for non-model organisms, there is only some labeled data and lots of unlabeled data. With domain adaptation one can leverage the large amount of data from a related model organism, along with the labeled and unlabeled data from the organism of interest to train a classifier for the latter. Our goal is to analyze the three ways of incorporating the unlabeled data - with soft labels only (i.e., Expectation-Maximization), with hard labels only (i.e., self-training), or with both soft and hard labels - for the splice site prediction in particular, and more broadly for a general iterative domain adaptation setting. We provide empirical results on splice site prediction indicating that using soft labels only can lead to better classifier compared to the other two ways.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114352930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
GraphExploiter: Creation, visualization and algorithms on graphs graphexplorer:图形的创建、可视化和算法
Victor Lequay, A. Ringot, Mohammed Haddad, Brice Effantin, H. Kheddouci
{"title":"GraphExploiter: Creation, visualization and algorithms on graphs","authors":"Victor Lequay, A. Ringot, Mohammed Haddad, Brice Effantin, H. Kheddouci","doi":"10.1145/2808797.2808803","DOIUrl":"https://doi.org/10.1145/2808797.2808803","url":null,"abstract":"We present GraphExploiter, a tool to import, visualize and manage data by representing them in a graph structure. The aim of this platform is (i) to facilitate the creation of graphs from real data sets, (ii) to propose an efficient tool of scalable visualization and (iii) to allow a user to import easily its own graph algorithms to the platform.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114796146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Prominent users detection during specific events by learning On- and Off-topic features of user activities 通过学习用户活动的On- and - Off-topic特征,在特定事件中突出用户检测
Imen Bizid, Nibal Nayef, P. Boursier, Sami Faïz, Jacques Morcos
{"title":"Prominent users detection during specific events by learning On- and Off-topic features of user activities","authors":"Imen Bizid, Nibal Nayef, P. Boursier, Sami Faïz, Jacques Morcos","doi":"10.1145/2808797.2809411","DOIUrl":"https://doi.org/10.1145/2808797.2809411","url":null,"abstract":"Microblogs such as Twitter are characterized by the richness and recency of information shared by their users during major events. However, it is very challenging to automatically mine for information or for users sharing certain information due to the huge variety of unstructured stream of data shared in such microblogs. This work proposes a ranking and classification model for identifying users sharing useful information during a specified event. The model is based on a novel set of features that can be computed in real time. These features are designed such that they take into account both the on and off-topic activities of a user. Once users are characterized by a feature vector, supervised machine learning tool is trained to classify users as either prominent or not. Our model has been tested on data shared during a flooding disaster event and performed very well. The achieved results show the effectiveness of the proposed model for both the classification and ranking of prominent users in such events, and also the importance of the adjustment of the on-topic features by the off-topic ones when describing users' activities.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124001813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Real-time monitoring of Twitter traffic by using semantic networks 使用语义网络实时监控Twitter流量
F. Bisio, Claudia Meda, R. Zunino, Roberto Surlinelli, Eugenio Scillia, A. Ottaviano
{"title":"Real-time monitoring of Twitter traffic by using semantic networks","authors":"F. Bisio, Claudia Meda, R. Zunino, Roberto Surlinelli, Eugenio Scillia, A. Ottaviano","doi":"10.1145/2808797.2809371","DOIUrl":"https://doi.org/10.1145/2808797.2809371","url":null,"abstract":"Data from Social Networks and microblogs can provide useful information for prevention and investigation purposes, provided unstructured information is processed at both the lexical and the semantic level. The proposed methodology introduces a comprehensive Semantic Network (ConceptNet) in the interpretation chain of Twitter traffic. This additional interpretation level greatly enhances the effectiveness of semi-automated tools for monitoring purposes. In particular, the paper shows that the combined use of semantic and text-mining clustering tools also allows law-enforcement operators to early detect and track unscheduled events. Experimental results demonstrate the method effectiveness in real cases.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125446847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An authentication model for IoT clouds 物联网云的身份验证模型
Luciano Barreto, A. Celesti, M. Villari, M. Fazio, A. Puliafito
{"title":"An authentication model for IoT clouds","authors":"Luciano Barreto, A. Celesti, M. Villari, M. Fazio, A. Puliafito","doi":"10.1145/2808797.2809361","DOIUrl":"https://doi.org/10.1145/2808797.2809361","url":null,"abstract":"Nowadays, the combination between Cloud computing and Internet of Things (IoT) is pursuing new levels of efficiency in delivering services, representing a tempting business opportunity for IT operators of increasing their revenues. However, security is considered as one of the major factors that slows down the rapid and large scale adoption and deployment of both IoT and Cloud computing. In this paper, considering such an IoT Cloud scenario, we present an architectural model and several use cases that allow different types of users to access IoT devices.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132235138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
I/O efficient algorithms for exact distance queries on disk-resident dynamic graphs 对驻留磁盘的动态图进行精确距离查询的I/O高效算法
Yishi Lin, Xiaowei Chen, John C.S. Lui
{"title":"I/O efficient algorithms for exact distance queries on disk-resident dynamic graphs","authors":"Yishi Lin, Xiaowei Chen, John C.S. Lui","doi":"10.1145/2808797.2808876","DOIUrl":"https://doi.org/10.1145/2808797.2808876","url":null,"abstract":"Point-to-point shortest distance queries are fundamental to large graph analytics. Motivated by the need for low-latency distance queries in large-scale \"dynamic\" graphs, we consider the problem of answering exact shortest distance queries on disk-resident scale-free dynamic graphs. Our query processing uses the canonical labeling method, which is a special 2-hop distance labeling for fast distance queries. In this paper, we propose two I/O efficient algorithms to update the canonical labeling. To the best of our knowledge, our proposed methods are the first practical disk-based methods to \"incrementally update\" the canonical labeling on dynamic graphs. We also show how to answer distance queries on the latest network based on outdated labels and new edges. Extensive experiments demonstrate the efficiency of our methods. Our update methods are an order of magnitude faster than reconstructing the canonical labeling. When the number of new edges is small, say less than 1% of the previous number of edges, our query algorithm based on outdated labels provides exact shortest distance and the query time is comparable to other query algorithms using latest labels.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132414301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Social circle discovery in ego-networks by mining the latent structure of user connections and profile attributes 挖掘用户连接和配置文件属性的潜在结构在自我网络中的社交圈发现
Georgios Petkos, S. Papadopoulos, Y. Kompatsiaris
{"title":"Social circle discovery in ego-networks by mining the latent structure of user connections and profile attributes","authors":"Georgios Petkos, S. Papadopoulos, Y. Kompatsiaris","doi":"10.1145/2808797.2809303","DOIUrl":"https://doi.org/10.1145/2808797.2809303","url":null,"abstract":"Online Social Networks (OSN) allow their users to organize their friends into groups, also known as social circles. These social circles can be used to better manage who has access to users' posted content and also to control the content posted from other users that they view. Unfortunately, these social circles are generated manually and this can be a laborious process for users with more than a few friends. In this paper, we propose an approach for automatically generating social circles that takes into account both the profile information of the friends to be grouped and the social network connectivity between them, while it allows multiple membership of friends in social circles. The approach is based on an adaptation of the widely used Latent Dirichlet Allocation model and, despite the fact that it does not explicitly model social network connectivity, as other state of the art methods do, it manages to achieve results that are competitive and even better than those obtained from such methods, at a considerably lower computational cost.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131831841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Analyzing event opinion transition through summarized emotion visualization 总结情绪可视化分析事件意见转变
Fernando H. Calderon, Chun-Hao Chang, C. Argueta, Elvis Saravia, Yi-Shin Chen
{"title":"Analyzing event opinion transition through summarized emotion visualization","authors":"Fernando H. Calderon, Chun-Hao Chang, C. Argueta, Elvis Saravia, Yi-Shin Chen","doi":"10.1145/2808797.2808801","DOIUrl":"https://doi.org/10.1145/2808797.2808801","url":null,"abstract":"Opinionated user-generated content has been increasingly flooding the Internet since the rise of the Web 2.0. Many of this content is generated by the occurrence of different events varying in time, scale and location. In recent years there has been a growing interest in having a deeper understanding of these events and how the public reacts to them. Towards this goal there is a constant development in areas such as opinion mining. Nevertheless these methods alone are insufficient to provide a greater insight regarding several event related behaviors. In this demonstration we present a time based visualization platform for analyzing events, focusing specifically on the emotional transition generated by their occurrence, to value the impact they have over society.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133210582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A test-bed for generating social graphs and recommending named groups from email 用于生成社交图表和从电子邮件中推荐命名组的测试平台
Andrew Ghobrial, Jacob W. Bartel, Andrew Vitkus, P. Dewan
{"title":"A test-bed for generating social graphs and recommending named groups from email","authors":"Andrew Ghobrial, Jacob W. Bartel, Andrew Vitkus, P. Dewan","doi":"10.1145/2808797.2808800","DOIUrl":"https://doi.org/10.1145/2808797.2808800","url":null,"abstract":"Named groups are persistent groups of contacts with whom a user may wish to share the same information. We have engineered a test-bed for evaluating algorithms that recommend such groups. It assumes that these algorithms first generate social graphs from email logs and then mine these graphs to recommend the lists. It supports a variety of mechanisms to gather user data to support users with different privacy needs. It can be attached to a variety of algorithms for mining the data collected. It accommodates different kinds of models for using named groups and offers an evaluation mechanism that requires no effort from the user. The test-bed also provides visualizations of the generated social graphs and generated lists. Thus, it frees algorithm designers from gathering data and evaluating and understanding the output. It has been used to evaluate and compare multiple algorithms for recommending contact groups.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115584818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信