{"title":"The fragility of Twitter social networks against suspended users","authors":"Wei Wei, K. Joseph, Huan Liu, Kathleen M. Carley","doi":"10.1145/2808797.2809316","DOIUrl":"https://doi.org/10.1145/2808797.2809316","url":null,"abstract":"Social media is rapidly becoming one of the mediums of choice for understanding the cultural pulse of a region; e.g., for identifying what the population is concerned with and what kind of help is needed in a crisis. To assess this cultural pulse it is critical to have an accurate assessment of who is saying what in social media. However, social media is also the home of malicious users engaged in disruptive, disingenuous, and potentially illegal activity. A range of users, both human and non-human, carry out such social cyber-attacks. We ask, to what extent does the presence or absence of such users influence our ability to assess the cultural pulse of a region? We conduct a series of experiments to analyze the fragility of social network assessments based on Twitter data by comparing changes in both the structural and content results when suspended users are left in and taken out. Because a Twitter account can be suspended for various reasons including spamming or spreading ideas that can lead to extremism or terrorism, we separately assess the impacts of removing apparent spam bots and apparent extremists. Experimental results demonstrate that Twitter-based network structures and content are unstable, and can be highly impacted by the removal of suspended users. Further, the results exhibit regional and temporal variation that may be related to the political situation or civil unrest. We also provides guidance on the differential impact of different types of potentially suspend-able users.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123827797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An evaluation of self-training styles for domain adaptation on the task of splice site prediction","authors":"Nic Herndon, Doina Caragea","doi":"10.1145/2808797.2808809","DOIUrl":"https://doi.org/10.1145/2808797.2808809","url":null,"abstract":"We consider the problem of adding a large unlabeled sample from the target domain to boost the performance of a domain adaptation algorithm when only a small set of labeled examples are available from the target domain. In particular, we consider the problem setting motivated by the task of splice site prediction. For this task, annotating a genome using machine learning requires a lot of labeled data, whereas for non-model organisms, there is only some labeled data and lots of unlabeled data. With domain adaptation one can leverage the large amount of data from a related model organism, along with the labeled and unlabeled data from the organism of interest to train a classifier for the latter. Our goal is to analyze the three ways of incorporating the unlabeled data - with soft labels only (i.e., Expectation-Maximization), with hard labels only (i.e., self-training), or with both soft and hard labels - for the splice site prediction in particular, and more broadly for a general iterative domain adaptation setting. We provide empirical results on splice site prediction indicating that using soft labels only can lead to better classifier compared to the other two ways.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114352930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Victor Lequay, A. Ringot, Mohammed Haddad, Brice Effantin, H. Kheddouci
{"title":"GraphExploiter: Creation, visualization and algorithms on graphs","authors":"Victor Lequay, A. Ringot, Mohammed Haddad, Brice Effantin, H. Kheddouci","doi":"10.1145/2808797.2808803","DOIUrl":"https://doi.org/10.1145/2808797.2808803","url":null,"abstract":"We present GraphExploiter, a tool to import, visualize and manage data by representing them in a graph structure. The aim of this platform is (i) to facilitate the creation of graphs from real data sets, (ii) to propose an efficient tool of scalable visualization and (iii) to allow a user to import easily its own graph algorithms to the platform.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114796146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Imen Bizid, Nibal Nayef, P. Boursier, Sami Faïz, Jacques Morcos
{"title":"Prominent users detection during specific events by learning On- and Off-topic features of user activities","authors":"Imen Bizid, Nibal Nayef, P. Boursier, Sami Faïz, Jacques Morcos","doi":"10.1145/2808797.2809411","DOIUrl":"https://doi.org/10.1145/2808797.2809411","url":null,"abstract":"Microblogs such as Twitter are characterized by the richness and recency of information shared by their users during major events. However, it is very challenging to automatically mine for information or for users sharing certain information due to the huge variety of unstructured stream of data shared in such microblogs. This work proposes a ranking and classification model for identifying users sharing useful information during a specified event. The model is based on a novel set of features that can be computed in real time. These features are designed such that they take into account both the on and off-topic activities of a user. Once users are characterized by a feature vector, supervised machine learning tool is trained to classify users as either prominent or not. Our model has been tested on data shared during a flooding disaster event and performed very well. The achieved results show the effectiveness of the proposed model for both the classification and ranking of prominent users in such events, and also the importance of the adjustment of the on-topic features by the off-topic ones when describing users' activities.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124001813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Bisio, Claudia Meda, R. Zunino, Roberto Surlinelli, Eugenio Scillia, A. Ottaviano
{"title":"Real-time monitoring of Twitter traffic by using semantic networks","authors":"F. Bisio, Claudia Meda, R. Zunino, Roberto Surlinelli, Eugenio Scillia, A. Ottaviano","doi":"10.1145/2808797.2809371","DOIUrl":"https://doi.org/10.1145/2808797.2809371","url":null,"abstract":"Data from Social Networks and microblogs can provide useful information for prevention and investigation purposes, provided unstructured information is processed at both the lexical and the semantic level. The proposed methodology introduces a comprehensive Semantic Network (ConceptNet) in the interpretation chain of Twitter traffic. This additional interpretation level greatly enhances the effectiveness of semi-automated tools for monitoring purposes. In particular, the paper shows that the combined use of semantic and text-mining clustering tools also allows law-enforcement operators to early detect and track unscheduled events. Experimental results demonstrate the method effectiveness in real cases.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125446847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Luciano Barreto, A. Celesti, M. Villari, M. Fazio, A. Puliafito
{"title":"An authentication model for IoT clouds","authors":"Luciano Barreto, A. Celesti, M. Villari, M. Fazio, A. Puliafito","doi":"10.1145/2808797.2809361","DOIUrl":"https://doi.org/10.1145/2808797.2809361","url":null,"abstract":"Nowadays, the combination between Cloud computing and Internet of Things (IoT) is pursuing new levels of efficiency in delivering services, representing a tempting business opportunity for IT operators of increasing their revenues. However, security is considered as one of the major factors that slows down the rapid and large scale adoption and deployment of both IoT and Cloud computing. In this paper, considering such an IoT Cloud scenario, we present an architectural model and several use cases that allow different types of users to access IoT devices.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132235138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"I/O efficient algorithms for exact distance queries on disk-resident dynamic graphs","authors":"Yishi Lin, Xiaowei Chen, John C.S. Lui","doi":"10.1145/2808797.2808876","DOIUrl":"https://doi.org/10.1145/2808797.2808876","url":null,"abstract":"Point-to-point shortest distance queries are fundamental to large graph analytics. Motivated by the need for low-latency distance queries in large-scale \"dynamic\" graphs, we consider the problem of answering exact shortest distance queries on disk-resident scale-free dynamic graphs. Our query processing uses the canonical labeling method, which is a special 2-hop distance labeling for fast distance queries. In this paper, we propose two I/O efficient algorithms to update the canonical labeling. To the best of our knowledge, our proposed methods are the first practical disk-based methods to \"incrementally update\" the canonical labeling on dynamic graphs. We also show how to answer distance queries on the latest network based on outdated labels and new edges. Extensive experiments demonstrate the efficiency of our methods. Our update methods are an order of magnitude faster than reconstructing the canonical labeling. When the number of new edges is small, say less than 1% of the previous number of edges, our query algorithm based on outdated labels provides exact shortest distance and the query time is comparable to other query algorithms using latest labels.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132414301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Social circle discovery in ego-networks by mining the latent structure of user connections and profile attributes","authors":"Georgios Petkos, S. Papadopoulos, Y. Kompatsiaris","doi":"10.1145/2808797.2809303","DOIUrl":"https://doi.org/10.1145/2808797.2809303","url":null,"abstract":"Online Social Networks (OSN) allow their users to organize their friends into groups, also known as social circles. These social circles can be used to better manage who has access to users' posted content and also to control the content posted from other users that they view. Unfortunately, these social circles are generated manually and this can be a laborious process for users with more than a few friends. In this paper, we propose an approach for automatically generating social circles that takes into account both the profile information of the friends to be grouped and the social network connectivity between them, while it allows multiple membership of friends in social circles. The approach is based on an adaptation of the widely used Latent Dirichlet Allocation model and, despite the fact that it does not explicitly model social network connectivity, as other state of the art methods do, it manages to achieve results that are competitive and even better than those obtained from such methods, at a considerably lower computational cost.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131831841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fernando H. Calderon, Chun-Hao Chang, C. Argueta, Elvis Saravia, Yi-Shin Chen
{"title":"Analyzing event opinion transition through summarized emotion visualization","authors":"Fernando H. Calderon, Chun-Hao Chang, C. Argueta, Elvis Saravia, Yi-Shin Chen","doi":"10.1145/2808797.2808801","DOIUrl":"https://doi.org/10.1145/2808797.2808801","url":null,"abstract":"Opinionated user-generated content has been increasingly flooding the Internet since the rise of the Web 2.0. Many of this content is generated by the occurrence of different events varying in time, scale and location. In recent years there has been a growing interest in having a deeper understanding of these events and how the public reacts to them. Towards this goal there is a constant development in areas such as opinion mining. Nevertheless these methods alone are insufficient to provide a greater insight regarding several event related behaviors. In this demonstration we present a time based visualization platform for analyzing events, focusing specifically on the emotional transition generated by their occurrence, to value the impact they have over society.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133210582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Andrew Ghobrial, Jacob W. Bartel, Andrew Vitkus, P. Dewan
{"title":"A test-bed for generating social graphs and recommending named groups from email","authors":"Andrew Ghobrial, Jacob W. Bartel, Andrew Vitkus, P. Dewan","doi":"10.1145/2808797.2808800","DOIUrl":"https://doi.org/10.1145/2808797.2808800","url":null,"abstract":"Named groups are persistent groups of contacts with whom a user may wish to share the same information. We have engineered a test-bed for evaluating algorithms that recommend such groups. It assumes that these algorithms first generate social graphs from email logs and then mine these graphs to recommend the lists. It supports a variety of mechanisms to gather user data to support users with different privacy needs. It can be attached to a variety of algorithms for mining the data collected. It accommodates different kinds of models for using named groups and offers an evaluation mechanism that requires no effort from the user. The test-bed also provides visualizations of the generated social graphs and generated lists. Thus, it frees algorithm designers from gathering data and evaluating and understanding the output. It has been used to evaluate and compare multiple algorithms for recommending contact groups.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115584818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}