Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017最新文献

筛选
英文 中文
Predicting Friendship Strength for Privacy Preserving: A Case Study on Facebook 基于隐私保护的友谊强度预测:以Facebook为例
Nitish Dhakal, Francesca Spezzano, Dianxiang Xu
{"title":"Predicting Friendship Strength for Privacy Preserving: A Case Study on Facebook","authors":"Nitish Dhakal, Francesca Spezzano, Dianxiang Xu","doi":"10.1145/3110025.3116196","DOIUrl":"https://doi.org/10.1145/3110025.3116196","url":null,"abstract":"Effective friend classification in Online Social Networks (OSN) has many benefits in privacy. Anything posted by a user in social networks like Facebook is distributed among all their friends. Although the user can select the manual option for their post-dissemination, it is not feasible every time. Since not all friends are the same in social networks, the visibility access for the post should be different for different strengths of friendship for privacy. Previous works in finding friendship strength in social networks have used interaction and similarity based features but none of them has considered using sentiment-based features as the driving factor to determine the strength. In this paper, we develop a supervised model to estimate the friendship strength based upon 23 different features comprising of structure based, interaction based, homophily based and sentiment based features. We evaluate our model on a real-world Facebook dataset we built that has ground truth for different types of friendship: close, good, acquaintance, and casual. Our model obtains an AUROC of 0.82 in identifying acquaintances from all the other three categories, and an AUROC of 0.85 in distinguishing between close friends and acquaintances. Our experiments suggest that features like average comment length, reaction scores for likes and love, friend tag score, Jaccard similarity and closeness variable consistently perform better in predicting friendship strength across different classifiers. In addition, combining language-based features with homophilic, structural and interaction features produces more accurate and trustworthy model to evaluate friendship strength.","PeriodicalId":399660,"journal":{"name":"Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017","volume":"286 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114185415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
MCDA: A Parameterless Algorithm for Detecting Communities in Multidimensional Networks 多维网络中群体检测的无参数算法
Oualid Boutemine, M. Bouguessa
{"title":"MCDA: A Parameterless Algorithm for Detecting Communities in Multidimensional Networks","authors":"Oualid Boutemine, M. Bouguessa","doi":"10.1145/3110025.3110052","DOIUrl":"https://doi.org/10.1145/3110025.3110052","url":null,"abstract":"This paper introduces a parameterless approach named MCDA: Multidimensional Communities Detection Algorithm. MCDA adopts a local search mechanism which is inspired from the label propagation principle. To this end, we design a novel propagation rule that exploits the most frequently used interaction dimensions among neighbors as an additional constraint for membership selections. The new propagation rule allows MCDA to automatically unfold the hidden communities in a multidimensional context. The detected communities are further processed for relevant dimensions selection using an inter-class inertia-based procedure. The proposed algorithm is fully automated and does not require any parameter to be set by the user to recover communities and their associated dimensions.","PeriodicalId":399660,"journal":{"name":"Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125595286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Anomalous Reviews Owing to Referral Incentive 推荐激励下的异常评价
Noor Abu-El-Rub, Amanda J. Minnich, A. Mueen
{"title":"Anomalous Reviews Owing to Referral Incentive","authors":"Noor Abu-El-Rub, Amanda J. Minnich, A. Mueen","doi":"10.1145/3110025.3110100","DOIUrl":"https://doi.org/10.1145/3110025.3110100","url":null,"abstract":"In an online review system, a user writes a review with the intention of helping fellow consumers (i.e. the readers) to make informed decisions. However, product owners often provide incentives (e.g. coupons, bonus points, referral rewards) to the writers, motivating the writing of biased reviews. These biased reviews, while beneficial for both writers and product owners, pollute the review space and destroy readers' trust significantly. In this paper, we analyze incentivized reviews in the Google Play store and identify a wide range of anomalous review types such as copying, spamming, advertising, and hidden-beneficiary reviews. We also find an increasing trend in the number of apps being targeted by abusers, which, if continued, will render review systems as crowd advertising platforms rather than an unbiased source of helpful information.","PeriodicalId":399660,"journal":{"name":"Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122303850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017 2017年IEEE/ACM社会网络分析与挖掘进展国际会议论文集
J. Diesner, E. Ferrari, Guandong Xu
{"title":"Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017","authors":"J. Diesner, E. Ferrari, Guandong Xu","doi":"10.1145/3110025","DOIUrl":"https://doi.org/10.1145/3110025","url":null,"abstract":"","PeriodicalId":399660,"journal":{"name":"Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130706628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Using Social Network Analysis in Understanding The Public Discourse on Gender Violence: an Agent-Based Modelling Approach 使用社会网络分析来理解性别暴力的公共话语:一个基于主体的建模方法
M. D. L. Paz, M. R. Estuar
{"title":"Using Social Network Analysis in Understanding The Public Discourse on Gender Violence: an Agent-Based Modelling Approach","authors":"M. D. L. Paz, M. R. Estuar","doi":"10.1145/3110025.3120960","DOIUrl":"https://doi.org/10.1145/3110025.3120960","url":null,"abstract":"There are many representations attributed to gender-based violence. Public discourse provides useful datasets that can be studied in order to study such representations. Social network modelling is a way to study that public discourse, by looking at how opinions in a discourse interact and repeat themselves on a large scale and over time. This study aims to construct a social network model using an agent-based approach to measure whether the conversation space of certain gender violence discourses are more centered on victims, perpetrators, institutions, or society. It will use network measures of centrality, immediate impact analysis, and centrality changes over time to compare the context of two cultures: Philippines and the United States. The data set from the Philippines consists of articles on the Vizconde Massacre and the data set from the United States consists of articles on the Stanford Rape Case. Results show that both datasets feature an institution-centric discourse that is consistent over time, and that society has the lowest role-centrality in both events. Perpetrators appear more central than victims, but comparatively more so in the Stanford Rape dataset compared to the Vizconde Massacre one.","PeriodicalId":399660,"journal":{"name":"Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017","volume":"68 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131771628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
InferIP: Extracting actionable information from security discussion forums 从安全论坛中提取可操作的信息
Joobin Gharibshah, Tai-Ching Li, Maria Solanas Vanrell, Andre Castro, K. Pelechrinis, E. Papalexakis, M. Faloutsos
{"title":"InferIP: Extracting actionable information from security discussion forums","authors":"Joobin Gharibshah, Tai-Ching Li, Maria Solanas Vanrell, Andre Castro, K. Pelechrinis, E. Papalexakis, M. Faloutsos","doi":"10.1145/3110025.3110055","DOIUrl":"https://doi.org/10.1145/3110025.3110055","url":null,"abstract":"How much useful information can we extract from security forums? Many security initiatives and commercial entities are harnessing the readily public information, but they seem to focus on structured sources of information. Our goal here is to extract information from hacker forums, whose information is provided in ad hoc and unstructured ways. Here, we focus on the problem of identifying malicious IPs addresses, when these are being reported in the forums. We develop a method to automate the identification of malicious IPs with the design goal of being independent of external sources. A key novelty is that we use a matrix decomposition method to extract latent features of the behavioral information of the users, which we combine with textual information from the related posts. As key design feature, our technique can be applied to different language forums since it relies on a simple NLP solution in combination with behavioral features. In particular, our solution only needs a small number of keywords in the new language plus the user's behavior captured by specific features. We also develop a tool to automate the data collection from security forums. We collect approximately 600K posts from 3 different forums. Our method exhibits high classification accuracy, while the precision of identifying malicious IP in post is greater than 88% in all three sites. Furthermore, by applying our method, we find up to 3 times more potentially malicious IPs than compared to the reference blacklist VirusTotal. As the cyber-wars are becoming more intense, having early accesses to useful information becomes more imperative to remove the hackers first-move advantage, and our work is a solid step towards this direction.","PeriodicalId":399660,"journal":{"name":"Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123903289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Understanding and Classifying Online Amputee Users on Reddit 理解和分类在线截肢用户在Reddit上
Xing Yu, Erin L. Brady
{"title":"Understanding and Classifying Online Amputee Users on Reddit","authors":"Xing Yu, Erin L. Brady","doi":"10.1145/3110025.3110037","DOIUrl":"https://doi.org/10.1145/3110025.3110037","url":null,"abstract":"Accessibility researchers have difficulty recruiting representative participants with disabilities given their scarcity. The rich information on social media provides accessibility researchers with a new approach to collecting data about these populations. Because social media is used by multiple stakeholders, a major barrier to this approach is differentiating representative users who have disabilities from unrepresentative users who do not. We (1) introduce an empirical study that compares representative users who are amputees with unrepresentative users in terms of linguistic behavior, online interaction, and community characteristics on Reddit and (2) develop a feature extraction method based on statistical analyses and graph mining to classify representative users. Those features allow us to detect amputees using a supervised learning method with an overall accuracy of 88% in amputee-related subreddits. Our findings improve our understanding of anonymous online users with physical disabilities, and can inform better tools for online data collection for accessibility researchers.","PeriodicalId":399660,"journal":{"name":"Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017","volume":"52 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115994588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
One Size Does Not Fit All: Profiling Personalized Time-Evolving User Behaviors 一种方式不适合所有人:分析个性化的、随时间变化的用户行为
Pravallika Devineni, E. Papalexakis, Danai Koutra, A. Seza Doğruöz, M. Faloutsos
{"title":"One Size Does Not Fit All: Profiling Personalized Time-Evolving User Behaviors","authors":"Pravallika Devineni, E. Papalexakis, Danai Koutra, A. Seza Doğruöz, M. Faloutsos","doi":"10.1145/3110025.3110050","DOIUrl":"https://doi.org/10.1145/3110025.3110050","url":null,"abstract":"Given the set of social interactions of a user, how can we detect changes in interaction patterns over time? While most previous work has focused on studying network-wide properties and spotting outlier users, the dynamics of individual user interactions remain largely unexplored. This work sets out to explore those dynamics in a way that is minimally invasive to privacy, thus, avoids to rely on the textual content of user posts---except for validation. Our contributions are two-fold. First, in contrast to previous studies, we challenge the use of a fixed interval of observation. We introduce and empirically validate the \"Temporal Asymmetry Hypothesis\", which states that appropriate observation intervals should vary both among users and over time for the same user. We validate this hypothesis using eight different datasets, including email, messaging, and social networks data. Second, we propose iNET, a comprehensive analytic and visualization framework which provides personalized insights into user behavior and operates in a streaming fashion. iNET learns personalized baseline behaviors of users and uses them to identify events that signify changes in user behavior. We evaluate the effectiveness of iNET by analyzing more than half a million interactions from Facebook users. Labeling of the identified changes in user behavior showed that iNET is able to capture a wide spectrum of exogenous and endogenous events, while the baselines are less diverse in nature and capture only 66% of that spectrum. Furthermore, iNET exhibited the highest precision (95%) compared to all competing approaches.","PeriodicalId":399660,"journal":{"name":"Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017","volume":"333 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122845608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
From Social Media Analysis to Ubiquitous Event Monitoring: The case of Turkish Tweets 从社交媒体分析到无处不在的事件监控:以土耳其推特为例
A. Erdogan, Tolga Yilmaz, Onur Can Sert, Mirun Akyüz, Tansel Özyer, R. Alhajj
{"title":"From Social Media Analysis to Ubiquitous Event Monitoring: The case of Turkish Tweets","authors":"A. Erdogan, Tolga Yilmaz, Onur Can Sert, Mirun Akyüz, Tansel Özyer, R. Alhajj","doi":"10.1145/3110025.3120986","DOIUrl":"https://doi.org/10.1145/3110025.3120986","url":null,"abstract":"The work described in this paper illustrates how social media is a valuable source of data which may be processed for informative knowledge discovery which may help in better decision making. We concentrate on Twitter as the source for the data to be processed. In particular, we extracted and captured tweets written in Turkish. We analyzed tweets online and real-time to determine most recent trending events, their location and time. The outcome may help predicting next hot events to be broadcasted in the news. It may also raise alert and warn people related to upcoming or ongoing disaster or an event which should be avoided, e.g., traffic jam, terror attacks, earthquake, flood, storm, fire, etc. To achieve this, a tweet may be labeled with more than one event. Named entity recognition combined with multinomial naive Bayes and stochastic gradient descent have been integrated in the process. The reported 95% success rate demonstrate the applicability and effectiveness of the proposed approach.","PeriodicalId":399660,"journal":{"name":"Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124975171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Real-Time Targeted-Influence Queries over Large Graphs 大型图上的实时目标影响查询
Alessandro Epasto, Ahmad Mahmoody, E. Upfal
{"title":"Real-Time Targeted-Influence Queries over Large Graphs","authors":"Alessandro Epasto, Ahmad Mahmoody, E. Upfal","doi":"10.1145/3110025.3110105","DOIUrl":"https://doi.org/10.1145/3110025.3110105","url":null,"abstract":"Social networks are important communication and information media. Individuals in a social network share information and influence each other through their social connections. Understanding social influence and information diffusion is a fundamental research endeavor and it has important applications in online social advertising and viral marketing. In this work, we introduce the Targeted-Influence problem (TIP): Given a network G = (V, ε) and a model of influence, we want to be able to estimate in real-time (e.g. a few seconds per query) the influence of a subset of users S over another subset of users T, for any possible query (S; T), S, T ⊆ V. To do so, we allow an efficient preprocessing. We provide the first scalable real-time algorithm for TIP. Our algorithm requires Õ(|V| + |ε|) space and preprocessing time, and it provides a provable approximation of the influence of S over T, for every subsets of nodes S, T ⊆ V in the query with large enough influence. The running time for answering each query (a.k.a query stage) is theoretically guaranteed to be Õ(|S| + |T|) in general undirected and for directed graphs under certain assumptions, supported by experiments. We also introduce the Snapshot model as our model of influence, which extends and includes as special case both the Independent Cascade and the Linear Threshold models. The analysis and the theoretical guarantees of our algorithms hold under the more general Snapshot model. Finally, we perform an extensive experimental analysis, demonstrating the accuracy, efficiency, and scalability of our methods.","PeriodicalId":399660,"journal":{"name":"Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114726860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信