{"title":"Predicting Friendship Strength for Privacy Preserving: A Case Study on Facebook","authors":"Nitish Dhakal, Francesca Spezzano, Dianxiang Xu","doi":"10.1145/3110025.3116196","DOIUrl":"https://doi.org/10.1145/3110025.3116196","url":null,"abstract":"Effective friend classification in Online Social Networks (OSN) has many benefits in privacy. Anything posted by a user in social networks like Facebook is distributed among all their friends. Although the user can select the manual option for their post-dissemination, it is not feasible every time. Since not all friends are the same in social networks, the visibility access for the post should be different for different strengths of friendship for privacy. Previous works in finding friendship strength in social networks have used interaction and similarity based features but none of them has considered using sentiment-based features as the driving factor to determine the strength. In this paper, we develop a supervised model to estimate the friendship strength based upon 23 different features comprising of structure based, interaction based, homophily based and sentiment based features. We evaluate our model on a real-world Facebook dataset we built that has ground truth for different types of friendship: close, good, acquaintance, and casual. Our model obtains an AUROC of 0.82 in identifying acquaintances from all the other three categories, and an AUROC of 0.85 in distinguishing between close friends and acquaintances. Our experiments suggest that features like average comment length, reaction scores for likes and love, friend tag score, Jaccard similarity and closeness variable consistently perform better in predicting friendship strength across different classifiers. In addition, combining language-based features with homophilic, structural and interaction features produces more accurate and trustworthy model to evaluate friendship strength.","PeriodicalId":399660,"journal":{"name":"Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017","volume":"286 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114185415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MCDA: A Parameterless Algorithm for Detecting Communities in Multidimensional Networks","authors":"Oualid Boutemine, M. Bouguessa","doi":"10.1145/3110025.3110052","DOIUrl":"https://doi.org/10.1145/3110025.3110052","url":null,"abstract":"This paper introduces a parameterless approach named MCDA: Multidimensional Communities Detection Algorithm. MCDA adopts a local search mechanism which is inspired from the label propagation principle. To this end, we design a novel propagation rule that exploits the most frequently used interaction dimensions among neighbors as an additional constraint for membership selections. The new propagation rule allows MCDA to automatically unfold the hidden communities in a multidimensional context. The detected communities are further processed for relevant dimensions selection using an inter-class inertia-based procedure. The proposed algorithm is fully automated and does not require any parameter to be set by the user to recover communities and their associated dimensions.","PeriodicalId":399660,"journal":{"name":"Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125595286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anomalous Reviews Owing to Referral Incentive","authors":"Noor Abu-El-Rub, Amanda J. Minnich, A. Mueen","doi":"10.1145/3110025.3110100","DOIUrl":"https://doi.org/10.1145/3110025.3110100","url":null,"abstract":"In an online review system, a user writes a review with the intention of helping fellow consumers (i.e. the readers) to make informed decisions. However, product owners often provide incentives (e.g. coupons, bonus points, referral rewards) to the writers, motivating the writing of biased reviews. These biased reviews, while beneficial for both writers and product owners, pollute the review space and destroy readers' trust significantly. In this paper, we analyze incentivized reviews in the Google Play store and identify a wide range of anomalous review types such as copying, spamming, advertising, and hidden-beneficiary reviews. We also find an increasing trend in the number of apps being targeted by abusers, which, if continued, will render review systems as crowd advertising platforms rather than an unbiased source of helpful information.","PeriodicalId":399660,"journal":{"name":"Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122303850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017","authors":"J. Diesner, E. Ferrari, Guandong Xu","doi":"10.1145/3110025","DOIUrl":"https://doi.org/10.1145/3110025","url":null,"abstract":"","PeriodicalId":399660,"journal":{"name":"Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130706628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Social Network Analysis in Understanding The Public Discourse on Gender Violence: an Agent-Based Modelling Approach","authors":"M. D. L. Paz, M. R. Estuar","doi":"10.1145/3110025.3120960","DOIUrl":"https://doi.org/10.1145/3110025.3120960","url":null,"abstract":"There are many representations attributed to gender-based violence. Public discourse provides useful datasets that can be studied in order to study such representations. Social network modelling is a way to study that public discourse, by looking at how opinions in a discourse interact and repeat themselves on a large scale and over time. This study aims to construct a social network model using an agent-based approach to measure whether the conversation space of certain gender violence discourses are more centered on victims, perpetrators, institutions, or society. It will use network measures of centrality, immediate impact analysis, and centrality changes over time to compare the context of two cultures: Philippines and the United States. The data set from the Philippines consists of articles on the Vizconde Massacre and the data set from the United States consists of articles on the Stanford Rape Case. Results show that both datasets feature an institution-centric discourse that is consistent over time, and that society has the lowest role-centrality in both events. Perpetrators appear more central than victims, but comparatively more so in the Stanford Rape dataset compared to the Vizconde Massacre one.","PeriodicalId":399660,"journal":{"name":"Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017","volume":"68 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131771628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Joobin Gharibshah, Tai-Ching Li, Maria Solanas Vanrell, Andre Castro, K. Pelechrinis, E. Papalexakis, M. Faloutsos
{"title":"InferIP: Extracting actionable information from security discussion forums","authors":"Joobin Gharibshah, Tai-Ching Li, Maria Solanas Vanrell, Andre Castro, K. Pelechrinis, E. Papalexakis, M. Faloutsos","doi":"10.1145/3110025.3110055","DOIUrl":"https://doi.org/10.1145/3110025.3110055","url":null,"abstract":"How much useful information can we extract from security forums? Many security initiatives and commercial entities are harnessing the readily public information, but they seem to focus on structured sources of information. Our goal here is to extract information from hacker forums, whose information is provided in ad hoc and unstructured ways. Here, we focus on the problem of identifying malicious IPs addresses, when these are being reported in the forums. We develop a method to automate the identification of malicious IPs with the design goal of being independent of external sources. A key novelty is that we use a matrix decomposition method to extract latent features of the behavioral information of the users, which we combine with textual information from the related posts. As key design feature, our technique can be applied to different language forums since it relies on a simple NLP solution in combination with behavioral features. In particular, our solution only needs a small number of keywords in the new language plus the user's behavior captured by specific features. We also develop a tool to automate the data collection from security forums. We collect approximately 600K posts from 3 different forums. Our method exhibits high classification accuracy, while the precision of identifying malicious IP in post is greater than 88% in all three sites. Furthermore, by applying our method, we find up to 3 times more potentially malicious IPs than compared to the reference blacklist VirusTotal. As the cyber-wars are becoming more intense, having early accesses to useful information becomes more imperative to remove the hackers first-move advantage, and our work is a solid step towards this direction.","PeriodicalId":399660,"journal":{"name":"Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123903289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Understanding and Classifying Online Amputee Users on Reddit","authors":"Xing Yu, Erin L. Brady","doi":"10.1145/3110025.3110037","DOIUrl":"https://doi.org/10.1145/3110025.3110037","url":null,"abstract":"Accessibility researchers have difficulty recruiting representative participants with disabilities given their scarcity. The rich information on social media provides accessibility researchers with a new approach to collecting data about these populations. Because social media is used by multiple stakeholders, a major barrier to this approach is differentiating representative users who have disabilities from unrepresentative users who do not. We (1) introduce an empirical study that compares representative users who are amputees with unrepresentative users in terms of linguistic behavior, online interaction, and community characteristics on Reddit and (2) develop a feature extraction method based on statistical analyses and graph mining to classify representative users. Those features allow us to detect amputees using a supervised learning method with an overall accuracy of 88% in amputee-related subreddits. Our findings improve our understanding of anonymous online users with physical disabilities, and can inform better tools for online data collection for accessibility researchers.","PeriodicalId":399660,"journal":{"name":"Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017","volume":"52 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115994588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pravallika Devineni, E. Papalexakis, Danai Koutra, A. Seza Doğruöz, M. Faloutsos
{"title":"One Size Does Not Fit All: Profiling Personalized Time-Evolving User Behaviors","authors":"Pravallika Devineni, E. Papalexakis, Danai Koutra, A. Seza Doğruöz, M. Faloutsos","doi":"10.1145/3110025.3110050","DOIUrl":"https://doi.org/10.1145/3110025.3110050","url":null,"abstract":"Given the set of social interactions of a user, how can we detect changes in interaction patterns over time? While most previous work has focused on studying network-wide properties and spotting outlier users, the dynamics of individual user interactions remain largely unexplored. This work sets out to explore those dynamics in a way that is minimally invasive to privacy, thus, avoids to rely on the textual content of user posts---except for validation. Our contributions are two-fold. First, in contrast to previous studies, we challenge the use of a fixed interval of observation. We introduce and empirically validate the \"Temporal Asymmetry Hypothesis\", which states that appropriate observation intervals should vary both among users and over time for the same user. We validate this hypothesis using eight different datasets, including email, messaging, and social networks data. Second, we propose iNET, a comprehensive analytic and visualization framework which provides personalized insights into user behavior and operates in a streaming fashion. iNET learns personalized baseline behaviors of users and uses them to identify events that signify changes in user behavior. We evaluate the effectiveness of iNET by analyzing more than half a million interactions from Facebook users. Labeling of the identified changes in user behavior showed that iNET is able to capture a wide spectrum of exogenous and endogenous events, while the baselines are less diverse in nature and capture only 66% of that spectrum. Furthermore, iNET exhibited the highest precision (95%) compared to all competing approaches.","PeriodicalId":399660,"journal":{"name":"Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017","volume":"333 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122845608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Erdogan, Tolga Yilmaz, Onur Can Sert, Mirun Akyüz, Tansel Özyer, R. Alhajj
{"title":"From Social Media Analysis to Ubiquitous Event Monitoring: The case of Turkish Tweets","authors":"A. Erdogan, Tolga Yilmaz, Onur Can Sert, Mirun Akyüz, Tansel Özyer, R. Alhajj","doi":"10.1145/3110025.3120986","DOIUrl":"https://doi.org/10.1145/3110025.3120986","url":null,"abstract":"The work described in this paper illustrates how social media is a valuable source of data which may be processed for informative knowledge discovery which may help in better decision making. We concentrate on Twitter as the source for the data to be processed. In particular, we extracted and captured tweets written in Turkish. We analyzed tweets online and real-time to determine most recent trending events, their location and time. The outcome may help predicting next hot events to be broadcasted in the news. It may also raise alert and warn people related to upcoming or ongoing disaster or an event which should be avoided, e.g., traffic jam, terror attacks, earthquake, flood, storm, fire, etc. To achieve this, a tweet may be labeled with more than one event. Named entity recognition combined with multinomial naive Bayes and stochastic gradient descent have been integrated in the process. The reported 95% success rate demonstrate the applicability and effectiveness of the proposed approach.","PeriodicalId":399660,"journal":{"name":"Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124975171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-Time Targeted-Influence Queries over Large Graphs","authors":"Alessandro Epasto, Ahmad Mahmoody, E. Upfal","doi":"10.1145/3110025.3110105","DOIUrl":"https://doi.org/10.1145/3110025.3110105","url":null,"abstract":"Social networks are important communication and information media. Individuals in a social network share information and influence each other through their social connections. Understanding social influence and information diffusion is a fundamental research endeavor and it has important applications in online social advertising and viral marketing. In this work, we introduce the Targeted-Influence problem (TIP): Given a network G = (V, ε) and a model of influence, we want to be able to estimate in real-time (e.g. a few seconds per query) the influence of a subset of users S over another subset of users T, for any possible query (S; T), S, T ⊆ V. To do so, we allow an efficient preprocessing. We provide the first scalable real-time algorithm for TIP. Our algorithm requires Õ(|V| + |ε|) space and preprocessing time, and it provides a provable approximation of the influence of S over T, for every subsets of nodes S, T ⊆ V in the query with large enough influence. The running time for answering each query (a.k.a query stage) is theoretically guaranteed to be Õ(|S| + |T|) in general undirected and for directed graphs under certain assumptions, supported by experiments. We also introduce the Snapshot model as our model of influence, which extends and includes as special case both the Independent Cascade and the Linear Threshold models. The analysis and the theoretical guarantees of our algorithms hold under the more general Snapshot model. Finally, we perform an extensive experimental analysis, demonstrating the accuracy, efficiency, and scalability of our methods.","PeriodicalId":399660,"journal":{"name":"Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114726860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}