Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017最新文献

筛选
英文 中文
From Retweet to Believability: Utilizing Trust to Identify Rumor Spreaders on Twitter 从转发到可信度:利用信任识别Twitter上的谣言传播者
Bhavtosh Rath, Wei Gao, Jing Ma, J. Srivastava
{"title":"From Retweet to Believability: Utilizing Trust to Identify Rumor Spreaders on Twitter","authors":"Bhavtosh Rath, Wei Gao, Jing Ma, J. Srivastava","doi":"10.1145/3110025.3110121","DOIUrl":"https://doi.org/10.1145/3110025.3110121","url":null,"abstract":"Ubiquitous use of social media such as microblogging platforms brings about ample opportunities for the false information to diffuse online. It is very important not just to determine the veracity of information but also the authenticity of the users who spread the information, especially in time-critical situations like real-world emergencies, where urgent measures have to be taken for stopping the spread of fake information. In this work, we propose a novel machine learning based approach for automatic identification of the users spreading rumorous information by leveraging the concept of believability, i.e., the extent to which the propagated information is likely to be perceived as truthful, based on the trust measures of users in Twitter's retweet network. We hypothesize that the believability between two users is proportional to the trustingness of the retweeter and the trustworthiness of the tweeter, which are two complementary measures of user trust and can be inferred from retweeting behaviors using a variant of HITS algorithm. With the retweet network edge-weighted by believability scores, we use network representation learning to generate user embeddings, which are then leveraged to classify users into as rumor spreaders or not. Based on experiments on a very large real-world rumor dataset collected from Twitter, we demonstrate that our method can effectively identify rumor spreaders and outperform four strong baselines with large margin.","PeriodicalId":399660,"journal":{"name":"Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115469958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
On Quantifying Predictability in Online Social Media Cascades Using Entropy 利用熵量化在线社交媒体级联中的可预测性
Naimisha Kolli, N. Balakrishnan, K. Ramakrishnan
{"title":"On Quantifying Predictability in Online Social Media Cascades Using Entropy","authors":"Naimisha Kolli, N. Balakrishnan, K. Ramakrishnan","doi":"10.1145/3110025.3110071","DOIUrl":"https://doi.org/10.1145/3110025.3110071","url":null,"abstract":"Predicting cascade volumes in social media communication is an important topic in furthering the use of social media for viral marketing, impact of political campaigns and in home-land security. Several techniques have been reported in the literature to estimate the cascade volumes. These algorithms use a variety of information such as Content, Structural and Temporal features, depending on their availability. Due to the spread of information infused into the algorithms the prediction accuracy has been shown in the literature to be different for different algorithms. Entropy based measures that are tailored for the differing situations of information availability have been successfully applied in the prediction scenarios in many fields including network traffic, human mobility and radio spectrum state dynamics as well as in atmospheric science. In this paper we adopt a multitude of entropy based measures for quantifying the predictability of cascade volumes in online social media communications. The limit derived from the entropy measures discussed in this paper has also been used to explain the difference in accuracies of some of the algorithms for cascade volume predictions reported in the literature. For the purpose of illustration and to demonstrate the utility of the entropy based predictability limits we have used two data sets, the MemeTracker dataset and Twitter Hashtags dataset. The results obtained in this paper demonstrate clearly the utility of entropy based measures for quantifying the predictability in online social media cascades. We have also shown that temporal relevancy is a dominant contributing factor in cascade predictability and how additional features such as the knowledge of a small number of large media sites and blogs can have significant influence on the prediction performance.","PeriodicalId":399660,"journal":{"name":"Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114177897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Dynamic Influence Keyword Model for Identifying Implicit User Interests on Social Networks 基于动态影响关键字的社交网络隐性用户兴趣识别模型
Elvis Saravia, Shaomei Wu, Yi-Shin Chen
{"title":"A Dynamic Influence Keyword Model for Identifying Implicit User Interests on Social Networks","authors":"Elvis Saravia, Shaomei Wu, Yi-Shin Chen","doi":"10.1145/3110025.3120987","DOIUrl":"https://doi.org/10.1145/3110025.3120987","url":null,"abstract":"The rapid growth of social networks have enabled users to instantly share what is happening around them. With the character-limitation and other feature constraints imposed by microblogs, users are obliged to express their intentions in implicit forms. This behavior poses many challenges for contextual approaches that aim to identify user intentions. Furthermore, users have the tendency to display different degree of preferences towards specific interests, simultaneously in time, making it difficult for models to rank the discovered interests. We propose a dynamic interest keyword model, a graph-based ranking mechanism, that identifies the different degrees of interests of a user. Our results show that the proposed system detects human-inferred interests, 94% of the time, showing that the model is feasible and contributes various insights that can be used to improve user intention identification systems.","PeriodicalId":399660,"journal":{"name":"Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114811451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimizing Network Discovery with Clever Walks 优化网络发现与智能行走
Ralucca Gera, Nicholas R. Juliano, Karl R. B. Schmitt
{"title":"Optimizing Network Discovery with Clever Walks","authors":"Ralucca Gera, Nicholas R. Juliano, Karl R. B. Schmitt","doi":"10.1145/3110025.3120961","DOIUrl":"https://doi.org/10.1145/3110025.3120961","url":null,"abstract":"","PeriodicalId":399660,"journal":{"name":"Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124937062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Social networks and healthcare coordination: Lessons learned from an Australian cancer care survey 社会网络和医疗保健协调:从澳大利亚癌症护理调查中吸取的教训
I. Durcinoska, K. S. Chung, Jane M. Young, M. Solomon
{"title":"Social networks and healthcare coordination: Lessons learned from an Australian cancer care survey","authors":"I. Durcinoska, K. S. Chung, Jane M. Young, M. Solomon","doi":"10.1145/3110025.3120994","DOIUrl":"https://doi.org/10.1145/3110025.3120994","url":null,"abstract":"Providing coordinated care is a key priority for health service improvement. Given the interpersonal nature of healthcare provision, social networks have emerged as an innovative approach to improving healthcare. However, there is a paucity of research applying network theory to investigate the role social networks play in patient cancer care coordination. In this paper, we describe the development and collection of social network data exploring the personal networks of patients receiving treatment for colorectal cancer. The paper will also discuss the challenges experienced in data collection, lessons learned and implications for future research.","PeriodicalId":399660,"journal":{"name":"Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125057873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Content Driven Profile Matching across Online Social Networks 跨在线社交网络的内容驱动配置文件匹配
R. Roedler, Dennis Kergl, G. Rodosek
{"title":"Content Driven Profile Matching across Online Social Networks","authors":"R. Roedler, Dennis Kergl, G. Rodosek","doi":"10.1145/3110025.3110095","DOIUrl":"https://doi.org/10.1145/3110025.3110095","url":null,"abstract":"Many publications deal with profile matching across online social networks and the approaches become increasingly complex. Almost all of them rely on common profile attributes like names and hobbies or structural attributes like relations to other user profiles. These approaches require high effort concerning computation, because each profile of one network has to be compared to all profiles of the other network. Complex approaches are not well suited to handle large datasets. Therefore, we present an approach to significantly reduce complexity by exploiting special properties of dataset IDs. We provide a proof of concept by an implementation of the use case of matching user profiles accross Twitter and Instagram. Additionally to the complexity problem of existing approaches, many profiles with similar attributes often lead to a restrictive trade-off between precision and recall of the matching strategy. Furthermore, profile attributes and relationships are not trustworthy, as these are due to arbitrary change by profile owners. In contrast to most existing approaches that rely on user definable attributes, we rather focus on timing properties of user publications across social media platforms. There are already profile matching approaches based on timing patterns. However, these do not aim to reduce complexity, what is a necessary requirement to be applicable to real-world online social networks. As we will show, the approach can be easily transferred to other networks.","PeriodicalId":399660,"journal":{"name":"Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123756791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Multiplex Media Attention and Disregard Network among 129 Countries 129个国家的多元媒体关注与忽视网络
Haewoon Kwak, Jisun An
{"title":"Multiplex Media Attention and Disregard Network among 129 Countries","authors":"Haewoon Kwak, Jisun An","doi":"10.1145/3110025.3120984","DOIUrl":"https://doi.org/10.1145/3110025.3120984","url":null,"abstract":"We built a multiplex media attention and disregard network (MADN) among 129 countries over 212 days. By characterizing the MADN from multiple levels, we found that it is formed primarily by skewed, hierarchical, and asymmetric relationships. Also, we found strong evidence that our news world is becoming a \"global village.\" However, at the same time, unique attention blocks of the Middle East and North Africa (MENA) region, as well as Russia and its neighbors, still exist.","PeriodicalId":399660,"journal":{"name":"Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128166306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Simultaneous Inference of User Representations and Trust 用户表示与信任的同时推理
Shashank Gupta, Pulkit Parikh, Manish Gupta, Vasudeva Varma
{"title":"Simultaneous Inference of User Representations and Trust","authors":"Shashank Gupta, Pulkit Parikh, Manish Gupta, Vasudeva Varma","doi":"10.1145/3110025.3110093","DOIUrl":"https://doi.org/10.1145/3110025.3110093","url":null,"abstract":"Inferring trust relations between social media users is critical for a number of applications wherein users seek credible information. The fact that available trust relations are scarce and skewed makes trust prediction a challenging task. To the best of our knowledge, this is the first work on exploring representation learning for trust prediction. We propose an approach that uses only a small amount of binary user-user trust relations to simultaneously learn user embeddings and a model to predict trust between user pairs. We empirically demonstrate that for trust prediction, our approach outperforms classifier-based approaches which use state-of-the-art representation learning methods like DeepWalk and LINE as features. We also conduct experiments which use embeddings pre-trained with DeepWalk and LINE each as an input to our model, resulting in further performance improvement. Experiments with a dataset of ~356K user pairs show that the proposed method can obtain a high F-score of 92.65%.","PeriodicalId":399660,"journal":{"name":"Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114795309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Big Data and Graph Theoretic Models: Simulating the Impact of Collateralization on a Financial System 大数据与图论模型:模拟抵押对金融系统的影响
Sharyn O'Halloran, N. Nowaczyk, Donal Gallagher
{"title":"Big Data and Graph Theoretic Models: Simulating the Impact of Collateralization on a Financial System","authors":"Sharyn O'Halloran, N. Nowaczyk, Donal Gallagher","doi":"10.1145/3110025.3120989","DOIUrl":"https://doi.org/10.1145/3110025.3120989","url":null,"abstract":"In this paper, we simulate and analyze the impact of financial regulations concerning the collateralization of derivative trades on systemic risk. We represent a financial system using a weighted directed graph model. We enhance a novel open source risk engine to automatically classify a financial regulation for its impact on systemic risk. The analysis finds that introducing collateralization does reduce the costs of resolving a financial system in crisis. It does not, however, change the distribution of risk in the system. The analysis also highlights the importance of scenario based testing using hands on metrics to quantify the notion of system risk.","PeriodicalId":399660,"journal":{"name":"Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132208251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Diving Deep into Clickbaits: Who Use Them to What Extents in Which Topics with What Effects? 深入研究点击诱饵:谁在哪些主题中使用到什么程度,有什么效果?
Md Main Uddin Rony, Naeemul Hassan, M. Yousuf
{"title":"Diving Deep into Clickbaits: Who Use Them to What Extents in Which Topics with What Effects?","authors":"Md Main Uddin Rony, Naeemul Hassan, M. Yousuf","doi":"10.1145/3110025.3110054","DOIUrl":"https://doi.org/10.1145/3110025.3110054","url":null,"abstract":"The use of alluring headlines (clickbait) to tempt the readers has become a growing practice nowadays. For the sake of existence in the highly competitive media industry, most of the on-line media including the mainstream ones, have started following this practice. Although the wide-spread practice of clickbait makes the reader's reliability on media vulnerable, a large scale analysis to reveal this fact is still absent. In this paper, we analyze 1.67 million Facebook posts created by 153 media organizations to understand the extent of clickbait practice, its impact and user engagement by using our own developed clickbait detection model. The model uses distributed sub-word embeddings learned from a large corpus. The accuracy of the model is 98.3%. Powered with this model, we further study the distribution of topics in clickbait and non-clickbait contents.","PeriodicalId":399660,"journal":{"name":"Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127715637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 97
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信