Presenters: Adeela Huma, Lijing Wang, Xuchao Zhang

Slides:



Advertisements
Similar presentations
Maximum flow Main goals of the lecture:
Advertisements

Train DEPOT PROBLEM USING PERMUTATION GRAPHS
Network Optimization Models: Maximum Flow Problems
Chapter 10: Iterative Improvement The Maximum Flow Problem The Design and Analysis of Algorithms.
1 Maximum Flow w s v u t z 3/33/3 1/91/9 1/11/1 3/33/3 4/74/7 4/64/6 3/53/5 1/11/1 3/53/5 2/22/2 
Placement of Integration Points in Multi-hop Community Networks Ranveer Chandra (Cornell University) Lili Qiu, Kamal Jain and Mohammad Mahdian (Microsoft.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Theory of Data Flow and Random Placement.
Network Optimization Models: Maximum Flow Problems In this handout: The problem statement Solving by linear programming Augmenting path algorithm.
Outline Max Flow Algorithm Model of Computation Proposed Algorithm Self Stabilization Contribution 1 A self-stabilizing algorithm for the maximum flow.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
Stereo Computation using Iterative Graph-Cuts
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Fall, 2004 Lecture 5 Wednesday, 10/6/04 Graph Algorithms: Part 2.
Models of Influence in Online Social Networks
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2007 (TPDS 2007)
Mobility Limited Flip-Based Sensor Networks Deployment Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic.
Design Techniques for Approximation Algorithms and Approximation Classes.
1 CPSC 320: Intermediate Algorithm Design and Analysis July 11, 2014.
On Energy-Efficient Trap Coverage in Wireless Sensor Networks Junkun Li, Jiming Chen, Shibo He, Tian He, Yu Gu, Youxian Sun Zhejiang University, China.
QoS Routing in Networks with Inaccurate Information: Theory and Algorithms Roch A. Guerin and Ariel Orda Presented by: Tiewei Wang Jun Chen July 10, 2000.
On Reducing Broadcast Redundancy in Wireless Ad Hoc Network Author: Wei Lou, Student Member, IEEE, and Jie Wu, Senior Member, IEEE From IEEE transactions.
Computer Science Department, Peking University
CS 4407, Algorithms University College Cork, Gregory M. Provan Network Optimization Models: Maximum Flow Problems In this handout: The problem statement.
Max Flow – Min Cut Problem. Directed Graph Applications Shortest Path Problem (Shortest path from one point to another) Max Flow problems (Maximum material.
Efficient Computing k-Coverage Paths in Multihop Wireless Sensor Networks XuFei Mao, ShaoJie Tang, and Xiang-Yang Li Dept. of Computer Science, Illinois.
CS223 Advanced Data Structures and Algorithms 1 Maximum Flow Neil Tang 3/30/2010.
Localized Low-Power Topology Control Algorithms in IEEE based Sensor Networks Jian Ma *, Min Gao *, Qian Zhang +, L. M. Ni *, and Wenwu Zhu +
1 EE5900 Advanced Embedded System For Smart Infrastructure Static Scheduling.
U of Minnesota DIWANS'061 Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and.
Network Analysis Maxflow. What is a Network? Directed connected graph Source node Sink (destination node) Arcs are weighted (costs) Represent a system.
1 CPSC 320: Intermediate Algorithm Design and Analysis July 14, 2014.
Maximum Flow Problem Definitions and notations The Ford-Fulkerson method.
Construction of Optimal Data Aggregation Trees for Wireless Sensor Networks Deying Li, Jiannong Cao, Ming Liu, and Yuan Zheng Computer Communications and.
Instructor Neelima Gupta Edited by Divya Gaur(39, MCS '09) Thanks to: Bhavya(9), Deepika(10), Deepika Bisht(11) (MCS '09)
::Network Optimization:: Minimum Spanning Trees and Clustering Taufik Djatna, Dr.Eng. 1.
Network Flow What is a network? Flow network and flows
Cycle Canceling Algorithm
Network Flow.
The Maximum Network Flow Problem
Recommendation Based Trust Model with an Effective Defense Scheme for ManetS Adeela Huma 02/02/2017.
Maximum Flow c v 3/3 4/6 1/1 4/7 t s 3/3 w 1/9 3/5 1/1 3/5 u z 2/2
Maximum Flow Chapter 26.
A Study of Group-Tree Matching in Large Scale Group Communications
The minimum cost flow problem
Graph Algorithms Minimum Spanning Tree (Chap 23)
CSCI 3160 Design and Analysis of Algorithms Tutorial 8
Network Flow.
Multi-Core Parallel Routing
Effective Social Network Quarantine with Minimal Isolation Costs
Instructor: Shengyu Zhang
Maximum Flow c v 3/3 4/6 1/1 4/7 t s 3/3 w 1/9 3/5 1/1 3/5 u z 2/2
Solving maximum flows on distribution networks:
Totally Disjoint Multipath Routing in Multihop Wireless Networks Sonia Waharte and Raoef Boutaba Presented by: Anthony Calce.
Barrier Coverage with Optimized Quality for Wireless Sensor Networks
Flow Networks General Characteristics Applications
Flow Networks and Bipartite Matching
Smart Content Delivery in Large Networks: En-Route Caching
Graph-based Security and Privacy Analytics via Collective Classification with Joint Weight Learning and Propagation Binghui Wang, Jinyuan Jia, and Neil.
Algorithms (2IL15) – Lecture 7
Uncapacitated Minimum Cost Problem in a Distribution Network
EE5900 Advanced Embedded System For Smart Infrastructure
Max Flow / Min Cut.
Maximum Flow c v 3/3 4/6 1/1 4/7 t s 3/3 w 1/9 3/5 1/1 3/5 u z 2/2
Text Book: Introduction to algorithms By C L R S
Network Flow.
Introduction to Maximum Flows
Maximum Flow Neil Tang 4/8/2008
Introduction to Maximum Flows
Distributed Minimum-Cost Clustering for Underwater Sensor Networks
Network Flow.
Maximum Bipartite Matching
Presentation transcript:

Presenters: Adeela Huma, Lijing Wang, Xuchao Zhang Trust Evaluation in Online Social Networks Using Generalized Network Flow Wenjun Jiang, Jie Wu, Fellow, IEEE, Feng Li, Member, IEEE, Guojun Wang, Member, IEEE, and Huanyang Zheng Presenters: Adeela Huma, Lijing Wang, Xuchao Zhang

Introduction source s is interested in a single target d in online social networks (OSNs) OSNs bear the small-world characteristic of high clustering Types of opinions: Preconceived opinions Aggregated opinions Trust formation Direct contact– first hand; directed link between two nodes Recommendation – second hand; such as a trusted path (s, u, d) representing s’s trust of d via u’s recommendation Paths – sequential and parallel

Introduction

Motivation Two open challenges are how to aggregate the trust of overlapped paths how to calibrate trust decay over iterative recommendations

Main Idea propose a computational approach for calculating trust, based on a modified network flow model with leakage. given an initial flow of 1 (i.e., f0 = 1 representing full trust) at s, what is the final flow (i.e., fsd representing total aggregated trust) that d can get? The flow model addresses path dependence - by allowing flow split and merge at each node. Trust decay - introduces a notion of leakage associated with each recommendation node, which is analogous to a leakage in a water pipe. At each node other than s and d, a certain percentage of incoming flow will be leaked before redirecting to outgoing links Credit Card analogy

Background & Related Work Path Dependence Previous models use shortest path or shortest, strongest path or overlapping paths are independent paths Trust Decay s fully trusts v1, and vi fully trusts vi+1 , i ε [2, n-1] , and finally vn fully trusts d Two approaches for trust calculation: Multiplication Taking the minimum Drawback: s will trust many indirectly connected nodes Aggregation Rule Sequential Rule Parallel Rule Can not solve both problems simultaneously

Problem Definition Given a trusted graph G = (V, E), V is the set of nodes and E is the set of edges. For two indirectly connected nodes, s and d in V , s is the source and d is the destination. In OSNs, trust evidence can be collected from three main sources: attitudes, behaviors, and experience. Its is assumed that the direct trust values between any two connected users are already known ( 0 to 1) goal is to infer indirect trust values for any two unconnected users, based on the known ones.

Problem Definition The generalized network flow problem is an extension of standard network flow, in which flow leaks as it is sent through the network. It is represented by a gain function in each edge, g : E R For each unit of flow that enters an edge e(u, v) at node u, g(u,v) units will arrive at node v. Capacity Constraint 0 <= f(u,v) <= c(u, v) Anti Symmetry constraint For all e(u, v) ε E : f(u, v) = - g(v, u) . f(v, u), where g(v, u) = -1/ g(u, v), and the minus sign means that the flow is going in the opposite direction.

Problem Definition Most of the existing network flow algorithms are based on the Ford- Fulkerson method, the two key concepts of which are residual network - Let f be a flow in a network N = (V, E), where c(u, v) and g(u, v) are the capacity and gain factor of edge e(u, v) ε E, respectively. With respect to the flow f , the residual network is Nf = (V, Ef ), in which the residual capacity is defined by cf (u, v) = c(u, v) - f (u, v) augmenting path - An augmenting path is a path in the residual network, where the capacity on each edge is larger than 0. A new flow can pass through an augmenting path.

Problem Definition Augmentation Path example

Notations Used

GFTrust Initial trust assumption GFTrust modeled using network flow with three tasks as follow: Modeling trust decay with node leakage Constructing generalized flow network Calculating a near-optimal generalized flow

5. GFTrust Lijing Wang

Modeling Trust Decay with Node Leakage Assumption: the trusted graph is already known. Leakage functions: According to node’s distance from the source Favor the shorter paths over the longer ones!

Constructing Generalized Flow Network For each (directed) edge: Capacity ( 𝑐(𝑢,𝑣) ) = Trust value ( 𝑡(𝑢,𝑣) ) Gain ( 𝑔(𝑢,𝑣) ) Outgoing edge from s: 1 Incoming edge to d: 1 Intermediate edges: < 1 transform the leakage of a node into the gain factor of an edge 𝑐( 𝑣 + , 𝑣 − ) = 1 𝑔 𝑣 + , 𝑣 − =1 −𝑙𝑒𝑎𝑘(𝑣)

Calculating Near-Optimal Generalized Flow Challenges: path dependence and trust decay Objective: predict trust levels that are close to the truth

Calculating Near-Optimal Generalized Flow Obs. 1. In original trusted graph, a shorter path makes a higher gain. Obs. 2. In the original trusted graph, the trusted paths with the same length have the same efficiency of sending flow. 𝑢 𝑖 𝑓 𝑠 = 0.8 𝑓 𝑞 1 = 0.6 ∗ 0.9 = 0.54 𝑞 1 → 𝑞 2 : 𝑓 𝑑 = 0.6∗0.9 +0.2∗0.9∗0.9 = 0.702 𝑓 𝑠 = 0.6 𝑓 𝑑 = 0.54 𝑞 2 → 𝑞 1 : 𝑓 𝑑 = 0.7∗0.9∗0.9+0.1∗0.9 = 0.657 𝑓 𝑞 2 = 0.6 ∗ 0.9 ∗ 0.9 = 0.486

Calculating Near-Optimal Generalized Flow Greedy algorithm: Search shortest path: breadth-first search Augmenting flow ?

Calculating Near-Optimal Generalized Flow 𝑐 𝑓 =𝑐−𝑓 (𝑓,𝑔,𝑐) (−𝑓𝑔, 1 𝑔 , 𝑐)

6. Analysis of GFTrust Lijing Wang

Efficiency Obs. 3. In most cases, the iterative number of augmenting flows in GFTrust is a small constant. Theorem 1. The total time complexity of Algorithm 1 and 2 in GFTrust is 𝑂( 𝑉 𝐸 2 ). According to Obs. 3., in most cases, the total complexity of GFTrust will be 𝑂(|𝐸|). GFTrust is a local trust metric which is based on a small trusted graph from source s to sink d, instead of the whole large OSNs.

Near-Optimal Effect GFTrust v.s. Linear Programming Dataset : Kaitiaki (64 nodes, 178 links)

Basic Desirable Properties Ability to solve Path Dependence No information reuse or loss Ability to solve Trust Decay Leakage functions No need to Normalize Resulting flow falls in the range of [0,1] False positive effect, doesn’t matter Generality Others as a special case of leak = 0

Special Desirable Properties 𝑝 1 (𝑠,𝑢,𝑑) 𝑝 2 (𝑠,𝑢,𝑣,𝑑) 𝑝 3 𝑠,𝑢,𝑣,𝑟,𝑑 𝑝 𝑠 𝑠,𝑢, 𝑑 ′ ,𝑑 Senario 1: d’ increases path length Senario 2: d’ doesn’t increases path length

Experiment Evaluation Technique: Leave one out If there is an edge between two nodes, that edge is masked. The masked value is the ground truth value to be compared with calculated value. Dataset: Epinions (www.epinions.com) an online community website where users can write reviews and rate other users’ reviews. 3,168 nodes and 51,888 edges

Experiment Evaluation Metrics Mean Error: 𝑡 𝑐 − 𝑡 𝑑 /𝐷 𝑡 𝑐 is the calculated trust, 𝑡 𝑑 is the ground truth trust. 𝐷 is the total number of edges whose trust can be predicted. Mean Error: 𝑡 𝑐 − 𝑡 𝑑 /𝐷 Precision & Recall FScore: 2∙𝑅𝑒𝑐𝑎𝑙𝑙∙𝑃𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛 𝑅𝑒𝑐𝑎𝑙𝑙+𝑃𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛 Connection Coverage

Experiment Basic Operations in the Reliability Model Compared Methods Propagation: calculates the reliability of a trusted path Aggregation: calculates the final trust value Compared Methods AveR-MaxT, AveR-WAveT, MaxR-MaxT, MaxR-WAveT AveR: take the average path weight as the reliability; MaxR: take the maximum one SWTrust: use the idea of TidalTrust (Golbeck [2]) which takes the weighted average trust value of all shortest and strongest paths

Experiment Effects of Max Length Max Length from 2 to 3, Fscore changes a little; from 3 to 6, no change

Experiment Effects of Trust Threshold As threshold increases, fewer paths will be trusted => less evidence can be used

Experiment Effects of Leakage in uniform setting Leakage has more positive effects on Mean Error than on FScore. Changes are sharper with respect to threshold, smoother with respect to maximum length. When leakage is large enough, the accuracy begins to reduce.

Experiment Effects of Leakage in Non-uniform setting The effects are even more various with different settings No apparent conclusion can be made based on the experiment result. Leave it as future work

Experiment Coverage Trust threshold impact coverage more than Max Length.

Conclusion Solve the challenges of path dependence during aggregation Solve the challenges of trust decay through propagation First work to introduce the modified generalized flow model into a trust evaluation system. Save the normalization process and bear two good properties of social incentive compatibility and Sybil tolerance.

Thank you !!