Discovering Important Nodes through Graph Entropy

Slides:



Advertisements
Similar presentations
Psychological Advertising: Exploring User Psychology for Click Prediction in Sponsored Search Date: 2014/03/25 Author: Taifeng Wang, Jiang Bian, Shusen.
Advertisements

Date: 2014/05/06 Author: Michael Schuhmacher, Simon Paolo Ponzetto Source: WSDM’14 Advisor: Jia-ling Koh Speaker: Chen-Yu Huang Knowledge-based Graph Document.
Ch2 Data Preprocessing part3 Dr. Bernard Chen Ph.D. University of Central Arkansas Fall 2009.
Diversity Maximization Under Matroid Constraints Date : 2013/11/06 Source : KDD’13 Authors : Zeinab Abbassi, Vahab S. Mirrokni, Mayur Thakur Advisor :
Entity-Centric Topic-Oriented Opinion Summarization in Twitter Date : 2013/09/03 Author : Xinfan Meng, Furu Wei, Xiaohua, Liu, Ming Zhou, Sujian Li and.
Linking Named Entity in Tweets with Knowledge Base via User Interest Modeling Date : 2014/01/22 Author : Wei Shen, Jianyong Wang, Ping Luo, Min Wang Source.
Finding Tribes: Identifying Close-Knit Individuals from Employment Patterns Lisa Friedland and David Jensen Presented by Nick Mattei.
Sequence Clustering and Labeling for Unsupervised Query Intent Discovery Speaker: Po-Hsien Shih Advisor: Jia-Ling Koh Source: WSDM’12 Date: 1 November,
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
COVERTNESS CENTRALITY IN NETWORKS Michael Ovelgönne UMIACS University of Maryland 1 Chanhyun Kang, Anshul Sawant Computer Science Dept.
Intelligent Systems Lecture 23 Introduction to Intelligent Data Analysis (IDA). Example of system for Data Analyzing based on neural networks.
Enron s as Graph Data Corpus for Large-scale Graph Querying Experimentation Michal Laclavík, Martin Šeleng, Marek Ciglan, Ladislav Hluchý.
A framework For Community Identification in Dynamic Social Networks Chayant, Tanya Berger-Wolf, David Kempe [KDD’07] Advisor : Dr. Koh Jia-Ling Advisor.
Alias Detection Using Social Network Analysis Ralf Holzer, Bradley Malin, Latanya Sweeney LinkKDD 2005 Advisor: Dr. Koh Jia-Ling Reporter: Che-Wei,
Andriy Shepitsen, Jonathan Gemmell, Bamshad Mobasher, and Robin Burke
Automated Social Hierarchy Detection through Network Analysis (SNAKDD07) Ryan Rowe, Germ´an Creamer, Shlomo Hershkop, Salvatore J Stolfo 1 Advisor:
ACT: Attachment Chain Tracing Scheme for Virus Detection and Control Jintao Xiong Proceedings of the 2004 ACM workshop on Rapid malcode Presented.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Enron Corpus: A New Dataset for Classification By Bryan Klimt and Yiming Yang CEAS 2004 Presented by Will Lee.
INTERACTIVE ANALYSIS OF COMPUTER CRIMES PRESENTED FOR CS-689 ON 10/12/2000 BY NAGAKALYANA ESKALA.
Mining Social Networks for Personalized Prioritization Shinjae Yoo, Yiming Yang, Frank Lin, II-Chul Moon [KDD ’09] 1 Advisor: Dr. Koh Jia-Ling Reporter:
27-18 września Data Mining dr Iwona Schab. 2 Semester timetable ORGANIZATIONAL ISSUES, INDTRODUCTION TO DATA MINING 1 Sources of data in business,
LOGO Summarizing Conversations with Clue Words Giuseppe Carenini, Raymond T. Ng, Xiaodong Zhou (WWW ’07) Advisor : Dr. Koh Jia-Ling Speaker : Tu.
Date : 2013/03/18 Author : Jeffrey Pound, Alexander K. Hudek, Ihab F. Ilyas, Grant Weddell Source : CIKM’12 Speaker : Er-Gang Liu Advisor : Prof. Jia-Ling.
Probabilistic Models for Discovering E-Communities Ding Zhou, Eren Manavoglu, Jia Li, C. Lee Giles, Hongyuan Zha The Pennsylvania State University WWW.
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology Mining Logs Files for Data-Driven System Management Advisor.
Finding Experts Using Social Network Analysis 2007 IEEE/WIC/ACM International Conference on Web Intelligence Yupeng Fu, Rongjing Xiang, Yong Wang, Min.
LOGO Identifying Opinion Leaders in the Blogosphere Xiaodan Song, Yun Chi, Koji Hino, Belle L. Tseng CIKM 2007 Advisor : Dr. Koh Jia-Ling Speaker : Tu.
Date: 2015/11/19 Author: Reza Zafarani, Huan Liu Source: CIKM '15
Intelligent Database Systems Lab Advisor : Dr. Hsu Graduate : Chien-Shing Chen Author : Juan D.Velasquez Richard Weber Hiroshi Yasuda 國立雲林科技大學 National.
Ranking Related Entities Components and Analyses CIKM’10 Advisor: Jia Ling, Koh Speaker: Yu Cheng, Hsieh.
Date: 2012/08/21 Source: Zhong Zeng, Zhifeng Bao, Tok Wang Ling, Mong Li Lee (KEYS’12) Speaker: Er-Gang Liu Advisor: Dr. Jia-ling Koh 1.
Intelligent Database Systems Lab Advisor : Dr.Hsu Graduate : Keng-Wei Chang Author : Balaji Rajagopalan Mark W. Isken 國立雲林科技大學 National Yunlin University.
Comparison of Tarry’s Algorithm and Awerbuch’s Algorithm CS 6/73201 Advanced Operating System Presentation by: Sanjitkumar Patel.
LINDEN : Linking Named Entities with Knowledge Base via Semantic Knowledge Date : 2013/03/25 Resource : WWW 2012 Advisor : Dr. Jia-Ling Koh Speaker : Wei.
Date: 2013/4/1 Author: Jaime I. Lopez-Veyna, Victor J. Sosa-Sosa, Ivan Lopez-Arevalo Source: KEYS’12 Advisor: Jia-ling Koh Speaker: Chen-Yu Huang KESOSD.
Effective Anomaly Detection with Scarce Training Data Presenter: 葉倚任 Author: W. Robertson, F. Maggi, C. Kruegel and G. Vigna NDSS
Hybrid Intelligent Systems for Network Security Lane Thames Georgia Institute of Technology Savannah, GA
Topical Clustering of Search Results Date : 2012/11/8 Resource : WSDM’12 Advisor : Dr. Jia-Ling Koh Speaker : Wei Chang 1.
{ Adaptive Relevance Feedback in Information Retrieval Yuanhua Lv and ChengXiang Zhai (CIKM ‘09) Date: 2010/10/12 Advisor: Dr. Koh, Jia-Ling Speaker: Lin,
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology 1 Mining Advisor-Advisee Relationships from Research Publication.
Discovering Evolutionary Theme Patterns from Text -An exploration of Temporal Text Mining KDD’05, August 21–24, 2005, Chicago, Illinois, USA. Qiaozhu Mei.
Contextual Text Cube Model and Aggregation Operator for Text OLAP
1 Patterns of Cascading Behavior in Large Blog Graphs Jure Leskoves, Mary McGlohon, Christos Faloutsos, Natalie Glance, Matthew Hurst SDM 2007 Date:2008/8/21.
Twitter Community Discovery & Analysis Using Topologies Andrew McClain Karen Aguar.
WEB STRUCTURE MINING SUBMITTED BY: BLESSY JOHN R7A ROLL NO:18.
Customized of Social Media Contents using Focused Topic Hierarchy
Queensland University of Technology
Where Did You Go: Personalized Annotation of Mobility Records
Sentiment analysis algorithms and applications: A survey
Associative Query Answering via Query Feature Similarity
Mining the Data Charu C. Aggarwal, ChengXiang Zhai
On the Generative Discovery of Structured Medical Knowledge
Summarizing answers in non-factoid community Question-answering
Liang Zheng and Yuzhong Qu
Speaker: Jim-An Tsai Advisor: Professor Jia-ling Koh
Block Matching for Ontologies
Web Mining Department of Computer Science and Engg.
Discovery of Blog Communities based on Mutual Awareness
Sourse: Www 2017 Advisor: Jia-Ling Koh Speaker: Hsiu-Yi,Chu
Date : 2013/1/10 Author : Lanbo Zhang, Yi Zhang, Yunfei Chen
GANG: Detecting Fraudulent Users in OSNs
Enriching Taxonomies With Functional Domain Knowledge
Date: 2012/11/15 Author: Jin Young Kim, Kevyn Collins-Thompson,
HeteroMed: Heterogeneous Information Network for Medical Diagnosis
TOPTRAC: Topical Trajectory Pattern Mining
Deep Interest Network for Click-Through Rate Prediction
Heterogeneous Graph Attention Network
Attention Is All You Need
Connecting the Dots Between News Article
Presentation transcript:

Discovering Important Nodes through Graph Entropy Jitesh Shetty, Jafar Adibi [KDD’ 05] Advisor: Dr. Koh Jia-Ling Reporter: Che-Wei, Liang Date: 2008/09/18

Outline Introduction Order In Networks Graph Entropy Experimental Result Conclusions

Introduction A new challenge in the area of Link Discovery and Social Network Analysis To exploit communication pattern information and text information within knowledge discovery processes such as discovery of hidden organizational structure and selection of interesting prominent members

Introduction Email logs Graph entropy Prime importance and relevance in the study of information flow in an organization Evidence database for law enforcement and intelligence organizations to detect hidden groups in an organization which are engaged in illegal activities Graph entropy To determine the most prominent interesting people

Order In Networks A graph model might not be the best representation of organizations Such as drug dealers, terrorist organization, threat groups Usually ignore their hierarchy They are composed of leaders and followers

Order In Networks Example

Graph Entropy (1/6) To find prominent people in a network Need to aggregate links between them and discover which node has the most effect on network Entropy model can identify an entity that most effect on the graph entropy Transform the problem space into a multigraph Each node represents an entity, each link represents action between entities

Graph Entropy (2/6)

Graph Entropy (3/6) Let G = (V, E) be a graph. P is the probability distribution on the vertex set V(G) P(AemailB) =

Graph Entropy (4/6) A great concern in LD domain is that elements of data are not independent Ex: link AsendemailtoB and link BsendemailtoC are dependent to each other, means B may forward A’s email to C Three approach to discover dependency Examine the similarity of emails check

Graph Entropy (5/6) 3. Exploitation of Markov Blanket type of model Assume an event(link) between two nodes is only dependent to those node’s events

Graph Entropy (6/6)

Experiment Enron Email Dataset 151 users, mostly senior management of Enron contains 252,759 email messages Almost all users use folders to organize their emails

Experiment

Experiment Created an Enron dictionary Normalized all emails using porter stemming algorithm Compare the vectors using Jaccards Algorithm Ordered emails based on the time stamp

Experiment

Conclusions Defined and addressed the problem of important nodes and finding closed group around them Using event based entropy to find influential nodes in a graph and exhibit entropy model can act as a good means for detecting influential nodes