Propagation of Trust and Distrust Antti Sorjamaa Propagation of Trust and Distrust R. Guha, R. Kumar, P. Raghavan and A. Tomkins New York, 2004 Antti Sorjamaa.

Slides:



Advertisements
Similar presentations
Principal Component Analysis Based on L1-Norm Maximization Nojun Kwak IEEE Transactions on Pattern Analysis and Machine Intelligence, 2008.
Advertisements

Near-Duplicates Detection
Minimizing Seed Set for Viral Marketing Cheng Long & Raymond Chi-Wing Wong Presented by: Cheng Long 20-August-2011.
Leting Wu Xiaowei Ying, Xintao Wu Aidong Lu and Zhi-Hua Zhou PAKDD 2011 Spectral Analysis of k-balanced Signed Graphs 1.
TI: An Efficient Indexing Mechanism for Real-Time Search on Tweets Chun Chen 1, Feng Li 2, Beng Chin Ooi 2, and Sai Wu 2 1 Zhejiang University, 2 National.
P RIVACY, T RUST, AND R EPUTATION Jose Miguel Such July 27th, 2011.
Qi Yu, Antti Sorjamaa, Yoan Miche, and Eric Severin (Jean-Paul Murara) Wednesday
Ao-Jan Su † Y. Charlie Hu ‡ Aleksandar Kuzmanovic † Cheng-Kok Koh ‡ † Northwestern University ‡ Purdue University How to Improve Your Google Ranking: Myths.
Guha et al (WWW 2004). Growing economic motivation to spread information & DISINFORMATION. Open standards and low barrier to publication on the Web. Unscrupulous.
CIKM’2008 Presentation Oct. 27, 2008 Napa, California
1 Algorithms for Large Data Sets Ziv Bar-Yossef Lecture 3 March 23, 2005
Perceptron-based Global Confidence Estimation for Value Prediction Master’s Thesis Michael Black June 26, 2003.
Zdravko Markov and Daniel T. Larose, Data Mining the Web: Uncovering Patterns in Web Content, Structure, and Usage, Wiley, Slides for Chapter 1:
Computing Trust in Social Networks
Link Analysis, PageRank and Search Engines on the Web
Chapter 13 Forecasting.
Social Context Based Recommendation Systems and Trust Inference Student: Andrea Manrique ID: ITEC810, Macquarie University1 Advisor: A/Prof. Yan.
Link Analysis. 2 HITS - Kleinberg’s Algorithm HITS – Hypertext Induced Topic Selection For each vertex v Є V in a subgraph of interest: A site is very.
Time Series Prediction as a Problem of Missing Values Time Series Prediction as a Problem of Missing Values Application to ESTSP2007 and NN3 Competition.
Application of Graph Theory to OO Software Engineering Alexander Chatzigeorgiou, Nikolaos Tsantalis, George Stephanides Department of Applied Informatics.
Information Retrieval
Forecasting Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill.
The Multiplicative Weights Update Method Based on Arora, Hazan & Kale (2005) Mashor Housh Oded Cats Advanced simulation methods Prof. Rubinstein.
FaceTrust: Assessing the Credibility of Online Personas via Social Networks Michael Sirivianos, Kyungbaek Kim and Xiaowei Yang in collaboration with J.W.
EMIS 8381 – Spring Netflix and Your Next Movie Night Nonlinear Programming Ron Andrews EMIS 8381.
Social Networking Algorithms related sections to read in Networked Life: 2.1,
Author(s): Rahul Sami and Paul Resnick, 2009 License: Unless otherwise noted, this material is made available under the terms of the Creative Commons Attribution.
Features and Algorithms Paper by: XIAOGUANG QI and BRIAN D. DAVISON Presentation by: Jason Bender.
Agenda Introduction Overview of White-box testing Basis path testing
Predicting Positive and Negative Links in Online Social Networks
CS 533 Information Retrieval Systems.  Introduction  Connectivity Analysis  Kleinberg’s Algorithm  Problems Encountered  Improved Connectivity Analysis.
Mining Social Networks for Personalized Prioritization Shinjae Yoo, Yiming Yang, Frank Lin, II-Chul Moon [KDD ’09] 1 Advisor: Dr. Koh Jia-Ling Reporter:
Ensemble Learning Spring 2009 Ben-Gurion University of the Negev.
1 The Other Kind of Networking: Social Networks on the Web Dr. Jennifer Golbeck University of Maryland, College Park March 20, 2006.
Survey Propagation. Outline Survey Propagation: an algorithm for satisfiability 1 – Warning Propagation – Belief Propagation – Survey Propagation Survey.
Estimating Component Availability by Dempster-Shafer Belief Networks Estimating Component Availability by Dempster-Shafer Belief Networks Lan Guo Lane.
Reputation Network Analysis for Filtering Ravi Emani Ramesh Ravindran.
Learning the Structure of Related Tasks Presented by Lihan He Machine Learning Reading Group Duke University 02/03/2006 A. Niculescu-Mizil, R. Caruana.
Truth Discovery with Multiple Conflicting Information Providers on the Web KDD 07.
Trust Management for the Semantic Web Matthew Richardson1†, Rakesh Agrawal2, Pedro Domingos By Tyrone Cadenhead.
Vulnerability in Socially-informed Peer-to-Peer Systems Jeremy Blackburn Nicolas Kourtellis Adriana Iamnitchi University of South Florida.
Algorithmic Detection of Semantic Similarity WWW 2005.
Link Analysis Rong Jin. Web Structure  Web is a graph Each web site correspond to a node A link from one site to another site forms a directed edge 
Most of contents are provided by the website Graph Essentials TJTSD66: Advanced Topics in Social Media.
LOGO Identifying Opinion Leaders in the Blogosphere Xiaodan Song, Yun Chi, Koji Hino, Belle L. Tseng CIKM 2007 Advisor : Dr. Koh Jia-Ling Speaker : Tu.
GeneMANIA: a real-time multiple association network integration algorithm for predicting gene function Sara Mostafavi, Debajyoti Ray, David Warde-Farley,
1 Slides by Yong Liu 1, Deep Medhi 2, and Michał Pióro 3 1 Polytechnic University, New York, USA 2 University of Missouri-Kansas City, USA 3 Warsaw University.
Ensemble Methods Construct a set of classifiers from the training data Predict class label of previously unseen records by aggregating predictions made.
Jure Leskovec (Stanford), Daniel Huttenlocher and Jon Kleinberg (Cornell)
MapReduce and the New Software Stack. Outline  Algorithm Using MapReduce  Matrix-Vector Multiplication  Matrix-Vector Multiplication by MapReduce 
Hierarchical Mixture of Experts Presented by Qi An Machine learning reading group Duke University 07/15/2005.
Paper Presentation Social influence based clustering of heterogeneous information networks Qiwei Bao & Siqi Huang.
Presented By: Madiha Saleem Sunniya Rizvi.  Collaborative filtering is a technique used by recommender systems to combine different users' opinions and.
Applying Link-based Classification to Label Blogs Smriti Bhagat, Irina Rozenbaum Graham Cormode.
1 Link Privacy in Social Networks Aleksandra Korolova, Rajeev Motwani, Shubha U. Nabar CIKM’08 Advisor: Dr. Koh, JiaLing Speaker: Li, HueiJyun Date: 2009/3/30.
Extrapolation to Speed-up Query- dependent Link Analysis Ranking Algorithms Muhammad Ali Norozi Department of Computer Science Norwegian University of.
Collaborative Filtering - Pooja Hegde. The Problem : OVERLOAD Too much stuff!!!! Too many books! Too many journals! Too many movies! Too much content!
Trust-aware Recommender Systems
Lecture 7: Constrained Conditional Models
Neighborhood - based Tag Prediction
HITS Hypertext-Induced Topic Selection
Search Engines and Link Analysis on the Web
E-Commerce Theories & Practices
Edge Weight Prediction in Weighted Signed Networks
A Comparative Study of Link Analysis Algorithms
Networks with Signed Edges
Jinhong Jung, Woojung Jin, Lee Sael, U Kang, ICDM ‘16
Binghui Wang, Le Zhang, Neil Zhenqiang Gong
Graph-based Security and Privacy Analytics via Collective Classification with Joint Weight Learning and Propagation Binghui Wang, Jinyuan Jia, and Neil.
GANG: Detecting Fraudulent Users in OSNs
Presentation transcript:

Propagation of Trust and Distrust Antti Sorjamaa Propagation of Trust and Distrust R. Guha, R. Kumar, P. Raghavan and A. Tomkins New York, 2004 Antti Sorjamaa Time Series Prediction and ChemoInformatics Group Adaptive Informatics Research Centre Helsinki University of Technology

Outline Background Background Algorithms Algorithms –Atomic propagation –Propagation methods –Rounding –Transitivity issues Experimental results Experimental results Antti Sorjamaa - TSPCi - AIRC - HUT2/27

Background Trust  Valid information Trust  Valid information Distrust  Disinformation or no information Distrust  Disinformation or no information Increasing flow of information makes it necessary to validate the information Increasing flow of information makes it necessary to validate the information Opinion of a single user is always right, but is it trustworthy? Opinion of a single user is always right, but is it trustworthy? eBay, Epinions, huuto.net, etc. eBay, Epinions, huuto.net, etc. Antti Sorjamaa - TSPCi - AIRC - HUT3/27

Background (2) Problems of disinformation Problems of disinformation –Stock manipulation by bogus postings on investment boards –Marketers posing as customers –Search engine link spamming –Online relationships, dating Web of Trust Web of Trust –Does not apply directly to Distrust Antti Sorjamaa - TSPCi - AIRC - HUT4/27

Origin of Trust Collect opinions of several users Collect opinions of several users –One user can use several accounts –Group of users agree and perform spoofing IRL Trust is built and maintained over long time periods IRL Trust is built and maintained over long time periods –Trust relationships –Good basis for the propagation of Trust –More individual view of the Web of Trust Antti Sorjamaa - TSPCi - AIRC - HUT5/27

Problems of Distrust ”Negative Trust” ”Negative Trust” Shifting the already existing Trust scores distort the results Shifting the already existing Trust scores distort the results Algorithmic complications Algorithmic complications –Negative eigenvalues –Negative probabilities What is Distrust propagation? What is Distrust propagation? Antti Sorjamaa - TSPCi - AIRC - HUT6/27

Notation Antti Sorjamaa - TSPCi - AIRC - HUT n = number of users T = Trust matrix, n x n, values from 0 to 1 D = Distrust matrix, as Trust matrix B = Beliefs matrix, typically T or T - D C B, α = Combined atomic propagation matrix P (k ) = Propagation matrix using k steps F = Final beliefs 7/27

Atomic Propagation Basic propagation techniques, ”atoms” Basic propagation techniques, ”atoms” Matrix operations, multiplying B with appropriate matrix operator Matrix operations, multiplying B with appropriate matrix operator 4 basic atoms 4 basic atoms –Direct Propagation –Co-citation –Transpose Trust –Trust coupling Antti Sorjamaa - TSPCi - AIRC - HUT

Atomic Propagation (2) Direct Propagation, B Direct Propagation, B Co-citation, B T B Co-citation, B T B Transpose Trust, B T Transpose Trust, B T Trust coupling, BB T Trust coupling, BB T Antti Sorjamaa - TSPCi - AIRC - HUT , = /27

Trust Coupling, BB T Antti Sorjamaa - TSPCi - AIRC - HUT = = /27

Atomic Propagation (3) Direct Propagation, B Direct Propagation, B Co-citation, B T B Co-citation, B T B Transpose Trust, B T Transpose Trust, B T Trust coupling, BB T Trust coupling, BB T Antti Sorjamaa - TSPCi - AIRC - HUT11/27

Notation Antti Sorjamaa - TSPCi - AIRC - HUT n = number of users T = Trust matrix, n x n, values from 0 to 1 D = Distrust matrix, as Trust matrix B = Beliefs matrix, typically T or T - D C B, α = Combined atomic propagation matrix P (k ) = Propagation matrix using k steps F = Final beliefs 12/27

Propagation Methods Trust only: B = T Trust only: B = T One-step Distrust: B = T One-step Distrust: B = T Propagated Distrust: B = T - D Propagated Distrust: B = T - D Antti Sorjamaa - TSPCi - AIRC - HUT13/27

Iterative Propagation Eigenvalue Propagation Eigenvalue Propagation Weighted Linear Combinations (WLC) Weighted Linear Combinations (WLC) Antti Sorjamaa - TSPCi - AIRC - HUT14/27

Rounding Binary decision of Trust (±1) Binary decision of Trust (±1) –Global Rounding Order F according to Trust values Order F according to Trust values Fraction of Trust in the whole F Fraction of Trust in the whole F –Local Rounding Order F according to Trust values Order F according to Trust values Fraction of Trust in the corrent row of F Fraction of Trust in the corrent row of F –Majority Rounding Smallest local well-defined neighborhood Smallest local well-defined neighborhood Antti Sorjamaa - TSPCi - AIRC - HUT15/27

, ,7 000 Transitivity Direct Propagation of Trust Direct Propagation of Trust –If 1 trusts 2 and 2 trusts 3 then 1 trusts 3 Does not apply to Distrust directly Does not apply to Distrust directly ”Enemy of my enemy is my friend”  Multiplicative Trust Propagation Antti Sorjamaa - TSPCi - AIRC - HUT = , , /27

Transitivity (2) Multiplicative Distrust creates problems Multiplicative Distrust creates problems –As seen on previous slide: ”Enemy of my enemy is my friend” –Directed cycle with negative values can lead to the user to distrust himself! Additive Distrust Propagation Additive Distrust Propagation –Transform the basic propagation atom –For example exp(b ij )  b ij Antti Sorjamaa - TSPCi - AIRC - HUT17/27

Experimental Results Epinions dataset from Epinions.com Epinions dataset from Epinions.com Users write and read reviews from many different topics Users write and read reviews from many different topics Users can also rate the reviews and other reviewers Users can also rate the reviews and other reviewers Review reading creates royalties Review reading creates royalties –Distrust system to decrease abuse Similar systems: Amazon, Slashdot Similar systems: Amazon, Slashdot Antti Sorjamaa - TSPCi - AIRC - HUT18/27

Epinions Dataset nodes with edges nodes with edges Edges either Trust (+1) or Distrust (-1) Edges either Trust (+1) or Distrust (-1) 85 percent of edges are Trust edges 85 percent of edges are Trust edges Large Strongly Connected Component (SCC) of over nodes Large Strongly Connected Component (SCC) of over nodes Bowtie: In almost nodes and out more than nodes Bowtie: In almost nodes and out more than nodes Antti Sorjamaa - TSPCi - AIRC - HUT19/27

Methodology Propagation of Distrust Propagation of Distrust –Trust, One-step and Propagated Distrust Iteration Methods: EIG and WLC Iteration Methods: EIG and WLC Rounding: Global, Local and Majority Rounding: Global, Local and Majority Atomic Propagations: Atomic Propagations: –Direct, Co-sitation and all combined  81 different combinations Antti Sorjamaa - TSPCi - AIRC - HUT20/27

Experiments Each combination of methods get the same treatment Each combination of methods get the same treatment Validation using Leave-One-Out (LOO) Validation using Leave-One-Out (LOO) –Total of 3250 random edges  prediction error ε –About 500 Distrust and 500 Trust edges  prediction error ε S Naive errors: ε = 0,15 and ε S = 0,5 Naive errors: ε = 0,15 and ε S = 0,5 Antti Sorjamaa - TSPCi - AIRC - HUT21/27

22/27Antti Sorjamaa - TSPCi - AIRC - HUT Results

Results (2) Antti Sorjamaa - TSPCi - AIRC - HUT23/27

Results (3) Antti Sorjamaa - TSPCi - AIRC - HUT24/27

Results (4) Antti Sorjamaa - TSPCi - AIRC - HUT25/27

Conclusions Web of Trust and Distrust is important part of many e-commerce related sites Web of Trust and Distrust is important part of many e-commerce related sites –Distrust stabilizes the propagation of opinions in the network –Distrust decreases the effect of abuse Rounding is surprisingly important Rounding is surprisingly important Small number of expressed Trust scores lead to accurate prediction Small number of expressed Trust scores lead to accurate prediction Antti Sorjamaa - TSPCi - AIRC - HUT26/27

27/27 Questions?