1 1 MPI for Intelligent Systems 2 Stanford University Manuel Gomez Rodriguez 1,2 David Balduzzi 1 Bernhard Schölkopf 1 UNCOVERING THE TEMPORAL DYNAMICS.

Slides:



Advertisements
Similar presentations
Modeling of Data. Basic Bayes theorem Bayes theorem relates the conditional probabilities of two events A, and B: A might be a hypothesis and B might.
Advertisements

A Hierarchical Multiple Target Tracking Algorithm for Sensor Networks Songhwai Oh and Shankar Sastry EECS, Berkeley Nest Retreat, Jan
Variational Methods for Graphical Models Micheal I. Jordan Zoubin Ghahramani Tommi S. Jaakkola Lawrence K. Saul Presented by: Afsaneh Shirazi.
Viral Marketing – Learning Influence Probabilities.
LEARNING INFLUENCE PROBABILITIES IN SOCIAL NETWORKS Amit Goyal Francesco Bonchi Laks V. S. Lakshmanan University of British Columbia Yahoo! Research University.
Fast Algorithms For Hierarchical Range Histogram Constructions
Minimizing Seed Set for Viral Marketing Cheng Long & Raymond Chi-Wing Wong Presented by: Cheng Long 20-August-2011.
Spread of Influence through a Social Network Adapted from :
Cost-effective Outbreak Detection in Networks Jure Leskovec, Andreas Krause, Carlos Guestrin, Christos Faloutsos, Jeanne VanBriesen, Natalie Glance.
Modeling Malware Spreading Dynamics Michele Garetto (Politecnico di Torino – Italy) Weibo Gong (University of Massachusetts – Amherst – MA) Don Towsley.
Guest lecture II: Amos Fiat’s Social Networks class Edith Cohen TAU, December 2014.
Dynamic Bayesian Networks (DBNs)
Exploiting Sparse Markov and Covariance Structure in Multiresolution Models Presenter: Zhe Chen ECE / CMR Tennessee Technological University October 22,
EE462 MLCV Lecture Introduction of Graphical Models Markov Random Fields Segmentation Tae-Kyun Kim 1.
Brian Baingana, Gonzalo Mateos and Georgios B. Giannakis Dynamic Structural Equation Models for Tracking Cascades over Social Networks Acknowledgments:
Dynamic Tuning of the IEEE Protocol to Achieve a Theoretical Throughput Limit Frederico Calì, Marco Conti, and Enrico Gregori IEEE/ACM TRANSACTIONS.
Herding: The Nonlinear Dynamics of Learning Max Welling SCIVI LAB - UCIrvine.
Lecture 5: Learning models using EM
1 Learning Entity Specific Models Stefan Niculescu Carnegie Mellon University November, 2003.
INFERRING NETWORKS OF DIFFUSION AND INFLUENCE Presented by Alicia Frame Paper by Manuel Gomez-Rodriguez, Jure Leskovec, and Andreas Kraus.
Parametric Inference.
Expectation Maximization Algorithm
Visual Recognition Tutorial
1 Wavelet synopses with Error Guarantees Minos Garofalakis Phillip B. Gibbons Information Sciences Research Center Bell Labs, Lucent Technologies Murray.
Today Logistic Regression Decision Trees Redux Graphical Models
Models of Influence in Online Social Networks
Diffusion in Social and Information Networks Part II W ORLD W IDE W EB 2015, F LORENCE MPI for Software SystemsGeorgia Institute of Technology Le Song.
Extracting Places and Activities from GPS Traces Using Hierarchical Conditional Random Fields Yong-Joong Kim Dept. of Computer Science Yonsei.
Learning with Positive and Unlabeled Examples using Weighted Logistic Regression Wee Sun Lee National University of Singapore Bing Liu University of Illinois,
Popularity versus Similarity in Growing Networks Fragiskos Papadopoulos Cyprus University of Technology M. Kitsak, M. Á. Serrano, M. Boguñá, and Dmitri.
Random Sampling, Point Estimation and Maximum Likelihood.
CSC321: Neural Networks Lecture 12: Clustering Geoffrey Hinton.
1 1 Stanford University 2 MPI for Biological Cybernetics 3 California Institute of Technology Inferring Networks of Diffusion and Influence Manuel Gomez.
1 1 Stanford University 2 MPI for Biological Cybernetics 3 California Institute of Technology Inferring Networks of Diffusion and Influence Manuel Gomez.
When In-Network Processing Meets Time: Complexity and Effects of Joint Optimization in Wireless Sensor Networks Department of Computer Science, Wayne State.
Influence Maximization in Dynamic Social Networks Honglei Zhuang, Yihan Sun, Jie Tang, Jialin Zhang, Xiaoming Sun.
ECE 8443 – Pattern Recognition LECTURE 07: MAXIMUM LIKELIHOOD AND BAYESIAN ESTIMATION Objectives: Class-Conditional Density The Multivariate Case General.
EE 685 presentation Utility-Optimal Random-Access Control By Jang-Won Lee, Mung Chiang and A. Robert Calderbank.
Estimating Component Availability by Dempster-Shafer Belief Networks Estimating Component Availability by Dempster-Shafer Belief Networks Lan Guo Lane.
Maximizing the Spread of Influence through a Social Network Authors: David Kempe, Jon Kleinberg, É va Tardos KDD 2003.
A Passive Approach to Sensor Network Localization Rahul Biswas and Sebastian Thrun International Conference on Intelligent Robots and Systems 2004 Presented.
Manuel Gomez Rodriguez Structure and Dynamics of Information Pathways in On-line Media W ORKSHOP M ENORCA, MPI FOR I NTELLIGENT S YSTEMS.
Online Social Networks and Media
I NFORMATION C ASCADE Priyanka Garg. OUTLINE Information Propagation Virus Propagation Model How to model infection? Inferring Latent Social Networks.
Lecture 2: Statistical learning primer for biologists
School of Computer Science 1 Information Extraction with HMM Structures Learned by Stochastic Optimization Dayne Freitag and Andrew McCallum Presented.
Bayesian networks and their application in circuit reliability estimation Erin Taylor.
Manuel Gomez Rodriguez Bernhard Schölkopf I NFLUENCE M AXIMIZATION IN C ONTINUOUS T IME D IFFUSION N ETWORKS , ICML ‘12.
John Lafferty Andrew McCallum Fernando Pereira
Machine Learning 5. Parametric Methods.
Probabilistic Equational Reasoning Arthur Kantor
Sporadic model building for efficiency enhancement of the hierarchical BOA Genetic Programming and Evolvable Machines (2008) 9: Martin Pelikan, Kumara.
1 1 MPI for Intelligent Systems 2 Stanford University Manuel Gomez Rodriguez 1,2 Bernhard Schölkopf 1 S UBMODULAR I NFERENCE OF D IFFUSION NETWORKS FROM.
F EATURE -E NHANCED P ROBABILISTIC M ODELS FOR D IFFUSION N ETWORK I NFERENCE Stefano Ermon ECML-PKDD September 26, 2012 Joint work with Liaoruo Wang and.
Bo Zong, Yinghui Wu, Ambuj K. Singh, Xifeng Yan 1 Inferring the Underlying Structure of Information Cascades
1 1 Stanford University 2 MPI for Biological Cybernetics 3 California Institute of Technology Inferring Networks of Diffusion and Influence Manuel Gomez.
Biao Wang 1, Ge Chen 1, Luoyi Fu 1, Li Song 1, Xinbing Wang 1, Xue Liu 2 1 Shanghai Jiao Tong University 2 McGill University
Privacy Vulnerability of Published Anonymous Mobility Traces Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip (Purdue University) Nageswara S. V. Rao (Oak.
Inferring Networks of Diffusion and Influence
Independent Cascade Model and Linear Threshold Model
Learning Deep Generative Models by Ruslan Salakhutdinov
Probability Theory and Parameter Estimation I
DM-Group Meeting Liangzhe Chen, Nov
Link Prediction and Network Inference
Independent Cascade Model and Linear Threshold Model
Estimating Networks With Jumps
Cost-effective Outbreak Detection in Networks
3.3 Network-Centric Community Detection
Independent Cascade Model and Linear Threshold Model
Human-centered Machine Learning
Presentation transcript:

1 1 MPI for Intelligent Systems 2 Stanford University Manuel Gomez Rodriguez 1,2 David Balduzzi 1 Bernhard Schölkopf 1 UNCOVERING THE TEMPORAL DYNAMICS OF DIFFUSION NETWORKS

2 Diffusion and propagation  Diffusion and propagation processes occur in many domains:  Information Propagation in Social Networks  Viral Marketing  Epidemiology  D iffusion have raised many different research problems:  Network Inference  Influence Estimation  Influence Maximization  Finding end effectors

3 Diffusion over networks  Diffusion often takes place over implicit or hard-to- observe networks  We observe when a node copies information, makes a decision or becomes infected but … … connectivity, diffusion rates between nodes and diffusion sources are unknown! Implicit networks of blogs and news sites that spread news without mentioning their sources

4 Examples of diffusion Virus propagation Viruses propagate in the network Diffusion ProcessAvailable dataHidden data Time when people get sick Who infected whom Viral marketing Time when people buy products Recommendations propagate in the network Who influenced whom Information propagation Information propagates in the network Time when blogs reproduce information Who copied whom

5 Directed Diffusion Network  Directed network over which diffusion processes propagate at different tx rates:  We do not observe edges nor tx rates, only when a diffusion reaches a node. Our aim is to infer the network and the dynamics only from the temporal traces Cascade 1Cascade 2

6 Related work  Network inference based on diffusion data has been attempted before. What do we improve? Simple convex program NETRATE N ET I NF (G OMEZ -R ODRIGUEZ, L ESKOVEC & K RAUSE, KDD’10) CoNNIe (M YERS & L ESKOVEC, NIPS’10) Fixed temporal dynamics (equal tx rates) Fixed temporal dynamics (equal tx rates, but infer priors) Complex convex program with tuning parameter Approximate submodular maximization Unique solutionSet # edgesTune regularizer Infer temporal dynamics (tx rates) OUR METHOD STATE OF THE ART

7 Outline 1.Compute the likelihood of the observed cascades 2.Efficiently find the tx rates that maximize the likelihood of the observed cascades using N ET R ATE 3.Validate N ET R ATE on synthetic and real diffusion data and compare with state-of-art methods (N ET I NF & C O NNI E )

8 Computing the likelihood of a cascade j j i i k k l l tjtj tktk tltl titi Infection times Cascade 1. Define likelihood of tx over an edge 2. Probability of survival of a node 3. Likelihood of infection of a node 4. Likelihood of a cascade DAG

9 Likelihood of transmission  Likelihood of tx of edge :  It depends on the tx time (t i – t j ) and the tx rate α (j, i)  As α j,i 0, likelihood 0 and E[tx time] ∞ E XP P OW R AY small α j,i big α j,i t j -t i i i j j SOCIAL AND INFORMATION DIFFUSION MODELS EPIDEMIOLOGY

10 Survival and Hazard  The survival function of edge is the probability that node is not infected by node by time t i :  The hazard function, or instantaneous infection rate, of edge is the ratio: i i j j i i i i j j j j tjtj titi

j j l l i i 11 Probability of survival  Probability of survival of a node until time T for a cascade (t 1,..., t N ): k k i i tjtj T i i j j tktk T i i k k × tltl T i i l l × ≤ 1

k k j j l l i i 12 Likelihood of an infection  What is the likelihood of infection of node at time t i when node is the first parent? tjtj titi i i j j tktk titi i i k k × tltl titi i i l l × i i i i j j  A node gets infected once the first parent infects it.

13 Likelihood of an infection  The likelihood of infection of node results from summing up over the mutually disjoint events that each potential parent is the first parent: i i tjtj titi tktk titi × tltl titi × j j l l i i k k tktk titi × tltl titi × tjtj titi j j l l i i k k + tktk titi × tltl titi × tjtj titi j j l l i i k k +

14 Likelihood of a cascade  The likelihood of the infections in a cascade is: j j i i k k l l 1 st infection 2 nd infection 3 rd infection Source

15 Network Inference: N ET R ATE  Our goal is to find the transmission rates α j,i that maximize the likelihood of a set of cascades: Theorem. Given log-concave survival functions and concave hazard functions in A, the network inference problem is convex in A.

16 Properties of N ET R ATE  The log-likelihood of a set of cascades has three terms with desirable easy-to-interpret properties: Survival terms Hazard term Infected before T Not infected till T

Properties of N ET R ATE  For E XP, P OW and R AY likelihood of tx, the survival terms are positively weighted l 1 -norms: 17  This encourages sparse solutions  It arises naturally within the probabilistic model!

18 Properties of N ET R ATE  For EXP, POW and RAY likelihood of tx, the Hazard term ensures infected nodes have at least one parent:

19 Solving and speeding-up N ET R ATE 1. Distributed optimization: N ET R ATE splits into N subproblems, one for each node i, in which we find N −1 rates α j,i, j = 1, …, N \ i. 2. Null rates: If a pair (j, i) is not in any common cascade, the optimal α j,i is zero because it is only weighted negatively in the objective. SPEEDING-UP NETRATE SOLVING NETRATE We use CVX (Grant & Boyd, 2010) to solve N ET R ATE. It uses successive approximations -- it converges quickly.

20 Experimental Evaluation  Network connectivity:  Precision-Recall  Accuracy  Transmission rates:  MAE (Mean Absolute Error)

21 Synthetic Networks: connectivity 1,024 node networks with 5,000 cascades Hierarchical Kronecker, E XP Forest Fire, P OW Random Kronecker, R AY

22 Synthetic Networks: tx rates Three types of (1,024 nodes, 2,048 edges) Kronecker networks and a (1,024 nodes, 2,422 edges) Forest Fire network with 5,000 cascades (optimization over 1,024 x 1,024 variables!)

23 Real Network: data  MEMETRACKER dataset:  172m news articles from Aug ’08 – Sept ’09  We aim to infer the network of information diffusion Which real diffusion data do we have from M EME T RACKER ? We use the hyperlinks between sites to generate the edges of the network D IFFUSION N ETWORK We have the time when a site create a link  cascades of hyperlinks C ASCADES (D IFFUSION PROCESSES )

24 Real Network: connectivity (500 node, 5000 edges) hyperlink network using hyperlinks cascades  N ET R ATE outperforms state-of-the-art across a significant part of the full range of their tunable parameters.  Parameter tuning in other methods is largely blind.

25 Conclusions  N ET R ATE is a flexible model of the spatiotemporal structure underlying diffusion processes:  We make minimal assumptions about the physical, biological or cognitive mechanisms responsible for diffusion.  The model uses only the temporal traces left by diffusion.  Introducing continuous temporal dynamics simplifies the problem dramatically:  Well defined convex maximum likelihood problem with unique solution.  No tuning parameters, sparsity follows naturally from the model.

26 Future work  How do different transmission rates distributions, length of observation window, etc… impact N ET R ATE ?  Build on N ET R ATE for inferring transmission rates in epidemiology, neuroscience, etc.  Support the threshold model in our formulation:  A node gets infected when several of its neighbours infect it.  Re-think related problems under our continuous time diffusion model:  Influence maximization (marketing), spread minimization (epidemiology, misinformation), incomplete diffusion data (many fields), confounders detection (many fields), etc…