Anomalous Node Detection in Time Series of Mobile Communication Graphs Leman Akoglu January 28, 2010.

Slides:



Advertisements
Similar presentations
Mobile Communication Networks Vahid Mirjalili Department of Mechanical Engineering Department of Biochemistry & Molecular Biology.
Advertisements

© 2010 IBM Corporation [A Social Network Analysis Suite for Business Intelligence] Telecom Research & Innovation Centre IBM Research, India T r iC SNAzzy.
Social Media Mining Chapter 5 1 Chapter 5, Community Detection and Mining in Social Media. Lei Tang and Huan Liu, Morgan & Claypool, September, 2010.
Maximizing the Spread of Influence through a Social Network By David Kempe, Jon Kleinberg, Eva Tardos Report by Joe Abrams.
Networks. Graphs (undirected, unweighted) has a set of vertices V has a set of undirected, unweighted edges E graph G = (V, E), where.
Automatic Identification of ROIs (Regions of interest) in fMRI data.
Learning using Graph Mincuts Shuchi Chawla Carnegie Mellon University 1/11/2003.
1 Representing Graphs. 2 Adjacency Matrix Suppose we have a graph G with n nodes. The adjacency matrix is the n x n matrix A=[a ij ] with: a ij = 1 if.
Network Topology Julian Shun. On Power-Law Relationships of the Internet Topology (Faloutsos 1999) Observes that Internet graphs can be described by “power.
Analysis of Large-Scale Cell Phone Networks Course Project Leman Akoglu Bhavana Dalvi Skyler Speakman April
CMU SCS Mining Billion-node Graphs Christos Faloutsos CMU.
Communities in Heterogeneous Networks Chapter 4 1 Chapter 4, Community Detection and Mining in Social Media. Lei Tang and Huan Liu, Morgan & Claypool,
Using Structure Indices for Efficient Approximation of Network Properties Matthew J. Rattigan, Marc Maier, and David Jensen University of Massachusetts.
Streaming Models and Algorithms for Communication and Information Networks Brian Thompson (joint work with James Abello)
Community Detection in a Large Real-World Social Network Karsten Steinhaeuser Nitesh V. Chawla DIAL Research Group University of Notre.
Quantifying Social Group Evolution Gergely Palla, Albert-Laszlo Barabasi, and Tamas Vicsek Nature Vol 446 April 2007 Presented by: Liang Ding Finance Department,
PageRank Identifying key users in social networks Student : Ivan Todorović, 3231/2014 Mentor : Prof. Dr Veljko Milutinović.
Structure, Tie Persistence and Event Detection in Large Phone and SMS Networks Leman Akoglu and Bhavana Dalvi {lakoglu, Carnegie Mellon.
David Rogers, Stu Andrzejewski, Kelly Desmond, Brad Garrod.
Social Network Analysis for National Security Michael Last Department of Defense.
Catholic Youth of India CCBI Youth Commission APPLICATION TO HELP CONNECTS THE 60 MILLION CATHOLIC YOUTH IN INDIA.
Models of Influence in Online Social Networks
Social Network Analysis via Factor Graph Model
On Anomalous Hot Spot Discovery in Graph Streams
A Distributed and Privacy Preserving Algorithm for Identifying Information Hubs in Social Networks M.U. Ilyas, Z Shafiq, Alex Liu, H Radha Michigan State.
Faculty: Dr. Chengcui Zhang Students: Wei-Bang Chen Song Gao Richa Tiwari.
Data Analysis in YouTube. Introduction Social network + a video sharing media – Potential environment to propagate an influence. Friendship network and.
WALKING IN FACEBOOK: A CASE STUDY OF UNBIASED SAMPLING OF OSNS junction.
Automated Social Hierarchy Detection through Network Analysis (SNAKDD07) Ryan Rowe, Germ´an Creamer, Shlomo Hershkop, Salvatore J Stolfo 1 Advisor:
Social Network Analysis (1) LING 575 Fei Xia 01/04/2011.
EVENT DETECTION IN TIME SERIES OF MOBILE COMMUNICATION GRAPHS
Page 1 Inferring Relevant Social Networks from Interpersonal Communication Munmun De Choudhury, Winter Mason, Jake Hofman and Duncan Watts WWW ’10 Summarized.
Local Indicators of Spatial Autocorrelation (LISA) Autocorrelation Distance.
Why is social networking beneficial to Target? Jessica Valle Liliana Vizarreta March 31, 2010.
Network Community Behavior to Infer Human Activities.
DATA GUIDED DISCOVERY OF DYNAMIC DIPOLES 1. Dipoles Dipoles represent a class of teleconnections characterized by anomalies of opposite polarity at two.
Du, Faloutsos, Wang, Akoglu Large Human Communication Networks Patterns and a Utility-Driven Generator Nan Du 1,2, Christos Faloutsos 2, Bai Wang 1, Leman.
Community-enhanced De-anonymization of Online Social Networks Shirin Nilizadeh, Apu Kapadia, Yong-Yeol Ahn Indiana University Bloomington CCS 2014.
Minas Gjoka, Emily Smith, Carter T. Butts
RTM: Laws and a Recursive Generator for Weighted Time-Evolving Graphs Leman Akoglu, Mary McGlohon, Christos Faloutsos Carnegie Mellon University School.
Graphs G = (V,E) V is the vertex set. Vertices are also called nodes and points. E is the edge set. Each edge connects two different vertices. Edges are.
Characterization of a Computational Grid as a Complex System Lovro Ilijasic ( Lorenza Saitta
Quantification in Social Networks Letizia Milli, Anna Monreale, Giulio Rossetti, Dino Pedreschi, Fosca Giannotti, Fabrizio Sebastiani Computer Science.
The Changing Face of the Contact Centre 18 th September 2013.
Speaker : Yu-Hui Chen Authors : Dinuka A. Soysa, Denis Guangyin Chen, Oscar C. Au, and Amine Bermak From : 2013 IEEE Symposium on Computational Intelligence.
Learning with Green’s Function with Application to Semi-Supervised Learning and Recommender System ----Chris Ding, R. Jin, T. Li and H.D. Simon. A Learning.
© Vipin Kumar IIT Mumbai Case Study 2: Dipoles Teleconnections are recurring long distance patterns of climate anomalies. Typically, teleconnections.
Privacy Preserving in Social Network Based System PRENTER: YI LIANG.
“Niche Work” Graham J Wills, Lucent Technologies (Bell Lab)
1 Lesson 12 Networks / Systems Biology. 2 Systems biology  Not only understanding components! 1.System structures: the network of gene interactions and.
Multidimensional Network Analysis Foundations of multidimensional Network Analysis, Berlingerio, Coscia, Giannotti, Monreale, Pedreschi. WWW Journal 2012.
Tutorial 12 Biological networks.
Dieudo Mulamba November 2017
Cheng-Ming Huang, Wen-Hung Liao Department of Computer Science
Deep Belief Nets and Ising Model-Based Network Construction
Department of Computer Science University of York
Graph and Tensor Mining for fun and profit
Word Embedding Word2Vec.
Graph and Tensor Mining for fun and profit
Problem Solving 4.
3.3 Network-Centric Community Detection
Binghui Wang, Le Zhang, Neil Zhenqiang Gong
GANG: Detecting Fraudulent Users in OSNs
Interactive analysis of a simulated patient flow network.
(a) Venn diagram showing the degree of overlap of the following different approaches: G-test for significant differences between groups (with Bonferroni.
Dynatrace AI Demystified
Graph Attention Networks
Line Graphs.
“The Spread of Physical Activity Through Social Networks”
--WWW 2010, Hongji Bao, Edward Y. Chang
Presentation transcript:

Anomalous Node Detection in Time Series of Mobile Communication Graphs Leman Akoglu January 28, 2010

Project Question (1) In a given graph in which - edges are weighted - nodes are UNlabeled which nodes to consider as “anomalous”? (2) How about in a time-series of graphs?

Dataset: who-calls/texts-whom 3 million customers interacting over 6 months + incoming/outgoing edges from/to out-of- network users Both SMS and phone-call

ego 4 egonet Which nodes are anomalous?

5

Features to characterize nodes  N i : number of neighbors (degree) of ego i  E i : number of edges in egonet i  W i : total weight of egonet i  S i : number of singleton neighbors of ego i with degree 1  max(d i ): average degree of i’s neighbors  …

features nodes M “2-mode look” at the data as a matrix

8 Which nodes are anomalous? time

nodes M “3-mode look” at the data as a tensor features time MtMt

nodes time U VTVT ∑

Preliminary objectives ICA? Robust PCA? How to capture correlations between features? How to do evaluation? Anomalous edges/groups of nodes?