Structual Trend Analysis for Online Social Networks Ceren Budak Divyakant Agrawal Amr El Abbadi Science,UCSB SantaBarbara,USA Reporter: Qi Liu.

Slides:



Advertisements
Similar presentations
BURSTY SUBGRAPHS IN SOCIAL NETWORKS. Introduction 2.
Advertisements

How to Schedule a Cascade in an Arbitrary Graph F. Chierchetti, J. Kleinberg, A. Panconesi February 2012 Presented by Emrah Cem 7301 – Advances in Social.
Active Learning for Streaming Networked Data Zhilin Yang, Jie Tang, Yutao Zhang Computer Science Department, Tsinghua University.
Influence and Passivity in Social Media Daniel M. Romero, Wojciech Galuba, Sitaram Asur, and Bernardo A. Huberman Social Computing Lab, HP Labs.
Analysis and Modeling of Social Networks Foudalis Ilias.
Xiaowei Ying, Xintao Wu, Daniel Barbara Spectrum based Fraud Detection in Social Networks 1.
Power Laws: Rich-Get-Richer Phenomena
Jeff Beard Lisa Helma David Parrish Start Presentation.
WWW 2011 Summary Sangkeun Lee. WWW 2011 Keynote – Tim Berners-Lee “IT companies should get a Semantic Web team in place, as part of their regular operations”
Oz Shaharabani. Study topic Detailed study of network evolution by analyzing four large online social networks with full temporal information about node.
Sampling from Large Graphs. Motivation Our purpose is to analyze and model social networks –An online social network graph is composed of millions of.
Measurement and Analysis of Online Social Networks By Alan Mislove, Massimiliano Marcon, Krishna P. Gummadi, Peter Druschel, Bobby Bhattacharjee Attacked.
1 Measurement-based Characterization of a Collection of On-line Games Chris Chambers Wu-chang Feng Portland State University Sambit Sahu Debanjan Saha.
PageRank Identifying key users in social networks Student : Ivan Todorović, 3231/2014 Mentor : Prof. Dr Veljko Milutinović.
Grade 6 Data Management Unit
Web Information Retrieval Projects Ida Mele. Rules Students can work in teams (max 3 people) The project must be delivered by the deadline that will be.
Models of Influence in Online Social Networks
1 Measurement-based Characterization of a Collection of On-line Games Chris Chambers Wu-chang Feng Portland State University Sambit Sahu Debanjan Saha.
Neighbourhood Sampling for Local Properties on a Graph Stream A. Pavan, Iowa State University Kanat Tangwongsan, IBM Research Srikanta Tirthapura, Iowa.
Statistical Significance R.Raveendran. Heart rate (bpm) Mean ± SEM n In men ± In women ± The difference between means.
Section 8 – Ec1818 Jeremy Barofsky March 31 st and April 1 st, 2010.
Recognition using Regions (Demo) Sudheendra V. Outline Generating multiple segmentations –Normalized cuts [Ren & Malik (2003)] Uniform regions –Watershed.
WALKING IN FACEBOOK: A CASE STUDY OF UNBIASED SAMPLING OF OSNS junction.
Network Characterization via Random Walks B. Ribeiro, D. Towsley UMass-Amherst.
Influence Maximization in Dynamic Social Networks Honglei Zhuang, Yihan Sun, Jie Tang, Jialin Zhang, Xiaoming Sun.
7.1 and 7.2: Spanning Trees. A network is a graph that is connected –The network must be a sub-graph of the original graph (its edges must come from the.
Chengjie Sun,Lei Lin, Yuan Chen, Bingquan Liu Harbin Institute of Technology School of Computer Science and Technology 1 19/11/ :09 PM.
Google News Personalization: Scalable Online Collaborative Filtering
Microblogs: Information and Social Network Huang Yuxin.
Date: 2012/4/23 Source: Michael J. Welch. al(WSDM’11) Advisor: Jia-ling, Koh Speaker: Jiun Jia, Chiou Topical semantics of twitter links 1.
Wei Feng , Jiawei Han, Jianyong Wang , Charu Aggarwal , Jianbin Huang
Optimal Link Bombs are Uncoordinated Sibel Adali Tina Liu Malik Magdon-Ismail Rensselaer Polytechnic Institute.
BotGraph: Large Scale Spamming Botnet Detection Yao Zhao, Yinglian Xie, Fang Yu, Qifa Ke, Yuan Yu, Yan Chen, and Eliot Gillum Speaker: 林佳宜.
Prediction of Influencers from Word Use Chan Shing Hei.
MOTIVATION AND CHALLENGE Big data Volume Velocity Variety Veracity Contributor Content Context Value 5 Vs of Big Data 3 Cs of Veracity.
Tarry vs Awerbuchs Shawn Biesan. Background Tarry’s Transversal Algorithm – Initiator forwards token to one of neighbors, each neighbor forwards token.
SybilGuard: Defending Against Sybil Attacks via Social Networks.
Jointly Modeling Topics, Events and User Interests on Twitter Qiming DiaoJing Jiang School of Information Systems Singapore Management University.
Community-enhanced De-anonymization of Online Social Networks Shirin Nilizadeh, Apu Kapadia, Yong-Yeol Ahn Indiana University Bloomington CCS 2014.
KNN CF: A Temporal Social Network kNN CF: A Temporal Social Network Neal Lathia, Stephen Hailes, Licia Capra University College London RecSys ’ 08 Advisor:
Comparison of Tarry’s Algorithm and Awerbuch’s Algorithm CS 6/73201 Advanced Operating System Presentation by: Sanjitkumar Patel.
A Latent Social Approach to YouTube Popularity Prediction Amandianeze Nwana Prof. Salman Avestimehr Prof. Tsuhan Chen.
Speaker : Yu-Hui Chen Authors : Dinuka A. Soysa, Denis Guangyin Chen, Oscar C. Au, and Amine Bermak From : 2013 IEEE Symposium on Computational Intelligence.
Online Evolutionary Collaborative Filtering RECSYS 2010 Intelligent Database Systems Lab. School of Computer Science & Engineering Seoul National University.
1 1 MPI for Intelligent Systems 2 Stanford University Manuel Gomez Rodriguez 1,2 Bernhard Schölkopf 1 S UBMODULAR I NFERENCE OF D IFFUSION NETWORKS FROM.
1 Random Walks on the Click Graph Nick Craswell and Martin Szummer Microsoft Research Cambridge SIGIR 2007.
Don’t Follow me : Spam Detection in Twitter January 12, 2011 In-seok An SNU Internet Database Lab. Alex Hai Wang The Pensylvania State University International.
A Nonparametric Method for Early Detection of Trending Topics Zhang Advisor: Prof. Aravind Srinivasan.
Biao Wang 1, Ge Chen 1, Luoyi Fu 1, Li Song 1, Xinbing Wang 1, Xue Liu 2 1 Shanghai Jiao Tong University 2 McGill University
Measuring User Influence in Twitter: The Million Follower Fallacy Meeyoung Cha Hamed Haddadi Fabricio Benevenuto Krishna P. Gummadi.
Alvin CHAN Kay CHEUNG Alex YING Relationship between Twitter Events and Real-life.
More than words: Social network’s text mining for consumer brand sentiments Expert Systems with Applications 40 (2013) 4241–4251 Mohamed M. Mostafa Reporter.
Yu Wang1, Gao Cong2, Guojie Song1, Kunqing Xie1
Topical Authority Detection and Sentiment Analysis on Top Influencers
The Spread of Media Content through the Blogosphere
Uncovering the Mystery of Trust in An Online Social Network
Community detection in graphs
Dieudo Mulamba November 2017
Generative Model To Construct Blog and Post Networks In Blogosphere
Latent Space Model for Road Networks to Predict Time-Varying Traffic
The likelihood of linking to a popular website is higher
Peer-to-Peer and Social Networks Fall 2017
Deep Belief Nets and Ising Model-Based Network Construction
Standard deviation Spearman's Rank Correlation Chi squared test
Binghui Wang, Le Zhang, Neil Zhenqiang Gong
Pei Lee, ICDE 2014, Chicago, IL, USA
Descriptive statistics Pearson’s correlation
“The Spread of Physical Activity Through Social Networks”
GhostLink: Latent Network Inference for Influence-aware Recommendation
Introduction Dataset search
Presentation transcript:

Structual Trend Analysis for Online Social Networks Ceren Budak Divyakant Agrawal Amr El Abbadi Science,UCSB SantaBarbara,USA Reporter: Qi Liu

What to do? Trend traditional structural coordinate uncoordinate

What’s new? Structural trend definition Reducing to local triangles counting Sampling tech for online detection

From where? A temporal view Using spatial properties Counting, streaming and semi-streaming

Define it!

High scores for coordinated trend Large number of pairs of connected nodes Large number of mentions For a complete graph, favors a uniform distribution In a power law graph, biased toward influential nodes

Example for complete graph f(Tx) = f(Ty) = 2N g(Tx) = 3N(N-1) g(Ty) = 4N(N-1) 1 N Tx Ty 1 1

Example for power law graph f(Tx) = f(Ty) = K+N-1 g(Tx) = 2K(N-1) g(Ty) = 2K+2N-4 Tx Ty K K

Significance Validation Model-Based Validation – Independent Trend Formation Model p i,x : external influence q i,j,x : internal influence – Nearest Neighbor model u: probability from 2 to 1 k: pairs of connected nodes per step Analysis-Based Validation

Coordinated differs from traditional Spearman rank correlation coefficient(SRCC) – – [-1, +1] Average precision – difference

What topics detected? Vary p and q Using different score functions Results:

App: Sybil Attack Detection Ranking of Ty: co>tr>un Breakpoints may means attack Small p,q and few Sybil nodes, big effect

Analysis-Based Validation Twitter data: 467 million posts, 20 million users, spanning 7 months 230m posts, 2.7m users, hashtags Extraction

Tr vs Co vs Un

Something new about twitter data Choose 60 th to 100 th topics Findings: – coordinated trend: 7694 users, 21.5 edges on average; – uncoordinated trend: users, 8.6 edges

Prefuse

Hashtag categories effect 7 categories: political, technology, celebrity, games, idioms, movies, music and none

Incremental Counting Algorithm For a coming

Reducing to count local triangles A directed multi-graph G’ = (N’,E’) N’ = T U N, E’ = E t U E f

Sampling tech

Conclusion Two trend definitons A reduction Sampling tech

THE END THANKS!