Preserving Privacy and Social Influence Isabelle Stanton.

Slides:



Advertisements
Similar presentations
A Survey of Program Slicing Techniques A Survey of Program Slicing Techniques Sections 3.1,3.6 Swathy Shankar
Advertisements

Social network partition Presenter: Xiaofei Cao Partick Berg.
How to Schedule a Cascade in an Arbitrary Graph F. Chierchetti, J. Kleinberg, A. Panconesi February 2012 Presented by Emrah Cem 7301 – Advances in Social.
O(N 1.5 ) divide-and-conquer technique for Minimum Spanning Tree problem Step 1: Divide the graph into  N sub-graph by clustering. Step 2: Solve each.
Matrices, Digraphs, Markov Chains & Their Use by Google Leslie Hogben Iowa State University and American Institute of Mathematics Leslie Hogben Iowa State.
Λ14 Διαδικτυακά Κοινωνικά Δίκτυα και Μέσα Positive and Negative Relationships Chapter 5, from D. Easley and J. Kleinberg book.
Approximation, Chance and Networks Lecture Notes BISS 2005, Bertinoro March Alessandro Panconesi University La Sapienza of Rome.
Spread of Influence through a Social Network Adapted from :
Maximizing the Spread of Influence through a Social Network
Graph Partitioning Dr. Frank McCown Intro to Web Science Harding University This work is licensed under Creative Commons Attribution-NonCommercial 3.0Attribution-NonCommercial.
Online Social Networks and Media. Graph partitioning The general problem – Input: a graph G=(V,E) edge (u,v) denotes similarity between u and v weighted.
1 The Monte Carlo method. 2 (0,0) (1,1) (-1,-1) (-1,1) (1,-1) 1 Z= 1 If  X 2 +Y 2  1 0 o/w (X,Y) is a point chosen uniformly at random in a 2  2 square.
CS774. Markov Random Field : Theory and Application Lecture 17 Kyomin Jung KAIST Nov
Maximizing the Spread of Influence through a Social Network By David Kempe, Jon Kleinberg, Eva Tardos Report by Joe Abrams.
Junction Trees: Motivation Standard algorithms (e.g., variable elimination) are inefficient if the undirected graph underlying the Bayes Net contains cycles.
From Variable Elimination to Junction Trees
Leting Wu Xiaowei Ying, Xintao Wu Dept. Software and Information Systems Univ. of N.C. – Charlotte Reconstruction from Randomized Graph via Low Rank Approximation.
Graph Clustering. Why graph clustering is useful? Distance matrices are graphs  as useful as any other clustering Identification of communities in social.
Algorithmic and Economic Aspects of Networks Nicole Immorlica.
Tirgul 12 Algorithm for Single-Source-Shortest-Paths (s-s-s-p) Problem Application of s-s-s-p for Solving a System of Difference Constraints.
A Unified View of Kernel k-means, Spectral Clustering and Graph Cuts
1 Perfect Matchings in Bipartite Graphs An undirected graph G=(U  V,E) is bipartite if U  V=  and E  U  V. A 1-1 and onto function f:U  V is a perfect.
1 On the Computation of the Permanent Dana Moshkovitz.
The Union-Split Algorithm and Cluster-Based Anonymization of Social Networks Brian Thompson Danfeng Yao Rutgers University Dept. of Computer Science Piscataway,
1 Joint work with Shmuel Safra. 2 Motivation 3 Motivation.
Preserving Privacy in Clickstreams Isabelle Stanton.
Minimum Spanning Trees. Subgraph A graph G is a subgraph of graph H if –The vertices of G are a subset of the vertices of H, and –The edges of G are a.
Arithmetic Operations on Matrices. 1. Definition of Matrix 2. Column, Row and Square Matrix 3. Addition and Subtraction of Matrices 4. Multiplying Row.
Models of Influence in Online Social Networks
Exploiting indirect neighbors and topological weight to predict protein function from protein– protein interactions Hon Nian Chua, Wing-Kin Sung and Limsoon.
The PageRank Citation Ranking: Bringing Order to the Web Presented by Aishwarya Rengamannan Instructor: Dr. Gautam Das.
Data Analysis in YouTube. Introduction Social network + a video sharing media – Potential environment to propagate an influence. Friendship network and.
GraphLab: how I understood it with sample code Aapo Kyrola, Carnegie Mellon Univ. Oct 1, 2009.
COSC 2007 Data Structures II Chapter 14 Graphs III.
Greedy Approximation Algorithms for finding Dense Components in a Graph Paper by Moses Charikar Presentation by Paul Horn.
Influence Maximization in Dynamic Social Networks Honglei Zhuang, Yihan Sun, Jie Tang, Jialin Zhang, Xiaoming Sun.
A Graph-based Friend Recommendation System Using Genetic Algorithm
Markov Cluster (MCL) algorithm Stijn van Dongen.
CS774. Markov Random Field : Theory and Application Lecture 02
CSE 589 Part VI. Reading Skiena, Sections 5.5 and 6.8 CLR, chapter 37.
Fractions. Vocabulary Denominator: The bottom number of a fraction that tells how many equal parts are in the whole Numerator: The top number of a fraction.
Anonymized Social Networks, Hidden Patterns, and Structural Stenography Lars Backstrom, Cynthia Dwork, Jon Kleinberg WWW 2007 – Best Paper.
Online Social Networks and Media
Learning to Share Motivation Disk schedulers are responsible for determining when processes are allowed to access the hard disk. They must balance multiple.
The Graphs of Quadratic Equations A quadratic equation is an equation that has a x 2 value. All of these are quadratics: y = x 2 y = x y = x 2 +
Privacy Protection in Social Networks Instructor: Assoc. Prof. Dr. DANG Tran Khanh Present : Bui Tien Duc Lam Van Dai Nguyen Viet Dang.
CS 590 Term Project Epidemic model on Facebook
Graph Data Management Lab, School of Computer Science Personalized Privacy Protection in Social Networks (VLDB2011)
Algorithms For Solving History Sensitive Cascade in Diffusion Networks Research Proposal Georgi Smilyanov, Maksim Tsikhanovich Advisor Dr Yu Zhang Trinity.
 In the previews parts we have seen some kind of segmentation method.  In this lecture we will see graph cut, which is a another segmentation method.
Privacy Preserving in Social Network Based System PRENTER: YI LIANG.
Importance Measures on Nodes Lecture 2 Srinivasan Parthasarathy 1.
Arizona State University Fast Eigen-Functions Tracking on Dynamic Graphs Chen Chen and Hanghang Tong - 1 -
An Algorithm to Learn the Structure of a Bayesian Network Çiğdem Gündüz Olcay Taner Yıldız Ethem Alpaydın Computer Engineering Taner Bilgiç Industrial.
Topics In Social Computing (67810) Module 1 (Structure) Centrality Measures, Graph Clustering Random Walks on Graphs.
1 CS 430 / INFO 430: Information Retrieval Lecture 20 Web Search 2.
13.4 Product of Two Matrices
Greedy & Heuristic algorithms in Influence Maximization
Perfect Matchings in Bipartite Graphs
What is the next line of the proof?
Partial Products Algorithm for Multiplication
Graph Analysis by Persistent Homology
Great Ideas in Computing Average Case Analysis
Peer-to-Peer and Social Networks
Katz Centrality (directed graphs).
The Graphs of Quadratic Equations
Social Network-Based Sybil Defenses
Adding fractions with like Denominators
The Graphs of Quadratic Equations
Presentation transcript:

Preserving Privacy and Social Influence Isabelle Stanton

Social Network Privacy  Bakstrom, Dwork and Kleinberg show removing names isn’t enough  Present passive, semi-active and active attacks against social networking graphs

Economic Motivation  Wants to sell ads  Viral Marketing needs social graph

Economic Motivation  Uses their viral marketing algorithm to find influential people  Executes Bakstrom attack to identify them $

Goal of the Project  Develop a perturbation scheme that preserves privacy of individuals while also approximately preserving their influence

Influence  Modeled as a weighted graph G=(V,E), where p u,v is the probability that u influences v.  p u,v  0  For each v, sum of incoming probabilities at most 1,  For each v,  u p u,v  1  Influence of a node: Expected number of active nodes v

Obtaining the (Indirect) Influence Graph  Ask each user to rate how their friends influence them.  Put into a matrix A  A 2 is how a node indirectly influences its’ friends’ friends.  Corresponds to a Markov Process  I = Σ A k

Privacy Definitions  Def 1: If an attacker knows all the values in the original I except u then:  Def 2: Given a perturbed version of I, I’, and an edge u, the weight of u shouldn’t affect I’ much

Perturbation ideas  Randomly select a value within [0,1] for each edge weight, then normalize  Preserves privacy but is obviously useless for preserving influence  Randomly select a value in [1-ε, 1+ε] for each edge and multiply.  Influence for each node is within (1+ε) n but privacy is not preserved by any definition

My Idea  The Influence graph is calculated as a Markov process  A small change initially will result in a large change in the end  Perturb the original graph instead of the end product

Original Graph Perturbation  Nodes in clusters have approximately equal influence  Cluster the graph  For each inter-cluster edge, select new nodes in the cluster to assign the edge to  Add and remove some small fraction of inter-cluster edges

 No proofs today  Any suggestions?