首页 > 最新文献

Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining最新文献

英文 中文
Using smart glasses for monitoring cyber threat intelligence feeds 使用智能眼镜监控网络威胁情报
Mikko Korkiakoski, Fatima Sadiq, Febrian Setianto, U. Latif, Paula Alavesa, Panos Kostakos
The surge of COVID-19 has introduced a new threat surface as malevolent actors are trying to benefit from the pandemic. Because of this, new information sources and visualization tools about COVID-19 have been introduced into the workflow of frontline practitioners. As a result, analysts are increasingly required to shift their focus between different visual displays to monitor pandemic related data, security threats, and incidents. Augmented reality (AR) smart glasses can overlay digital data to the physical environment in a comprehensible manner. However, the real-life use situations are often complex and require fast knowledge acquisition from multiple sources. In this study we report results from an experiment with six subjects using an AR overlaid information interface coupled with traditional computer monitors. Our goal was to evaluate a multi tasking setup with traditional monitors and an AR headset where notifications from the new COVID-19 MISP instance were visualized. Our results indicate that better situational awareness does translate to increased task performance, but at the cost of a gender gap that requires further attention.
随着恶意行为者试图从大流行中获益,COVID-19的激增带来了新的威胁面。因此,在一线从业人员的工作流程中引入了新的COVID-19信息来源和可视化工具。因此,分析人员越来越需要在不同的视觉显示之间转移注意力,以监测与流行病相关的数据、安全威胁和事件。增强现实(AR)智能眼镜可以以可理解的方式将数字数据覆盖到物理环境中。然而,现实生活中的使用情况往往是复杂的,需要从多个来源快速获取知识。在这项研究中,我们报告了六名受试者使用AR覆盖信息界面与传统计算机显示器相结合的实验结果。我们的目标是评估使用传统监视器和AR头显的多任务设置,其中可视化来自新COVID-19 MISP实例的通知。我们的研究结果表明,更好的情境意识确实转化为更高的任务表现,但代价是性别差距,这需要进一步关注。
{"title":"Using smart glasses for monitoring cyber threat intelligence feeds","authors":"Mikko Korkiakoski, Fatima Sadiq, Febrian Setianto, U. Latif, Paula Alavesa, Panos Kostakos","doi":"10.1145/3487351.3492722","DOIUrl":"https://doi.org/10.1145/3487351.3492722","url":null,"abstract":"The surge of COVID-19 has introduced a new threat surface as malevolent actors are trying to benefit from the pandemic. Because of this, new information sources and visualization tools about COVID-19 have been introduced into the workflow of frontline practitioners. As a result, analysts are increasingly required to shift their focus between different visual displays to monitor pandemic related data, security threats, and incidents. Augmented reality (AR) smart glasses can overlay digital data to the physical environment in a comprehensible manner. However, the real-life use situations are often complex and require fast knowledge acquisition from multiple sources. In this study we report results from an experiment with six subjects using an AR overlaid information interface coupled with traditional computer monitors. Our goal was to evaluate a multi tasking setup with traditional monitors and an AR headset where notifications from the new COVID-19 MISP instance were visualized. Our results indicate that better situational awareness does translate to increased task performance, but at the cost of a gender gap that requires further attention.","PeriodicalId":320904,"journal":{"name":"Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123327705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient analytical computation of expected frequency of motifs of small size by marginalization in uncertain network 不确定网络中小尺寸基元期望频率的边缘化高效解析计算
Takayasu Fushimi, Kazumi Saito, H. Motoda
Counting motifs in an uncertain graph for which each link is associated with a connection probability is computationally expensive when the graph is huge due to the extremely large number of possible worlds. Natural approach is to rely on sampling-based approximation methods, but this still needs many sample graphs for obtaining accurate results. We propose a novel method that analytically computes the expected frequency of motif without relying on expensive sampling. Marginalizing the probability of each possible world on a candidate motif can drastically reduce the number of possible worlds that need be considered when the size of motif is small. Experiments using real-world data confirm that the proposed method is effective and efficient. It is far better than the state-of-the-art sampling-based method. The accuracy is guaranteed and the running time is about 4 order of magnitude faster. It runs at a speed that does not depend on the connection probability.
在不确定图中,由于可能世界的数量非常多,当图非常大时,计算每个链接与连接概率相关联的图中的图案是非常昂贵的。自然的方法是依靠基于抽样的近似方法,但这仍然需要大量的样本图来获得准确的结果。我们提出了一种新的方法来解析计算基序的期望频率,而不依赖于昂贵的采样。边缘化候选基序上每个可能世界的概率可以大大减少在基序较小时需要考虑的可能世界的数量。实际数据实验验证了该方法的有效性和有效性。它比最先进的基于抽样的方法要好得多。精度得到保证,运行时间提高了约4个数量级。它的运行速度不依赖于连接概率。
{"title":"Efficient analytical computation of expected frequency of motifs of small size by marginalization in uncertain network","authors":"Takayasu Fushimi, Kazumi Saito, H. Motoda","doi":"10.1145/3487351.3488275","DOIUrl":"https://doi.org/10.1145/3487351.3488275","url":null,"abstract":"Counting motifs in an uncertain graph for which each link is associated with a connection probability is computationally expensive when the graph is huge due to the extremely large number of possible worlds. Natural approach is to rely on sampling-based approximation methods, but this still needs many sample graphs for obtaining accurate results. We propose a novel method that analytically computes the expected frequency of motif without relying on expensive sampling. Marginalizing the probability of each possible world on a candidate motif can drastically reduce the number of possible worlds that need be considered when the size of motif is small. Experiments using real-world data confirm that the proposed method is effective and efficient. It is far better than the state-of-the-art sampling-based method. The accuracy is guaranteed and the running time is about 4 order of magnitude faster. It runs at a speed that does not depend on the connection probability.","PeriodicalId":320904,"journal":{"name":"Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121522272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Misogynoir: public online response towards self-reported misogynoir 厌恶女性:网上公众对自我报告的厌恶女性的反应
J. Kwarteng, S. Perfumi, T. Farrell, Miriam Fernández
"Misogynoir" refers to the specific forms of misogyny that Black women experience, which couple racism and sexism together. To better understand the online manifestations of this type of hate, and to propose methods that can automatically identify it, in this paper, we conduct a study on 4 cases of Black women in Tech reporting experiences of misogynoir on the Twitter platform. We follow the reactions to these cases (both supportive and non-supportive responses), and categorise them within a model of misogynoir that highlights experiences of Tone Policing, White Centring, Racial Gaslighting and Defensiveness. As an intersectional form of abusive or hateful speech, we investigate the possibilities and challenges to detect online instances of misogynoir in an automated way. We then conduct a closer qualitative analysis on messages of support and non-support to look at some of these categories in more detail. The purpose of this investigation is to understand responses to misogynoir online, including doubling down on misogynoir, engaging in performative allyship, and showing solidarity with Black women in tech.
“厌女症”(Misogynoir)是指黑人女性所经历的厌女症的具体形式,它将种族主义和性别歧视结合在一起。为了更好地理解这种类型的仇恨在网络上的表现,并提出可以自动识别的方法,在本文中,我们对4例科技领域的黑人女性在Twitter平台上报道厌女症的经历进行了研究。我们跟踪对这些案例的反应(包括支持和不支持的反应),并将它们归类为厌女症模型,该模型突出了语气管制、白人中心、种族煤气灯和防御的经历。作为辱骂或仇恨言论的一种交叉形式,我们研究了以自动方式检测在线厌女事件的可能性和挑战。然后,我们对支持和不支持的信息进行更密切的定性分析,以更详细地了解其中的一些类别。这项调查的目的是了解人们对网络上厌恶女性的反应,包括加倍厌恶女性,参与表演同盟,以及与科技领域的黑人女性团结一致。
{"title":"Misogynoir: public online response towards self-reported misogynoir","authors":"J. Kwarteng, S. Perfumi, T. Farrell, Miriam Fernández","doi":"10.1145/3487351.3488342","DOIUrl":"https://doi.org/10.1145/3487351.3488342","url":null,"abstract":"\"Misogynoir\" refers to the specific forms of misogyny that Black women experience, which couple racism and sexism together. To better understand the online manifestations of this type of hate, and to propose methods that can automatically identify it, in this paper, we conduct a study on 4 cases of Black women in Tech reporting experiences of misogynoir on the Twitter platform. We follow the reactions to these cases (both supportive and non-supportive responses), and categorise them within a model of misogynoir that highlights experiences of Tone Policing, White Centring, Racial Gaslighting and Defensiveness. As an intersectional form of abusive or hateful speech, we investigate the possibilities and challenges to detect online instances of misogynoir in an automated way. We then conduct a closer qualitative analysis on messages of support and non-support to look at some of these categories in more detail. The purpose of this investigation is to understand responses to misogynoir online, including doubling down on misogynoir, engaging in performative allyship, and showing solidarity with Black women in tech.","PeriodicalId":320904,"journal":{"name":"Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125118067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Enriching demand prediction with product relationship information using graph neural networks 利用图神经网络丰富产品关系信息的需求预测
Yaren Yilmaz, Ş. Öğüdücü
Demand prediction is crucial for companies in the retail industry to increase their profit and customer satisfaction. Although recent studies show the success of state-of-art machine learning and deep learning models in demand prediction, enriching datasets using graph-based feature representations to improve demand forecasting models is still rare. In this study, we propose a demand forecasting model that forecasts demand with the usage of graph-based product embeddings. Unlike most of the existing methods, the sale information data is used to extract the relations and several relationships are utilized to construct graphs. Using the Node2Vec and GraphSAGE algorithms, five different embeddings are evaluated to reflect the different relationships of products. Extreme Gradient Boosting Regressor (XGBR) is preferred over other models because of the ability to handle high sparse data. In order to observe and compare the results of different models, we also implement Long Short Term Memory (LSTM). The performance is evaluated using a public retail dataset and the results show that the proposed model gives less error using Node2Vec graph-based embedding with XGBR.
需求预测对于零售企业提高利润和客户满意度至关重要。尽管最近的研究表明,最先进的机器学习和深度学习模型在需求预测方面取得了成功,但使用基于图的特征表示来丰富数据集以改进需求预测模型仍然很少。在这项研究中,我们提出了一个需求预测模型,该模型使用基于图的产品嵌入来预测需求。与大多数现有方法不同,该方法使用销售信息数据提取关系,并利用若干关系构造图。使用Node2Vec和GraphSAGE算法,评估了五种不同的嵌入以反映产品的不同关系。由于能够处理高度稀疏的数据,极端梯度增强回归器(XGBR)比其他模型更受欢迎。为了观察和比较不同模型的结果,我们还实现了长短期记忆(LSTM)。使用公共零售数据集对性能进行了评估,结果表明,使用基于Node2Vec图的XGBR嵌入,所提出的模型误差较小。
{"title":"Enriching demand prediction with product relationship information using graph neural networks","authors":"Yaren Yilmaz, Ş. Öğüdücü","doi":"10.1145/3487351.3489477","DOIUrl":"https://doi.org/10.1145/3487351.3489477","url":null,"abstract":"Demand prediction is crucial for companies in the retail industry to increase their profit and customer satisfaction. Although recent studies show the success of state-of-art machine learning and deep learning models in demand prediction, enriching datasets using graph-based feature representations to improve demand forecasting models is still rare. In this study, we propose a demand forecasting model that forecasts demand with the usage of graph-based product embeddings. Unlike most of the existing methods, the sale information data is used to extract the relations and several relationships are utilized to construct graphs. Using the Node2Vec and GraphSAGE algorithms, five different embeddings are evaluated to reflect the different relationships of products. Extreme Gradient Boosting Regressor (XGBR) is preferred over other models because of the ability to handle high sparse data. In order to observe and compare the results of different models, we also implement Long Short Term Memory (LSTM). The performance is evaluated using a public retail dataset and the results show that the proposed model gives less error using Node2Vec graph-based embedding with XGBR.","PeriodicalId":320904,"journal":{"name":"Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining","volume":"6 22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116870654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deterministic influence maximization approach for sequential active marketing 序贯积极营销的确定性影响最大化方法
Dmitri Goldenberg, Eyal Tzvi Tenzer
The influence maximization problem aims to find the best seeding set of nodes in a network to increase the influence spread, under various information diffusion models. Recent advances have shown the importance of the timing of the seeding and introduced the sequential seeding approach, determining a step-by-step cascade of activations. Our study explores a novel Deterministic Influence Maximization Approach (DIMA) for time-based sequential seeding dynamics in a threshold-based model. We examine the problem characteristics and formulate solutions optimizing a scheduled sequential seeding strategy. Based on a set of empirical simulations we demonstrate the properties of the deterministic sequential problem, incorporate three different mathematical programming formulations and provide an initial benchmark for optimization techniques.
影响最大化问题的目的是在各种信息扩散模型下,寻找网络中最佳的节点播种集,以增加影响的传播。最近的进展表明了播种时间的重要性,并引入了顺序播种方法,确定了一步一步的级联激活。我们的研究探索了一种新的确定性影响最大化方法(DIMA),用于基于阈值的基于时间的序列播种动力学模型。我们研究了问题的特征,并制定了优化调度顺序播种策略的解决方案。基于一组经验模拟,我们展示了确定性序列问题的性质,结合了三种不同的数学规划公式,并为优化技术提供了一个初始基准。
{"title":"Deterministic influence maximization approach for sequential active marketing","authors":"Dmitri Goldenberg, Eyal Tzvi Tenzer","doi":"10.1145/3487351.3489474","DOIUrl":"https://doi.org/10.1145/3487351.3489474","url":null,"abstract":"The influence maximization problem aims to find the best seeding set of nodes in a network to increase the influence spread, under various information diffusion models. Recent advances have shown the importance of the timing of the seeding and introduced the sequential seeding approach, determining a step-by-step cascade of activations. Our study explores a novel Deterministic Influence Maximization Approach (DIMA) for time-based sequential seeding dynamics in a threshold-based model. We examine the problem characteristics and formulate solutions optimizing a scheduled sequential seeding strategy. Based on a set of empirical simulations we demonstrate the properties of the deterministic sequential problem, incorporate three different mathematical programming formulations and provide an initial benchmark for optimization techniques.","PeriodicalId":320904,"journal":{"name":"Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129611007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GAWD: graph anomaly detection in weighted directed graph databases GAWD:加权有向图数据库中的图异常检测
Meng-Chieh Lee, H. Nguyen, Dimitris Berberidis, V. Tseng, L. Akoglu
Given a set of node-labeled directed weighted graphs, how to find the most anomalous ones? How can we summarize the normal behavior in the database without losing information? We propose GAWD, for detecting anomalous graphs in directed weighted graph databases. The idea is to (1) iteratively identify the "best" substructure (i.e., subgraph or motif) that yields the largest compression when each of its occurrences is replaced by a super-node, and (2) score each graph by how much it compresses over iterations --- the more the compression, the lower the anomaly score. Different from existing work [1] on which we build, GAWD exhibits (i) a lossless graph encoding scheme, (ii) ability to handle numeric edge weights, (iii) interpretability by common patterns, and (iv) scalability with running time linear in input size. Experiments on four datasets injected with anomalies show that GAWD achieves significantly better results than state-of-the-art baselines.
给定一组节点标记的有向加权图,如何找到最异常的有向加权图?我们如何在不丢失信息的情况下总结数据库中的正常行为?我们提出了GAWD,用于检测有向加权图数据库中的异常图。这个想法是:(1)迭代地识别“最佳”子结构(即,子图或母图),当它的每个出现都被超级节点取代时,产生最大的压缩,(2)根据每个图在迭代中的压缩程度对其进行评分——压缩越多,异常得分越低。与我们所构建的现有工作[1]不同,GAWD展示了(i)无损图形编码方案,(ii)处理数字边缘权重的能力,(iii)通用模式的可解释性,以及(iv)运行时间线性输入的可扩展性。在注入异常的四个数据集上进行的实验表明,GAWD的效果明显优于最先进的基线。
{"title":"GAWD: graph anomaly detection in weighted directed graph databases","authors":"Meng-Chieh Lee, H. Nguyen, Dimitris Berberidis, V. Tseng, L. Akoglu","doi":"10.1145/3487351.3488325","DOIUrl":"https://doi.org/10.1145/3487351.3488325","url":null,"abstract":"Given a set of node-labeled directed weighted graphs, how to find the most anomalous ones? How can we summarize the normal behavior in the database without losing information? We propose GAWD, for detecting anomalous graphs in directed weighted graph databases. The idea is to (1) iteratively identify the \"best\" substructure (i.e., subgraph or motif) that yields the largest compression when each of its occurrences is replaced by a super-node, and (2) score each graph by how much it compresses over iterations --- the more the compression, the lower the anomaly score. Different from existing work [1] on which we build, GAWD exhibits (i) a lossless graph encoding scheme, (ii) ability to handle numeric edge weights, (iii) interpretability by common patterns, and (iv) scalability with running time linear in input size. Experiments on four datasets injected with anomalies show that GAWD achieves significantly better results than state-of-the-art baselines.","PeriodicalId":320904,"journal":{"name":"Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126213522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Are you influenced?: modeling the diffusion of fake news in social media 你受到影响了吗?:模拟假新闻在社交媒体上的传播
Abishai Joy, Anu Shrestha, Francesca Spezzano
We propose an approach inspired by the diffusion of innovations theory to model and characterize fake news sharing in social media through the lens of the different levels of influential factors (users, networks, and news). We address the problem of predicting fake news sharing as a classification task and demonstrate the potentials of the proposed features by achieving an AUROC of 0.97 and an average precision of 0.88, consistently outperforming baseline models with a higher margin (about 30% of AUROC). Also, we show that news-based features are the most effective at predicting real and fake news sharing, followed by the user- and network-based features.
受创新扩散理论的启发,我们提出了一种方法,通过不同层次的影响因素(用户、网络和新闻)来建模和表征社交媒体中的假新闻分享。我们将预测假新闻共享的问题作为分类任务来解决,并通过实现0.97的AUROC和0.88的平均精度来展示所提出特征的潜力,始终以更高的边际(约30%的AUROC)优于基线模型。此外,我们还表明,基于新闻的特征在预测真假新闻分享方面最有效,其次是基于用户和网络的特征。
{"title":"Are you influenced?: modeling the diffusion of fake news in social media","authors":"Abishai Joy, Anu Shrestha, Francesca Spezzano","doi":"10.1145/3487351.3488345","DOIUrl":"https://doi.org/10.1145/3487351.3488345","url":null,"abstract":"We propose an approach inspired by the diffusion of innovations theory to model and characterize fake news sharing in social media through the lens of the different levels of influential factors (users, networks, and news). We address the problem of predicting fake news sharing as a classification task and demonstrate the potentials of the proposed features by achieving an AUROC of 0.97 and an average precision of 0.88, consistently outperforming baseline models with a higher margin (about 30% of AUROC). Also, we show that news-based features are the most effective at predicting real and fake news sharing, followed by the user- and network-based features.","PeriodicalId":320904,"journal":{"name":"Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122770032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Identifying influential nodes using overlapping modularity vitality 使用重叠模块化活力识别有影响的节点
Stephany Rajeh, M. Savonnet, É. Leclercq, H. Cherifi
It is of paramount importance to uncover influential nodes to control diffusion phenomena in a network. In recent works, there is a growing trend to investigate the role of the community structure to solve this issue. Up to now, the vast majority of the so-called community-aware centrality measures rely on non-overlapping community structure. However, in many real-world networks, such as social networks, the communities overlap. In other words, a node can belong to multiple communities. To overcome this drawback, we propose and investigate the "Overlapping Modularity Vitality" centrality measure. This extension of "Modularity Vitality" quantifies the community structure strength variation when removing a node. It allows identifying a node as a hub or a bridge based on its contribution to the overlapping modularity of a network. A comparative analysis with its non-overlapping version using the Susceptible-Infected-Recovered (SIR) epidemic diffusion model has been performed on a set of six real-world networks. Overall, Overlapping Modularity Vitality outperforms its alternative. These results illustrate the importance of incorporating knowledge about the overlapping community structure to identify influential nodes effectively. Moreover, one can use multiple ranking strategies as the two measures are signed. Results show that selecting the nodes with the top positive or the top absolute centrality values is more effective than choosing the ones with the maximum negative values to spread the epidemic.
发现影响节点对于控制网络中的扩散现象至关重要。在最近的作品中,越来越多的人倾向于研究社区结构在解决这一问题中的作用。到目前为止,绝大多数所谓的社区意识中心性措施都依赖于非重叠的社区结构。然而,在许多现实世界的网络中,比如社交网络,社区是重叠的。换句话说,一个节点可以属于多个团体。为了克服这一缺陷,我们提出并研究了“重叠模块化活力”中心性度量。这种“模块化活力”的扩展量化了移除节点时社区结构强度的变化。它允许根据节点对网络重叠模块化的贡献来确定节点是枢纽还是桥接。利用易感-感染-恢复(SIR)流行病扩散模型,在6个真实网络上进行了与非重叠版本的比较分析。总体而言,重叠模块化生命力优于其替代方案。这些结果说明了将重叠社区结构知识纳入有效识别影响节点的重要性。此外,当两个度量被签名时,可以使用多个排序策略。结果表明,选择绝对中心性值最高的节点或绝对中心性值最高的节点比选择绝对中心性值最大的节点传播疫情更有效。
{"title":"Identifying influential nodes using overlapping modularity vitality","authors":"Stephany Rajeh, M. Savonnet, É. Leclercq, H. Cherifi","doi":"10.1145/3487351.3488277","DOIUrl":"https://doi.org/10.1145/3487351.3488277","url":null,"abstract":"It is of paramount importance to uncover influential nodes to control diffusion phenomena in a network. In recent works, there is a growing trend to investigate the role of the community structure to solve this issue. Up to now, the vast majority of the so-called community-aware centrality measures rely on non-overlapping community structure. However, in many real-world networks, such as social networks, the communities overlap. In other words, a node can belong to multiple communities. To overcome this drawback, we propose and investigate the \"Overlapping Modularity Vitality\" centrality measure. This extension of \"Modularity Vitality\" quantifies the community structure strength variation when removing a node. It allows identifying a node as a hub or a bridge based on its contribution to the overlapping modularity of a network. A comparative analysis with its non-overlapping version using the Susceptible-Infected-Recovered (SIR) epidemic diffusion model has been performed on a set of six real-world networks. Overall, Overlapping Modularity Vitality outperforms its alternative. These results illustrate the importance of incorporating knowledge about the overlapping community structure to identify influential nodes effectively. Moreover, one can use multiple ranking strategies as the two measures are signed. Results show that selecting the nodes with the top positive or the top absolute centrality values is more effective than choosing the ones with the maximum negative values to spread the epidemic.","PeriodicalId":320904,"journal":{"name":"Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125641586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Conversations around organizational risk and insider threat 围绕组织风险和内部威胁的对话
Luke J. Osterritter, Kathleen M. Carley
Organizational risk and resilience as well as insider threat have been studied through the lenses of socio-psychological studies and information and computer sciences. As with all disciplines, it is an area in which practitioners, enthusiasts, and experts discuss the theory, issues, and solutions of the field in various online public forums. Such conversations, despite their public nature, can be difficult to understand and to study, even by those deeply involved in the communities themselves. Who are the key actors? How can we understand and characterize the culture around such communities, the problems they face, and the solutions favored by the experts in the field? Which narratives are being created and propagated, and by whom - and are these actors truly people, or are they autonomous agents, or "bots"? In this paper, we demonstrate the value in applying dynamic network analysis and social network analysis to gain situational awareness of the public conversation around insider threat, nation-state espionage, and industrial espionage. Characterizing public discourse around a topic can reveal individuals and organizations attempting to push or shape narratives in ways that might not be obvious to casual observation. Such techniques have been used to great effect in the study of elections, the COVID-19 pandemic, and the study of misinformation and disinformation, and we hope to show that their use in this area is a powerful way to build a foundation of understanding around the conversations in the online public forum, provide data and analysis for use in further research, and equip counter insider threat practitioners with new insights.
组织风险和弹性以及内部威胁已经通过社会心理学研究和信息与计算机科学的镜头进行了研究。与所有学科一样,它是一个实践者、爱好者和专家在各种在线公共论坛上讨论该领域的理论、问题和解决方案的领域。尽管这些对话具有公共性质,但很难理解和研究,即使是那些深入参与社区的人也是如此。谁是关键角色?我们如何理解和描述这些社区周围的文化,他们面临的问题,以及该领域专家青睐的解决方案?哪些故事是由谁创造和传播的,这些演员是真正的人,还是自主的代理人,或“机器人”?在本文中,我们展示了应用动态网络分析和社会网络分析来获得围绕内部威胁、民族国家间谍和工业间谍的公众对话的态势感知的价值。描述围绕一个话题的公共话语可以揭示个人和组织试图以不经意的观察可能不明显的方式推动或塑造叙事。这些技术在研究选举、COVID-19大流行以及研究错误信息和虚假信息方面发挥了巨大作用,我们希望表明,在这一领域使用它们是一种强有力的方式,可以围绕在线公共论坛中的对话建立理解基础,为进一步研究提供数据和分析,并为反内部威胁从业者提供新的见解。
{"title":"Conversations around organizational risk and insider threat","authors":"Luke J. Osterritter, Kathleen M. Carley","doi":"10.1145/3487351.3492721","DOIUrl":"https://doi.org/10.1145/3487351.3492721","url":null,"abstract":"Organizational risk and resilience as well as insider threat have been studied through the lenses of socio-psychological studies and information and computer sciences. As with all disciplines, it is an area in which practitioners, enthusiasts, and experts discuss the theory, issues, and solutions of the field in various online public forums. Such conversations, despite their public nature, can be difficult to understand and to study, even by those deeply involved in the communities themselves. Who are the key actors? How can we understand and characterize the culture around such communities, the problems they face, and the solutions favored by the experts in the field? Which narratives are being created and propagated, and by whom - and are these actors truly people, or are they autonomous agents, or \"bots\"? In this paper, we demonstrate the value in applying dynamic network analysis and social network analysis to gain situational awareness of the public conversation around insider threat, nation-state espionage, and industrial espionage. Characterizing public discourse around a topic can reveal individuals and organizations attempting to push or shape narratives in ways that might not be obvious to casual observation. Such techniques have been used to great effect in the study of elections, the COVID-19 pandemic, and the study of misinformation and disinformation, and we hope to show that their use in this area is a powerful way to build a foundation of understanding around the conversations in the online public forum, provide data and analysis for use in further research, and equip counter insider threat practitioners with new insights.","PeriodicalId":320904,"journal":{"name":"Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130833382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fast colonization algorithm for seed selection in complex networks based on community detection 基于群体检测的复杂网络种子选择快速定植算法
Alexandru Topîrceanu, M. Udrescu
An ongoing challenge in network science is influence maximization (IM), which sets out to define those nodes which maximize the dissemination of influence. Most of the recent research proposals on the IM problem offer solutions that are still highly time consuming for usage in the context of real-world complex networks. This article develops a novel seed selection framework based on the principle of maximizing influence at the community level with an emphasis on global homogeneous seed spacing. Our proposed framework, called Colonise, consists of the following stages: (i) community tuning, (ii) node centrality computation, and (iii) seed assignment. Particularly, phase (i) iteratively breaks down the network into communities, using the Louvain method, based on the number of desired seeds; phase (ii) measures a target node centrality on each community to reduce the number of seed candidates; phase (iii) assigns nodes as seeds from the highest centrality nodes found in each community. In contrast to global centrality-based seed selection, we exploit the structure of communities and circumvent overlapped assignment, such that we select efficiently the number of seed nodes to boost information diffusion. The simulation results---based on 12 diverse synthetic and real-world networks, and employing the SIR epidemic model---prove that our proposed Colonise algorithm surpasses state-of-the-art selection methods in all simulated scenarios, with an increased diffusion efficiency ranging between +0.15% up to +173.53% (22.36% on average), without compromising either diffusion coverage or speed.
网络科学中的一个持续挑战是影响力最大化(IM),它旨在定义那些使影响力传播最大化的节点。最近关于IM问题的大多数研究建议提供的解决方案仍然非常耗时,无法在现实世界的复杂网络环境中使用。本文提出了一种基于群落影响最大化原则的种子选择框架,并着重于全局均匀种子间距。我们提出的框架称为Colonise,由以下阶段组成:(i)社区调整,(ii)节点中心性计算和(iii)种子分配。特别是,阶段(i)使用Louvain方法,根据所需种子的数量,迭代地将网络分解为社区;阶段(ii)测量每个社区的目标节点中心性,以减少候选种子的数量;阶段(iii)从每个群落中发现的最高中心性节点中分配节点作为种子。与基于全局中心性的种子选择相比,我们利用社区结构和规避重叠分配,从而有效地选择种子节点数量以促进信息扩散。基于12个不同的合成网络和现实世界网络,并采用SIR流行病模型的模拟结果证明,我们提出的Colonise算法在所有模拟场景中都优于最先进的选择方法,扩散效率提高了+0.15%到+173.53%(平均22.36%),而扩散覆盖范围和速度都没有受到影响。
{"title":"Fast colonization algorithm for seed selection in complex networks based on community detection","authors":"Alexandru Topîrceanu, M. Udrescu","doi":"10.1145/3487351.3488319","DOIUrl":"https://doi.org/10.1145/3487351.3488319","url":null,"abstract":"An ongoing challenge in network science is influence maximization (IM), which sets out to define those nodes which maximize the dissemination of influence. Most of the recent research proposals on the IM problem offer solutions that are still highly time consuming for usage in the context of real-world complex networks. This article develops a novel seed selection framework based on the principle of maximizing influence at the community level with an emphasis on global homogeneous seed spacing. Our proposed framework, called Colonise, consists of the following stages: (i) community tuning, (ii) node centrality computation, and (iii) seed assignment. Particularly, phase (i) iteratively breaks down the network into communities, using the Louvain method, based on the number of desired seeds; phase (ii) measures a target node centrality on each community to reduce the number of seed candidates; phase (iii) assigns nodes as seeds from the highest centrality nodes found in each community. In contrast to global centrality-based seed selection, we exploit the structure of communities and circumvent overlapped assignment, such that we select efficiently the number of seed nodes to boost information diffusion. The simulation results---based on 12 diverse synthetic and real-world networks, and employing the SIR epidemic model---prove that our proposed Colonise algorithm surpasses state-of-the-art selection methods in all simulated scenarios, with an increased diffusion efficiency ranging between +0.15% up to +173.53% (22.36% on average), without compromising either diffusion coverage or speed.","PeriodicalId":320904,"journal":{"name":"Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130922585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1