首页 > 最新文献

Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining最新文献

英文 中文
Edge-centric network analysis 边缘中心网络分析
G. Pirrò
Most of the existing deep-learning-based network analysis techniques focus on the problem of learning low-dimensional node representations. However, networks can also be seen in the light of edges interlinking pairs of nodes. The broad goal of this paper is to introduce a deep-learning framework focused on computing edge-centric network embeddings. We present a novel approach called ECNE, which instead of computing edge embeddings by aggregating node embeddings, computes them directly. ECNE leverages the notion of line graph of a graph coupled with an edge weighting mechanism to preserve the dynamic of the original graph in the line graph. We show that ECNE brings benefits wrt the state-of-the-art.
现有的基于深度学习的网络分析技术大多集中在低维节点表示的学习问题上。然而,网络也可以被看作是连接节点对的边。本文的主要目标是介绍一种专注于计算以边缘为中心的网络嵌入的深度学习框架。我们提出了一种新的方法,称为ECNE,它不是通过聚集节点嵌入来计算边缘嵌入,而是直接计算边缘嵌入。ECNE利用图形的线形图的概念与边缘加权机制相结合,以保持线形图中原始图形的动态。我们表明,ECNE带来了最先进的效益。
{"title":"Edge-centric network analysis","authors":"G. Pirrò","doi":"10.1145/3487351.3488329","DOIUrl":"https://doi.org/10.1145/3487351.3488329","url":null,"abstract":"Most of the existing deep-learning-based network analysis techniques focus on the problem of learning low-dimensional node representations. However, networks can also be seen in the light of edges interlinking pairs of nodes. The broad goal of this paper is to introduce a deep-learning framework focused on computing edge-centric network embeddings. We present a novel approach called ECNE, which instead of computing edge embeddings by aggregating node embeddings, computes them directly. ECNE leverages the notion of line graph of a graph coupled with an edge weighting mechanism to preserve the dynamic of the original graph in the line graph. We show that ECNE brings benefits wrt the state-of-the-art.","PeriodicalId":320904,"journal":{"name":"Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134377069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fake news and COVID-19 vaccination: a comparative study 假新闻与COVID-19疫苗接种:比较研究
Farzaneh Jouyandeh, Sarvnaz Sadeghi, Bahareh Rahmatikargar, Pooya Moradian Zadeh
COVID-19 pandemic has changed almost every aspect of people's lives around the world. Along with non-pharmaceutical interventions such as physical distancing, vaccination is one of the proposed solutions to control the spread of this pandemic. However, so much fake information is spread on social media websites about the vaccination. In this paper, we study the problem of fake news detection on Twitter network. After collecting a dataset and pre-processing, a set of features are extracted from the tweets. This includes the tweet's length and its keywords, number of followers, sentiment, and readability scores. In the next phase, six well-known classifiers are executed on this data, and the best result with the highest accuracy is chosen for the community detection process to study and track the evolution of fake news campaigns. For the analysis, we considered multiple criteria such as the number of communities, their sizes, leaders, and topics. The results of this research can help decision-makers to understand the underlying and formation of fake news campaigns.
2019冠状病毒病大流行几乎改变了全世界人民生活的方方面面。除了保持身体距离等非药物干预措施外,疫苗接种是控制本次大流行传播的拟议解决方案之一。然而,社交媒体网站上传播了大量关于疫苗接种的虚假信息。在本文中,我们研究了Twitter网络上的假新闻检测问题。在收集数据集并进行预处理后,从推文中提取出一组特征。这包括tweet的长度和关键词、关注者数量、情绪和可读性得分。在下一阶段,对这些数据执行六个知名分类器,并选择准确率最高的最佳结果用于社区检测过程,以研究和跟踪假新闻活动的演变。为了进行分析,我们考虑了多个标准,例如社区的数量、规模、领导者和主题。这项研究的结果可以帮助决策者了解假新闻运动的基础和形成。
{"title":"Fake news and COVID-19 vaccination: a comparative study","authors":"Farzaneh Jouyandeh, Sarvnaz Sadeghi, Bahareh Rahmatikargar, Pooya Moradian Zadeh","doi":"10.1145/3487351.3490960","DOIUrl":"https://doi.org/10.1145/3487351.3490960","url":null,"abstract":"COVID-19 pandemic has changed almost every aspect of people's lives around the world. Along with non-pharmaceutical interventions such as physical distancing, vaccination is one of the proposed solutions to control the spread of this pandemic. However, so much fake information is spread on social media websites about the vaccination. In this paper, we study the problem of fake news detection on Twitter network. After collecting a dataset and pre-processing, a set of features are extracted from the tweets. This includes the tweet's length and its keywords, number of followers, sentiment, and readability scores. In the next phase, six well-known classifiers are executed on this data, and the best result with the highest accuracy is chosen for the community detection process to study and track the evolution of fake news campaigns. For the analysis, we considered multiple criteria such as the number of communities, their sizes, leaders, and topics. The results of this research can help decision-makers to understand the underlying and formation of fake news campaigns.","PeriodicalId":320904,"journal":{"name":"Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124469601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Unsupervised real-time induction and interactive visualization of taxonomies over domain-specific concepts 对特定领域概念的分类法进行无监督的实时归纳和交互式可视化
M. Kejriwal, Ke Shen
Given a domain-specific set of concept labels, taxonomy induction is the problem of inducing a taxonomy over the concept labels. Despite its importance in problems such as e-commerce, and some algorithmic research as a consequence, practical tools for taxonomy induction and interactive visualization do not currently exist. To be truly useful, such a tool must permit a reasonable solution in a relatively unsupervised setting, and be applicable to general subsets of concept labels. In this paper, we present an unsupervised, end-to-end taxonomy induction system for arbitrary concept-labels from the e-commerce domain. Our system only takes a simple text file as input and yields a tree-like taxonomy that can be rendered on a browser, and that a non-technical user can interact with. Important components of the system can also be customized by a technically experienced user.
给定特定于领域的概念标签集,分类法归纳是在概念标签上归纳分类法的问题。尽管它在电子商务等问题以及一些算法研究中很重要,但目前还没有用于分类归纳和交互式可视化的实用工具。要真正有用,这样的工具必须允许在相对无监督的设置中提供合理的解决方案,并且适用于概念标签的一般子集。本文提出了一种针对电子商务领域中任意概念标签的无监督端到端分类归纳系统。我们的系统只接受一个简单的文本文件作为输入,并产生一个可以在浏览器上呈现的树状分类法,非技术用户可以与之交互。系统的重要组件也可以由技术经验丰富的用户定制。
{"title":"Unsupervised real-time induction and interactive visualization of taxonomies over domain-specific concepts","authors":"M. Kejriwal, Ke Shen","doi":"10.1145/3487351.3489481","DOIUrl":"https://doi.org/10.1145/3487351.3489481","url":null,"abstract":"Given a domain-specific set of concept labels, taxonomy induction is the problem of inducing a taxonomy over the concept labels. Despite its importance in problems such as e-commerce, and some algorithmic research as a consequence, practical tools for taxonomy induction and interactive visualization do not currently exist. To be truly useful, such a tool must permit a reasonable solution in a relatively unsupervised setting, and be applicable to general subsets of concept labels. In this paper, we present an unsupervised, end-to-end taxonomy induction system for arbitrary concept-labels from the e-commerce domain. Our system only takes a simple text file as input and yields a tree-like taxonomy that can be rendered on a browser, and that a non-technical user can interact with. Important components of the system can also be customized by a technically experienced user.","PeriodicalId":320904,"journal":{"name":"Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127815914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A deep contrastive learning approach to extremely-sparse disaster damage assessment in social sensing 社会感知中极稀疏灾害损失评估的深度对比学习方法
Yang Zhang, Ruohan Zong, Lanyu Shang, Ziyi Kou, Dong Wang
Social sensing has emerged as a pervasive and scalable sensing paradigm to obtain timely information of the physical world from "human sensors". In this paper, we study a new extremely-sparse disaster damage assessment (DBA) problem in social sensing. The objective is to automatically assess the damage severity of affected areas in a disaster event by leveraging the imagery data reported on online social media with extremely sparse training data (e.g., only 1% of the data samples have labels). Our problem is motivated by the limitation of current DDA solutions that often require a significant amount of high-quality training data to learn an effective DDA model. We identify two critical challenges in solving our problem: i) it remains to be a fundamental challenge on how to effectively train a reliable DDA model given the lack of sufficient damage severity labels; ii) it is a difficult task to capture the excessive and fine-grained damage-related features in each image for accurate damage assessment. In this paper, we propose ContrastDDA, a deep contrastive learning approach to address the extremely-sparse DDA problem by designing an integrated contrastive and augmentative neural network architecture for accurate disaster damage assessment using the extremely sparse training samples. The evaluation results on two real-world DDA applications demonstrate that ContrastDDA clearly outperforms state-of-the-art deep learning and semi-supervised learning baselines with the highest DDA accuracy under different application scenarios.
社会感知作为一种普遍的、可扩展的感知范式,从“人体传感器”中获取物理世界的及时信息。本文研究了一种新的极稀疏灾害损害评估(DBA)问题。目标是利用在线社交媒体上报告的图像数据,利用极其稀疏的训练数据(例如,只有1%的数据样本有标签),自动评估灾害事件中受影响地区的损害严重程度。我们的问题源于当前DDA解决方案的局限性,这些解决方案通常需要大量高质量的训练数据来学习有效的DDA模型。我们确定了解决问题的两个关键挑战:1)在缺乏足够的损伤严重程度标签的情况下,如何有效地训练可靠的DDA模型仍然是一个根本性的挑战;Ii)在每个图像中捕获过多的和细粒度的损伤相关特征以进行准确的损伤评估是一项困难的任务。在本文中,我们提出了一种深度对比学习方法ContrastDDA,通过设计一个集成的对比和增强神经网络架构,利用极稀疏的训练样本进行准确的灾害损害评估,来解决极稀疏DDA问题。在两个真实的DDA应用中的评估结果表明,在不同的应用场景下,ContrastDDA以最高的DDA准确率明显优于最先进的深度学习和半监督学习基线。
{"title":"A deep contrastive learning approach to extremely-sparse disaster damage assessment in social sensing","authors":"Yang Zhang, Ruohan Zong, Lanyu Shang, Ziyi Kou, Dong Wang","doi":"10.1145/3487351.3488318","DOIUrl":"https://doi.org/10.1145/3487351.3488318","url":null,"abstract":"Social sensing has emerged as a pervasive and scalable sensing paradigm to obtain timely information of the physical world from \"human sensors\". In this paper, we study a new extremely-sparse disaster damage assessment (DBA) problem in social sensing. The objective is to automatically assess the damage severity of affected areas in a disaster event by leveraging the imagery data reported on online social media with extremely sparse training data (e.g., only 1% of the data samples have labels). Our problem is motivated by the limitation of current DDA solutions that often require a significant amount of high-quality training data to learn an effective DDA model. We identify two critical challenges in solving our problem: i) it remains to be a fundamental challenge on how to effectively train a reliable DDA model given the lack of sufficient damage severity labels; ii) it is a difficult task to capture the excessive and fine-grained damage-related features in each image for accurate damage assessment. In this paper, we propose ContrastDDA, a deep contrastive learning approach to address the extremely-sparse DDA problem by designing an integrated contrastive and augmentative neural network architecture for accurate disaster damage assessment using the extremely sparse training samples. The evaluation results on two real-world DDA applications demonstrate that ContrastDDA clearly outperforms state-of-the-art deep learning and semi-supervised learning baselines with the highest DDA accuracy under different application scenarios.","PeriodicalId":320904,"journal":{"name":"Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining","volume":"9 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116655764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Unfolding the dimensionality structure of social networks in ideological embeddings 意识形态嵌入中社会网络维度结构的揭示
P. Morales, Jean-Philippe Cointet, Gabriel Muñoz Zolotoochin
Traditionally, public opinion on different issues of public debate has been studied through polls and surveys. Recent advancements in network ideological scaling methods, however, have shown that digital behavioral traces in social media platforms can be used to mine opinions at a massive scale. This has yet to be shown to work beyond one-dimensional opinion scales, which are best suited for two-party systems and binary social divides such as those observed in the US. In this article, we use multidimensional ideological scaling for coupled with referential attitudinal data for some nodes. We show that opinions can be mined in a multitude of issues: from social networks, embedding them in ideological spaces where dimensions stand for indicators of positive and negative opinions, towards issues of public debate. This method does not require text analysis and is thus language independent. We illustrate this approach on the Twitter follower network of French users leveraging political survey data.
传统上,公众对公共辩论的不同问题的意见是通过民意调查和调查来研究的。然而,网络意识形态扩展方法的最新进展表明,社交媒体平台上的数字行为痕迹可以用来大规模地挖掘意见。目前还没有证据表明,这种方法在一维意见量表之外也能发挥作用,这种量表最适合于两党制度和二元社会划分,比如在美国观察到的情况。在本文中,我们使用多维意识形态尺度来耦合一些节点的参考态度数据。我们表明,意见可以从许多问题中挖掘:从社交网络,将它们嵌入意识形态空间,其中维度代表积极和消极意见的指标,到公共辩论的问题。这种方法不需要文本分析,因此与语言无关。我们利用政治调查数据在法国用户的Twitter追随者网络上说明了这种方法。
{"title":"Unfolding the dimensionality structure of social networks in ideological embeddings","authors":"P. Morales, Jean-Philippe Cointet, Gabriel Muñoz Zolotoochin","doi":"10.1145/3487351.3489441","DOIUrl":"https://doi.org/10.1145/3487351.3489441","url":null,"abstract":"Traditionally, public opinion on different issues of public debate has been studied through polls and surveys. Recent advancements in network ideological scaling methods, however, have shown that digital behavioral traces in social media platforms can be used to mine opinions at a massive scale. This has yet to be shown to work beyond one-dimensional opinion scales, which are best suited for two-party systems and binary social divides such as those observed in the US. In this article, we use multidimensional ideological scaling for coupled with referential attitudinal data for some nodes. We show that opinions can be mined in a multitude of issues: from social networks, embedding them in ideological spaces where dimensions stand for indicators of positive and negative opinions, towards issues of public debate. This method does not require text analysis and is thus language independent. We illustrate this approach on the Twitter follower network of French users leveraging political survey data.","PeriodicalId":320904,"journal":{"name":"Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126886028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
LinkMan: hyperlink-driven misbehavior detection in online security forums LinkMan:在线安全论坛中超链接驱动的不当行为检测
Risul Islam, Ben Treves, Md Omar Faruk Rokon, M. Faloutsos
How can we detect and analyze hyperlink-driven misbehavior in online forums? Online forums contain enormous amounts of user-generated content, with threads and comments frequently supplemented by hyperlinks. These hyperlinks are often posted with malicious intention and we refer to this as 'hyperlink-driven misbehavior'. We present LinkMan, a systematic suite of capabilities, to detect and analyze hyperlink-driven misbehavior in online forums. We take a unique perspective focusing on hyperlink sharing practices of the users to spot misbehavior. LinkMan can categorize these hyperlinks as: a) phishing, b) spamming, and b) promoting malicious products. Our approach consists of three high-level phases: (a) extracting hyperlinks from the textual data, (b) identifying misbehaving hyperlinks, and (c) modeling the behavioral patterns of hyperlink sharing, where we identify key hyperlinks and analyze the collaboration dynamics of hyperlink sharing. In addition, we implement our approach as a powerful and easy-to-use open platform for practitioners. We apply LinkMan to spot misbehavior from three online security forums, where we expect the users to be more security-aware. We show that our approach works very well in terms of retrieving and classifying hyperlinks compared to previous solutions. Furthermore, we find non-trivial and often systematic misbehavior: (a) we find a total of 637 misbehaving hyperlinks, and (b) we identify 30 colluding groups of users in terms of promoting hyperlinks. Our work is a significant step towards mining online forums and detecting misbehaving users comprehensively.
我们如何检测和分析在线论坛中由超链接驱动的不当行为?在线论坛包含大量用户生成的内容,其中的主题和评论经常由超链接补充。这些超链接通常带有恶意,我们将其称为“超链接驱动的不当行为”。我们提出LinkMan,一个系统的功能套件,以检测和分析超链接驱动的不当行为在网上论坛。我们以独特的视角关注用户的超链接分享行为,以发现不当行为。LinkMan可以将这些超链接分类为:a)网络钓鱼,b)垃圾邮件,b)推销恶意产品。我们的方法包括三个高级阶段:(a)从文本数据中提取超链接,(b)识别行为不当的超链接,以及(c)对超链接共享的行为模式建模,其中我们识别关键超链接并分析超链接共享的协作动态。此外,我们将我们的方法作为一个强大且易于使用的开放平台来实现。我们使用LinkMan来发现来自三个在线安全论坛的不当行为,我们希望这些论坛的用户更有安全意识。我们表明,与以前的解决方案相比,我们的方法在检索和分类超链接方面工作得非常好。此外,我们还发现了一些不寻常的、经常是系统性的不当行为:(a)我们发现了总共637个行为不当的超链接,(b)我们在推广超链接方面确定了30个串通的用户组。我们的工作是朝着全面挖掘在线论坛和发现行为不端的用户迈出的重要一步。
{"title":"LinkMan: hyperlink-driven misbehavior detection in online security forums","authors":"Risul Islam, Ben Treves, Md Omar Faruk Rokon, M. Faloutsos","doi":"10.1145/3487351.3488323","DOIUrl":"https://doi.org/10.1145/3487351.3488323","url":null,"abstract":"How can we detect and analyze hyperlink-driven misbehavior in online forums? Online forums contain enormous amounts of user-generated content, with threads and comments frequently supplemented by hyperlinks. These hyperlinks are often posted with malicious intention and we refer to this as 'hyperlink-driven misbehavior'. We present LinkMan, a systematic suite of capabilities, to detect and analyze hyperlink-driven misbehavior in online forums. We take a unique perspective focusing on hyperlink sharing practices of the users to spot misbehavior. LinkMan can categorize these hyperlinks as: a) phishing, b) spamming, and b) promoting malicious products. Our approach consists of three high-level phases: (a) extracting hyperlinks from the textual data, (b) identifying misbehaving hyperlinks, and (c) modeling the behavioral patterns of hyperlink sharing, where we identify key hyperlinks and analyze the collaboration dynamics of hyperlink sharing. In addition, we implement our approach as a powerful and easy-to-use open platform for practitioners. We apply LinkMan to spot misbehavior from three online security forums, where we expect the users to be more security-aware. We show that our approach works very well in terms of retrieving and classifying hyperlinks compared to previous solutions. Furthermore, we find non-trivial and often systematic misbehavior: (a) we find a total of 637 misbehaving hyperlinks, and (b) we identify 30 colluding groups of users in terms of promoting hyperlinks. Our work is a significant step towards mining online forums and detecting misbehaving users comprehensively.","PeriodicalId":320904,"journal":{"name":"Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127025268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Detecting spam tweets using machine learning and effective preprocessing 使用机器学习和有效的预处理来检测垃圾推文
Berk Kardaş, İsmail Erdem Bayar, Tansel Özyer, R. Alhajj
Nowadays, with the rapid increase in popularity of online social networks (OSNs), these platforms are realized as ideal places for spammers. Unfortunately, these spammers can easily publish malicious content, advertise phishing scams by taking advantage of OSNs. Therefore, effective identification and filtering of spam tweets will be beneficial to both OSNs and users. However, it is becoming increasingly difficult to check and eliminate spam tweets due to this great flow of posts. Motivated by these observations, in this paper we propose an approach for the detection of spam tweets using machine learning and effective preprocessing techniques. The approach proposes the advantages of the preprocessing and which of these preprocessing techniques are the most effective. To compare these techniques UtkML Twitter spam dataset is used in testing. After the most effective methods determined, the detection accuracy of the spam tweets will be better optimized by combining them. We have evaluated our solution with four different machine learning algorithms namely - Naïve Bayes Classifier, Neural Network, Logistic Regression and Support Vector Machine. With SVM Classifier, we are able to achieve an accuracy of 93.02%. Experimental results show that our approach can improve the performance of spam tweet classification effectively.
如今,随着在线社交网络(OSNs)的迅速普及,这些平台成为垃圾邮件发送者的理想场所。不幸的是,这些垃圾邮件发送者可以很容易地利用osn发布恶意内容,宣传网络钓鱼骗局。因此,对垃圾推文进行有效的识别和过滤,对osn和用户都是有利的。然而,由于这种巨大的帖子流量,检查和消除垃圾推文变得越来越困难。基于这些观察结果,在本文中,我们提出了一种使用机器学习和有效预处理技术检测垃圾推文的方法。该方法提出了各种预处理技术的优点以及哪种预处理技术是最有效的。为了比较这些技术,在测试中使用了UtkML Twitter垃圾邮件数据集。在确定了最有效的方法后,将它们结合起来,可以更好地优化垃圾推文的检测精度。我们用四种不同的机器学习算法来评估我们的解决方案,即Naïve贝叶斯分类器、神经网络、逻辑回归和支持向量机。使用SVM分类器,我们能够达到93.02%的准确率。实验结果表明,该方法可以有效地提高垃圾推文分类的性能。
{"title":"Detecting spam tweets using machine learning and effective preprocessing","authors":"Berk Kardaş, İsmail Erdem Bayar, Tansel Özyer, R. Alhajj","doi":"10.1145/3487351.3490968","DOIUrl":"https://doi.org/10.1145/3487351.3490968","url":null,"abstract":"Nowadays, with the rapid increase in popularity of online social networks (OSNs), these platforms are realized as ideal places for spammers. Unfortunately, these spammers can easily publish malicious content, advertise phishing scams by taking advantage of OSNs. Therefore, effective identification and filtering of spam tweets will be beneficial to both OSNs and users. However, it is becoming increasingly difficult to check and eliminate spam tweets due to this great flow of posts. Motivated by these observations, in this paper we propose an approach for the detection of spam tweets using machine learning and effective preprocessing techniques. The approach proposes the advantages of the preprocessing and which of these preprocessing techniques are the most effective. To compare these techniques UtkML Twitter spam dataset is used in testing. After the most effective methods determined, the detection accuracy of the spam tweets will be better optimized by combining them. We have evaluated our solution with four different machine learning algorithms namely - Naïve Bayes Classifier, Neural Network, Logistic Regression and Support Vector Machine. With SVM Classifier, we are able to achieve an accuracy of 93.02%. Experimental results show that our approach can improve the performance of spam tweet classification effectively.","PeriodicalId":320904,"journal":{"name":"Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129195577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Forecasting topic activity with exogenous and endogenous information signals in Twitter 利用Twitter中外生和内生信息信号预测话题活动
Kin Wai Ng, Sameera Horawalavithana, Adriana Iamnitchi
Modeling social media activity has numerous practical implications such as designing and testing intervention techniques to mitigate disinformation or delivering critical information during disaster relief operations. In this paper we propose a modeling technique that forecasts topic-specific daily volume of social media activities by using both exogenous signals, such as news or armed conflicts records, and endogenous data from the social media platform we model. Empirical evaluations with real datasets from Twitter on two different contexts each composed of multiple interrelated topics demonstrate the effectiveness of our solution.
对社会媒体活动进行建模具有许多实际意义,例如设计和测试干预技术以减轻虚假信息或在救灾行动中提供关键信息。在本文中,我们提出了一种建模技术,通过使用外生信号(如新闻或武装冲突记录)和来自我们建模的社交媒体平台的内生数据来预测特定主题的社交媒体日活动量。在两种不同的背景下,使用Twitter的真实数据集进行实证评估,每种背景由多个相互关联的主题组成,证明了我们的解决方案的有效性。
{"title":"Forecasting topic activity with exogenous and endogenous information signals in Twitter","authors":"Kin Wai Ng, Sameera Horawalavithana, Adriana Iamnitchi","doi":"10.1145/3487351.3488344","DOIUrl":"https://doi.org/10.1145/3487351.3488344","url":null,"abstract":"Modeling social media activity has numerous practical implications such as designing and testing intervention techniques to mitigate disinformation or delivering critical information during disaster relief operations. In this paper we propose a modeling technique that forecasts topic-specific daily volume of social media activities by using both exogenous signals, such as news or armed conflicts records, and endogenous data from the social media platform we model. Empirical evaluations with real datasets from Twitter on two different contexts each composed of multiple interrelated topics demonstrate the effectiveness of our solution.","PeriodicalId":320904,"journal":{"name":"Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129218987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Temporal dynamics of posts and user engagement of influencers on Facebook and Instagram Facebook和Instagram上帖子的时间动态和影响者的用户参与度
L. Vassio, M. Garetto, C. Chiasserini, Emilio Leonardi
A relevant fraction of human interactions occurs on online social networks. Freshness of content seems to play an important role, with content popularity rapidly vanishing over time. In this paper, we investigate how influencers' generated content (i.e., posts) attracts interactions, measured by number of likes or reactions. We analyse the activity of Italian influencers and followers over more than 5 years, focusing on two popular social networks: Facebook and Instagram, including more than 13 billion interactions and about 4 million posts. We characterise the influencers' and followers' behaviour over time, show that influencers' posts are short-lived with an exponential temporal decay, and characterise the time evolution of the interactions from their initial peak till the end of a post lifetime. Finally, leveraging our findings, we discuss how they can be exploited to develop an analytical model of the interactions temporal dynamics.
人类互动的相关部分发生在在线社交网络上。内容的新鲜度似乎起着重要作用,随着时间的推移,内容的受欢迎程度会迅速消失。在本文中,我们研究了网红生成的内容(即帖子)如何吸引互动,通过点赞或反应的数量来衡量。我们分析了意大利网红和粉丝在5年多时间里的活动,重点关注两个流行的社交网络:Facebook和Instagram,其中包括超过130亿次互动和大约400万条帖子。我们描述了影响者和追随者随时间的行为特征,表明影响者的帖子是短暂的,具有指数级的时间衰减,并描述了互动从最初的高峰到帖子生命周期结束的时间演变。最后,利用我们的发现,我们讨论了如何利用它们来开发相互作用时间动态的分析模型。
{"title":"Temporal dynamics of posts and user engagement of influencers on Facebook and Instagram","authors":"L. Vassio, M. Garetto, C. Chiasserini, Emilio Leonardi","doi":"10.1145/3487351.3488340","DOIUrl":"https://doi.org/10.1145/3487351.3488340","url":null,"abstract":"A relevant fraction of human interactions occurs on online social networks. Freshness of content seems to play an important role, with content popularity rapidly vanishing over time. In this paper, we investigate how influencers' generated content (i.e., posts) attracts interactions, measured by number of likes or reactions. We analyse the activity of Italian influencers and followers over more than 5 years, focusing on two popular social networks: Facebook and Instagram, including more than 13 billion interactions and about 4 million posts. We characterise the influencers' and followers' behaviour over time, show that influencers' posts are short-lived with an exponential temporal decay, and characterise the time evolution of the interactions from their initial peak till the end of a post lifetime. Finally, leveraging our findings, we discuss how they can be exploited to develop an analytical model of the interactions temporal dynamics.","PeriodicalId":320904,"journal":{"name":"Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining","volume":"18 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114930309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Analyzing behavioral changes of Twitter users after exposure to misinformation 分析Twitter用户在接触错误信息后的行为变化
Yichen Wang, Richard O. Han, Tamara Lehman, Q. Lv, Shivakant Mishra
Social media platforms have been exploited to disseminate misinformation in recent years. The widespread online misinformation has been shown to affect users' beliefs and is connected to social impact such as polarization. In this work, we focus on misinformation's impact on specific user behavior and aim to understand whether general Twitter users changed their behavior after being exposed to misinformation. We compare the before and after behavior of exposed users to determine whether the frequency of the tweets they posted, or the sentiment of their tweets underwent any significant change. Our results indicate that users overall exhibited statistically significant changes in behavior across some of these metrics. Through language distance analysis, we show that exposed users were already different from baseline users before the exposure. We also study the characteristics of two specific user groups, multi-exposure and extreme change groups, which were potentially highly impacted. Finally, we study if the changes in the behavior of the users after exposure to misinformation tweets vary based on the number of their followers or the number of followers of the tweet authors, and find that their behavioral changes are all similar.
近年来,社交媒体平台被用来传播错误信息。广泛存在的网络错误信息已被证明会影响用户的信念,并与两极分化等社会影响有关。在这项工作中,我们专注于错误信息对特定用户行为的影响,旨在了解一般Twitter用户在接触错误信息后是否会改变他们的行为。我们比较了暴露用户的行为前后,以确定他们发布推文的频率,或者他们的推文情绪是否发生了重大变化。我们的结果表明,用户总体上在这些指标上表现出显著的行为变化。通过语言距离分析,我们发现暴露用户与暴露前的基线用户已经存在差异。我们还研究了两个特定用户群体的特征,即多重暴露和极端变化群体,这两个群体可能受到高度影响。最后,我们研究了用户在接触错误信息推文后的行为变化是否会随着关注者的数量或推文作者的关注者数量而变化,发现他们的行为变化都是相似的。
{"title":"Analyzing behavioral changes of Twitter users after exposure to misinformation","authors":"Yichen Wang, Richard O. Han, Tamara Lehman, Q. Lv, Shivakant Mishra","doi":"10.1145/3487351.3492718","DOIUrl":"https://doi.org/10.1145/3487351.3492718","url":null,"abstract":"Social media platforms have been exploited to disseminate misinformation in recent years. The widespread online misinformation has been shown to affect users' beliefs and is connected to social impact such as polarization. In this work, we focus on misinformation's impact on specific user behavior and aim to understand whether general Twitter users changed their behavior after being exposed to misinformation. We compare the before and after behavior of exposed users to determine whether the frequency of the tweets they posted, or the sentiment of their tweets underwent any significant change. Our results indicate that users overall exhibited statistically significant changes in behavior across some of these metrics. Through language distance analysis, we show that exposed users were already different from baseline users before the exposure. We also study the characteristics of two specific user groups, multi-exposure and extreme change groups, which were potentially highly impacted. Finally, we study if the changes in the behavior of the users after exposure to misinformation tweets vary based on the number of their followers or the number of followers of the tweet authors, and find that their behavioral changes are all similar.","PeriodicalId":320904,"journal":{"name":"Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129193176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1