首页 > 最新文献

2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)最新文献

英文 中文
Algorithm and Application for Signed Graphlets 签名graphlet的算法及应用
Apratim Das, A. Aravind, Mark Dale
As the world is flooded with deluge of data, the demand for mining data to gain insights is increasing. One effective technique to deal with the problem is to model the data as networks (graphs) and then apply graph mining techniques to uncover useful patterns. Several graph mining techniques have been studied in the literature, and graphlet-based analysis is gaining popularity due to its power in exposing hidden structure and interaction within the networks. The concept of graphlets for basic (undirected) networks was introduced around 2004 by Pržulj, et. al. [14]. Subsequently, graphlet based network analysis gained attraction when Pržulj added the concept of graphlet orbits and applied to biological networks [15]. A decade later, Sarajlić, et. al. introduced graphlets and graphlet orbits for directed networks, illustrating its application to fields beyond biology such as world trade networks, brain networks, communication networks, etc. [19]. Hence, directed graphlets are found to be more powerful in exposing hidden structures of the network than undirected graphlets of same size, due to added information on the edges. Taking this approach further, more recently, graphlets and orbits for signed networks have been introduced by Dale [3]. This paper presents a simple algorithm to enumerate signed graphlets and orbits. It then demonstrates an application of signed graphlets and orbits to a metabolic network.
随着世界充斥着大量的数据,挖掘数据以获得洞察力的需求正在增加。处理该问题的一种有效技术是将数据建模为网络(图),然后应用图挖掘技术来发现有用的模式。文献中已经研究了几种图挖掘技术,基于图的分析由于其在揭示网络中的隐藏结构和交互方面的能力而越来越受欢迎。用于基本(无向)网络的graphlet概念是在2004年左右由Pržulj等人提出的[14]。随后,Pržulj加入了石墨烯轨道的概念并将其应用于生物网络,基于石墨烯的网络分析受到了关注[15]。十年后,萨拉热窝等人将石墨烯和石墨烯轨道引入有向网络,说明了其在生物学以外的领域的应用,如世界贸易网络、大脑网络、通信网络等[19]。因此,由于在边缘上添加了信息,因此发现有向石墨烯在暴露网络隐藏结构方面比相同大小的无向石墨烯更强大。最近,Dale[3]为签名网络引入了石墨let和轨道,进一步采用了这种方法。本文提出了一种简单的枚举签名石墨和轨道的算法。然后演示了签名石墨烯和轨道在代谢网络中的应用。
{"title":"Algorithm and Application for Signed Graphlets","authors":"Apratim Das, A. Aravind, Mark Dale","doi":"10.1145/3341161.3343692","DOIUrl":"https://doi.org/10.1145/3341161.3343692","url":null,"abstract":"As the world is flooded with deluge of data, the demand for mining data to gain insights is increasing. One effective technique to deal with the problem is to model the data as networks (graphs) and then apply graph mining techniques to uncover useful patterns. Several graph mining techniques have been studied in the literature, and graphlet-based analysis is gaining popularity due to its power in exposing hidden structure and interaction within the networks. The concept of graphlets for basic (undirected) networks was introduced around 2004 by Pržulj, et. al. [14]. Subsequently, graphlet based network analysis gained attraction when Pržulj added the concept of graphlet orbits and applied to biological networks [15]. A decade later, Sarajlić, et. al. introduced graphlets and graphlet orbits for directed networks, illustrating its application to fields beyond biology such as world trade networks, brain networks, communication networks, etc. [19]. Hence, directed graphlets are found to be more powerful in exposing hidden structures of the network than undirected graphlets of same size, due to added information on the edges. Taking this approach further, more recently, graphlets and orbits for signed networks have been introduced by Dale [3]. This paper presents a simple algorithm to enumerate signed graphlets and orbits. It then demonstrates an application of signed graphlets and orbits to a metabolic network.","PeriodicalId":403360,"journal":{"name":"2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121919143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Computational Method for Identifying the Boundaries of Crime with Street Profile and Discrete Calculus 基于街道轮廓和离散微积分的犯罪边界识别方法
Justin Song, Valerie Spicer, Andrew J. Park, Herbert H. Tsang, P. Brantingham
The structure of the urban setting determines the crime patterns. This research explores the street profile analysis which is a new method for analyzing crime in relation to street networks. Street profile analysis can be used to identify crime surges or heavy concentrations of crime along roadways. In this study, the street profile technique is combined with a discrete calculus approach to locate the boundaries of small criminal spaces in the City of Vancouver, British Columbia, Canada. This experimental technique utilizes open source property crime data from the Vancouver Police Department to analyze crime patterns within Vancouver. This computational crime analysis technique is described in detail and the utility of this technique explored. The new technique is a valuable tool for the intelligence and security informatics communities.
城市环境的结构决定了犯罪模式。街道侧容分析是分析与街道网络有关的犯罪的一种新方法。街道轮廓分析可以用来确定犯罪激增或沿道路犯罪的严重集中。在这项研究中,将街道轮廓技术与离散微积分方法相结合,以确定加拿大不列颠哥伦比亚省温哥华市小型犯罪空间的边界。这项实验技术利用来自温哥华警察局的开源财产犯罪数据来分析温哥华的犯罪模式。详细描述了这种计算犯罪分析技术,并探讨了该技术的实用性。这种新技术对于情报和安全信息学领域来说是一种有价值的工具。
{"title":"Computational Method for Identifying the Boundaries of Crime with Street Profile and Discrete Calculus","authors":"Justin Song, Valerie Spicer, Andrew J. Park, Herbert H. Tsang, P. Brantingham","doi":"10.1145/3341161.3343537","DOIUrl":"https://doi.org/10.1145/3341161.3343537","url":null,"abstract":"The structure of the urban setting determines the crime patterns. This research explores the street profile analysis which is a new method for analyzing crime in relation to street networks. Street profile analysis can be used to identify crime surges or heavy concentrations of crime along roadways. In this study, the street profile technique is combined with a discrete calculus approach to locate the boundaries of small criminal spaces in the City of Vancouver, British Columbia, Canada. This experimental technique utilizes open source property crime data from the Vancouver Police Department to analyze crime patterns within Vancouver. This computational crime analysis technique is described in detail and the utility of this technique explored. The new technique is a valuable tool for the intelligence and security informatics communities.","PeriodicalId":403360,"journal":{"name":"2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116761422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Rumor Detection in Social Networks via Deep Contextual Modeling 基于深度上下文建模的社交网络谣言检测
Amir Pouran Ben Veyseh, M. Thai, Thien Huu Nguyen, D. Dou
Fake news and rumors constitute a major problem in social networks recently. Due to the fast information propagation in social networks, it is inefficient to use human labor to detect suspicious news. Automatic rumor detection is thus necessary to prevent devastating effects of rumors on the individuals and society. Previous work has shown that in addition to the content of the news/posts and their contexts (i.e., replies), the relations or connections among those components are important to boost the rumor detection performance. In order to induce such relations between posts and contexts, the prior work has mainly relied on the inherent structures of the social networks (e.g., direct replies), ignoring the potential semantic connections between those objects. In this work, we demonstrate that such semantic relations are also helpful as they can reveal the implicit structures to better capture the patterns in the contexts for rumor detection. We propose to employ the self-attention mechanism in neural text modeling to achieve the semantic structure induction for this problem. In addition, we introduce a novel method to preserve the important information of the main news/posts in the final representations of the entire threads to further improve the performance for rumor detection. Our method matches the main post representations and the thread representations by ensuring that they predict the same latent labels in a multitask learning framework. The extensive experiments demonstrate the effectiveness of the proposed model for rumor detection, yielding the state-of-the-art performance on recent datasets for this problem.
假新闻和谣言构成了最近社交网络的一个主要问题。由于社交网络中信息的快速传播,使用人工来检测可疑新闻的效率很低。因此,为了防止谣言对个人和社会的破坏性影响,谣言自动检测是必要的。先前的研究表明,除了新闻/帖子的内容及其上下文(即回复)之外,这些组成部分之间的关系或联系对提高谣言检测性能也很重要。为了归纳帖子和语境之间的这种关系,之前的工作主要依赖于社交网络的固有结构(例如,直接回复),而忽略了这些对象之间潜在的语义联系。在这项工作中,我们证明了这种语义关系也很有帮助,因为它们可以揭示隐含结构,以便更好地捕获上下文中的模式,用于谣言检测。我们提出利用神经文本建模中的自注意机制来实现这一问题的语义结构归纳。此外,我们引入了一种新颖的方法,在整个线程的最终表示中保留主要新闻/帖子的重要信息,以进一步提高谣言检测的性能。我们的方法通过确保它们在多任务学习框架中预测相同的潜在标签来匹配主后表示和线程表示。大量的实验证明了所提出的谣言检测模型的有效性,在这个问题的最新数据集上产生了最先进的性能。
{"title":"Rumor Detection in Social Networks via Deep Contextual Modeling","authors":"Amir Pouran Ben Veyseh, M. Thai, Thien Huu Nguyen, D. Dou","doi":"10.1145/3341161.3342896","DOIUrl":"https://doi.org/10.1145/3341161.3342896","url":null,"abstract":"Fake news and rumors constitute a major problem in social networks recently. Due to the fast information propagation in social networks, it is inefficient to use human labor to detect suspicious news. Automatic rumor detection is thus necessary to prevent devastating effects of rumors on the individuals and society. Previous work has shown that in addition to the content of the news/posts and their contexts (i.e., replies), the relations or connections among those components are important to boost the rumor detection performance. In order to induce such relations between posts and contexts, the prior work has mainly relied on the inherent structures of the social networks (e.g., direct replies), ignoring the potential semantic connections between those objects. In this work, we demonstrate that such semantic relations are also helpful as they can reveal the implicit structures to better capture the patterns in the contexts for rumor detection. We propose to employ the self-attention mechanism in neural text modeling to achieve the semantic structure induction for this problem. In addition, we introduce a novel method to preserve the important information of the main news/posts in the final representations of the entire threads to further improve the performance for rumor detection. Our method matches the main post representations and the thread representations by ensuring that they predict the same latent labels in a multitask learning framework. The extensive experiments demonstrate the effectiveness of the proposed model for rumor detection, yielding the state-of-the-art performance on recent datasets for this problem.","PeriodicalId":403360,"journal":{"name":"2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130186993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
A clinical decision support framework for automatic disease diagnoses 疾病自动诊断的临床决策支持框架
C. Comito, Agostino Forestiero, Giuseppe Papuzzo
Detecting diseases at early stage can help to overcome and treat them accurately. Identifying the appropriate treatment depends on the method that is used in diagnosing the diseases. A Clinical Decision Support System (CDS) can greatly help in identifying diseases and methods of treatment. In this paper we propose a CDS framework that can integrate heterogeneous health data from different sources, such as laboratory test results, basic information of patients, and health records. Using the electronic health medical data so collected, innovative machine learning and deep learning approaches are employed to implement a set of services to recommend a list of diseases and thus assist physicians in diagnosing or treating their patients health issues more efficiently.
在早期发现疾病有助于克服和准确治疗疾病。确定适当的治疗取决于诊断疾病所使用的方法。临床决策支持系统(CDS)可以极大地帮助确定疾病和治疗方法。在本文中,我们提出了一个CDS框架,该框架可以整合来自不同来源的异构健康数据,如实验室检测结果、患者基本信息和健康记录。利用收集到的电子健康医疗数据,采用创新的机器学习和深度学习方法来实施一套服务,以推荐一系列疾病,从而帮助医生更有效地诊断或治疗患者的健康问题。
{"title":"A clinical decision support framework for automatic disease diagnoses","authors":"C. Comito, Agostino Forestiero, Giuseppe Papuzzo","doi":"10.1145/3341161.3343509","DOIUrl":"https://doi.org/10.1145/3341161.3343509","url":null,"abstract":"Detecting diseases at early stage can help to overcome and treat them accurately. Identifying the appropriate treatment depends on the method that is used in diagnosing the diseases. A Clinical Decision Support System (CDS) can greatly help in identifying diseases and methods of treatment. In this paper we propose a CDS framework that can integrate heterogeneous health data from different sources, such as laboratory test results, basic information of patients, and health records. Using the electronic health medical data so collected, innovative machine learning and deep learning approaches are employed to implement a set of services to recommend a list of diseases and thus assist physicians in diagnosing or treating their patients health issues more efficiently.","PeriodicalId":403360,"journal":{"name":"2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"69 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131470999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Social Relations versus Near Neighbours: Reliable Recommenders in Limited Information Social Network Collaborative Filtering for Online Advertising 社会关系与近邻:有限信息社会网络协同过滤在线广告中的可靠推荐
Dionisis Margaris, D. Spiliotopoulos, C. Vassilakis
Online advertising benefits by recommender systems since the latter analyse reviews and rating of products, providing useful insight of the buyer perception of products and services. When traditional recommender system information is enriched with social network information, more successful recommendations are produced, since more users' aspects are taken into consideration. However, social network information may be unavailable since some users may not have social network accounts or may not consent to their use for recommendations, while rating data may be unavailable due to the cold start phenomenon. In this paper, we propose an algorithm that combines limited collaborative filtering information, comprised only of users' ratings on items, with limited social network information, comprised only of users' social relations, in order to improve (1) prediction accuracy and (2) prediction coverage in collaborative filtering recommender systems, at the same time. The proposed algorithm considerably improves rating prediction accuracy and coverage, while it can be easily integrated in recommender systems.
在线广告受益于推荐系统,因为后者分析评论和产品评级,提供有用的洞察买家对产品和服务的看法。当传统的推荐系统信息被社交网络信息所丰富时,会产生更多成功的推荐,因为它考虑了更多用户的方面。但是,由于部分用户可能没有社交网络账户或者不同意将其用于推荐,社交网络信息可能不可用,而评分数据可能由于冷启动现象而不可用。在本文中,我们提出了一种将有限的协同过滤信息(仅由用户对商品的评分组成)与有限的社交网络信息(仅由用户的社交关系组成)相结合的算法,以同时提高协同过滤推荐系统的(1)预测精度和(2)预测覆盖率。该算法大大提高了评级预测的准确率和覆盖率,并且易于集成到推荐系统中。
{"title":"Social Relations versus Near Neighbours: Reliable Recommenders in Limited Information Social Network Collaborative Filtering for Online Advertising","authors":"Dionisis Margaris, D. Spiliotopoulos, C. Vassilakis","doi":"10.1145/3341161.3345620","DOIUrl":"https://doi.org/10.1145/3341161.3345620","url":null,"abstract":"Online advertising benefits by recommender systems since the latter analyse reviews and rating of products, providing useful insight of the buyer perception of products and services. When traditional recommender system information is enriched with social network information, more successful recommendations are produced, since more users' aspects are taken into consideration. However, social network information may be unavailable since some users may not have social network accounts or may not consent to their use for recommendations, while rating data may be unavailable due to the cold start phenomenon. In this paper, we propose an algorithm that combines limited collaborative filtering information, comprised only of users' ratings on items, with limited social network information, comprised only of users' social relations, in order to improve (1) prediction accuracy and (2) prediction coverage in collaborative filtering recommender systems, at the same time. The proposed algorithm considerably improves rating prediction accuracy and coverage, while it can be easily integrated in recommender systems.","PeriodicalId":403360,"journal":{"name":"2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130279755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Placement matters in making good decisions sooner: the influence of topology in reaching public utility thresholds 位置对更快做出正确决策很重要:拓扑对达到公用事业阈值的影响
Sheung Yat Law, D. Kasthurirathna, Piraveenan Mahendra
Social systems are increasingly being modelled as complex networks, and the interactions and decision making of individuals in such systems can be modelled using game theory. Therefore, networked game theory can be effectively used to model social dynamics. Individuals can use pure or mixed strategies in their decision making, and recent research has shown that there is a connection between the topological placement of an individual within a social network and the best strategy they can choose to maximise their returns. Therefore, if certain individuals have a preference to employ a certain strategy, they can be swapped or moved around within the social network to more desirable topological locations where their chosen strategies will be more effective. To this end, it has been shown that to increase the overall public good, the cooperators should be placed at the hubs, and the defectors should be placed at the peripheral nodes. In this paper, we tackle a related question, which is the time (or number of swaps) it takes for individuals who are randomly placed within the network to move to optimal topological locations which ensure that the public utility satisfies a certain utility threshold. We show that this time depends on the topology of the social network, and we analyse this topological dependence in terms of topological metrics such as scale-free exponent, assortativity, clustering coefficient, and Shannon information content. We show that the higher the scale-free exponent, the quicker the public utility threshold can be reached by swapping individuals from an initial random allocation. On the other hand, we find that assortativity has negative correlation with the time it takes to reach the public utility threshold. We find also that in terms of the correlation between information content and the time it takes to reach a public utility threshold from a random initial assignment, there is a bifurcation: one class of networks show a positive correlation, while another shows a negative correlation. Our results highlight that by designing networks with appropriate topological properties, one can minimise the need for the movement of individuals within a network before a certain public good threshold is achieved. This result has obvious implications for defence strategies in particular.
社会系统越来越多地被建模为复杂的网络,在这样的系统中,个体的相互作用和决策可以用博弈论建模。因此,网络博弈论可以有效地用于模拟社会动态。个人在决策时可以使用纯策略或混合策略,最近的研究表明,个人在社会网络中的拓扑位置与他们可以选择的最佳策略之间存在联系,以最大化他们的回报。因此,如果某些个体倾向于采用某种策略,他们可以在社会网络中交换或移动到更理想的拓扑位置,在那里他们选择的策略将更有效。为此,研究表明,为了增加整体公共利益,合作者应被置于中心节点,叛逃者应被置于外围节点。在本文中,我们解决了一个相关的问题,即随机放置在网络中的个体移动到确保公共效用满足特定效用阈值的最佳拓扑位置所需的时间(或交换次数)。我们表明,这个时间取决于社会网络的拓扑结构,我们根据拓扑指标(如无标度指数、分类性、聚类系数和香农信息内容)分析了这种拓扑依赖性。我们证明了无标度指数越高,通过从初始随机分配交换个体可以更快地达到公用事业阈值。另一方面,我们发现分类性与达到公用事业阈值所需的时间呈负相关。我们还发现,就信息内容与从随机初始分配达到公用事业阈值所需的时间之间的相关性而言,存在分歧:一类网络显示出正相关,而另一类网络显示出负相关。我们的研究结果强调,通过设计具有适当拓扑属性的网络,可以在达到某个公共产品阈值之前将网络中个人移动的需求降至最低。这一结果尤其对国防战略有明显的影响。
{"title":"Placement matters in making good decisions sooner: the influence of topology in reaching public utility thresholds","authors":"Sheung Yat Law, D. Kasthurirathna, Piraveenan Mahendra","doi":"10.1145/3341161.3343674","DOIUrl":"https://doi.org/10.1145/3341161.3343674","url":null,"abstract":"Social systems are increasingly being modelled as complex networks, and the interactions and decision making of individuals in such systems can be modelled using game theory. Therefore, networked game theory can be effectively used to model social dynamics. Individuals can use pure or mixed strategies in their decision making, and recent research has shown that there is a connection between the topological placement of an individual within a social network and the best strategy they can choose to maximise their returns. Therefore, if certain individuals have a preference to employ a certain strategy, they can be swapped or moved around within the social network to more desirable topological locations where their chosen strategies will be more effective. To this end, it has been shown that to increase the overall public good, the cooperators should be placed at the hubs, and the defectors should be placed at the peripheral nodes. In this paper, we tackle a related question, which is the time (or number of swaps) it takes for individuals who are randomly placed within the network to move to optimal topological locations which ensure that the public utility satisfies a certain utility threshold. We show that this time depends on the topology of the social network, and we analyse this topological dependence in terms of topological metrics such as scale-free exponent, assortativity, clustering coefficient, and Shannon information content. We show that the higher the scale-free exponent, the quicker the public utility threshold can be reached by swapping individuals from an initial random allocation. On the other hand, we find that assortativity has negative correlation with the time it takes to reach the public utility threshold. We find also that in terms of the correlation between information content and the time it takes to reach a public utility threshold from a random initial assignment, there is a bifurcation: one class of networks show a positive correlation, while another shows a negative correlation. Our results highlight that by designing networks with appropriate topological properties, one can minimise the need for the movement of individuals within a network before a certain public good threshold is achieved. This result has obvious implications for defence strategies in particular.","PeriodicalId":403360,"journal":{"name":"2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"1993 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131145538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Monitoring Individuals in Drug Trafficking Organizations: A Social Network Analysis 监测贩毒组织中的个人:社会网络分析
K. Basu, Arunabha Sen
The United Nations, in their annual World Drug Report in 2018, reported that the production of Opium, Cocaine, Cannabis, etc. all observed record highs, which indicates the ever-growing demand of these drugs. Social networks of individuals associated with Drug Trafficking Organizations (DTO) have been created and studied by various research groups to capture key individuals, in order to disrupt operations of a DTO. With drug offenses increasing globally, the list of suspect individuals has also been growing over the past decade. As it takes significant amount of technical and human resources to monitor a suspect, an increasing list entails higher resource requirements on the part of law enforcement agencies. Monitoring all the suspects soon becomes an impossible task. In this paper, we present a novel methodology which ensures reduction in resources on the part of law enforcement authorities, without compromising the ability to uniquely identify a suspect, when they become “active” in drug related activities. Our approach utilizes the mathematical notion of Identifying Codes, which generates unique identification for all the nodes in a network. We find that just monitoring important individuals in the network leads to a wastage in resources and show how our approach overcomes this shortcoming. Finally, we evaluate the efficacy of our approach on real world datasets.
联合国在2018年《世界毒品报告》中指出,鸦片、可卡因、大麻等毒品的产量均创历史新高,这表明对这些毒品的需求不断增长。与毒品贩运组织(DTO)有关的个人的社会网络已经被各种研究小组创建和研究,以捕获关键人物,以破坏DTO的运作。随着全球毒品犯罪的增加,嫌疑人名单在过去十年中也在不断增加。由于监控一名嫌疑人需要大量的技术和人力资源,越来越多的名单对执法机构的资源要求也越来越高。监视所有嫌疑人很快就变成了一项不可能完成的任务。在本文中,我们提出了一种新的方法,确保在执法当局减少资源的同时,不损害在与毒品有关的活动中“活跃”嫌疑人的唯一识别能力。我们的方法利用识别码的数学概念,为网络中的所有节点生成唯一标识。我们发现仅仅监控网络中的重要个体会导致资源的浪费,并展示了我们的方法如何克服这一缺点。最后,我们评估了我们的方法在真实世界数据集上的有效性。
{"title":"Monitoring Individuals in Drug Trafficking Organizations: A Social Network Analysis","authors":"K. Basu, Arunabha Sen","doi":"10.1145/3341161.3342938","DOIUrl":"https://doi.org/10.1145/3341161.3342938","url":null,"abstract":"The United Nations, in their annual World Drug Report in 2018, reported that the production of Opium, Cocaine, Cannabis, etc. all observed record highs, which indicates the ever-growing demand of these drugs. Social networks of individuals associated with Drug Trafficking Organizations (DTO) have been created and studied by various research groups to capture key individuals, in order to disrupt operations of a DTO. With drug offenses increasing globally, the list of suspect individuals has also been growing over the past decade. As it takes significant amount of technical and human resources to monitor a suspect, an increasing list entails higher resource requirements on the part of law enforcement agencies. Monitoring all the suspects soon becomes an impossible task. In this paper, we present a novel methodology which ensures reduction in resources on the part of law enforcement authorities, without compromising the ability to uniquely identify a suspect, when they become “active” in drug related activities. Our approach utilizes the mathematical notion of Identifying Codes, which generates unique identification for all the nodes in a network. We find that just monitoring important individuals in the network leads to a wastage in resources and show how our approach overcomes this shortcoming. Finally, we evaluate the efficacy of our approach on real world datasets.","PeriodicalId":403360,"journal":{"name":"2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"272 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133852291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Evaluating Architectural Changes to Alter Pathogen Dynamics in a Dialysis Unit 评估透析室结构变化对病原体动力学的影响
Hankyu Jang, Samuel Justice, P. Polgreen, Alberto Maria Segre, Daniel K. Sewell, S. Pemmaraju
This paper presents a high-fidelity agent-based simulation of the spread of methicillin-resistant Staphylococcus aureus (MRSA), a serious hospital acquired infection, within the dialysis unit at the University of Iowa Hospitals and Clinics (UIHC). The simulation is based on ten days of fine-grained healthcare worker (HCW) movement and interaction data collected from a sensor mote instrumentation of the dialysis unit by our research group in the fall of 2013. The simulation layers a detailed model of MRSA pathogen transfer, die-off, shedding, and infection on top of agent interactions obtained from data. The specific question this paper focuses on is whether there are simple, inexpensive architectural or process changes one can make in the dialysis unit to reduce the spread of MRSA? We evaluate two architectural changes of the nurses' station: (i) splitting the central nurses' station into two smaller distinct nurses' stations, and (ii) doubling the surface area of the nursing station. The first architectural change is modeled as a graph partitioning problem on a HCW contact network obtained from our HCW movement data. Somewhat counter-intuitively, our results suggest that the first architectural modification and the resulting reduction in HCW-HCW contacts has little to noeffect on the spread of MRSA and may in fact lead to an increase in MRSA infection counts in some cases. In contrast, the second modification leads to a substantial reduction - between 12% and 22% for simulations with different parameters - in the number of patients infected by MRSA. These results suggest that the dynamics of an environmentally mediated infection such as MRSA may be quite different from that of infections whose spread is not substantially affected by the environment (e.g., respiratory infections or influenza).
本文介绍了一种高保真的药物模拟耐甲氧西林金黄色葡萄球菌(MRSA)的传播,这是一种严重的医院获得性感染,在爱荷华大学医院和诊所(UIHC)的透析单元内。该模拟基于我们的研究小组在2013年秋季从透析单元的传感器远程仪器收集的10天细粒度卫生保健工作者(HCW)运动和交互数据。模拟层的MRSA病原体转移,死亡,脱落和感染的详细模型在药物相互作用的基础上获得的数据。本文关注的具体问题是,是否可以在透析单元中进行简单、廉价的结构或工艺改变,以减少MRSA的传播?我们评估了护士站的两个建筑变化:(i)将中心护士站分成两个较小的独立护士站,(ii)将护理站的表面积增加一倍。第一个架构变化被建模为基于HCW运动数据的HCW接触网络的图划分问题。与我们的直觉相反,我们的研究结果表明,第一次建筑改造以及由此导致的HCW-HCW接触的减少对MRSA的传播几乎没有影响,实际上在某些情况下可能导致MRSA感染计数的增加。相比之下,第二次修改导致了MRSA感染患者数量的大幅减少——在不同参数的模拟中减少了12%到22%。这些结果表明,环境介导的感染(如MRSA)的动态可能与传播不受环境影响的感染(如呼吸道感染或流感)的动态大不相同。
{"title":"Evaluating Architectural Changes to Alter Pathogen Dynamics in a Dialysis Unit","authors":"Hankyu Jang, Samuel Justice, P. Polgreen, Alberto Maria Segre, Daniel K. Sewell, S. Pemmaraju","doi":"10.1145/3341161.3343515","DOIUrl":"https://doi.org/10.1145/3341161.3343515","url":null,"abstract":"This paper presents a high-fidelity agent-based simulation of the spread of methicillin-resistant Staphylococcus aureus (MRSA), a serious hospital acquired infection, within the dialysis unit at the University of Iowa Hospitals and Clinics (UIHC). The simulation is based on ten days of fine-grained healthcare worker (HCW) movement and interaction data collected from a sensor mote instrumentation of the dialysis unit by our research group in the fall of 2013. The simulation layers a detailed model of MRSA pathogen transfer, die-off, shedding, and infection on top of agent interactions obtained from data. The specific question this paper focuses on is whether there are simple, inexpensive architectural or process changes one can make in the dialysis unit to reduce the spread of MRSA? We evaluate two architectural changes of the nurses' station: (i) splitting the central nurses' station into two smaller distinct nurses' stations, and (ii) doubling the surface area of the nursing station. The first architectural change is modeled as a graph partitioning problem on a HCW contact network obtained from our HCW movement data. Somewhat counter-intuitively, our results suggest that the first architectural modification and the resulting reduction in HCW-HCW contacts has little to noeffect on the spread of MRSA and may in fact lead to an increase in MRSA infection counts in some cases. In contrast, the second modification leads to a substantial reduction - between 12% and 22% for simulations with different parameters - in the number of patients infected by MRSA. These results suggest that the dynamics of an environmentally mediated infection such as MRSA may be quite different from that of infections whose spread is not substantially affected by the environment (e.g., respiratory infections or influenza).","PeriodicalId":403360,"journal":{"name":"2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"382 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117158435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Characterizing and Detecting Livestreaming Chatbots 表征和检测直播聊天机器人
Shreya Jain, D. Niranjan, Hemank Lamba, Neil Shah, P. Kumaraguru
Livestreaming platforms enable content producers, or streamers, to broadcast creative content to a potentially large viewer base. Chatrooms form an integral part of such platforms, enabling viewers to interact both with the streamer, and amongst themselves. Streams with high engagement (many viewers and active chatters) are typically considered engaging, and often promoted to end users by means of recommendation algorithms, and exposed to better monetization opportunities via revenue share from platform advertising, viewer donations, and third-party sponsorships. Given such incentives, some streamers make use of fraudulent means to increase perceived engagement by simulating chatter via fake “chatbots” which can be purchased from shady online marketplaces. This inauthentic engagement can negatively influence recommendation, hurt streamer and viewer trust in the platform, and harm monetization for honest streamers. In this paper, we tackle the novel problem of automating detection of chatbots on livestreaming platforms. To this end, we first formalize the livestreaming chatbot detection problem and characterize differences between botted and genuine chatter behavior observed from a real-world livestreaming chatter dataset collected from Twitch.tv. We then propose Sherlock, which posits a two-stage approach of detecting chatbotted streams, and subsequently detecting the constituent chatbots. Finally, we demonstrate effectiveness on both real and synthetic data: to this end, we propose a novel strategy for collecting labeled, synthetic chatter dataset (typically unavailable) from such platforms, enabling evaluation of proposed detection approaches against chatbot behaviors with varying signatures. Our approach achieves .97 precision/recall on the real-world dataset, and .80+ F1 scores across most simulated attack settings.
直播平台使内容生产者或流媒体能够向潜在的大量观众播放创意内容。聊天室构成了这些平台的一个组成部分,使观众既可以与主播互动,也可以在他们自己之间互动。具有高参与度(许多观众和活跃的聊天)的流媒体通常被认为具有吸引力,通常通过推荐算法向最终用户推广,并通过平台广告,观众捐赠和第三方赞助的收入分成获得更好的盈利机会。考虑到这些动机,一些主播利用欺诈手段,通过假的“聊天机器人”来模拟聊天,这些机器人可以从阴暗的在线市场上购买。这种不真实的参与会对推荐产生负面影响,损害主播和观众对平台的信任,并损害诚实主播的盈利。在本文中,我们解决了在直播平台上自动检测聊天机器人的新问题。为此,我们首先形式化了直播聊天机器人检测问题,并描述了从Twitch.tv收集的真实直播聊天数据集观察到的bot和真实聊天行为之间的差异。然后我们提出了Sherlock,它假设了一种检测聊天流的两阶段方法,随后检测组成聊天机器人。最后,我们展示了在真实和合成数据上的有效性:为此,我们提出了一种新的策略,用于从这些平台收集标记的合成喋喋不休数据集(通常不可用),从而能够评估针对不同签名的聊天机器人行为的拟议检测方法。我们的方法在真实数据集上达到了0.97的精度/召回率,在大多数模拟攻击设置中达到了0.80 + F1的分数。
{"title":"Characterizing and Detecting Livestreaming Chatbots","authors":"Shreya Jain, D. Niranjan, Hemank Lamba, Neil Shah, P. Kumaraguru","doi":"10.1145/3341161.3345308","DOIUrl":"https://doi.org/10.1145/3341161.3345308","url":null,"abstract":"Livestreaming platforms enable content producers, or streamers, to broadcast creative content to a potentially large viewer base. Chatrooms form an integral part of such platforms, enabling viewers to interact both with the streamer, and amongst themselves. Streams with high engagement (many viewers and active chatters) are typically considered engaging, and often promoted to end users by means of recommendation algorithms, and exposed to better monetization opportunities via revenue share from platform advertising, viewer donations, and third-party sponsorships. Given such incentives, some streamers make use of fraudulent means to increase perceived engagement by simulating chatter via fake “chatbots” which can be purchased from shady online marketplaces. This inauthentic engagement can negatively influence recommendation, hurt streamer and viewer trust in the platform, and harm monetization for honest streamers. In this paper, we tackle the novel problem of automating detection of chatbots on livestreaming platforms. To this end, we first formalize the livestreaming chatbot detection problem and characterize differences between botted and genuine chatter behavior observed from a real-world livestreaming chatter dataset collected from Twitch.tv. We then propose Sherlock, which posits a two-stage approach of detecting chatbotted streams, and subsequently detecting the constituent chatbots. Finally, we demonstrate effectiveness on both real and synthetic data: to this end, we propose a novel strategy for collecting labeled, synthetic chatter dataset (typically unavailable) from such platforms, enabling evaluation of proposed detection approaches against chatbot behaviors with varying signatures. Our approach achieves .97 precision/recall on the real-world dataset, and .80+ F1 scores across most simulated attack settings.","PeriodicalId":403360,"journal":{"name":"2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114325389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Estimating Distributed Representation Performance in Disaster-Related Social Media Classification 灾害相关社交媒体分类中分布式表示性能的估计
P. Jain, R. Ross, Bianca Schoen-Phelan
This paper examines the effectiveness of a range of pre-trained language representations in order to determine the informativeness and information type of social media in the event of natural or man-made disasters. Within the context of disaster tweet analysis, we aim to accurately analyse tweets while minimising both false positive and false negatives in the automated information analysis. The investigation is performed across a number of well known disaster-related twitter datasets. Models that are built from pre-trained word embeddings from Word2Vec, GloVe, ELMo and BERT are used for performance evaluation. Given the relative ubiquity of BERT as a standout language representation in recent times it was expected that BERT dominates results. However, results are more diverse, with classical Word2Vec and GloVe both displaying strong results. As part of the analysis, we discuss some challenges related to automated twitter analysis including the fine-tuning of language models to disaster-related scenarios.
本文考察了一系列预先训练的语言表征的有效性,以确定社交媒体在发生自然或人为灾害时的信息量和信息类型。在灾难推文分析的背景下,我们的目标是准确地分析推文,同时最大限度地减少自动化信息分析中的假阳性和假阴性。这项调查是在许多众所周知的与灾难有关的twitter数据集上进行的。从Word2Vec、GloVe、ELMo和BERT的预训练词嵌入中构建的模型用于性能评估。鉴于BERT作为一种突出的语言表示在最近的时间里相对普遍存在,人们预计BERT会主导结果。然而,结果更加多样化,经典的Word2Vec和GloVe都显示出很强的结果。作为分析的一部分,我们将讨论与自动twitter分析相关的一些挑战,包括针对与灾难相关的场景对语言模型进行微调。
{"title":"Estimating Distributed Representation Performance in Disaster-Related Social Media Classification","authors":"P. Jain, R. Ross, Bianca Schoen-Phelan","doi":"10.1145/3341161.3343680","DOIUrl":"https://doi.org/10.1145/3341161.3343680","url":null,"abstract":"This paper examines the effectiveness of a range of pre-trained language representations in order to determine the informativeness and information type of social media in the event of natural or man-made disasters. Within the context of disaster tweet analysis, we aim to accurately analyse tweets while minimising both false positive and false negatives in the automated information analysis. The investigation is performed across a number of well known disaster-related twitter datasets. Models that are built from pre-trained word embeddings from Word2Vec, GloVe, ELMo and BERT are used for performance evaluation. Given the relative ubiquity of BERT as a standout language representation in recent times it was expected that BERT dominates results. However, results are more diverse, with classical Word2Vec and GloVe both displaying strong results. As part of the analysis, we discuss some challenges related to automated twitter analysis including the fine-tuning of language models to disaster-related scenarios.","PeriodicalId":403360,"journal":{"name":"2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"261 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124795084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1