首页 > 最新文献

2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)最新文献

英文 中文
A Syntax-based Learning Approach to Geo-locating Abnormal Traffic Events using Social Sensing 基于句法的学习方法在交通异常事件地理定位中的应用
Yang Zhang, Xiangyu Dong, D. Zhang, Dong Wang
Social sensing has emerged as a new sensing paradigm to observe the physical world by exploring the “wisdom of crowd” on social media. This paper focuses on the abnormal traffic event localization problem using social media sensing. Two critical challenges exist in the state-of-the-arts: i) “content-only inference”: the limited and unstructured content of a social media post provides little clue to accurately infer the locations of the reported traffic events; ii) “informal and scarce data”: the language of the social media post (e.g., tweet) is informal and the number of the posts that report the abnormal traffic events is often quite small. To address the above challenges, we develop SyntaxLoc, a syntax-based probabilistic learning framework to accurately identify the location entities by exploring the syntax of social media content. We perform extensive experiments to evaluate the SyntaxLoc framework through real world case studies in both New York City and Los Angeles. Evaluation results demonstrate significant performance gains of the SyntaxLoc framework over state-of-the-art baselines in terms of accurately identifying the location entities that can be directly used to locate the abnormal traffic events.
社会感知是通过社交媒体探索“群体智慧”来观察物理世界的一种新的感知范式。本文主要研究基于社交媒体感知的异常交通事件定位问题。目前最先进的技术存在两个关键挑战:i)“仅限内容推断”:社交媒体帖子的有限和非结构化内容几乎无法提供准确推断所报告的交通事件位置的线索;Ii)“非正式和稀缺数据”:社交媒体帖子(如tweet)的语言是非正式的,报道异常流量事件的帖子数量往往很少。为了解决上述挑战,我们开发了SyntaxLoc,这是一个基于语法的概率学习框架,通过探索社交媒体内容的语法来准确识别位置实体。我们在纽约和洛杉矶进行了大量的实验,通过真实世界的案例研究来评估SyntaxLoc框架。评估结果表明,在准确识别可直接用于定位异常流量事件的位置实体方面,SyntaxLoc框架在最先进的基线上获得了显著的性能提升。
{"title":"A Syntax-based Learning Approach to Geo-locating Abnormal Traffic Events using Social Sensing","authors":"Yang Zhang, Xiangyu Dong, D. Zhang, Dong Wang","doi":"10.1145/3341161.3343708","DOIUrl":"https://doi.org/10.1145/3341161.3343708","url":null,"abstract":"Social sensing has emerged as a new sensing paradigm to observe the physical world by exploring the “wisdom of crowd” on social media. This paper focuses on the abnormal traffic event localization problem using social media sensing. Two critical challenges exist in the state-of-the-arts: i) “content-only inference”: the limited and unstructured content of a social media post provides little clue to accurately infer the locations of the reported traffic events; ii) “informal and scarce data”: the language of the social media post (e.g., tweet) is informal and the number of the posts that report the abnormal traffic events is often quite small. To address the above challenges, we develop SyntaxLoc, a syntax-based probabilistic learning framework to accurately identify the location entities by exploring the syntax of social media content. We perform extensive experiments to evaluate the SyntaxLoc framework through real world case studies in both New York City and Los Angeles. Evaluation results demonstrate significant performance gains of the SyntaxLoc framework over state-of-the-art baselines in terms of accurately identifying the location entities that can be directly used to locate the abnormal traffic events.","PeriodicalId":403360,"journal":{"name":"2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125204306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Content-Based Echo Chamber Detection on Social Media Platforms 基于内容的社交媒体平台回声室检测
Fernando H. Calderon, Li-Kai Cheng, Ming-Jen Lin, Yen-Hao Huang, Yi-Shin Chen
“Echo chamber” is a metaphorical description of a situation in which beliefs are amplified inside a closed network, and social media platforms provide an environment that is well-suited to this phenomenon. Depending on the scale of the echo chamber, a user's judgment of different opinions may be restricted. The current study focuses on detecting echoing interaction between a post and its related comments to then quantify the predominating degree of echo chamber behavior on Facebook pages. To enable such detection, two content-based features are designed; the first aids stance representation of comments on a particular discussion topic, and the second focuses on the type and intensity of emotion elicited by a subject. This work also introduces data-driven semi-supervised approaches to extract such features from social media data.
“回音室”是对一种情况的隐喻性描述,在这种情况下,信念在一个封闭的网络中被放大,而社交媒体平台提供了一个非常适合这种现象的环境。根据回音室的大小,用户对不同意见的判断可能会受到限制。目前的研究重点是检测帖子与其相关评论之间的回声交互,然后量化Facebook页面上回声室行为的主导程度。为了实现这种检测,设计了两个基于内容的功能;第一种是对特定讨论主题的评论的立场表示,第二种是对主题引起的情感的类型和强度的关注。这项工作还引入了数据驱动的半监督方法来从社交媒体数据中提取这些特征。
{"title":"Content-Based Echo Chamber Detection on Social Media Platforms","authors":"Fernando H. Calderon, Li-Kai Cheng, Ming-Jen Lin, Yen-Hao Huang, Yi-Shin Chen","doi":"10.1145/3341161.3343689","DOIUrl":"https://doi.org/10.1145/3341161.3343689","url":null,"abstract":"“Echo chamber” is a metaphorical description of a situation in which beliefs are amplified inside a closed network, and social media platforms provide an environment that is well-suited to this phenomenon. Depending on the scale of the echo chamber, a user's judgment of different opinions may be restricted. The current study focuses on detecting echoing interaction between a post and its related comments to then quantify the predominating degree of echo chamber behavior on Facebook pages. To enable such detection, two content-based features are designed; the first aids stance representation of comments on a particular discussion topic, and the second focuses on the type and intensity of emotion elicited by a subject. This work also introduces data-driven semi-supervised approaches to extract such features from social media data.","PeriodicalId":403360,"journal":{"name":"2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127797128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Increasing the Diffusional Characteristics of Networks Through Optimal Topology Changes within Sub-graphs 通过子图内最优拓扑变化提高网络的扩散特性
Patryk Pazura, Jarosław Jankowski, Kamil Bortko, Piotr Bartków
In recent years, bustling online communities have focused a lot of attention on research dealing with information spreading. Through acquired knowledge about the characteristics of information spreading processes, we are able to influence their dynamics via the enhancement of propagation properties or by changing them to decrease their spread within a network. One of approaches is adding or removing connections within a network. While optimal linking within complex networks requires extensive computational resources, in this investigation, we focus on the optimization of the topology of small graphs within larger network structures. The study shows how the enhancement of propagation properties within small networks is preserved in bigger networks based on connected smaller graphs. We compare the results from combined small graphs with added links providing optimal spread and networks with additional random linking. The results show that improvements in linking within small sub-graphs with optimal linking improves the diffusional properties of the whole network.
近年来,蓬勃发展的网络社区将大量注意力集中在信息传播研究上。通过获得信息传播过程特征的知识,我们能够通过增强传播特性或通过改变它们来减少它们在网络中的传播来影响它们的动态。其中一种方法是在网络中添加或删除连接。虽然复杂网络中的最佳连接需要大量的计算资源,但在本研究中,我们将重点放在大型网络结构中小图拓扑的优化上。该研究展示了如何在基于连接的小图的大网络中保持小网络中传播特性的增强。我们比较了组合小图与提供最佳传播的附加链接和具有附加随机链接的网络的结果。结果表明,小子图间最优连接的改进改善了整个网络的扩散特性。
{"title":"Increasing the Diffusional Characteristics of Networks Through Optimal Topology Changes within Sub-graphs","authors":"Patryk Pazura, Jarosław Jankowski, Kamil Bortko, Piotr Bartków","doi":"10.1145/3341161.3344823","DOIUrl":"https://doi.org/10.1145/3341161.3344823","url":null,"abstract":"In recent years, bustling online communities have focused a lot of attention on research dealing with information spreading. Through acquired knowledge about the characteristics of information spreading processes, we are able to influence their dynamics via the enhancement of propagation properties or by changing them to decrease their spread within a network. One of approaches is adding or removing connections within a network. While optimal linking within complex networks requires extensive computational resources, in this investigation, we focus on the optimization of the topology of small graphs within larger network structures. The study shows how the enhancement of propagation properties within small networks is preserved in bigger networks based on connected smaller graphs. We compare the results from combined small graphs with added links providing optimal spread and networks with additional random linking. The results show that improvements in linking within small sub-graphs with optimal linking improves the diffusional properties of the whole network.","PeriodicalId":403360,"journal":{"name":"2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134145873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The curse of self-presentation: Looking for career patterns in online CVs 自我展示的诅咒:在网上简历中寻找职业模式
Johanna M. Werz, Valerie Varney, I. Isenhardt
Climbing the career ladder to a senior executive position is a long and complex process that, nevertheless, many people are trying to master. Over the last decades, the number of people providing their CVs on professional online social networks, such as LinkedIn is growing. New methods of pattern detection raise the question of whether online CVs provide insights into career patterns and paths. The respective hypothesis is that online CVs map people“s careers and therefore build the ideal data set to detect career patterns. To test this hypothesis, 100.006 online CVs were downloaded and preprocessed. This paper presents initial results of one educational and one internship variable. Whereas a higher degree positively predicts career level, having made an internship negatively relates to career level. These results reveal that rather than objectively mirroring people“s career trajectories, online career platforms provide selective information. The information of online CVs and the respective career level is intermingled, i.e. people with a high career level present different parts of their careers than people on lower levels. Furthermore, self-presentational effects might have an impact. The effect on similar research and possible implications are discussed.
爬上职业阶梯到高级管理职位是一个漫长而复杂的过程,然而,许多人都在努力掌握。在过去的几十年里,在LinkedIn等专业在线社交网络上提供简历的人越来越多。模式检测的新方法提出了一个问题,即在线简历是否提供了对职业模式和路径的洞察。各自的假设是,在线简历映射了人们的职业,因此建立了理想的数据集来检测职业模式。为了验证这一假设,我们下载了100.006份在线简历并进行了预处理。本文给出了一个教育变量和一个实习变量的初步结果。高学历与职业水平呈正相关,实习经历与职业水平负相关。这些结果表明,在线职业平台提供的信息是选择性的,而不是客观地反映人们的职业轨迹。在线简历的信息和各自的职业水平是混杂的,即职业水平高的人与职业水平低的人呈现出不同的职业部分。此外,自我呈现效应可能会产生影响。讨论了对类似研究的影响和可能的启示。
{"title":"The curse of self-presentation: Looking for career patterns in online CVs","authors":"Johanna M. Werz, Valerie Varney, I. Isenhardt","doi":"10.1145/3341161.3343681","DOIUrl":"https://doi.org/10.1145/3341161.3343681","url":null,"abstract":"Climbing the career ladder to a senior executive position is a long and complex process that, nevertheless, many people are trying to master. Over the last decades, the number of people providing their CVs on professional online social networks, such as LinkedIn is growing. New methods of pattern detection raise the question of whether online CVs provide insights into career patterns and paths. The respective hypothesis is that online CVs map people“s careers and therefore build the ideal data set to detect career patterns. To test this hypothesis, 100.006 online CVs were downloaded and preprocessed. This paper presents initial results of one educational and one internship variable. Whereas a higher degree positively predicts career level, having made an internship negatively relates to career level. These results reveal that rather than objectively mirroring people“s career trajectories, online career platforms provide selective information. The information of online CVs and the respective career level is intermingled, i.e. people with a high career level present different parts of their careers than people on lower levels. Furthermore, self-presentational effects might have an impact. The effect on similar research and possible implications are discussed.","PeriodicalId":403360,"journal":{"name":"2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134190356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Daily life patients Sentiment Analysis model based on well-encoded embedding vocabulary for related-medication text 基于良好编码的相关药物文本嵌入词汇的日常生活患者情绪分析模型
Hanane Grissette, E. Nfaoui
Millions of health-related messages and fresh communications can reveal important public health issues. New Drugs, Diseases, Adverse Drug Reactions (ADRs) keep appearing on social media in new Unicode versions. In particular, generative Model for both Sentiment analysis (SA) and Naturel Language Understanding (NLU) requires medical human labeled data or making use of resources for weak supervision that operates with the ignorance and the inability to define related-medication targets, and results in inaccurate sentiment prediction performance. The frequent use of informal medical language, nonstandard format and abbreviation forms, as well as typos in social media messages has to be taken into account. We probe the transition-based approach between patients language used in social media messages and formal medical language used in the descriptions of medical concepts in a standard ontology[21] to be formal input of our neural network model. At this end, we propose daily life patients Sentiment Analysis model based on hybrid embedding vocabulary for related-medication text under distributed dependency, and concepts translation methodology by incorporating medical knowledge from social media and real life medical science systems. The proposed neural network layers is shared between medical concept Normalization model and sentiment prediction model in order to understand and leverage related-sentiment information behind conceptualized features in Multiple context. The experiments were performed on various real world scenarios where limited resources in this case.
数以百万计的与健康有关的信息和新的通信可以揭示重要的公共卫生问题。新的Unicode版本的新药、疾病、药物不良反应(adr)不断出现在社交媒体上。特别是,情感分析(SA)和自然语言理解(NLU)的生成模型都需要医学人类标记数据或利用资源进行弱监督,这种监督在无知和无法定义相关药物目标的情况下运行,并导致不准确的情感预测性能。必须考虑到经常使用非正式的医学语言、不标准的格式和缩写形式,以及社交媒体信息中的拼写错误。我们探索了基于转换的方法,将社交媒体消息中使用的患者语言与标准本体中描述医学概念时使用的正式医学语言[21]作为神经网络模型的正式输入。为此,我们提出了分布式依赖下基于相关药物文本混合嵌入词汇的日常患者情感分析模型,以及结合社交媒体医学知识和现实生活医学系统的概念翻译方法。本文提出的神经网络层在医学概念归一化模型和情感预测模型之间共享,以理解和利用多上下文下概念化特征背后的相关情感信息。实验是在各种现实世界的场景中进行的,在这种情况下资源有限。
{"title":"Daily life patients Sentiment Analysis model based on well-encoded embedding vocabulary for related-medication text","authors":"Hanane Grissette, E. Nfaoui","doi":"10.1145/3341161.3343854","DOIUrl":"https://doi.org/10.1145/3341161.3343854","url":null,"abstract":"Millions of health-related messages and fresh communications can reveal important public health issues. New Drugs, Diseases, Adverse Drug Reactions (ADRs) keep appearing on social media in new Unicode versions. In particular, generative Model for both Sentiment analysis (SA) and Naturel Language Understanding (NLU) requires medical human labeled data or making use of resources for weak supervision that operates with the ignorance and the inability to define related-medication targets, and results in inaccurate sentiment prediction performance. The frequent use of informal medical language, nonstandard format and abbreviation forms, as well as typos in social media messages has to be taken into account. We probe the transition-based approach between patients language used in social media messages and formal medical language used in the descriptions of medical concepts in a standard ontology[21] to be formal input of our neural network model. At this end, we propose daily life patients Sentiment Analysis model based on hybrid embedding vocabulary for related-medication text under distributed dependency, and concepts translation methodology by incorporating medical knowledge from social media and real life medical science systems. The proposed neural network layers is shared between medical concept Normalization model and sentiment prediction model in order to understand and leverage related-sentiment information behind conceptualized features in Multiple context. The experiments were performed on various real world scenarios where limited resources in this case.","PeriodicalId":403360,"journal":{"name":"2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134253962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Extraction of User Demands Based on Similar Tweets Graph 基于相似推文图的用户需求提取
Takayasu Fushimi, Kennichi Kanno
Twitter is used by many users, and posted tweets include user's straightforward real intention. Therefore, we can obtain various opinions on items and events by collecting tweets. However, since the tweets are posted one after another over time and are represented by characters, it is difficult to grasp the overall picture of opinions on items. Therefore, by visualizing opinions on items, it is easier to grasp the whole picture more clearly. In this study, we collect tweets including item names and construct a graph connecting similar tweets. Then, from the connected component, we attempt to extract expressions related to user demands. Also, when constructing a similar tweet graph, it is necessary to appropriately set the similarity threshold. If the threshold is too low, unrelated tweets will be connected and a connected component will consist of different demand expressions. On the other hand, if the threshold value is too high, the demand expression of the same meaning will be divided as other connected components due to some notation fluctuation. In this paper, by focusing on the occurrence probability of the demand expression appearing in each connected component and defining the purity and the cohesiveness, we propose a method of setting the apropriate similarity threshold. In our experimental evaluations using a lot of tweets for two games “Mario tennis ace” and “Dairanto smash brothers SPECIAL”, we confirmed that opinions such as “interesting” or “difficult” can be extracted from similar tweets graph constructed by the appropriate similarity threshold value. We also confirmed that we can overlook the demands related to items.
Twitter被很多用户使用,发布的tweets包含了用户直接的真实意图。因此,我们可以通过收集推文来获得对项目和事件的各种意见。然而,由于这些推文是随着时间的推移一个接一个发布的,并且是用字符来代表的,所以很难掌握对项目的意见的全貌。因此,通过可视化对项目的看法,更容易更清楚地掌握整体情况。在本研究中,我们收集了包含商品名称的推文,并构建了一个连接相似推文的图。然后,从连接的组件中,我们尝试提取与用户需求相关的表达式。此外,在构建相似推文图时,需要适当设置相似度阈值。如果阈值过低,则不相关的推文将被连接起来,连接的组件将由不同的需求表达组成。另一方面,如果阈值过高,同一含义的需求表达会因为符号波动而被划分为其他连接的分量。本文通过关注需求表达在各连通构件中出现的概率,定义其纯度和内聚性,提出了一种设置合适相似性阈值的方法。在我们对《马里奥网球高手》和《Dairanto smash brothers SPECIAL》两款游戏的大量推文进行实验评估中,我们证实了通过适当的相似度阈值构建的相似推文图可以提取出“有趣”或“困难”等意见。我们也确认可以忽略与项目相关的需求。
{"title":"Extraction of User Demands Based on Similar Tweets Graph","authors":"Takayasu Fushimi, Kennichi Kanno","doi":"10.1145/3341161.3344824","DOIUrl":"https://doi.org/10.1145/3341161.3344824","url":null,"abstract":"Twitter is used by many users, and posted tweets include user's straightforward real intention. Therefore, we can obtain various opinions on items and events by collecting tweets. However, since the tweets are posted one after another over time and are represented by characters, it is difficult to grasp the overall picture of opinions on items. Therefore, by visualizing opinions on items, it is easier to grasp the whole picture more clearly. In this study, we collect tweets including item names and construct a graph connecting similar tweets. Then, from the connected component, we attempt to extract expressions related to user demands. Also, when constructing a similar tweet graph, it is necessary to appropriately set the similarity threshold. If the threshold is too low, unrelated tweets will be connected and a connected component will consist of different demand expressions. On the other hand, if the threshold value is too high, the demand expression of the same meaning will be divided as other connected components due to some notation fluctuation. In this paper, by focusing on the occurrence probability of the demand expression appearing in each connected component and defining the purity and the cohesiveness, we propose a method of setting the apropriate similarity threshold. In our experimental evaluations using a lot of tweets for two games “Mario tennis ace” and “Dairanto smash brothers SPECIAL”, we confirmed that opinions such as “interesting” or “difficult” can be extracted from similar tweets graph constructed by the appropriate similarity threshold value. We also confirmed that we can overlook the demands related to items.","PeriodicalId":403360,"journal":{"name":"2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131938634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Evolution of Roles 角色的演变
Julian Müller, U. Brandes
We propose a novel formalization of roles in social networks that unifies the most commonly used definitions of role equivalence. As one consequence, we obtain a single, straightforward proof that role equivalences form lattices. Our formalization focuses on the evolution of roles from arbitrary initial conditions and thereby generalizes notions of relative and iterated roles that have been suggested previously. In addition to the unified structure result this provides a micro-foundation for the emergence of roles. Considering the genesis of roles may explain, and help overcome, the problem that social networks rarely exhibit interesting role equivalences of the traditional kind. Finally, we hint at ways to further generalize the role concept to multivariate networks.
我们提出了一种新的社会网络角色形式化,它统一了最常用的角色等价定义。作为一个结果,我们得到了一个简单的证明,即作用等价形成格。我们的形式化重点关注角色从任意初始条件的演变,从而概括了之前提出的相对角色和迭代角色的概念。除了统一的结构结果,这为角色的出现提供了微观基础。考虑角色的起源可以解释并帮助克服社交网络很少表现出传统类型的有趣角色等同的问题。最后,我们暗示了进一步将角色概念推广到多元网络的方法。
{"title":"The Evolution of Roles","authors":"Julian Müller, U. Brandes","doi":"10.1145/3341161.3342889","DOIUrl":"https://doi.org/10.1145/3341161.3342889","url":null,"abstract":"We propose a novel formalization of roles in social networks that unifies the most commonly used definitions of role equivalence. As one consequence, we obtain a single, straightforward proof that role equivalences form lattices. Our formalization focuses on the evolution of roles from arbitrary initial conditions and thereby generalizes notions of relative and iterated roles that have been suggested previously. In addition to the unified structure result this provides a micro-foundation for the emergence of roles. Considering the genesis of roles may explain, and help overcome, the problem that social networks rarely exhibit interesting role equivalences of the traditional kind. Finally, we hint at ways to further generalize the role concept to multivariate networks.","PeriodicalId":403360,"journal":{"name":"2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117066133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Text Mining for Malware Classification Using Multivariate All Repeated Patterns Detection 基于多元全重复模式检测的文本挖掘恶意软件分类
Konstantinos F. Xylogiannopoulos, P. Karampelas, R. Alhajj
Mobile phones have become nowadays a commodity to the majority of people. Using them, people are able to access the world of Internet and connect with their friends, their colleagues at work or even unknown people with common interests. This proliferation of the mobile devices has also been seen as an opportunity for the cyber criminals to deceive smartphone users and steel their money directly or indirectly, respectively, by accessing their bank accounts through the smartphones or by blackmailing them or selling their private data such as photos, credit card data, etc. to third parties. This is usually achieved by installing malware to smartphones masking their malevolent payload as a legitimate application and advertise it to the users with the hope that mobile users will install it in their devices. Thus, any existing application can easily be modified by integrating a malware and then presented it as a legitimate one. In response to this, scientists have proposed a number of malware detection and classification methods using a variety of techniques. Even though, several of them achieve relatively high precision in malware classification, there is still space for improvement. In this paper, we propose a text mining all repeated pattern detection method which uses the decompiled files of an application in order to classify a suspicious application into one of the known malware families. Based on the experimental results using a real malware dataset, the methodology tries to correctly classify (without any misclassification) all randomly selected malware applications of 3 categories with 3 different families each.
手机如今已成为大多数人的一种商品。使用它们,人们能够访问互联网的世界,并与他们的朋友,他们的同事在工作,甚至不认识的人有共同的兴趣。移动设备的激增也被视为网络犯罪分子欺骗智能手机用户并直接或间接地分别通过智能手机访问他们的银行账户或勒索他们或将他们的私人数据(如照片,信用卡数据等)出售给第三方的机会。这通常是通过将恶意软件安装到智能手机上,将其恶意负载伪装成合法应用程序,并向用户宣传,希望移动用户将其安装到他们的设备中。因此,任何现有的应用程序都可以很容易地通过集成恶意软件进行修改,然后将其呈现为合法的应用程序。针对这一点,科学家们提出了一些使用各种技术的恶意软件检测和分类方法。尽管其中有几个在恶意软件分类上达到了较高的精度,但仍有改进的空间。本文提出了一种文本挖掘全重复模式检测方法,该方法利用应用程序的反编译文件将可疑应用程序分类到已知的恶意软件家族中。基于使用真实恶意软件数据集的实验结果,该方法尝试对随机选择的3个不同家族的3类恶意软件应用程序进行正确分类(无任何误分类)。
{"title":"Text Mining for Malware Classification Using Multivariate All Repeated Patterns Detection","authors":"Konstantinos F. Xylogiannopoulos, P. Karampelas, R. Alhajj","doi":"10.1145/3341161.3350841","DOIUrl":"https://doi.org/10.1145/3341161.3350841","url":null,"abstract":"Mobile phones have become nowadays a commodity to the majority of people. Using them, people are able to access the world of Internet and connect with their friends, their colleagues at work or even unknown people with common interests. This proliferation of the mobile devices has also been seen as an opportunity for the cyber criminals to deceive smartphone users and steel their money directly or indirectly, respectively, by accessing their bank accounts through the smartphones or by blackmailing them or selling their private data such as photos, credit card data, etc. to third parties. This is usually achieved by installing malware to smartphones masking their malevolent payload as a legitimate application and advertise it to the users with the hope that mobile users will install it in their devices. Thus, any existing application can easily be modified by integrating a malware and then presented it as a legitimate one. In response to this, scientists have proposed a number of malware detection and classification methods using a variety of techniques. Even though, several of them achieve relatively high precision in malware classification, there is still space for improvement. In this paper, we propose a text mining all repeated pattern detection method which uses the decompiled files of an application in order to classify a suspicious application into one of the known malware families. Based on the experimental results using a real malware dataset, the methodology tries to correctly classify (without any misclassification) all randomly selected malware applications of 3 categories with 3 different families each.","PeriodicalId":403360,"journal":{"name":"2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"195 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114966258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On the Structural Properties of Social Networks and their Measurement-calibrated Synthetic Counterparts 社会网络的结构性质及其测量校准的合成对应物
Marcell Nagy, Roland Molontay
Data-driven analysis of large social networks has attracted a great deal of research interest. In this paper, we investigate 120 real social networks and their measurement-calibrated synthetic counterparts generated by four well-known network models. We investigate the structural properties of the networks revealing the correlation profiles of graph metrics across various social domains (friendship networks, communication networks, and collaboration networks). We find that the correlation patterns differ across domains. We identify a nonredundant set of metrics to describe social networks. We study which topological characteristics of real networks the models can or cannot capture. We find that the goodness-of-fit of the network models depends on the domains. Furthermore, while 2K and stochastic block models lack the capability of generating graphs with large diameter and high clustering coefficient at the same time, they can still be used to mimic social networks relatively efficiently.
大型社交网络的数据驱动分析吸引了大量的研究兴趣。在本文中,我们研究了120个真实的社会网络和它们的测量校准合成对偶由四个著名的网络模型产生。我们研究了网络的结构特性,揭示了不同社会领域(友谊网络、通信网络和协作网络)中图形指标的相关概况。我们发现相关模式在不同的领域是不同的。我们确定了一组非冗余的指标来描述社交网络。我们研究模型可以或不能捕获真实网络的哪些拓扑特征。我们发现网络模型的拟合优度依赖于域。此外,虽然2K和随机块模型缺乏同时生成大直径和高聚类系数图的能力,但它们仍然可以相对有效地用于模拟社会网络。
{"title":"On the Structural Properties of Social Networks and their Measurement-calibrated Synthetic Counterparts","authors":"Marcell Nagy, Roland Molontay","doi":"10.1145/3341161.3343686","DOIUrl":"https://doi.org/10.1145/3341161.3343686","url":null,"abstract":"Data-driven analysis of large social networks has attracted a great deal of research interest. In this paper, we investigate 120 real social networks and their measurement-calibrated synthetic counterparts generated by four well-known network models. We investigate the structural properties of the networks revealing the correlation profiles of graph metrics across various social domains (friendship networks, communication networks, and collaboration networks). We find that the correlation patterns differ across domains. We identify a nonredundant set of metrics to describe social networks. We study which topological characteristics of real networks the models can or cannot capture. We find that the goodness-of-fit of the network models depends on the domains. Furthermore, while 2K and stochastic block models lack the capability of generating graphs with large diameter and high clustering coefficient at the same time, they can still be used to mimic social networks relatively efficiently.","PeriodicalId":403360,"journal":{"name":"2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115329154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimal Influence Strategies in an Oligopolistic Competition Network Environment 寡头竞争网络环境下的最优影响策略
Dionisios N. Sotiropoulos, Ifigeneia Georgoula, Christos Bilanakos
This paper presents a non-linear optimization methodology for determining the Nash Equilibrium (NE) solutions of a non-cooperative two-player game. Each player, in particular, is trying to maximize a rational profit function within a continuous action space. The game arises in the context of a duopolistic network environment where two identical rival firms are competing to maximize their influence over a single consumer. Specifically, we consider a weighted and strongly connected network which mediates the opinion formation processes concerning the perceived qualities of their products. Obtaining the NE solutions for such a game is an extremely difficult task which cannot be analytically addressed, even if additional simplifying assumptions are imposed on the exogenous parameters of the model. Our approach, obtains the required NE solutions by combining the Karush-Kuhn-Tucker (KKT) conditions associated with the original optimization tasks into a single-objective nonlinear maximization problem under nonlinear constrains. The resulting optimization problem is, ultimately, solved through the utilization of the Sequential Quadratic Programming (SQP) algorithm which constitutes a state-of-the-art method for nonlinear optimization problems. The validity of our work is justified through the conduction of a series of experiments in which we simulated the best response-based dynamical behaviour of the two agents in the network that make strategic decisions. Juxtaposing the intersection points of the acquired best response curves against the NE solutions obtained by the proposed nonlinear optimization methodology verifies that the corresponding solution points coincide.
本文提出了一种确定非合作二人博弈纳什均衡(NE)解的非线性优化方法。特别是,每个玩家都试图在一个连续的行动空间中最大化一个合理的利润函数。这个游戏是在双寡头网络环境中产生的,两个相同的竞争对手公司为了最大限度地影响单个消费者而竞争。具体来说,我们考虑了一个加权和强连接的网络,它调解了关于他们的产品感知质量的意见形成过程。即使对模型的外生参数施加额外的简化假设,获得这种游戏的NE解决方案也是一项极其困难的任务,无法用分析方法解决。我们的方法通过将与原始优化任务相关的Karush-Kuhn-Tucker (KKT)条件组合成非线性约束下的单目标非线性最大化问题,获得所需的NE解。由此产生的优化问题最终通过使用序列二次规划(SQP)算法来解决,该算法构成了非线性优化问题的最新方法。我们工作的有效性是通过一系列的实验来证明的,在这些实验中,我们模拟了网络中做出战略决策的两个代理的基于最佳响应的动态行为。将所获得的最佳响应曲线的交点与所提出的非线性优化方法得到的NE解并置,验证了相应的解点重合。
{"title":"Optimal Influence Strategies in an Oligopolistic Competition Network Environment","authors":"Dionisios N. Sotiropoulos, Ifigeneia Georgoula, Christos Bilanakos","doi":"10.1145/3341161.3343691","DOIUrl":"https://doi.org/10.1145/3341161.3343691","url":null,"abstract":"This paper presents a non-linear optimization methodology for determining the Nash Equilibrium (NE) solutions of a non-cooperative two-player game. Each player, in particular, is trying to maximize a rational profit function within a continuous action space. The game arises in the context of a duopolistic network environment where two identical rival firms are competing to maximize their influence over a single consumer. Specifically, we consider a weighted and strongly connected network which mediates the opinion formation processes concerning the perceived qualities of their products. Obtaining the NE solutions for such a game is an extremely difficult task which cannot be analytically addressed, even if additional simplifying assumptions are imposed on the exogenous parameters of the model. Our approach, obtains the required NE solutions by combining the Karush-Kuhn-Tucker (KKT) conditions associated with the original optimization tasks into a single-objective nonlinear maximization problem under nonlinear constrains. The resulting optimization problem is, ultimately, solved through the utilization of the Sequential Quadratic Programming (SQP) algorithm which constitutes a state-of-the-art method for nonlinear optimization problems. The validity of our work is justified through the conduction of a series of experiments in which we simulated the best response-based dynamical behaviour of the two agents in the network that make strategic decisions. Juxtaposing the intersection points of the acquired best response curves against the NE solutions obtained by the proposed nonlinear optimization methodology verifies that the corresponding solution points coincide.","PeriodicalId":403360,"journal":{"name":"2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124743257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1