Biao Wang 1, Ge Chen 1, Luoyi Fu 1, Li Song 1, Xinbing Wang 1, Xue Liu 2 1 Shanghai Jiao Tong University 2 McGill University

Slides:



Advertisements
Similar presentations
LEARNING INFLUENCE PROBABILITIES IN SOCIAL NETWORKS Amit Goyal Francesco Bonchi Laks V. S. Lakshmanan University of British Columbia Yahoo! Research University.
Advertisements

Minimizing Seed Set for Viral Marketing Cheng Long & Raymond Chi-Wing Wong Presented by: Cheng Long 20-August-2011.
DAVA: Distributing Vaccines over Networks under Prior Information
Modeling Malware Spreading Dynamics Michele Garetto (Politecnico di Torino – Italy) Weibo Gong (University of Massachusetts – Amherst – MA) Don Towsley.
In Search of Influential Event Organizers in Online Social Networks
Maximizing the Spread of Influence through a Social Network By David Kempe, Jon Kleinberg, Eva Tardos Report by Joe Abrams.
Topology Generation Suat Mercan. 2 Outline Motivation Topology Characterization Levels of Topology Modeling Techniques Types of Topology Generators.
Graph Data Management Lab School of Computer Science , Bristol, UK.
Integrating Bayesian Networks and Simpson’s Paradox in Data Mining Alex Freitas University of Kent Ken McGarry University of Sunderland.
1 Epidemic Spreading in Real Networks: an Eigenvalue Viewpoint Yang Wang Deepayan Chakrabarti Chenxi Wang Christos Faloutsos.
On the Construction of Energy- Efficient Broadcast Tree with Hitch-hiking in Wireless Networks Source: 2004 International Performance Computing and Communications.
INFERRING NETWORKS OF DIFFUSION AND INFLUENCE Presented by Alicia Frame Paper by Manuel Gomez-Rodriguez, Jure Leskovec, and Andreas Kraus.
Dynamic Network Security Deployment under Partial Information George Theodorakopoulos (EPFL) John S. Baras (UMD) Jean-Yves Le Boudec (EPFL) September 24,
Maximizing Product Adoption in Social Networks
Models of Influence in Online Social Networks
1 11 Subcarrier Allocation and Bit Loading Algorithms for OFDMA-Based Wireless Networks Gautam Kulkarni, Sachin Adlakha, Mani Srivastava UCLA IEEE Transactions.
1 1 Stanford University 2 MPI for Biological Cybernetics 3 California Institute of Technology Inferring Networks of Diffusion and Influence Manuel Gomez.
Influence Maximization in Dynamic Social Networks Honglei Zhuang, Yihan Sun, Jie Tang, Jialin Zhang, Xiaoming Sun.
Thang N. Dinh, Dung T. Nguyen, My T. Thai Dept. of Computer & Information Science & Engineering University of Florida, Gainesville, FL Hypertext-2012,
A Graph-based Friend Recommendation System Using Genetic Algorithm
MAP: Multi-Auctioneer Progressive Auction in Dynamic Spectrum Access Lin Gao, Youyun Xu, Xinbing Wang Shanghai Jiaotong University.
Scaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users Yingzhe Li, Xinbing Wang, Xiaohua Tian Department of Electronic Engineering.
Towards Efficient Large-Scale VPN Monitoring and Diagnosis under Operational Constraints Yao Zhao, Zhaosheng Zhu, Yan Chen, Northwestern University Dan.
Evaluating Network Security with Two-Layer Attack Graphs Anming Xie Zhuhua Cai Cong Tang Jianbin Hu Zhong Chen ACSAC (Dec., 2009) 2010/6/151.
Zibin Zheng DR 2 : Dynamic Request Routing for Tolerating Latency Variability in Cloud Applications CLOUD 2013 Jieming Zhu, Zibin.
Robustness of complex networks with the local protection strategy against cascading failures Jianwei Wang Adviser: Frank,Yeong-Sung Lin Present by Wayne.
On the Topology of Wireless Sensor Networks Sen Yang, Xinbing Wang, Luoyi Fu Department of Electronic Engineering, Shanghai Jiao Tong University, China.
Speaker : Yu-Hui Chen Authors : Dinuka A. Soysa, Denis Guangyin Chen, Oscar C. Au, and Amine Bermak From : 2013 IEEE Symposium on Computational Intelligence.
Mitigation strategies on scale-free networks against cascading failures Jianwei Wang Adviser: Frank,Yeong-Sung Lin Present by Chris Chang.
Online Social Networks and Media
I NFORMATION C ASCADE Priyanka Garg. OUTLINE Information Propagation Virus Propagation Model How to model infection? Inferring Latent Social Networks.
Surviving Failures in Bandwidth Constrained Datacenters Authors: Peter Bodik Ishai Menache Mosharaf Chowdhury Pradeepkumar Mani David A.Maltz Ion Stoica.
On Bharathi-Kempe-Salek Conjecture about Influence Maximization Ding-Zhu Du University of Texas at Dallas.
Manuel Gomez Rodriguez Bernhard Schölkopf I NFLUENCE M AXIMIZATION IN C ONTINUOUS T IME D IFFUSION N ETWORKS , ICML ‘12.
Towards Social User Profiling: Unified and Discriminative Influence Model for Inferring Home Locations Rui Li, Shengjie Wang, Hongbo Deng, Rui Wang, Kevin.
LOCALIZED MINIMUM - ENERGY BROADCASTING IN AD - HOC NETWORKS Paper By : Julien Cartigny, David Simplot, And Ivan Stojmenovic Instructor : Dr Yingshu Li.
1 Latency-Bounded Minimum Influential Node Selection in Social Networks Incheol Shin
Brief Announcement : Measuring Robustness of Superpeer Topologies Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
An Effective Method to Improve the Resistance to Frangibility in Scale-free Networks Kaihua Xu HuaZhong Normal University.
1 Friends and Neighbors on the Web Presentation for Web Information Retrieval Bruno Lepri.
A Latent Social Approach to YouTube Popularity Prediction Amandianeze Nwana Prof. Salman Avestimehr Prof. Tsuhan Chen.
Speaker : Yu-Hui Chen Authors : Dinuka A. Soysa, Denis Guangyin Chen, Oscar C. Au, and Amine Bermak From : 2013 IEEE Symposium on Computational Intelligence.
Incremental Run-time Application Mapping for Heterogeneous Network on Chip 2012 IEEE 14th International Conference on High Performance Computing and Communications.
An Improved Acquaintance Immunization Strategy for Complex Network.
Research Direction Introduction Advisor: Frank, Yeong-Sung Lin Presented by Hui-Yu, Chung 2011/11/22.
Controlling Propagation at Group Scale on Networks Yao Zhang*, Abhijin Adiga +, Anil Vullikanti + *, and B. Aditya Prakash* *Department of Computer Science.
Optimal Relay Placement for Indoor Sensor Networks Cuiyao Xue †, Yanmin Zhu †, Lei Ni †, Minglu Li †, Bo Li ‡ † Shanghai Jiao Tong University ‡ HK University.
Root Cause Localization on Power Networks Zhen Chen, ECEE, Arizona State University Joint work with Kai Zhu and Lei Ying.
1 1 Stanford University 2 MPI for Biological Cybernetics 3 California Institute of Technology Inferring Networks of Diffusion and Influence Manuel Gomez.
Paper Presentation Social influence based clustering of heterogeneous information networks Qiwei Bao & Siqi Huang.
Arizona State University Fast Eigen-Functions Tracking on Dynamic Graphs Chen Chen and Hanghang Tong - 1 -
TOWARD OPTIMAL ALLOCATION OF LOCATION DEPENDENT TASKS IN CROWDSENSING Jingtao Yao Lab of Cyberspace Computing Shanghai Jiao Tong University.
Yu Wang1, Gao Cong2, Guojie Song1, Kunqing Xie1
Inferring Networks of Diffusion and Influence
Wenyu Zhang From Social Network Group
Nanyang Technological University
Hiroki Sayama NECSI Summer School 2008 Week 2: Complex Systems Modeling and Networks Network Models Hiroki Sayama
Near-Optimal Spectrum Allocation for Cognitive Radios: A Frequency-Time Auction Perspective Xinyu Wang Department of Electronic Engineering Shanghai.
Greedy & Heuristic algorithms in Influence Maximization
IMSWT2012 Conference Ship Fire-fighting System Cascading Failure Analysis Based on Complex Network Theory Speaker: Hongzhang Jin Affiliation: Harbin.
Surviving Holes and Barriers in Geographic Data Reporting for
Friend Recommendation with a Target User in Social Networking Services
The Importance of Communities for Learning to Influence
Effective Social Network Quarantine with Minimal Isolation Costs
Mixture of Mutually Exciting Processes for Viral Diffusion
Xinbing Wang*, Qian Zhang**
Conflict-Aware Event-Participant Arrangement
复杂网络可控性 研究进展 汪秉宏 2014 北京 网络科学论坛.
Viral Marketing over Social Networks
Presentation transcript:

Biao Wang 1, Ge Chen 1, Luoyi Fu 1, Li Song 1, Xinbing Wang 1, Xue Liu 2 1 Shanghai Jiao Tong University 2 McGill University DRIMUX: Dynamic Rumor Influence Minimization with User Experience in Social Networks 1

Outline  Introduction of social networks  Rumor blocking  Proposed algorithms  Performance Evaluation  Conclusion and future work 2

Social Networks 3  Information sharing and diffusion

Social Network  Directed graph: G=(V,E)  V - Set of vertices, representing users.  E - Set of edges, representing relationships (e.g. user 1 follows user 2)

Social Networks 5  Innovation propagation  Information sharing  Rumor spreading

Rumor Diffusion 6  Viral spreading (large friends circles )  Causing chaos in society (e.g. ISIS terrorism attack)

7 How do we prevent the rumors from further spreading?

Outline  Introduction of social networks  Rumor blocking  Proposed algorithms  Performance Evaluation  Conclusion and future work 8

Rumor Propagation  SI (Susceptible and Infected) model ( with no recovery )  IC (Independent Cascade) model p 12 p 13 p 14 p43p43 p46p46 p47p47 P ij denotes the probability of node j becoming infected by node i (i, j=1,2,…,7.)

Rumor Propagation  How to determine p ij ? 10  Global popularity Topic evolution tendency  Individual tendency Sending probability Acceptance probability Ising model in Physics

Rumor Blocking  Two strategies:  Blocking nodes --- Removing all the edges of the selected node  Blocking edges --- Removing selected edges

Rumor Blocking  Considering real world problem: will users accept being blocked? 12

Rumor Blocking 13  User experience utility function  N nodes, each with blockage threshold T th, which is A constant for homogeneous network A constant for homogeneous network A variable for heterogeneous network A variable for heterogeneous network  T b (u) is the blockage time of node u  Indicating the average blockage tolerance of whole social network

Outline  Introduction of social networks  Rumor blocking  Proposed algorithms  Performance Evaluation  Conclusion and future work 14

Problem Formulation  Goal  Minimize the influence of rumor (the number of infected nodes)  Constraint of user experience utility  Traditional algorithms fail  Time critical  Stochastic topology 15

Survival Analysis  Survival theory  Probability of an event occurring within a time period t  If the event occurs during t--- “death”; otherwise, “survival” 16 0 t “Death” “Survive” “Death”

Survival Analysis  Survival function  The probability that a node “survives”  In our context  User experience utility determines observation time t  A node “survives” means not being infected  Our goal --- maximizing the likelihood of nodes “surviving” during the observation time 17

Proposed Algorithms  Hazard rate  Instantaneous occurrence of an event  In our context  Hazard rate: expectation of propagation probability from precedent infected nodes  Coefficient matrix: Indicator matrix of the network 18

Proposed Algorithms 19  Greedy algorithm  Each time finding the optimal node to block  K iterations

Proposed Algorithms 20  Dynamic blocking algorithm  “Incrementally” finding the optimal node to block  Each time blocking nodes

Outline  Introduction of social networks  Rumor blocking  Proposed algorithms  Performance Evaluation  Conclusion and future work 21

Performance Evaluation  Datasets Network extracted from the SinaWeibo, with 23 , 086 nodes, and 183 , 549 edges.  Classic Greedy: Greedy algorithm based on descendant order of nodes degree and is used as the baseline algorithm. Greedy algorithm based on descendant order of nodes degree and is used as the baseline algorithm.  Proposed Greedy: By blocking a node, we can generate a new propagation matrix and reach a new maximum survival likelihood value. By blocking a node, we can generate a new propagation matrix and reach a new maximum survival likelihood value.  Dynamic Algorithm: Adjusts to each propagation status, and gradually includes new targeted nodes as long as the cost is within the scope of tolerable user experience. Adjusts to each propagation status, and gradually includes new targeted nodes as long as the cost is within the scope of tolerable user experience. 22

Performance Evaluation 23  Vertical dashed line indicates the starting point of blocking  Left: 54 initial rumor seeds; Right: 32  K=64, the total number of nodes to be blocked

Performance Evaluation 24  Different block durations vs. Infection ratio of network  Infection ratio stop decreasing with block duration  User experience improvement

Outline  Introduction of social networks  Rumor diffusion model  Rumor blocking algorithms  Performance Evaluation  Conclusion and future work 25

Conclusion & Future work  Conclusion  Rumor blocking --- a serious problem in social networks  User experience --- a realistic issue in social networks  Survival theory --- maximum likelihood solution  Dynamic algorithm --- more reasonable and adaptable  Future work  Network topology --- homogeneous & heterogeneous  Experiments on more real world large scale datasets 26

THANK YOU! Q&A THANK YOU! Q&A 27