Confluence: Conformity Influence in Large Social Networks

Slides:



Advertisements
Similar presentations
Making Data Mining Models Useful to Model Non-paying Customers of Exchange Carriers Wei Fan, IBM T.J.Watson Janek Mathuria, and Chang-tien Lu Virginia.
Advertisements

Document Summarization using Conditional Random Fields Dou Shen, Jian-Tao Sun, Hua Li, Qiang Yang, Zheng Chen IJCAI 2007 Hao-Chin Chang Department of Computer.
1 Cross-domain Collaboration Recommendation Jie Tang 1, Sen Wu 1, Jimeng Sun 2, Hang Su 1 1 Tsinghua University 2 IBM TJ Watson Research Center.
Mining Triadic Closure Patterns in Social Networks
1 From Sentiment to Emotion Analysis in Social Networks Jie Tang Department of Computer Science and Technology Tsinghua University, China.
Learning Influence Probabilities in Social Networks 1 2 Amit Goyal 1 Francesco Bonchi 2 Laks V. S. Lakshmanan 1 U. of British Columbia Yahoo! Research.
LEARNING INFLUENCE PROBABILITIES IN SOCIAL NETWORKS Amit Goyal Francesco Bonchi Laks V. S. Lakshmanan University of British Columbia Yahoo! Research University.
1 Jie Tang, Chenhui Zhang Tsinghua University Keke Cai, Li Zhang, Zhong Su IBM, China Research Lab Sampling Representative Users from Large Social Networks.
Active Learning for Streaming Networked Data Zhilin Yang, Jie Tang, Yutao Zhang Computer Science Department, Tsinghua University.
Influence and Correlation in Social Networks Xufei wang Nov
Modelling Paying Behavior in Game Social Networks Zhanpeng Fang +, Xinyu Zhou +, Jie Tang +, Wei Shao #, A.C.M. Fong *, Longjun Sun #, Ying Ding -, Ling.
Nodes, Ties and Influence
1 Social Influence Analysis in Large-scale Networks Jie Tang 1, Jimeng Sun 2, Chi Wang 1, and Zi Yang 1 1 Dept. of Computer Science and Technology Tsinghua.
1 Yuxiao Dong *$, Jie Tang $, Sen Wu $, Jilei Tian # Nitesh V. Chawla *, Jinghai Rao #, Huanhuan Cao # Link Prediction and Recommendation across Multiple.
We Know #Tag: Does the Dual Role Affect Hashtag Adoption? Lei Yang 1, Tao Sun 2, Ming Zhang 2, Qiaozhu Mei 1 1 School of Information, the University.
Graph Data Management Lab School of Computer Science , Bristol, UK.
1 1 Chenhao Tan, 1 Jie Tang, 2 Jimeng Sun, 3 Quan Lin, 4 Fengjiao Wang 1 Department of Computer Science and Technology, Tsinghua University, China 2 IBM.
On Community Outliers and their Efficient Detection in Information Networks Jing Gao 1, Feng Liang 1, Wei Fan 2, Chi Wang 1, Yizhou Sun 1, Jiawei Han 1.
Influence and Correlation in Social Networks Aris Anagnostopoulos Ravi Kumar Mohammad Mahdian.
Maximizing Product Adoption in Social Networks
Longbiao Kang, Baotian Hu, Xiangping Wu, Qingcai Chen, and Yan He Intelligent Computing Research Center, School of Computer Science and Technology, Harbin.
Models of Influence in Online Social Networks
Wang, Z., et al. Presented by: Kayla Henneman October 27, 2014 WHO IS HERE: LOCATION AWARE FACE RECOGNITION.
1 Social Influence and Information Diffusion Jie Tang Department of Computer Science and Technology Tsinghua University.
1 Yuxiao Dong *, Jie Tang $, Tiancheng Lou #, Bin Wu &, Nitesh V. Chawla * How Long will She Call Me? Distribution, Social Theory and Duration Prediction.
Modelling Paying Behavior in Game Social Networks Zhanpeng Fang +, Xinyu Zhou +, Jie Tang +, Wei Shao #, A.C.M. Fong *, Longjun Sun #, Ying Ding -, Ling.
1 1 Chenhao Tan, 1 Jie Tang, 2 Jimeng Sun, 3 Quan Lin, 4 Fengjiao Wang 1 Department of Computer Science and Technology, Tsinghua University, China 2 IBM.
Active Learning for Networked Data Based on Non-progressive Diffusion Model Zhilin Yang, Jie Tang, Bin Xu, Chunxiao Xing Dept. of Computer Science and.
Alert Correlation for Extracting Attack Strategies Authors: B. Zhu and A. A. Ghorbani Source: IJNS review paper Reporter: Chun-Ta Li ( 李俊達 )
Personalized Influence Maximization on Social Networks
Modeling Relationship Strength in Online Social Networks Rongjing Xiang: Purdue University Jennifer Neville: Purdue University Monica Rogati: LinkedIn.
Machine Learning1 Machine Learning: Summary Greg Grudic CSCI-4830.
Using Transactional Information to Predict Link Strength in Online Social Networks Indika Kahanda and Jennifer Neville Purdue University.
1 From Sentiment to Emotion Analysis in Social Networks Jie Tang Department of Computer Science and Technology Tsinghua University, China.
Information Spread and Information Maximization in Social Networks Xie Yiran 5.28.
Introduction to machine learning and data mining 1 iCSC2014, Juan López González, University of Oviedo Introduction to machine learning Juan López González.
Influence Maximization in Dynamic Social Networks Honglei Zhuang, Yihan Sun, Jie Tang, Jialin Zhang, Xiaoming Sun.
Data Mining: Classification & Predication Hosam Al-Samarraie, PhD. Centre for Instructional Technology & Multimedia Universiti Sains Malaysia.
To Blog or Not to Blog: Characterizing and Predicting Retention in Community Blogs Imrul Kayes 1, Xiang Zuo 1, Da Wang 2, Jacob Chakareski 3 1 University.
Data Mining and Machine Learning Lab Unsupervised Feature Selection for Linked Social Media Data Jiliang Tang and Huan Liu Computer Science and Engineering.
Predicting Positive and Negative Links in Online Social Networks
Exploiting Context Analysis for Combining Multiple Entity Resolution Systems -Ramu Bandaru Zhaoqi Chen Dmitri V.kalashnikov Sharad Mehrotra.
Estimating Component Availability by Dempster-Shafer Belief Networks Estimating Component Availability by Dempster-Shafer Belief Networks Lan Guo Lane.
LOGO Identifying Opinion Leaders in the Blogosphere Xiaodan Song, Yun Chi, Koji Hino, Belle L. Tseng CIKM 2007 Advisor : Dr. Koh Jia-Ling Speaker : Tu.
Click to Add Title A Systematic Framework for Sentiment Identification by Modeling User Social Effects Kunpeng Zhang Assistant Professor Department of.
1 From Sentiment to Emotion Analysis in Social Networks Jie Tang Department of Computer Science and Technology Tsinghua University, China.
1 CoupledLP: Link Prediction in Coupled Networks Yuxiao Dong #, Jing Zhang +, Jie Tang +, Nitesh V. Chawla #, Bai Wang* # University of Notre Dame + Tsinghua.
Supervised Random Walks: Predicting and Recommending Links in Social Networks Lars Backstrom (Facebook) & Jure Leskovec (Stanford) Proc. of WSDM 2011 Present.
Unsupervised Streaming Feature Selection in Social Media
Ganesh J, Soumyajit Ganguly, Manish Gupta, Vasudeva Varma, Vikram Pudi
1 Discovering Web Communities in the Blogspace Ying Zhou, Joseph Davis (HICSS 2007)
A Connectivity-Based Popularity Prediction Approach for Social Networks Huangmao Quan, Ana Milicic, Slobodan Vucetic, and Jie Wu Department of Computer.
Biao Wang 1, Ge Chen 1, Luoyi Fu 1, Li Song 1, Xinbing Wang 1, Xue Liu 2 1 Shanghai Jiao Tong University 2 McGill University
1 Zi Yang Tsinghua University Joint work with Prof. Jie Tang, Prof. Juanzi Li, Dr. Keke Cai, Jingyi Guo, Chi Wang, etc. July 21, 2011, CASIN 2011, Tsinghua.
1 Zi Yang Tsinghua University Joint work with Prof. Jie Tang, Prof. Juanzi Li, Dr. Keke Cai, Jingyi Guo, Chi Wang, etc. July 21, 2011, CASIN 2011, Tsinghua.
MINING DEEP KNOWLEDGE FROM SCIENTIFIC NETWORKS
Table 1. Advantages and Disadvantages of Traditional DM/ML Methods
User Joining Behavior in Online Forums
Pfizer HTS Machine Learning Algorithms: November 2002
Cross-lingual Knowledge Linking Across Wiki Knowledge Bases
Social Role-Aware Emotion Contagion in Image Social Networks
Center for Complexity in Business, R. Smith School of Business
Weakly Learning to Match Experts in Online Community
MEgo2Vec: Embedding Matched Ego Networks for User Alignment Across Social Networks Jing Zhang+, Bo Chen+, Xianming Wang+, Fengmei Jin+, Hong Chen+, Cuiping.
Structural influence:
Example: Academic Search
GANG: Detecting Fraudulent Users in OSNs
Modeling Topic Diffusion in Scientific Collaboration Networks
Presentation transcript:

Confluence: Conformity Influence in Large Social Networks Jie Tang*, Sen Wu*, and Jimeng Sun+ *Tsinghua University +IBM TJ Watson Research Center

Conformity Conformity is the act of matching attitudes, opinions, and behaviors to group norms.[1] Kelman identified three major types of conformity[2] Compliance is public conformity, while possibly keeping one's own original beliefs for yourself. Identification is conforming to someone who is liked and respected, such as a celebrity or a favorite uncle. Internalization is accepting the belief or behavior, if the source is credible. It is the deepest influence on people and it will affect them for a long time. Compliance is public conformity, while possibly keeping one's own original beliefs for yourself. Compliance is motivated by the need for approval and the fear of being rejected. Identification is conforming to someone who is liked and respected, such as a celebrity or a favorite uncle. This can be motivated by the attractiveness of the source,[11] and this is a deeper type of conformism than compliance. Internalization is accepting the belief or behavior and conforming both publicly and privately, if the source is credible. It is the deepest influence on people and it will affect them for a long time. [1] R.B. Cialdini, & N.J. Goldstein. Social influence: Compliance and conformity. Annual Review of Psych., 2004, 55, 591–621. [2] H.C. Kelman. Compliance, Identification, and Internalization: Three Processes of Attitude Change. Journal of Conflict Resolution, 1958, 2 (1): 51–60.

“Love Obama” I hate Obama, the worst president ever I love Obama Obama is fantastic Obama is great! No Obama in 2012! Obama has done just that. From social networking to his blog to his Fight the Smears campaign, Obama has made his Web 2.0 presence known. He has over 1.5 million friends on MySpace and Facebook, and he currently has over 28,000,000 followers on Twitter. This personal activity in social networks allows him to quickly get the word out across multiple platforms. He cannot be the next president! Positive Negative

Conformity Influence Analysis I love Obama 3. Group conformity Obama is fantastic A Obama is great! D 1. Peer conformity 2. Individual conformity C B Positive Negative

Related Work—Conformity Conformity theory Compliance, identification, and internalization [Kelman 1958] A theory of conformity based on game theory [Bernheim 1994] Influence and conformity Conformity-aware influence analysis [Li-Bhowmick-Sun 2011] Applications Social influence in social advertising [Bakshy-el-al 2012] Conformity was first studied by psychologists through interviews with small groups of participants [17]. In economics, Bernheim [3] found that sometimes people are willing to conform simply because they recognize that departure from the social norm may impair their status. Bernheim further proposed a theory of social conformity and presented a model to describe the conformity process. However, due to the lack of real data, he only studied the model from the theoretical aspect. Correlation between influence and individual conformity

Related Work—social influence Influence test and quantification Influence and correlation [Anagnostopoulos-et-al 2008] Distinguish influence and homophily [Aral-et-al 2009, La Fond-Nevill 2010] Topic-based influence measure [Tang-Sun-Wang-Yang 2009, Liu-et-al 2012] Learning influence probability [Goyal-Bonchi-Lakshmanan 2010] Influence diffusion model Linear threshold and cascaded model [Kempe-Kleinberg-Tardos 2003] Efficient algorithm [Chen-Wang-Yang 2009] From a broader viewpoint, conformity can be seen as a special type of social influence. There are a bulk of studies on social influence analysis. These studies can be roughly classified into three categories: influence testing [1, 9, 20], influence quantification [12, 13, 23, 32], and influence maximization models [6, 18]. However, most of the works focus on qualitative study of social influence. However, they do not distinguish the effect of peer influence and group conformity.

Challenges How to formally define and differentiate different types of conformities? How to construct a computational model to learn the different conformity factors? How to validate the proposed model in real large networks?

Problem Formulation and Methodologies

Four Datasets Weibo 1,776,950 308,489,739 Tweet on popular topics Network #Nodes #Edges Behavior #Actions Weibo 1,776,950 308,489,739 Tweet on popular topics 6,761,186 Flickr 1,991,509 208,118,719 Comment on a popular photo 3,531,801 Gowalla 196,591 950,327 Check-in some location 6,442,890 ArnetMiner 737,690 2,416,472 Publish in a specific domain 1,974,466 All the datasets are publicly available for research.

A concrete example in Gowalla Legend Alice Alice’s friend Other users 1’ 1’ 1’ 1’ If Alice’s friends check in this location at time t Will Alice also check in nearby?

Notations G =(V, E, C, X) Node/user: vi User Group: cij Time t Node/user: vi User Group: cij Time t-1, t-2… Attributes: xi(N*d matrix) - location, gender, age, etc. Action/Status: yi - e.g., “Love Obama” G =(V, E, C, X) The input of our problem consists of two components, i.e., an attribute augmented network G = (V,E,C,X) and action history A = {(a, vi, t)}a,i,t, where X denotes an N x d attribute matrix with an element xij indicating the jth attribute of user vi. N*m matrix where N is the number of V and m is the number of groups , Group memberships — each (a, vi, t) represents user vi performed action a at time t

Notations The input of our problem consists of two components, i.e., an attribute augmented network G = (V,E,C,X) and action history A = {(a, vi, t)}a,i,t, where X denotes an N x d attribute matrix with an element xij indicating the jth attribute of user vi.

Conformity Definition Three levels of conformities Individual conformity Peer conformity Group conformity Our goal is to study how a user’s behavior conforms to her peer friends and the communities (groups) that she belongs to. In this work, we define three levels of conformities respectively from the aspect of individual, peer relationship, and group.

Individual Conformity The individual conformity represents how easily user v’s behavior conforms to her friends A specific action performed by user v at time t Exists a friend v′ who performed the same action at time t’′ The individual conformity is defined as the ratio between the number of actions for which we have evidence that the user v conforms to one of her friends v′, over the total number of actions performed by user v. All actions by user v

Peer Conformity The peer conformity represents how likely the user v s behavior is influenced by one particular friend v′ A specific action performed by user v′ at time t′ User v follows v′ to perform the action a at time t The peer conformity is defined as the ratio between the number of actions for which we have evidence that the user v conforms to her friend v′ , over the total number of actions performed by the friend v′ All actions by user v′

Group Conformity The group conformity represents the conformity of user v’s behavior to groups that the user belongs to. τ-group action: an action performed by more than a percentage τ of all users in the group Ck User v conforms to the group to perform the action a at time t A specific τ-group action To begin with, we first define the τ -group action as the action that was performed by more than a percentage τ of all users in the community (group) Ck. Given this, we define the group conformity as follows: The group conformity is then defined as the ratio between the number of actions for which we have evidence that the user v conforms to the group, over the total number of τ -group actions performed by users in the group Ck, Please note that a user may be involved into more than one groups, thus has different conformity degrees in the different groups. All τ-group actions performed by users in the group Ck A indicator function, which returns true if the value of cik is 1 and false otherwise

For an example Conformity in the Co-Author Network KDD We use another example from the Co-Author network to further explain the defined conformity. We calculate how easily authors from different conferences conform to the other authors when publishing their papers. It is interesting. Comparing with ICDM and CIKM, authors from KDD are not least to conform to other authors, while authors from CIKM has a much higher individual conformity. Further looking at the KDD the conference, the conformity degrees of different years are also different. For example, in 2005, the peer conformity is higher that that in the 2000 and 2010. As for the group conformity, on different topics, authors may have different conformity. For example, in ICDM, authors are easily to conform to the group who are working on “the clustering algorithm”.

Now our problem becomes How to incorporate the different types of conformities into a unified model? Input: G=(V, E, C, X), A Output: F: f(G, A) ->Y(t+1) Now our problem becomes how to incorporate the different types of conformities into a unified model?

Confluence —A conformity-aware factor graph model Group conformity factor function Random variable y: Action Peer conformity factor function An example is illustrated in Figure 2. In the input network, user v1 belongs to three groups C1, C2, and C3, thus in the constructed factor graph, its corresponding latent variable y1 is connected to three group conformity factors (e.g., g(y1, gcf(v1,C1))). User v1 has four friends in the input network, thus four peer conformity factors in the factor graph model. We also define an individual conformity factor for each user. Individual conformity factor function

Model Instantiation capture the correlation between the user’s attribute xij and user’s action. Individual conformity factor function Peer conformity factor function Based on the theory of factor graph model, we can define the following log-likelihood objective function. The decay factor decays the peer conformity exponentially over time, with the half-life, λ, serving as a tunable parameter. Besides the conformity actors, we use factor function f(yi, xij) to capture the correlation between the user’s attribute xij and user’s action. Finally, learning the model is going to estimate the unkown parameters. Group conformity factor function

General Social Features Opinion leader[1] Whether the user is an opinion leader or not Structural hole[2] Whether the user is a structural hole spanner Social ties[3] Whether a tie between two users is a strong or weak tie Social balance[4] People in a social network tend to form balanced (triad) structures (like “my friend’s friend is also my friend”). For a undirected network, there are four types of (un)balanced triads. A binary feature is defined for each of the triad structure. The similar feature definition was also used in [31]. [1] X. Song, Y. Chi, K. Hino, and B. L. Tseng. Identifying opinion leaders in the blogosphere. In CIKM’06, pages 971–974, 2007. [2] T. Lou and J Tang. Mining Structural Hole Spanners Through Information Diffusion in Social Networks. In WWW'13. pp. 837-848. [3] M. Granovetter. The strength of weak ties. American Journal of Sociology, 78(6):1360–1380, 1973. [4] D. Easley and J. Kleinberg. Networks, Crowds, and Markets: Reasoning about a Highly Connected World. Cambridge University Press, 2010.

Distributed Model Learning Unknown parameters to estimate (1) Master (2) Slave Learning the Confluence model is to estimate the unknown parameters (3) Master

Experiments

Data Set and Baselines Baselines Evaluation metrics Support Vector Machine (SVM) Logistic Regression (LR) Naive Bayes (NB) Gaussian Radial Basis Function Neural Network (RBF) Conditional Random Field (CRF) Evaluation metrics Precision, Recall, F1, and Area Under Curve (AUC) Network #Nodes #Edges Behavior #Actions Weibo 1,776,950 308,489,739 Post a tweet 6,761,186 Flickr 1,991,509 208,118,719 Add comment 3,531,801 Gowalla 196,591 950,327 Check-in 6,442,890 ArnetMiner 737,690 2,416,472 Publish paper 1,974,466

Prediction Accuracy t-test, p<<0.01

Effect of Conformity We further present an in-depth analysis of how different levels of conformities affect the performance of action prediction. It can be clearly seen that without the conformity based factors, the prediction performance drop significantly. Co-Author network is most predictable because the co-authorships are stable and predictable in general. Weibo and Flickr are the most difficult to predict because the user behavior is fairly autonomous and independent. Conformity has most significant prediction impact on Gowalla, which suggests conformity plays an important role in geospatial and mobile applications in social networks. By incorporating the conformity features, significant improvements (+20-30%) over the prediction performance can be obtained on Gowalla. Confluencebase+I (or +P or +G) respectively indicates that we respectively add individual conformity features (or peer conformity features or group conformity features) into the Confluencebase method. By incorporating each type of conformity factors, we observe clear improvement compared to the Confluencebase method. We can also see that on all the four data sets, the group conformity is more important than the other two types of conformities. This makes sense, as in most cases conformity is a group phenomenon rather than an individual behavior Confluencebase stands for the Confluence method without any social based features Confluencebase+I stands for the Confluencebase method plus only individual conformity features Confluencebase+P stands for the Confluencebase method plus only peer conformity features Confluencebase+G stands for the Confluencebase method plus only group conformity

Scalability performance Achieve ∼ 9×speedup with 16 cores We now evaluate the scalability performance of the distributed learning algorithm on the four networks. Figure 5 shows the speedup of the distributed algorithm with different number of computer nodes (2, 3, 6, 8, 10, 12, 14, 16 cores) used. The speedup curve is close to the perfect line at the beginning. the distributed learning algorithm can still achieve 9x speedup with 16 cores.

Conclusion Study a novel problem of conformity influence analysis in large social networks Formally define three conformity functions to capture the different levels of conformities Propose a Confluence model to model users’ actions and conformity Our experiments on four datasets verify the effectiveness and efficiency of the proposed model

Future work Connect the conformity phenomena with other social theories e.g., social balance, status, and structural hole Study the interplay between conformity and reactance Better model the conformity phenomena with other methodologies (e.g., causality) connect the conformity phenomenon with some other social theories such as social status and structural holes so as to understand the formation and dynamic change of the network structure. It is also interesting to design some other model, for example a game theory based model, to model the conformity phenomenon. As for the proposed Confluence model itself, it has many parameters. We also consider adding regularization to control the sparsity of those parameters.

Confluence: Conformity Influence in Large Social Networks Jie Tang*, Sen Wu*, and Jimeng Sun+ *Tsinghua University +IBM TJ Watson Research Center Data and codes are available at: http://arnetminer.org/conformity/

Qualitative Case Study

2. Individual Conformity Positive Negative I love Obama 1. Peer Conformity 1 2. Individual Conformity

2. Individual Conformity Positive Negative I love Obama Obama is great! 1. Peer conformity 2 2. Individual Conformity

2. Individual conformity Positive Negative I love Obama Obama is great! 1. Peer conformity 3 2. Individual conformity

2. Individual conformity Positive Negative I love Obama 3. Group conformity Obama is fantastic Obama is great! 1. Peer conformity 4 2. Individual conformity