Measuring Behavioral Trust in Social Networks

Slides:



Advertisements
Similar presentations
Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection Presented by: Vijay Kumar.
Advertisements

Autonomic Scaling of Cloud Computing Resources
Influence and Passivity in Social Media Daniel M. Romero, Wojciech Galuba, Sitaram Asur, and Bernardo A. Huberman Social Computing Lab, HP Labs.
Understanding Cancer-based Networks in Twitter using Social Network Analysis Dhiraj Murthy Daniela Oliveira Alexander Gross Social Network Innovation Lab.
Integrated Coverage and Connectivity Configuration in Wireless Sensor Networks Xiaorui Wang, Guoliang Xing, Yuanfang Zhang*, Chenyang Lu, Robert Pless,
Community Detection Laks V.S. Lakshmanan (based on Girvan & Newman. Finding and evaluating community structure in networks. Physical Review E 69,
Authors Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham Flaxman Presented by: Jonathan di Costanzo & Muhammad Atif Qureshi 1.
Linear Obfuscation to Combat Symbolic Execution Zhi Wang 1, Jiang Ming 2, Chunfu Jia 1 and Debin Gao 3 1 Nankai University 2 Pennsylvania State University.
Directional triadic closure and edge deletion mechanism induce asymmetry in directed edge properties.
CIKM’2008 Presentation Oct. 27, 2008 Napa, California
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Expertise Networks in Online Communities: Structure and Algorithms Jun Zhang Mark S. Ackerman Lada Adamic University of Michigan WWW 2007, May 8–12, 2007,
CSE 222 Systems Programming Graph Theory Basics Dr. Jim Holten.
SybilGuard: Defending Against Sybil Attacks via Social Networks Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, and Abraham Flaxman Presented by Ryan.
Structure based Data De-anonymization of Social Networks and Mobility Traces Shouling Ji, Weiqing Li, and Raheem Beyah Georgia Institute of Technology.
To Trust of Not To Trust? Predicting Online Trusts using Trust Antecedent Framework Viet-An Nguyen 1, Ee-Peng Lim 1, Aixin Sun 2, Jing Jiang 1, Hwee-Hoon.
Models of Influence in Online Social Networks
Integrated Social and Quality of Service Trust Management of Mobile Groups in Ad Hoc Networks Ing-Ray Chen, Jia Guo, Fenye Bao, Jin-Hee Cho Communications.
Analysis and Modeling of the Open Source Software Community Yongqin Gao, Greg Madey Computer Science & Engineering University of Notre Dame Vincent Freeh.
Social Network Analysis via Factor Graph Model
Using Friendship Ties and Family Circles for Link Prediction Elena Zheleva, Lise Getoor, Jennifer Golbeck, Ugur Kuter (SNAKDD 2008)
Research Meeting Seungseok Kang Center for E-Business Technology Seoul National University Seoul, Korea.
Social Networking and On-Line Communities: Classification and Research Trends Maria Ioannidou, Eugenia Raptotasiou, Ioannis Anagnostopoulos.
Some Surprises in the Theory of Generalized Belief Propagation Jonathan Yedidia Mitsubishi Electric Research Labs (MERL) Collaborators: Bill Freeman (MIT)
Modeling Information Diffusion in Networks with Unobserved Links Quang Duong Michael P. Wellman Satinder Singh Computer Science and Engineering University.
Krishnaprasad Thirunarayan, Pramod Anantharam, Cory A. Henson, and Amit P. Sheth Kno.e.sis Center, Ohio Center of Excellence on Knowledge-enabled Computing,
Data Analysis in YouTube. Introduction Social network + a video sharing media – Potential environment to propagate an influence. Friendship network and.
Rate-based Data Propagation in Sensor Networks Gurdip Singh and Sandeep Pujar Computing and Information Sciences Sanjoy Das Electrical and Computer Engineering.
Page 1 Ming Ji Department of Computer Science University of Illinois at Urbana-Champaign.
On Finding Fine-Granularity User Communities by Profile Decomposition Seulki Lee, Minsam Ko, Keejun Han, Jae-Gil Lee Department of Knowledge Service Engineering.
Presentation: A measure of betweenness centrality based on random walks M.E.J. Newman ELSEVIER Social Networks November 2004 A measure of betweenness centrality.
Predicting Positive and Negative Links in Online Social Networks
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Mining Social Network for Personalized Prioritization Language Techonology Institute School of Computer Science Carnegie Mellon University Shinjae.
Optimal Link Bombs are Uncoordinated Sibel Adali Tina Liu Malik Magdon-Ismail Rensselaer Polytechnic Institute.
BEHAVIORAL TARGETING IN ON-LINE ADVERTISING: AN EMPIRICAL STUDY AUTHORS: JOANNA JAWORSKA MARCIN SYDOW IN DEFENSE: XILING SUN & ARINDAM PAUL.
Evaluating Network Security with Two-Layer Attack Graphs Anming Xie Zhuhua Cai Cong Tang Jianbin Hu Zhong Chen ACSAC (Dec., 2009) 2010/6/151.
Robustness of complex networks with the local protection strategy against cascading failures Jianwei Wang Adviser: Frank,Yeong-Sung Lin Present by Wayne.
Peer Centrality in Socially-Informed P2P Topologies Nicolas Kourtellis, Adriana Iamnitchi Department of Computer Science & Engineering University of South.
Chapter 2 Doing Sociological Research Key Terms. scientific method Involves several steps in research process, including observation, hypothesis testing,
Probabilistic Models for Discovering E-Communities Ding Zhou, Eren Manavoglu, Jia Li, C. Lee Giles, Hongyuan Zha The Pennsylvania State University WWW.
Mining and Visualizing the Evolution of Subgroups in Social Networks Falkowsky, T., Bartelheimer, J. & Spiliopoulou, M. (2006) IEEE/WIC/ACM International.
Finding Experts Using Social Network Analysis 2007 IEEE/WIC/ACM International Conference on Web Intelligence Yupeng Fu, Rongjing Xiang, Yong Wang, Min.
QoS Supported Clustered Query Processing in Large Collaboration of Heterogeneous Sensor Networks Debraj De and Lifeng Sang Ohio State University Workshop.
Privacy Preserving Payments in Credit Networks By: Moreno-Sanchez et al from Saarland University Presented By: Cody Watson Some Slides Borrowed From NDSS’15.
Time-Space Trust in Networks Shunan Ma, Jingsha He and Yuqiang Zhang 1 College of Computer Science and Technology 2 School of Software Engineering.
Mix networks with restricted routes PET 2003 Mix Networks with Restricted Routes George Danezis University of Cambridge Computer Laboratory Privacy Enhancing.
Speaker : Yu-Hui Chen Authors : Dinuka A. Soysa, Denis Guangyin Chen, Oscar C. Au, and Amine Bermak From : 2013 IEEE Symposium on Computational Intelligence.
Hierarchical Trust Management for Wireless Sensor Networks and Its Applications to Trust-Based Routing and Intrusion Detection Wenhai Sun & Ruide Zhang.
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Wenliang Du et al.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
Incremental Run-time Application Mapping for Heterogeneous Network on Chip 2012 IEEE 14th International Conference on High Performance Computing and Communications.
Fair and Efficient multihop Scheduling Algorithm for IEEE BWA Systems Daehyon Kim and Aura Ganz International Conference on Broadband Networks 2005.
Anonymous communication over social networks Shishir Nagaraja and Ross Anderson Security Group Computer Laboratory.
Online Social Networks and Media Absorbing random walks Label Propagation Opinion Formation.
Outline  Introduction  Subgraph Pattern Matching  Types of Subgraph Pattern Matching  Models of Computation  Distributed Algorithms  Performance.
Zijian Wang, Eyuphan Bulut, and Boleslaw K. Szymanski Center for Pervasive Computing and Networking and Department of Computer Science Rensselaer Polytechnic.
Paper Presentation Social influence based clustering of heterogeneous information networks Qiwei Bao & Siqi Huang.
1 Link Privacy in Social Networks Aleksandra Korolova, Rajeev Motwani, Shubha U. Nabar CIKM’08 Advisor: Dr. Koh, JiaLing Speaker: Li, HueiJyun Date: 2009/3/30.
Non-Markovian Character in Human Mobility: Online and Offline 报告人:蔡世民 合作者:赵志丹,卢扬.
2010 IEEE Global Telecommunications Conference (GLOBECOM 2010)
Presented by: Saurav Kumar Bengani
Sofus A. Macskassy Fetch Technologies
T.W. Scholten, C. de Persis, P. Tesi
Dieudo Mulamba November 2017
Department of Computer Science University of York
Jiawei Han Department of Computer Science
Prepared by: Mahmoud Rafeek Al-Farra
The Impact of Changes in Network Structure on Diffusion of Warnings
Yingze Wang and Shi-Kuo Chang University of Pittsburgh
Presentation transcript:

Measuring Behavioral Trust in Social Networks Sibel Adali, et al. IEEE International Conference on Intelligence and Security Informatics Presented by: Liang Zhao Northern Virginia Center

Outline Introduction Behavior Trust Twitter data Experiment Results Conclusion

Introduction Trust vs. Social Network Evaluate Trust in Social Network Assumptions Purpose of this paper

Trust vs. Social Network Trust → Social Network (SN) Forms coalitions Identifies influential nodes in SN Depicts the flow of information Social Network → Trust Communities induce greater trust Information flow enhances trust

Evaluate Trust in Social Network Whether we trust others? Our own predisposition to trust. Relationship with others. Our opinions towards others. Tip: Add your own speaker notes here.

Assumptions Does not consider semantic information. Only consider social ties Trust is a social tie between a trustor and trustee. Social ties can be observed by communication behaviors. Degree of Trust can change. Behavior Trust: Measure of trust is based on social behavior. Social behaviors can conversely enhance or reduce the trust.

Purpose of this paper Measure trust based on the communi- cation behavior of the actors in SN. Input: Communication Stream of Social Network: {<sender, receiver, time>,…,<sender, receiver, time>} Output: Behavior trust graph Nodes: actors in SN, e.g., 𝐴, 𝐵. Edges’ weights: strength of trust, e.g., 𝑇(𝐴,𝐵).

Behavior Trust Conversations & Propagations Conversations behavior based Conversations grouping Conversation Trust Computation Propagation behavior based Propagation Trust Potential Propagations Counting Propagation Trust Computation

Conversations & Propagations This paper considers two kinds of behavior: Conversations: Two nodes converse means they are more likely to trust each other. Propagations: A propagates info from B indicates A trust B. undirected directed

Conversations grouping The set of messages exchanged between A and B is: . Average time between messages is: Rule: two consecutive messages 𝑡 𝑖 , 𝑡 𝑖+1 are in the same conversation if 𝑡 𝑖+1 − 𝑡 𝑖 <S∙𝜏. 𝑡 5 −𝑡 4 > S∙𝜏 𝑡 3 −𝑡 2 < S∙𝜏 𝑡 1 𝑡 2 𝑡 3 𝑡 4 𝑡 5 𝑡 6 𝑡 7 𝑡 4 −𝑡 3 < S∙𝜏

Conversation Trust Computation Rules: Longer Conversations imply more trust. More Conversations imply more trust. Balanced participation between two actors imply more trust. Trust (namely Edge’s weight in trust graph): Entropy function: 𝑝 : the fraction sent by one actor; 1−𝑝: the fraction sent by the other actor.

Propagation Trust 𝐴 details ? Given communication statistics alone, we cannot definitely determine which messages from B are propagations from A. So we turn to counting “potential propagations”. Tip: Add your own speaker notes here.

Potential Propagations Counting Potential Propagations must satisfy the following constraint: Matching “incoming to B” messages with “outgoing from B” messages: 𝑠 1 − 𝑡 1 < 𝜏 𝑚𝑖𝑛 𝜏 𝑚𝑖𝑛 < 𝑠 2 − 𝑡 1 < 𝜏 𝑚𝑎𝑥 𝜏 𝑚𝑖𝑛 <𝑠 3 − 𝑡 3 < 𝜏 𝑚𝑎𝑥 𝑠 3 − 𝑡 2 > 𝜏 𝑚𝑎𝑥 No cross

Propagation Trust Computation Notations: 𝑝𝑟𝑜𝑝 𝐵 the number of propagations by B. 𝑝𝑟𝑜𝑝 𝐴𝐵 the number of potential propagations. 𝑚 𝐴𝐵 the number of messages A sent to B. Strategy 1: Strategy 2: The fraction of B’s energy spent on propagating A’ messages. The fraction of A’s messages worthy to be propagated by B.

Twitter Data Data Volume: Data format: 2M users (1.9M senders). 230K tweets per day. Data format: (sender, receiver, time). Ground Truth Label of Trust: retweeting Directed Broadcast Tip: Add your own speaker notes here.

Experiment Compute Conversation & Propagation Graphs. Overlaps between Conversation & Propagation Graphs. Validate Conversation & Propagation Graphs using retweets.

Computing Conversation & Propagation Graphs Data: 15M Directed tweets for conversation graph. 34M broadcast tweets for propagation graph. Settings:

Computing Conversation & Propagation Graphs (continued) To achieve comparison between conversation and propagation graphs: treat the undirected edge as two directed ones. Tip: Add your own speaker notes here.

Overlaps between Conversation & Propagation Graphs Cluster these two graphs based on the weighted edges to discover communities: Overlaps evaluation: Random set of clusters with same size distribution; repeat 1000 times.

Graph validation using retweets. Assumption: A retweet is a propagation. When a user propagates information from some other user, there must be some element of trust between them. indicates directed trust: 𝐵→𝐴. Directed retweet is more determinative than broadcast retweet in indicating trust.

Graph validation using retweets (contd.) Conversational Trust Graph Validation: Nodes: 20% are also presented in retweets graph. Edges: as follows. 𝑇 𝑟𝑎𝑛𝑑𝑜𝑚 : Random graph, which consists of randomly selected nodes. The edges are communications between the nodes. 𝑇 𝑑𝑒𝑔𝑟𝑒𝑒 : Prominence graph, which consists of most active nodes. The edges are communications between the nodes.

Graph validation using retweets (contd.) Propagation Trust Graph Validation: Nodes: 20% are also presented in retweets graph. Edges: as follows.

Conclusion Method advantages: Propose a measurable behavior trust metric. Does not need semantic information. Can be applied to dynamic network. The proposed metric reasonably correlate with retweets. Can be applied to general social networks other than Twitter. Good scalability due to low computational cost on statistical communication data.

Future Works Verify the potentially casual relationship between conversation and propagation behavior. The intersection of conversation and propagation graphs would be a more stringent measure of trust. Improve the purity of trust measurement by considering semantics of messages. Trust should be dependent on context (e.g., we trust a doctor in medical science, but not necessarily in finance analysis. Improve the trust measurement by considering the quality and value of messages.

Thank you