Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2023
Community-Preserving Social Graph Release with Node Differential Privacy
Journal of Computer Science and Technology (JCST), Volume 38, Issue 6Pages 1369–1386https://doi.org/10.1007/s11390-021-1270-7AbstractThe goal of privacy-preserving social graph release is to protect individual privacy while preserving data utility. Community structure, which is an important global pattern of nodes, is a crucial data utility as it is fundamental to many graph ...
- research-articleJanuary 2023
Mathematical modelling of abnormal account detection on social media platform based on improved edge weight
International Journal of Web Based Communities (IJWBC), Volume 19, Issue 2-3Pages 187–197https://doi.org/10.1504/ijwbc.2023.131400In order to overcome the problems of traditional methods such as large time consumption, high missed detection rate and low recall rate of detection results, a mathematical modelling method of abnormal account detection on social media platform based on ...
- research-articleJanuary 2022
Bayesian inference of a social graph with trace feasibility guarantees
ASONAM '21: Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and MiningPages 317–324https://doi.org/10.1145/3487351.3488279Network inference is the process of deciding what is the true unknown graph underlying a set of interactions between nodes. There is a vast literature on the subject, but most known methods have an important drawback: the inferred graph is not ...
- research-articleApril 2020
Improved Advertisement Targeting via Fine-grained Location Prediction using Twitter
WWW '20: Companion Proceedings of the Web Conference 2020Pages 527–532https://doi.org/10.1145/3366424.3382118With the growing demand for social network service advertisements, more accurate targeting methods are required. Therefore, the authors of this study try to predict the location of Twitter users in a more fine-grained manner with regard to area ...
- research-articleJuly 2017
Edge-weighting Hyperlink-Induced Topic Search (E-HITS) Algorithm
ASONAM '17: Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017Pages 925–930https://doi.org/10.1145/3110025.3110111Link analysis method in general and Hyperlink-Induced Topic Search (HITS) algorithm in particular is used for analyzing graph in many important contexts, including ranking search results based on the hyperlink structure of the World Wide Web and privacy ...
-
- research-articleOctober 2016
Updating an Existing Social Graph Snapshot via a Limited API
CIKM '16: Proceedings of the 25th ACM International on Conference on Information and Knowledge ManagementPages 1693–1702https://doi.org/10.1145/2983323.2983703We study the problem of graph tracking with limited information. In this paper, we focus on updating a social graph snapshot. Say we have an existing partial snapshot, G1, of the social graph stored at some system. Over time G1 becomes out of date. We ...
- ArticleJune 2015
A Diffusion Model with Constant Source and Sinks for Social Graph Partitioning
ICWS '15: Proceedings of the 2015 IEEE International Conference on Web ServicesPages 113–120https://doi.org/10.1109/ICWS.2015.25Social services are more and more popular with the development of web and mobile internet. Behind social services, graph model is the key data structure representing the relationship among social entities. Partitioning social graphs according to graph ...
- research-articleJune 2015
Towards a Three-tiered Social Graph in Decentralized Online Social Networks
HOTPOST '15: Proceedings of the 7th International Workshop on Hot Topics in Planet-scale mObile computing and online Social neTworkingPages 1–6https://doi.org/10.1145/2757513.2757517Online Social Networks have become one of the main tools for interpersonal online communication. In the age of the smartphone, mobile user scenarios become more and more important for Online Social Networks. Smartphones enable location-based and context-...
- research-articleMay 2015
Leveraging Careful Microblog Users for Spammer Detection
WWW '15 Companion: Proceedings of the 24th International Conference on World Wide WebPages 419–429https://doi.org/10.1145/2740908.2745400Microblogging websites, e.g. Twitter and Sina Weibo, have become a popular platform for socializing and sharing information in recent years. Spammers have also discovered this new opportunity to unfairly overpower normal users with unsolicited content, ...
- otherMay 2015
Why Do You Follow Him?: Multilinear Analysis on Twitter
WWW '15 Companion: Proceedings of the 24th International Conference on World Wide WebPages 137–138https://doi.org/10.1145/2740908.2742715Why does Smith follow Johnson on Twitter? In most cases, the reason why users follow other users is unavailable. In this work, we answer this question by proposing TagF, which analyzes the who-follows-whom network (matrix) and the who-tags-whom network (...
- research-articleFebruary 2015
"You Never Call, You Never Write": Call and SMS Logs Do Not Always Indicate Tie Strength
CSCW '15: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social ComputingPages 765–774https://doi.org/10.1145/2675133.2675143How effective are call and SMS logs in modeling tie strength? Frequency and duration of communication has long been cited as a major aspect of tie strength. Intuitively, this makes sense: people communicate with those that they feel close to. Highly ...
- research-articleNovember 2014
Enabling Social Search in Time through Graphs
Web-KR '14: Proceedings of the 5th International Workshop on Web-scale Knowledge Representation Retrieval & ReasoningPages 59–62https://doi.org/10.1145/2663792.2663802Recently, social networks have attracted considerable attention. The huge volume of information contained in them, as well as their dynamic nature, make the problem of searching social data challenging. In this work, we envision the design of a complete ...
- ArticleSeptember 2014
Social Data Analytics Tool: Design, Development, and Demonstrative Case Studies
EDOCW '14: Proceedings of the 2014 IEEE 18th International Enterprise Distributed Object Computing Conference Workshops and DemonstrationsPages 414–417https://doi.org/10.1109/EDOCW.2014.70This paper presents the design, development and demonstrative case studies of the Social Data Analytics Tool, SODATO. Adopting Action Design Framework [1], the objective of SODATO [2] is to collect, store, analyze, and report big social data emanating ...
- research-articleAugust 2014
Marius, the giraffe: a comparative informatics case study of linguistic features of the social media discourse
CABS '14: Proceedings of the 5th ACM international conference on Collaboration across boundaries: culture, distance & technologyPages 131–140https://doi.org/10.1145/2631488.2631501On February 9, 2014, a giraffe named Marius was put to death by the Copenhagen Zoo in Denmark, sparking a storm of public discussion nationally and internationally. This paper presents a comparative informatics case study of the event. We employ the ...
- posterAugust 2014
Sampling online social networks: an experimental study of twitter
SIGCOMM '14: Proceedings of the 2014 ACM conference on SIGCOMMPages 127–128https://doi.org/10.1145/2619239.2631452Online social networks (OSNs) are an important source of information for scientists in different fields such as computer science, sociology, economics, etc. However, it is hard to study OSNs as they are very large. For instance, Facebook has 1.28 ...
Also Published in:
ACM SIGCOMM Computer Communication Review: Volume 44 Issue 4 - posterAugust 2014
Poster: social mobility based routing in crowdsourced systems
MobiHoc '14: Proceedings of the 15th ACM international symposium on Mobile ad hoc networking and computingPages 433–434https://doi.org/10.1145/2632951.2635935In this paper, we formulate a generalized optimization problem to meet the profit problem for crowdsourced systems with considering three aspects of connectivity, profit and risk. We also propose a routing algorithm for this special scenario, featured ...
- ArticleAugust 2014
Indirect Keyword Recommendation
WI-IAT '14: Proceedings of the 2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT) - Volume 01Pages 384–391https://doi.org/10.1109/WI-IAT.2014.60Helping users to find useful contacts or potentially interesting subjects is a challenge for social and productive networks. The evidence of the content produced by users must be considered in this task, which may be simplified by the use of the meta-...
- ArticleMay 2014
Constructing and Analyzing Criminal Networks
SPW '14: Proceedings of the 2014 IEEE Security and Privacy WorkshopsPages 84–91https://doi.org/10.1109/SPW.2014.22Analysis of criminal social graph structures can enable us to gain valuable insights into how these communities are organized. Such as, how large scale and centralized these criminal communities are currently? While these types of analysis have been ...
- posterApril 2014
Detecting suspicious following behavior in multimillion-node social networks
WWW '14 Companion: Proceedings of the 23rd International Conference on World Wide WebPages 305–306https://doi.org/10.1145/2567948.2577306In a multimillion-node network of who-follows-whom like Twitter, since a high count of followers leads to higher profits, users have the incentive to boost their in-degree. Can we spot the suspicious following behavior, which may indicate zombie ...
- ArticleDecember 2013
A Feature Representation Method of Social Graph for Malware Detection
GCIS '13: Proceedings of the 2013 Fourth Global Congress on Intelligent SystemsPages 139–143https://doi.org/10.1109/GCIS.2013.28The proliferation of malware has presented a serious threat to internet security, and made traditional signature-based methods unable to analyze and process the massive data timely and effectively. The development trend of malware motivates many ...