99 research outputs found
On the Convexity of Latent Social Network Inference
In many real-world scenarios, it is nearly impossible to collect explicit
social network data. In such cases, whole networks must be inferred from
underlying observations. Here, we formulate the problem of inferring latent
social networks based on network diffusion or disease propagation data. We
consider contagions propagating over the edges of an unobserved social network,
where we only observe the times when nodes became infected, but not who
infected them. Given such node infection times, we then identify the optimal
network that best explains the observed data. We present a maximum likelihood
approach based on convex programming with a l1-like penalty term that
encourages sparsity. Experiments on real and synthetic data reveal that our
method near-perfectly recovers the underlying network structure as well as the
parameters of the contagion propagation model. Moreover, our approach scales
well as it can infer optimal networks of thousands of nodes in a matter of
minutes.Comment: NIPS, 201
Interval-censored Transformer Hawkes: Detecting Information Operations using the Reaction of Social Systems
Social media is being increasingly weaponized by state-backed actors to
elicit reactions, push narratives and sway public opinion. These are known as
Information Operations (IO). The covert nature of IO makes their detection
difficult. This is further amplified by missing data due to the user and
content removal and privacy requirements. This work advances the hypothesis
that the very reactions that Information Operations seek to elicit within the
target social systems can be used to detect them. We propose an
Interval-censored Transformer Hawkes (IC-TH) architecture and a novel data
encoding scheme to account for both observed and missing data. We derive a
novel log-likelihood function that we deploy together with a contrastive
learning procedure. We showcase the performance of IC-TH on three real-world
Twitter datasets and two learning tasks: future popularity prediction and item
category prediction. The latter is particularly significant. Using the
retweeting timing and patterns solely, we can predict the category of YouTube
videos, guess whether news publishers are reputable or controversial and, most
importantly, identify state-backed IO agent accounts. Additional qualitative
investigations uncover that the automatically discovered clusters of
Russian-backed agents appear to coordinate their behavior, activating
simultaneously to push specific narratives
Inference and Sampling of Point Processes from Diffusion Excursions
Point processes often have a natural interpretation with respect to a
continuous process. We propose a point process construction that describes
arrival time observations in terms of the state of a latent diffusion process.
In this framework, we relate the return times of a diffusion in a continuous
path space to new arrivals of the point process. This leads to a continuous
sample path that is used to describe the underlying mechanism generating the
arrival distribution. These models arise in many disciplines, such as financial
settings where actions in a market are determined by a hidden continuous price
or in neuroscience where a latent stimulus generates spike trains. Based on the
developments in It\^o's excursion theory, we propose methods for inferring and
sampling from the point process derived from the latent diffusion process. We
illustrate the approach with numerical examples using both simulated and real
data. The proposed methods and framework provide a basis for interpreting point
processes through the lens of diffusions.Comment: In UAI 202
- …