298 research outputs found

    Identifying influencers from sampled social networks

    Get PDF
    Identifying influencers who can spread information to many other individuals from a social network is a fundamental research task in the network science research field. Several measures for identifying influencers have been proposed, and the effectiveness of these influence measures has been evaluated for the case where the complete social network structure is known. However, it is difficult in practice to obtain the complete structure of a social network because of missing data, false data, or node/link sampling from the social network. In this paper, we investigate the effects of node sampling from a social network on the effectiveness of influence measures at identifying influencers. Our experimental results show that the negative effect of biased sampling, such as sample edge count, on the identification of influencers is generally small. For social media networks, we can identify influencers whose influence is comparable with that of those identified from the complete social networks by sampling only 10%–30% of the networks. Moreover, our results also suggest the possible benefit of network sampling in the identification of influencers. Our results show that, for some networks, nodes with higher influence can be discovered from sampled social networks than from complete social networks

    An Introduction to Systems Biology for Mathematical Programmers

    Get PDF
    Many recent advances in biology, medicine and health care are due to computational efforts that rely on new mathematical results. These mathematical tools lie in discrete mathematics, statistics & probability, and optimization, and when combined with savvy computational tools and an understanding of cellular biology they are capable of remarkable results. One of the most significant areas of growth is in the field of systems biology, where we are using detailed biological information to construct models that describe larger entities. This chapter is designed to be an introduction to systems biology for individuals in Operations Research (OR) and mathematical programming who already know the supporting mathematics but are unaware of current research in this field

    Estimating Influence of Social Media Users from Sampled Social Networks

    Get PDF
    Several indices for estimating the influence of social media users have been proposed. Most such indices are obtained from the topological structure of a social network that represents relations among social media users. However, several errors are typically contained in such social network structures because of missing data, false data, or poor node/link sampling from the social network. In this paper, we investigate the effects of node sampling from a social network on the effectiveness of indices for estimating the influence of social media users. We compare the estimated influence of users, as obtained from a sampled social network, with their actual influence. Our experimental results show that using biased sampling methods, such as sample edge count, is a more effective approach than random sampling for estimating user influence, and that the use of random sampling to obtain the structure of a social network significantly affects the effectiveness of indices for estimating user influence, which may make indices useless.ASONAM 2016 : The 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and MiningPlace: San Francisco, CA, USADate: Aug 18, 2016 - Aug 21, 201

    Developing Robust Models, Algorithms, Databases and Tools With Applications to Cybersecurity and Healthcare

    Get PDF
    As society and technology becomes increasingly interconnected, so does the threat landscape. Once isolated threats now pose serious concerns to highly interdependent systems, highlighting the fundamental need for robust machine learning. This dissertation contributes novel tools, algorithms, databases, and models—through the lens of robust machine learning—in a research effort to solve large-scale societal problems affecting millions of people in the areas of cybersecurity and healthcare. (1) Tools: We develop TIGER, the first comprehensive graph robustness toolbox; and our ROBUSTNESS SURVEY identifies critical yet missing areas of graph robustness research. (2) Algorithms: Our survey and toolbox reveal existing work has overlooked lateral attacks on computer authentication networks. We develop D2M, the first algorithmic framework to quantify and mitigate network vulnerability to lateral attacks by modeling lateral attack movement from a graph theoretic perspective. (3) Databases: To prevent lateral attacks altogether, we develop MALNET-GRAPH, the world’s largest cybersecurity graph database—containing over 1.2M graphs across 696 classes—and show the first large-scale results demonstrating the effectiveness of malware detection through a graph medium. We extend MALNET-GRAPH by constructing the largest binary-image cybersecurity database—containing 1.2M images, 133×more images than the only other public database—enabling new discoveries in malware detection and classification research restricted to a few industry labs (MALNET-IMAGE). (4) Models: To protect systems from adversarial attacks, we develop UNMASK, the first model that flags semantic incoherence in computer vision systems, which detects up to 96.75% of attacks, and defends the model by correctly classifying up to 93% of attacks. Inspired by UNMASK’s ability to protect computer visions systems from adversarial attack, we develop REST, which creates noise robust models through a novel combination of adversarial training, spectral regularization, and sparsity regularization. In the presence of noise, our method improves state-of-the-art sleep stage scoring by 71%—allowing us to diagnose sleep disorders earlier on and in the home environment—while using 19× less parameters and 15×less MFLOPS. Our work has made significant impact to industry and society: the UNMASK framework laid the foundation for a multi-million dollar DARPA GARD award; the TIGER toolbox for graph robustness analysis is a part of the Nvidia Data Science Teaching Kit, available to educators around the world; we released MALNET, the world’s largest graph classification database with 1.2M graphs; and the D2M framework has had major impact to Microsoft products, inspiring changes to the product’s approach to lateral attack detection.Ph.D

    Analysis and Design of Robust and High-Performance Complex Dynamical Networks

    Get PDF
    In the first part of this dissertation, we develop some basic principles to investigate performance deterioration of dynamical networks subject to external disturbances. First, we propose a graph-theoretic methodology to relate structural specifications of the coupling graph of a linear consensus network to its performance measure. Moreover, for this class of linear consensus networks, we introduce new insights into the network centrality based not only on the network graph but also on a more structured model of network uncertainties. Then, for the class of generic linear networks, we show that the H_2-norm, as a performance measure, can be tightly bounded from below and above by some spectral functions of state and output matrices of the system. Finally, we study nonlinear autocatalytic networks and exploit their structural properties to characterize their existing hard limits and essential tradeoffs. In the second part, we consider problems of network synthesis for performance enhancement. First, we propose an axiomatic approach for the design and performance analysis of linear consensus networks by introducing a notion of systemic performance measure. We build upon this new notion and investigate a general form of combinatorial problem of growing a linear consensus network via minimizing a given systemic performance measure. Two efficient polynomial-time approximation algorithms are devised to tackle this network synthesis problem. Then, we investigate the optimal design problem of distributed system throttlers. A throttler is a mechanism that limits the flow rate of incoming metrics, e.g., byte per second, network bandwidth usage, capacity, traffic, etc. Finally, a framework is developed to produce a sparse approximation of a given large-scale network with guaranteed performance bounds using a nearly-linear time algorithm

    Peer review networks between Bitcoin traders

    Get PDF
    Bitcoin is a cryptocurrency that can be traded online. Some of the online Bitcoin trading platforms allow traders to give trust ratings to each other. Trust ratings are meant to indicate with whom to trade. Given and received trust ratings between Bitcoin traders form a Bitcoin trader peer review network. Understanding the functionality of Bitcoin peer review networks is crucial due to counter-party risk in Bitcoin transactions. This work studies the social aspects of Bitcoin trading. Trust rating data from two online Bitcoin trading platforms, Bitcoin OTC and Bitcoin Alpha, is used. Bitcoin trader behaviour in peer review networks is reduced to five behavioural features: attention, reputation, activity, fairness and goodness. The first three are derived from the data in a straightforward way. The last two are determined by using a state-of- the-art algorithm designed for trust/distrust networks. Trader types are extracted by clustering the traders based on the behavioural features. Due to timestamped data it is possible to define how the behaviour of Bitcoin traders evolve over time. Bitcoin peer review networks are represented as chronological aggregated snapshots of the underlying temporal system. Per each aggregated network, traders are clustered based on their behaviour. Cluster transitions provide information about how Bitcoin trader behaviour evolves over time. This work focuses especially on adverse behaviour. Adverse behaviour refers to giving unfair trust ratings to others or being distrusted by other traders, especially fair ones. The impact of receiving unfair ratings on a trader's behaviour is studied. In addition, it is studied if adversely behaving traders form communities. A community is a group of traders who have been rating each other. Behavioural clusters are also studied in relation to the most and the least central traders. The most central traders substantially contribute to the peer review network while the impact of the least central ones is negligible. The behavioural clusters show clear similarities between the datasets. There are trader types for which behaviour is exceptionally persistent. For well behaving traders it is common to remain as they are. Distrusted traders are likely to remain distrusted or disappear from the network, which can partly be explained by unfair negative treatment. Unfairly negatively rated traders can react to unfair treatment by becoming unfair themselves. Some of the most reputable traders have received their reputation from unfair positive ratings. Active and noticed traders with medium reputation behave in various ways in the future and are likely to stay in the network. In addition, it is observed that communities of unfairness and distrust emerge in Bitcoin peer review networks the same time with a burst of negative trust ratings. Surprisingly, the results on centrality show that the most well behaving traders become the least central. The most central traders in Bitcoin peer review networks are active and noticed traders who do not behave adversely

    A Cascading Failure Model for Command and Control Networks with Hierarchy Structure

    Get PDF
    Cascading failures in the command and control networks (C2 networks) could substantially affect the network invulnerability to some extent. In particular, without considering the characteristics of hierarchy structure, it is quite misleading to employ the existing cascading failure models and effectively analyze the invulnerability of C2 networks. Therefore, a novel cascading failure model for command and control networks with hierarchy structure is proposed in this paper. Firstly, a method of defining the node’s initial load in C2 networks based on hierarchy-degree is proposed. By applying the method, the impact of organizational positions and the degree of the node on its initial load could be highlighted. Secondly, a nonuniform adjustable load redistribution strategy (NALR strategy) is put forward in this paper. More specifically, adjusting the redistribution coefficient could allocate the load from failure nodes to the higher and the same level neighboring nodes according to different proportions. It could be demonstrated by simulation results that the robustness of C2 networks against cascading failures could be dramatically improved by adjusting the initial load adjustment coefficient, the tolerance parameter, and the load redistribution coefficient. And finally, comparisons with other relational models are provided to verify the rationality and effectiveness of the model proposed in this paper. Subsequently, the invulnerability of C2 networks could be enhanced
    • …
    corecore