Latest in cs.si

total 11123took 0.18s
Situational Awareness Enhanced through Social Media Analytics: A Survey of First RespondersSep 16 2019Social media data has been increasingly used to facilitate situational awareness during events and emergencies such as natural disasters. While researchers have investigated several methods to summarize, visualize or mine the data for analysis, first ... More
Uncovering Flaming Events on News Media in Social MediaSep 16 2019Social networking sites (SNSs) facilitate the sharing of ideas and information through different types of feedback including publishing posts, leaving comments and other type of reactions. However, some comments or feedback on SNSs are inconsiderate and ... More
Hashtags are (not) judgemental: The untold story of Lok Sabha elections 2019Sep 16 2019Hashtags in online social media have become a way for users to build communities around topics, promote opinions, and categorize messages. In the political context, hashtags on Twitter are used by users to campaign for their parties, spread news, or to ... More
Catching up with trends: The changing landscape of political discussions on twitter in 2014 and 2019Sep 16 2019The advent of 4G increased the usage of internet in India, which took a huge number of discussions online. Online Social Networks (OSNs) are the center of these discussions. During elections, political discussions constitute a significant portion of the ... More
A Joint Two-Phase Time-Sensitive Regularized Collaborative Ranking Model for Point of Interest RecommendationSep 16 2019The popularity of location-based social networks (LBSNs) has led to a tremendous amount of user check-in data. Recommending points of interest (POIs) plays a key role in satisfying users' needs in LBSNs. While recent work has explored the idea of adopting ... More
ChOracle: A Unified Statistical Framework for Churn PredictionSep 15 2019User churn is an important issue in online services that threatens the health and profitability of services. Most of the previous works on churn prediction convert the problem into a binary classification task where the users are labeled as churned and ... More
Centrality in dynamic competition networksSep 15 2019Competition networks are formed via adversarial interactions between actors. The Dynamic Competition Hypothesis predicts that influential actors in competition networks should have a large number of common out-neighbors with many other nodes. We empirically ... More
Quantitative analysis of cryptocurrencies transaction graphSep 15 2019Cryptocurrencies as a new way of transferring assets and securing financial transactions have gained popularity in recent years. Transactions in cryptocurrencies are publicly available, hence, statistical studies on different aspects of these currencies ... More
Biometric Blockchain: A Secure Solution for Intelligent Vehicle Data SharingSep 14 2019The intelligent vehicle (IV) has become a promising technology that could revolutionize our life in smart cities sooner or later. However, it yet suffers from many security vulnerabilities. Traditional security methods are incapable to secure the IV data ... More
Deep Collaborative Filtering with Multi-Aspect Information in Heterogeneous NetworksSep 14 2019Recently, recommender systems play a pivotal role in alleviating the problem of information overload. Latent factor models have been widely used for recommendation. Most existing latent factor models mainly utilize the interaction information between ... More
Node Injection Attacks on Graphs via Reinforcement LearningSep 14 2019Real-world graph applications, such as advertisements and product recommendations make profits based on accurately classify the label of the nodes. However, in such scenarios, there are high incentives for the adversaries to attack such graph to reduce ... More
Balance in Signed Bipartite NetworksSep 13 2019A large portion of today's big data can be represented as networks. However, not all networks are the same, and in fact, for many that have additional complexities to their structure, traditional general network analysis methods are no longer applicable. ... More
DyANE: Dynamics-aware node embedding for temporal networksSep 12 2019Low-dimensional vector representations of network nodes have proven successful to feed graph data to machine learning algorithms and to improve performance across diverse tasks. Most of the embedding techniques, however, have been developed with the goal ... More
Determining the Scale of Impact from Denial-of-Service Attacks in Real Time Using TwitterSep 12 2019Denial of Service (DoS) attacks are common in on-line and mobile services such as Twitter, Facebook and banking. As the scale and frequency of Distributed Denial of Service (DDoS) attacks increase, there is an urgent need for determining the impact of ... More
Multilingual Multimodal Digital Deception Detection and Disinformation Spread across Social PlatformsSep 12 2019Our main contribution in this work is novel results of multilingual models that go beyond typical applications of rumor or misinformation detection in English social news content to identify fine-grained classes of digital deception across multiple languages ... More
HapPenIng: Happen, Predict, Infer -- Event Series Completion in a Knowledge GraphSep 12 2019Event series, such as the Wimbledon Championships and the US presidential elections, represent important happenings in key societal areas including sports, culture and politics. However, semantic reference sources, such as Wikidata, DBpedia and EventKG ... More
Minimizing Margin of Victory for Fair Political and Educational DistrictingSep 12 2019In many practical scenarios, a population is divided into disjoint groups for better administration, e.g., electorates into political districts, employees into departments, students into school districts, and so on. However, grouping people arbitrarily ... More
Social Success of PerfumesSep 11 2019We study data on perfumes and their odour descriptors - notes - to understand how note compositions, called accords, influence successful fragrance formulas. We obtain accords which tend to be present in perfumes that receive significantly more customer ... More
Clusters and the entropy in opinion dynamics on complex networksSep 11 2019In this work, we investigate a heterogeneous population in the modified Hegselmann-Krause opinion model on complex networks. We introduce the Shannon information entropy about all relative opinion clusters to characterize the cluster profile in the final ... More
Modeling User Reputation in Online Social Networks: The Role of Costs, Benefits, and ReciprocitySep 10 2019We analyze an agent-based model to estimate how the costs and benefits of users in an online social network (OSN) impact the robustness of the OSN. Benefits are measured in terms of relative reputation that users receives from their followers. They can ... More
Jointly embedding the local and global relations of heterogeneous graph for rumor detectionSep 10 2019The development of social media has revolutionized the way people communicate, share information and make decisions, but it also provides an ideal platform for publishing and spreading rumors. Existing rumor detection methods focus on finding clues from ... More
Jointly embedding the local and global relations of heterogeneous graph for rumor detectionSep 10 2019Sep 11 2019The development of social media has revolutionized the way people communicate, share information and make decisions, but it also provides an ideal platform for publishing and spreading rumors. Existing rumor detection methods focus on finding clues from ... More
Competing Topic Naming Conventions in Quora: Predicting Appropriate Topic Merges and Winning Topics from Millions of Topic PairsSep 10 2019Quora is a popular Q&A site which provides users with the ability to tag questions with multiple relevant topics which helps to attract quality answers. These topics are not predefined but user-defined conventions and it is not so rare to have multiple ... More
Non-Bayesian Social Learning with Uncertain Models over Time-Varying Directed GraphsSep 10 2019We study the problem of non-Bayesian social learning with uncertain models, in which a network of agents seek to cooperatively identify the state of the world based on a sequence of observed signals. In contrast with the existing literature, we focus ... More
Lifelog Patterns Analyzation using Graph Embedding based on Deep Neural NetworkSep 10 2019Recently, as the spread of smart devices increases, the amount of data collected through sensors is increasing. A lifelog is a kind of big data to analyze behavior patterns in the daily life of individuals collected from various smart de-vices. However, ... More
Temporal Network Embedding with Micro- and Macro-dynamicsSep 10 2019Network embedding aims to embed nodes into a low-dimensional space, while capturing the network structures and properties. Although quite a few promising network embedding methods have been proposed, most of them focus on static networks. In fact, temporal ... More
Follow the Leader: Documents on the Leading Edge of Semantic Change Get More CitationsSep 09 2019Diachronic word embeddings offer remarkable insights into the evolution of language and provide a tool for quantifying socio-cultural change. However, while this method identifies words that have semantically shifted, it studies them in isolation; it ... More
Community Detection via Katz and Eigenvector CentralitySep 09 2019The computational demands of community detection algorithms such as Louvain and spectral optimization can be prohibitive for large networks. Eigenvector centrality and Katz centrality are two network statistics commonly used to describe the relative importance ... More
Do you really follow them? Automatic detection of credulous Twitter usersSep 09 2019Online Social Media represent a pervasive source of information able to reach a huge audience. Sadly, recent studies show how online social bots (automated, often malicious accounts, populating social networks and mimicking genuine users) are able to ... More
Toward a Knowledge-based Personalised Recommender System for Mobile App DevelopmentSep 09 2019Over the last few years, the arena of mobile application development has expanded considerably beyond the balance of the world\'s software markets. With the growing number of mobile software companies, and the mounting sophistication of smartphones\' ... More
The Future of Misinformation Detection: New Perspectives and TrendsSep 09 2019The massive spread of misinformation in social networks has become a global risk, implicitly influencing public opinion and threatening social/political development. Misinformation detection (MID) has thus become a surging research topic in recent years. ... More
Dynamic channel selection in wireless communications via a multi-armed bandit algorithm using laser chaos time seriesSep 09 2019Dynamic channel selection is among the most important wireless communication elements in dynamically changing electromagnetic environments wherein a user can experience improved communication quality by choosing a better channel. Multi-armed bandit (MAB) ... More
Boosting Item-based Collaborative Filtering via Nearly Uncoupled Random WalksSep 09 2019Item-based models are among the most popular collaborative filtering approaches for building recommender systems. Random walks can provide a powerful tool for harvesting the rich network of interactions captured within these models. They can exploit indirect ... More
An Experimental Study of Structural Diversity in Social NetworksSep 08 2019Sep 10 2019Several recent studies of online social networking platforms have found that adoption rates and engagement levels are positively correlated with structural diversity, the degree of heterogeneity among an individual's contacts as measured by network ties. ... More
Generating Reliable Friends via Adversarial Training to Improve Social RecommendationSep 08 2019Most of the recent studies of social recommendation assume that people share similar preferences with their friends and the online social relations are helpful in improving traditional recommender systems. However, this assumption is often untenable as ... More
How much research output from India gets social media attention?Sep 08 2019Scholarly articles are now increasingly being mentioned and discussed in social media platforms, sometimes even as pre- or post-print version uploads. Measures of social media mentions and coverage are now emerging as an alternative indicator of impact ... More
A Generalized Configuration Model with Degree Correlations and Its Percolation AnalysisSep 08 2019In this paper we present a generalization of the classical configuration model. Like the classical configuration model, the generalized configuration model allows users to specify an arbitrary degree distribution. In our generalized configuration model, ... More
Kernel Node EmbeddingsSep 08 2019Sep 10 2019Learning representations of nodes in a low dimensional space is a crucial task with many interesting applications in network analysis, including link prediction and node classification. Two popular approaches for this problem include matrix factorization ... More
Kernel Node EmbeddingsSep 08 2019Learning representations of nodes in a low dimensional space is a crucial task with many interesting applications in network analysis, including link prediction and node classification. Two popular approaches for this problem include \textit{matrix factorization} ... More
Towards Generating Explanations for ASP-Based Link Analysis using Declarative Program TransformationsSep 08 2019The explication and the generation of explanations are prominent topics in artificial intelligence and data science, in order to make methods and systems more transparent and understandable for humans. This paper investigates the problem of link analysis, ... More
Multi-group connectivity structures and their implicationsSep 08 2019We investigate the implications of different forms of multi-group connectivity. Four multi-group connectivity modalities are considered: co-memberships, edge bundles, bridges, and liaison hierarchies. We propose generative models to generate these four ... More
Assessing Disaster Impacts on Highways Using Social Media: Case Study of Hurricane HarveySep 08 2019During and after disasters, highways provide vital routes for emergency services, relief efforts, and evacuation activities. Thus, a timely and reliable assessment of disaster impacts on highways is critical for decision-makers to quickly and effectively ... More
HeteSpaceyWalk: A Heterogeneous Spacey Random Walk for Heterogeneous Information Network EmbeddingSep 07 2019Heterogeneous information network (HIN) embedding has gained increasing interests recently. However, the current way of random-walk based HIN embedding methods have paid few attention to the higher-order Markov chain nature of meta-path guided random ... More
Measuring and Relieving the Over-smoothing Problem for Graph Neural Networks from the Topological ViewSep 07 2019Graph Neural Networks (GNNs) have achieved promising performance on a wide range of graph-based tasks. Despite their success, one severe limitation of GNNs is the over-smoothing issue (indistinguishable representations of nodes in different classes). ... More
Parallel Computation of Graph EmbeddingsSep 06 2019Graph embedding aims at learning a vector-based representation of vertices that incorporates the structure of the graph. This representation then enables inference of graph properties. Existing graph embedding techniques, however, do not scale well to ... More
Analyzing Network Effects on a Fanfiction CommunitySep 06 2019Since the early days of the Web 2.0, online communities have been growing quickly and have become important part of life for large number of people. In one of these communities, fanfiction.net, users can read and write stories which are adapted, recreated ... More
Graph Representation Ensemble LearningSep 06 2019Representation learning on graphs has been gaining attention due to its wide applicability in predicting missing links, and classifying and recommending nodes. Most embedding methods aim to preserve certain properties of the original graph in the low ... More
Causal Effects of Brevity on Style and Success in Social MediaSep 05 2019In online communities, where billions of people strive to propagate their messages, understanding how wording affects success is of primary importance. In this work, we are interested in one particularly salient aspect of wording: brevity. What is the ... More
Remembering winter was comingSep 05 2019Today's popular TV series tend to develop continuous, complex plots spanning several seasons, but are often viewed in controlled and discontinuous conditions. Consequently, most viewers need to be re-immersed in the story before watching a new season. ... More
A complex network approach to political analysis: application to the Brazilian Chamber of DeputiesSep 05 2019Sep 08 2019In this paper, we introduce a network-based methodology to study how clusters represented by political entities evolve over time. We constructed networks of voting data from the Brazilian Chamber of Deputies, where deputies are nodes and edges are represented ... More
A complex network approach to political analysis: application to the Brazilian Chamber of DeputiesSep 05 2019In this paper, we introduce a network-based methodology to study how clusters represented by political entities evolve over time. We constructed networks of voting data from the Brazilian Chamber of Deputies, where deputies are nodes and edges are represented ... More
An Experiment on Network Density and Sequential LearningSep 05 2019We conduct a sequential social learning experiment where subjects guess a hidden state after observing private signals and the guesses of a subset of their predecessors. A network determines the observable predecessors, and we compare subjects' accuracy ... More
Author Growth Outstrips Publication Growth in Computer Science and Publication Quality Correlates with CollaborationSep 05 2019Although the computer science community successfully harnessed exponential increases in computer performance to drive societal and economic change, the exponential growth in publications is proving harder to accommodate. To gain a deeper understanding ... More
Diversity Breeds Innovation With Discounted Impact and RecognitionSep 04 2019Prior work poses a diversity paradox for science. Diversity breeds scientific innovation, and yet, diverse individuals have less successful scientific careers. But if diversity is good for innovation, why is science not rewarding diversity? We answer ... More
Status in flux: Unequal alliances can create power vacuumsSep 04 2019Human groups show a variety of leadership structures from no leader, to changing leaders, to a single long-term leader. When a leader is deposed, the presence of a power vacuum can mean they are often quickly replaced. We lack an explanation of how such ... More
Different Absorption from the Same Sharing: Sifted Multi-task Learning for Fake News DetectionSep 04 2019Recently, neural networks based on multi-task learning have achieved promising performance on fake news detection, which focus on learning shared features among tasks as complementary features to serve different tasks. However, in most of the existing ... More
Under the Conditions of Non-Agenda Ownership: Social Media Users in the 2019 Ukrainian Presidential Elections CampaignSep 04 2019Owing to its history and challenging circumstances, social networks community in Ukraine is a very interesting polygon for the study of communications in the constantly changing environment, especially in the political discourse. This unique environment ... More
Social Networks as a Tool for a Higher Education Institution Image CreationSep 04 2019The article presents the dynamics of social networks users increase, depending on the total world population from 2010 to 2018. It also identifies the most popular social networks in Ukraine. The systematic risk indicator of using social networks relative ... More
Modelling the Behavior Classification of Social News Aggregations UsersSep 04 2019This paper deals with actual fuzzy logic approach for modelling the behavior classification of social news aggregations users. The peculiarities of the structure of informational content of communities on the basis of social news aggregations are explored. ... More
Can social influence be exploited to compromise security: An online experimental evaluationSep 04 2019Social media has enabled users and organizations to obtain information about technology usage like software usage and even security feature usage. However, on the dark side it has also allowed an adversary to potentially exploit the users in a manner ... More
Gerrymandering: A Briber's PerspectiveSep 04 2019We initiate the study of bribery problem in the context of gerrymandering and reverse gerrymandering. In our most general problem, the input is a set of voters having votes over a set of alternatives, a graph on the voters, a partition of voters into ... More
Network Transfer Learning via Adversarial Domain Adaptation with Graph ConvolutionSep 04 2019This paper studies the problem of cross-network node classification to overcome the insufficiency of labeled data in a single network. It aims to leverage the label information in a partially labeled source network to assist node classification in a completely ... More
How much research shared on Facebook is hidden from public view? A comparison of public and private online activity around PLOS ONE papersSep 03 2019Despite its undisputed position as the biggest social media platform, Facebook has never entered the main stage of altmetrics research. In this study, we argue that the lack of attention by altmetrics researchers is not due to a lack of relevant activity ... More
How much research shared on Facebook is hidden from public view? A comparison of public and private online activity around PLOS ONE papersSep 03 2019Sep 05 2019Despite its undisputed position as the biggest social media platform, Facebook has never entered the main stage of altmetrics research. In this study, we argue that the lack of attention by altmetrics researchers is not due to a lack of relevant activity ... More
Adversarial Robustness of Similarity-Based Link PredictionSep 03 2019Link prediction is one of the fundamental problems in social network analysis. A common set of techniques for link prediction rely on similarity metrics which use the topology of the observed subnetwork to quantify the likelihood of unobserved links. ... More
Impact of Social Influence on Adoption Behavior: An Online Controlled Experimental EvaluationSep 03 2019It is widely believed that the adoption behavior of a decision-maker in a social network is related to the number of signals it receives from its peers in the social network. It is unclear if these same principles hold when the "pattern" by which they ... More
Into the Battlefield: Quantifying and Modeling Intra-community Conflicts in Online DiscussionSep 03 2019In this work, we present a novel quantification of conflict in online discussion. Unlike previous studies on conflict dynamics, which model conflict as a binary phenomenon, our measure is continuous-valued, which we validate with manually annotated ratings. ... More
Incrementally Updated Spectral EmbeddingsSep 03 2019Several fundamental tasks in data science rely on computing an extremal eigenspace of size $r \ll n$, where $n$ is the underlying problem dimension. For example, spectral clustering and PCA both require the computation of the leading $r$-dimensional subspace. ... More
Non-Parametric Class Completeness Estimators for Collaborative Knowledge Graphs -- The Case of WikidataSep 03 2019Collaborative Knowledge Graph platforms allow humans and automated scripts to collaborate in creating, updating and interlinking entities and facts. To ensure both the completeness of the data as well as a uniform coverage of the different topics, it ... More
Graph Representation Learning: A SurveySep 03 2019Research on graph representation learning has received a lot of attention in recent years since many data in real-world applications come in form of graphs. High-dimensional graph data are often in irregular form, which makes them more difficult to analyze ... More
Identifying the Hierarchical Influence Structure behind Smart Sanctions using Network AnalysisSep 02 2019Smart sanctions are an increasingly popular tool for banning rogue actors from the global economy. In this paper, by analyzing the smart sanctions lists issued by major institutions worldwide, we identify the hierarchical influence structure among these ... More
War pact model of shrinking networksSep 02 2019Many real systems can be described by a set of interacting entities forming a complex network. To some surprise, these have been shown to share a number of structural properties regardless of their type or origin. It is thus of vital importance to design ... More
Secure Analysis of Dynamic Networks under Pinning Attacks against SynchronizationSep 02 2019In this paper, we first consider a pinning node selection and control gain co-design problem for complex networks. A necessary and sufficient condition for the synchronization of the pinning controlled networks at a homogeneous state is provided. A quantitative ... More
On Privacy of Socially Contagious AttributesSep 02 2019A commonly used method to protect user privacy in data collection is to perform randomized perturbation on user's real data before collection so that aggregated statistics can still be inferred without endangering secrets held by individuals. In this ... More
Can A User Guess What Her Followers Want?Sep 01 2019Whenever a social media user decides to share a story, she is typically pleased to receive likes, comments, shares, or, more generally, feedback from her followers. As a result, she may feel compelled to use the feedback she receives to (re-)estimate ... More
Misinformation spreading on correlated multiplex networksSep 01 2019The numerous expanding online social networks offer fast channels for misinformation spreading, which could have a serious impact on socioeconomic systems. Researchers across multiple areas have paid attention to this issue with a view of addressing it. ... More
Publishing Community-Preserving Attributed Social Graphs with a Differential Privacy GuaranteeAug 31 2019We present a novel method for publishing differentially private synthetic attributed graphs. Unlike preceding approaches, our method is able to preserve the community structure of the original graph without sacrificing the ability to capture global structural ... More
Experimental analyses on 2-hop-based and 3-hop-based link prediction algorithmsAug 31 2019Link prediction is a significant and challenging task in network science. The majority of known methods are similarity-based, which assign similarity indices for node pairs and assume that two nodes of larger similarity have higher probability to be connected ... More
Efficient limited time reachability estimation in temporal networksAug 30 2019Sep 03 2019Time-limited states characterise several dynamical processes evolving on the top of networks. During epidemic spreading infected agents may recover after some times, in case of information diffusion people may forget news or consider it out-dated, or ... More
Efficient limited time reachability estimation in temporal networksAug 30 2019Time-limited states characterise several dynamical processes evolving on the top of networks. During epidemic spreading infected agents may recover after some times, in case of information diffusion people may forget news or consider it out-dated, or ... More
Making Communities Show Respect for OrderAug 30 2019In this work we give a community detection algorithm in which the communities both respects the intrinsic order of a directed acyclic graph and also finds similar nodes. We take inspiration from classic similarity measures of bibliometrics, used to assess ... More
Seasonal payoff variations and the evolution of cooperation in social dilemmasAug 30 2019Varying environmental conditions affect relations between interacting individuals in social dilemmas, thus affecting also the evolution of cooperation. Oftentimes these environmental variations are seasonal and can therefore be mathematically described ... More
Optimal Legislative County Clustering in North CarolinaAug 30 2019North Carolina's constitution requires that state legislative districts should not split counties. However, counties must be split to comply with the "one person, one vote" mandate of the U.S. Supreme Court. Given that counties must be split, the North ... More
Fast Algorithms for Intimate-Core Group Search in Weighted GraphsAug 30 2019Community search that finds query-dependent communities has been studied on various kinds of graphs. As one instance of community search, intimate-core group search over a weighted graph is to find a connected $k$-core containing all query nodes with ... More
A Study of Cyber Hate on Twitter with Implications for Social Media Governance StrategiesAug 30 2019This paper explores ways in which the harmful effects of cyber hate may be mitigated through mechanisms for enhancing the self governance of new digital spaces. We report findings from a mixed methods study of responses to cyber hate posts, which aimed ... More
Adversarial Training Methods for Network EmbeddingAug 30 2019Network Embedding is the task of learning continuous node representations for networks, which has been shown effective in a variety of tasks such as link prediction and node classification. Most of existing works aim to preserve different network structures ... More
Fast and Accurate Network Embeddings via Very Sparse Random ProjectionAug 30 2019We present FastRP, a scalable and performant algorithm for learning distributed node representations in a graph. FastRP is over 4,000 times faster than state-of-the-art methods such as DeepWalk and node2vec, while achieving comparable or even better performance ... More
Growth Dynamics of Value and Cost Trade-off in Competitive Temporal NetworksAug 29 2019The question is: What does happen to the real-world networks which cause them not to grow permanently? The idea here is that real-world networks have to pay the cost of growth. We investigate the growth and trade-off between value and cost in the networks ... More
Identification of influencers in complex networks by local information dimensionAug 29 2019Identifying influential spreaders in the complex network has been a hot topic in the study of network characteristic. Lots of centrality measures have been proposed to address this problem, but most methods have their own limitations and shortcomings. ... More
Wikidata from a Research Perspective -- A Systematic Mapping Study of WikidataAug 29 2019Wikidata is one of the most edited knowledge bases which contains structured data. It serves as the data source for many projects in the Wikimedia sphere and beyond. Since its inception in October 2012, it has been increasingly growing in term of both ... More
Going beneath the shoulders of giants: tracking the cumulative knowledge spreading in a comprehensive citation networkAug 29 2019In all of science, the authors of publications depend on the knowledge presented by the previous publications. Thus they "stand on the shoulders of giants" and there is a flow of knowledge from previous publications to more recent ones. The dominating ... More
On the Ethereum Blockchain Structure: a Complex Networks Theory PerspectiveAug 29 2019In this paper, we analyze the Ethereum blockchain using the complex networks modeling framework. Accounts acting on the blockchain are represented as nodes, while the interactions among these accounts, recorded on the blockchain, are treated as links ... More
A Deep Neural Information Fusion Architecture for Textual Network EmbeddingsAug 29 2019Textual network embeddings aim to learn a low-dimensional representation for every node in the network so that both the structural and textual information from the networks can be well preserved in the representations. Traditionally, the structural and ... More
PageRank algorithm for Directed HypergraphAug 29 2019During the last two decades, we easilly see that the World Wide Web's link structure is modeled as the directed graph. In this paper, we will model the World Wide Web's link structure as the directed hypergraph. Moreover, we will develop the PageRank ... More
A cross-sectional study of social inequities in medical crowdfunding campaigns in the United StatesAug 29 2019Americans are increasingly relying on crowdfunding to pay for the costs of healthcare. In medical crowdfunding, online platforms allow individuals to appeal to social networks to request donations for health and medical needs. Users are often told that ... More
Elites, communities and the limited benefits of mentorship in electronic musicAug 28 2019Music has been one of the strongest forms of cultural expression and identity for thousands of years and has evolved into a strongly collaborative artistic domain. While the emergence of success in music has been studied at large, the link between individual ... More
Not at Home on the Range: Peer Production and the Urban/Rural DivideAug 28 2019Wikipedia articles about places, OpenStreetMap features, and other forms of peer-produced content have become critical sources of geographic knowledge for humans and intelligent technologies. In this paper, we explore the effectiveness of the peer production ... More
A Large-Scale Empirical Study of Geotagging Behavior on TwitterAug 28 2019Geotagging on social media has become an important proxy for understanding people's mobility and social events. Research that uses geotags to infer public opinions relies on several key assumptions about the behavior of geotagged and non-geotagged users. ... More
Intergroup Contact in the Wild: Characterizing Language Differences between Intergroup and Single-group Members in NBA-related Discussion ForumsAug 28 2019Intergroup contact has long been considered as an effective strategy to reduce prejudice between groups. However, recent studies suggest that exposure to opposing groups in online platforms can exacerbate polarization. To further understand the behavior ... More
False News Detection on Social MediaAug 28 2019Social media has become a major information platform where people consume and share news. However, it has also enabled the wide dissemination of false news, i.e., news posts published on social media that are verifiably false, causing significant negative ... More