Latest in cs.si

total 10452took 0.14s
Message passing on networks with loopsJul 18 2019In this paper we offer a solution to a long-standing problem in the study of networks. Message passing is a fundamental technique for calculations on networks and graphs. The first versions of the method appeared in the 1930s and over the decades it has ... More
Investigating Italian disinformation spreading on Twitter in the context of 2019 European electionsJul 18 2019We investigate the presence (and the influence) of disinformation spreading on online social networks in Italy, in the 5-month period preceding the 2019 European Parliament elections. To this aim we collected a large-scale dataset of tweets associated ... More
Total variation based community detection using a nonlinear optimization approachJul 18 2019Maximizing the modularity of a network is a successful tool to identify an important community of nodes. However, this combinatorial optimization problem is known to be NP-hard. Inspired by recent nonlinear modularity eigenvector approaches, we introduce ... More
Interactional and Informational Attention on TwitterJul 18 2019Twitter may be considered as a decentralized social information processing platform whose users constantly receive their followees' information feeds, which they may in turn dispatch to their followers. This decentralization is not devoid of hierarchy ... More
Consensus formation Online using Sociophysics methodJul 18 2019Consensus formation and difference of opinion have long been the subject of research. However, relevant laws and systems within society are being updated to reflect the changes in information networks. Online environment has come to fulfill a major role ... More
Cross-Media Usage of Social Big Data for Emergency Services and Volunteer Communities: Approaches, Development and Challenges of Multi-Platform Social Media ServicesJul 17 2019The use of social media is ubiquitous and nowadays well-established in our everyday life, but increasingly also before, during or after emergencies. The produced data is spread across several types of social media and can be used by different actors, ... More
Towards Reliable Online Clickbait Video Detection: A Content-Agnostic ApproachJul 17 2019Jul 18 2019Online video sharing platforms (e.g., YouTube, Vimeo) have become an increasingly popular paradigm for people to consume video contents. Clickbait video, whose content clearly deviates from its title/thumbnail, has emerged as a critical problem on online ... More
Towards Reliable Online Clickbait Video Detection: A Content-Agnostic ApproachJul 17 2019Online video sharing platforms (e.g., YouTube, Vimeo) have become an increasingly popular paradigm for people to consume video contents. Clickbait video, whose content clearly deviates from its title/thumbnail, has emerged as a critical problem on online ... More
Computational Human DynamicsJul 17 2019This thesis summarises my scientific contributions in the domain of network science, human dynamics and computational social science. These contributions are associated to computer science, physics, statistics, and applied mathematics. The goal of this ... More
Constructions and properties of a class of random scale-free networksJul 17 2019Complex networks have abundant and extensive applications in real life. Recently, researchers have proposed a number of complex networks, in which some are deterministic and others are random. Compared with deterministic networks, random network is not ... More
DeepNC: Deep Generative Network CompletionJul 17 2019Most network data are collected from only partially observable networks with both missing nodes and edges, for example due to limited resources and privacy settings specified by users on social media. Thus, it stands to the reason that inferring the missing ... More
Tangles in the social sciencesJul 17 2019Traditional clustering identifies groups of objects that share certain qualities. Tangles do the converse: they identify groups of qualities that often occur together. They can thereby identify and discover 'types': of behaviour, views, abilities, dispositions. ... More
Caching as an Image Characterization Problem using Deep Convolutional Neural NetworksJul 16 2019Optimizing caching locations of popular content has received significant research attention over the last few years. This paper targets the optimization of the caching locations by proposing a novel transformation of the optimization problem to a grey-scale ... More
Fairness and Diversity in the Recommendation and Ranking of Participatory Media ContentJul 16 2019Online participatory media platforms that enable one-to-many communication among users, see a significant amount of user generated content and consequently face a problem of being able to recommend a subset of this content to its users. We address the ... More
Relevancy Classification of Multimodal Social Media Streams for Emergency ServicesJul 16 2019Social media has become an integral part of our daily lives. During time-critical events, the public shares a variety of posts on social media including reports for resource needs, damages, and help offerings for the affected community. Such posts can ... More
Modeling Human Annotation Errors to Design Bias-Aware Systems for Social Stream ProcessingJul 16 2019High-quality human annotations are necessary to create effective machine learning systems for social media. Low-quality human annotations indirectly contribute to the creation of inaccurate or biased learning systems. We show that human annotation quality ... More
DeepTrax: Embedding Graphs of Financial TransactionsJul 16 2019Financial transactions can be considered edges in a heterogeneous graph between entities sending money and entities receiving money. For financial institutions, such a graph is likely large (with millions or billions of edges) while also sparsely connected. ... More
Hubs and authorities of the scientific migration networkJul 16 2019In this work we study international migrations of researchers, scientists, and academics from a complex-network perspective to identify the central countries involved in the migration phenomenon. We define the scientific migration network (SMN) as temporal ... More
Measuring I2P Censorship at a Global ScaleJul 16 2019The prevalence of Internet censorship has prompted the creation of several measurement platforms for monitoring filtering activities. An important challenge faced by these platforms revolves around the trade-off between depth of measurement and breadth ... More
Data-driven strategies for optimal bicycle network growthJul 16 2019Urban transportation networks, from sidewalks and bicycle paths to streets and rail lines, provide the backbone for movement and socioeconomic life in cities. These networks can be understood as layers of a larger multiplex transport network. Because ... More
Homophily as a process generating social networks: insights from Social Distance Attachment modelJul 16 2019Real-world social networks often exhibit high levels of clustering, positive degree assortativity, short average path lengths (small-world property) and bounded, which means not scale-free, degree distributions. At the same time homophily, defined as ... More
Homophily as a process generating social networks: insights from Social Distance Attachment modelJul 16 2019Jul 17 2019Real-world social networks often exhibit high levels of clustering, positive degree assortativity, short average path lengths (small-world property) and bounded, which means not scale-free, degree distributions. At the same time homophily, defined as ... More
Deep Social Collaborative FilteringJul 16 2019Recommender systems are crucial to alleviate the information overload problem in online worlds. Most of the modern recommender systems capture users' preference towards items via their interactions based on collaborative filtering techniques. In addition ... More
Ethical Underpinnings in the Design and Management of ICT ProjectsJul 16 2019With a view towards understanding why undesirable outcomes often arise in ICT projects, we draw attention to three aspects in this essay. First, we present several examples to show that incorporating an ethical framework in the design of an ICT system ... More
Low-supervision urgency detection and transfer in short crisis messagesJul 15 2019Humanitarian disasters have been on the rise in recent years due to the effects of climate change and socio-political situations such as the refugee crisis. Technology can be used to best mobilize resources such as food and water in the event of a natural ... More
Micro, Meso, Macro: the effect of triangles on communities in networksJul 15 2019Meso-scale structures (communities) are used to understand the macro-scale properties of complex networks, such as their functionality and formation mechanisms. Micro-scale structures are known to exist in most complex networks (e.g., large number of ... More
The Elusive Model of Technology, Media, Social Development, and Financial SustainabilityJul 15 2019We recount in this essay the decade-long story of Gram Vaani, a social enterprise with a vision to build appropriate ICTs (Information and Communication Technologies) for participatory media in rural and low-income settings, to bring about social development ... More
Seedless Graph Matching via Tail of Degree Distribution for Correlated Erdos-Renyi GraphsJul 15 2019The graph matching problem refers to recovering the node-to-node correspondence between two correlated graphs. A previous work theoretically showed that recovering is feasible in sparse Erdos-Renyi graphs if and only if the probability of having an edge ... More
Seedless Graph Matching via Tail of Degree Distribution for Correlated Erdos-Renyi GraphsJul 15 2019Jul 17 2019The graph matching problem refers to recovering the node-to-node correspondence between two correlated graphs. A previous work theoretically showed that recovering is feasible in sparse Erdos-Renyi graphs if and only if the probability of having an edge ... More
Wave solutions of Gilson-Pickering equationJul 14 2019In this work, we apply the (1/G')-expansion method to produce the novel soliton solution of the Gilson-Pickering equation. This method is fundamental on homogeneous balance procedure that gives the order of the estimating polynomial-type solution. Also ... More
Information Pollution by Social BotsJul 13 2019Social media are vulnerable to deceptive social bots, which can impersonate humans to amplify misinformation and manipulate opinions. Little is known about the large-scale consequences of such pollution operations. Here we introduce an agent-based model ... More
Changing Views: Persuasion Modeling and Argument Extraction from Online DiscussionsJul 13 2019Persuasion and argumentation are possibly among the most complex examples of the interplay between multiple human subjects. With the advent of the Internet, online forums provide wide platforms for people to share their opinions and reasonings around ... More
A Novel Approach for Detection and Ranking of Trendy and Emerging Cyber Threat Events in Twitter StreamsJul 12 2019We present a new machine learning and text information extraction approach to detection of cyber threat events in Twitter that are novel (previously non-extant) and developing (marked by significance with respect to similarity with a previously detected ... More
Asynchronous Majority Dynamics in Preferential Attachment TreesJul 12 2019We study information aggregation in networks where agents make binary decisions (labeled incorrect or correct). Agents initially form independent private beliefs about the better decision, which is correct with probability $1/2+\delta$. The dynamics we ... More
Predicting engagement in online social networks: Challenges and opportunitiesJul 11 2019Since the introduction of social media, user participation or engagement has received little research attention. In this survey article, we establish the notion of participation in social media and main challenges that researchers may face while exploring ... More
Evidential positive opinion influence measures for viral marketingJul 11 2019The Viral Marketing is a relatively new form of marketing that exploits social networks to promote a brand, a product, etc. The idea behind it is to find a set of influencers on the network that can trigger a large cascade of propagation and adoptions. ... More
Exploring the context of course rankings on online academic forumsJul 10 2019University students routinely use the tools provided by online course ranking forums to share and discuss their satisfaction with the quality of instruction and content in a wide variety of courses. Student perception of the efficacy of pedagogies employed ... More
Dynamics of Team Library Adoptions: An Exploration of GitHub Commit LogsJul 10 2019When a group of people strives to understand new information, struggle ensues as various ideas compete for attention. Steep learning curves are surmounted as teams learn together. To understand how these team dynamics play out in software development, ... More
Pairwise Link PredictionJul 10 2019Link prediction is a common problem in network science that transects many disciplines. The goal is to forecast the appearance of new links or to find links missing in the network. Typical methods for link prediction use the topology of the network to ... More
Democratic summary of public opinions in free-response surveysJul 09 2019Social surveys have been widely used as a method of obtaining public opinion. Sometimes it is more ideal to collect opinions by presenting questions in free-response formats than in multiple-choice formats. Despite their advantages, free-response questions ... More
Mobile phone data's potential for informing infrastructure planning in developing countriesJul 09 2019High quality census data are not always available in developing countries. Instead, mobile phone data are becoming a go to proxy to evaluate population density, activity and social characteristics. They offer additional advantages for infrastructure planning ... More
ICLab: A Global, Longitudinal Internet Censorship Measurement PlatformJul 09 2019Jul 10 2019Researchers have studied Internet censorship for nearly as long as attempts to censor contents have taken place. Most studies have however been limited to a short period of time and/or a few countries; the few exceptions have traded off detail for breadth ... More
ICLab: A Global, Longitudinal Internet Censorship Measurement PlatformJul 09 2019Researchers have studied Internet censorship for nearly as long as attempts to censor contents have taken place. Most studies have however been limited to a short period of time and/or a few countries; the few exceptions have traded off detail for breadth ... More
Multitask Learning for Blackmarket Tweet DetectionJul 09 2019Online social media platforms have made the world more connected than ever before, thereby making it easier for everyone to spread their content across a wide variety of audiences. Twitter is one such popular platform where people publish tweets to spread ... More
Loss of transmission on directed networks due to link deletionJul 09 2019We investigate the effects of link deletion on a 1 - to - 1 transmission process occurring on various models of directed networks and characterize them in terms of the fraction of successful transmissions and average transmission time. We make intuitive ... More
Community Detection on Networks with Ricci FlowJul 09 2019Many complex networks in the real world have community structures -- groups of well-connected nodes with important functional roles. It has been well recognized that the identification of communities bears numerous practical applications. While existing ... More
Hierarchical Clustering Supported by Reciprocal Nearest NeighborsJul 09 2019Clustering is a fundamental analysis tool aiming at classifying data points into groups based on their similarity or distance. It has found successful applications in all natural and social sciences, including biology, physics, economics, chemistry, astronomy, ... More
Profiling Players with Engagement PredictionsJul 09 2019The possibility of using player engagement predictions to profile high spending video game users is explored. In particular, individual-player survival curves in terms of days after first login, game level reached and accumulated playtime are used to ... More
Uncertainty and causal emergence in complex networksJul 08 2019The connectivity of a network conveys information about the dependencies between nodes. We show that this information can be analyzed by measuring the uncertainty (and certainty) contained in paths along nodes and links in a network. Specifically, we ... More
Characteristics of human mobility patterns revealed by high-frequency cell-phone position dataJul 08 2019Human mobility is an important characteristic of human behavior, but since tracking personalized position to high temporal and spatial resolution is difficult, most studies on human mobility patterns rely largely on mathematical models. Seminal models ... More
Belief places and spaces: Mapping cognitive environmentsJul 08 2019Beliefs are not facts, but they are \textit{factive} -- feel like facts. This property is what can make misinformation dangerous. Being able to deliberately navigate through a landscape of often conflicting factive statements is difficult when there is ... More
Belief places and spaces: Mapping cognitive environmentsJul 08 2019Jul 11 2019Beliefs are not facts, but they are factive - they feel like facts. This property is what can make misinformation dangerous. Being able to deliberately navigate through a landscape of often conflicting factive statements is difficult when there is no ... More
Ensuring Responsible Outcomes from TechnologyJul 07 2019We attempt to make two arguments in this essay. First, through a case study of a mobile phone based voice-media service we have been running in rural central India for more than six years, we describe several implementation complexities we had to navigate ... More
I Am Not What I Write: Privacy Preserving Text Representation LearningJul 06 2019Online users generate tremendous amounts of textual information by participating in different activities, such as writing reviews and sharing tweets. This textual data provides opportunities for researchers and business partners to study and understand ... More
A Conceptual Marketplace Model for IoT Generated Personal DataJul 05 2019We propose a decentralized conceptual marketplace model for IoT generated personal data. Our model is based on a thorough analysis of personal data in a marketplace context, with specific focus on the challenges presented by commercializing IoT generated ... More
Network Embedding: on Compression and LearningJul 05 2019Recently, network embedding that encodes structural information of graphs into a vector space has become popular for network analysis. Although recent methods show promising performance for various applications, the huge sizes of graphs may hinder a direct ... More
Extraction and Analysis of Fictional Character Networks: A SurveyJul 05 2019A character network is a graph extracted from a narrative, in which vertices represent characters and edges correspond to interactions between them. A number of narrative-related problems can be addressed automatically through the analysis of character ... More
Intelligent social bots uncover the link between user preference and diversity of news consumptionJul 05 2019The boom of online social media and microblogging platforms has rapidly alter the way we consume news and exchange opinions. Even though considerable efforts try to recommend various contents to users, loss of information diversity and the polarization ... More
Vector Colorings of Random, Ramanujan, and Large-Girth Irregular GraphsJul 04 2019We prove that in sparse Erd\H{o}s-R\'{e}nyi graphs of average degree $d$, the vector chromatic number (the relaxation of chromatic number coming from the Lov\`{a}sz theta function) is typically $\tfrac{1}{2}\sqrt{d} + o_d(1)$. This fits with a long-standing ... More
Detecting Cyber-Related Discussions in Online Social PlatformsJul 04 2019As the use of social platforms continues to evolve, in areas such as cyber-security and defence, it has become imperative to develop adaptive methods for tracking, identifying and investigating cyber-related activities on these platforms. This paper introduces ... More
Discovering Communities of Community DiscoveryJul 04 2019Discovering communities in complex networks means grouping nodes similar to each other, to uncover latent information about them. There are hundreds of different algorithms to solve the community detection task, each with its own understanding and definition ... More
Tracking Temporal Evolution of Graphs using Non-Timestamped DataJul 04 2019Datasets to study the temporal evolution of graphs are scarce. To encourage the research of novel dynamic graph learning algorithms we introduce YoutubeGraph-Dyn (available at https://github.com/palash1992/YoutubeGraph-Dyn), an evolving graph dataset ... More
On computing distances and latencies in Link StreamsJul 03 2019Link Streams were proposed a few years ago as a model of temporal networks. We seek to understand the topological and temporal nature of those objects through efficiently computing the distances, latencies and lengths of shortest fastest paths. We develop ... More
Use of OWL and Semantic Web Technologies at PinterestJul 03 2019Pinterest is a popular Web application that has over 250 million active users. It is a visual discovery engine for finding ideas for recipes, fashion, weddings, home decoration, and much more. In the last year, the company adopted Semantic Web technologies ... More
Weighted distances in scale-free preferential attachment modelsJul 03 2019We study three preferential attachment models, one where vertices have a fixed outdegree, and two where the outdegree is variable. We choose the parameters such that the degrees follow a power law with parameter $\tau\in(2,3)$. Once the graph on $t$ vertices ... More
On Adaptivity Gaps of Influence Maximization under the Independent Cascade Model with Full Adoption FeedbackJul 03 2019In this paper, we study the adaptivity gap of the influence maximization problem under independent cascade model when full-adoption feedback is available. Our main results are to derive upper bounds on several families of well-studied influence graphs, ... More
On the Privacy of dK-Random GraphsJul 03 2019Real social network datasets provide significant benefits for understanding phenomena such as information diffusion or network evolution. Yet the privacy risks raised from sharing real graph datasets, even when stripped of user identity information, are ... More
Taint analysis of the Bitcoin networkJul 02 2019Determining the trust of an individual Bitcoin wallet is a difficult problem. There are no ratings, that offer vendors or exchanges meaningful information about the level of the taint of Bitcoins they are receiving. Lack of such information places exchanges ... More
What, When and Where of petitions submitted to the UK Government during a time of chaosJul 02 2019In times marked by political turbulence and uncertainty, as well as increasing divisiveness and hyperpartisanship, Governments need to use every tool at their disposal to understand and respond to the concerns of their citizens. We study issues raised ... More
Generalized Random Surfer-Pair ModelsJul 02 2019SimRank is a widely studied link-based similarity measure that is known for its simple, yet powerful philosophy that two nodes are similar if they are referenced by similar nodes. While this philosophy has been the basis of several improvements, there ... More
Generalized Random Surfer-Pair ModelsJul 02 2019Jul 04 2019SimRank is a widely studied link-based similarity measure that is known for its simple, yet powerful philosophy that two nodes are similar if they are referenced by similar nodes. While this philosophy has been the basis of several improvements, there ... More
Identifying vital nodes based on reverse greedy methodJul 02 2019The identification of vital nodes that maintain the network connectivity is a long-standing challenge in network science. In this paper, we propose a so-called reverse greedy method where the least important nodes are preferentially chosen to make the ... More
A Semantic Approach for User-Brand Targeting in On-Line Social NetworksJul 02 2019We propose a general framework for the recommendation of possible customers (users) to advertisers (e.g., brands) based on the comparison between On-line Social Network profiles. In particular, we represent both user and brand profiles as trees where ... More
Danish Stance Classification and Rumour ResolutionJul 02 2019The Internet is rife with flourishing rumours that spread through microblogs and social media. Recent work has shown that analysing the stance of the crowd towards a rumour is a good indicator for its veracity. One state-of-the-art system uses an LSTM ... More
Predicting the Topical Stance of Media and Popular Twitter UsersJul 02 2019Controversial social and political issues of the day spur people to express their opinion on social networks, often sharing links to online media articles and reposting statements from prominent members of the platforms. Discovering the stances of people ... More
The Role of Network Structure and Initial Group Norm Distributions in Norm ConflictJul 01 2019Social norms can facilitate societal coexistence in groups by providing an implicitly shared set of expectations and behavioral guidelines. However, different social groups can hold different norms, and lacking an overarching normative consensus can lead ... More
iPool -- Information-based Pooling in Hierarchical Graph Neural NetworksJul 01 2019With the advent of data science, the analysis of network or graph data has become a very timely research problem. A variety of recent works have been proposed to generalize neural networks to graphs, either from a spectral graph theory or a spatial perspective. ... More
Improved Forecasting of Cryptocurrency Price using Social SignalsJul 01 2019Social media signals have been successfully used to develop large-scale predictive and anticipatory analytics. For example, forecasting stock market prices and influenza outbreaks. Recently, social data has been explored to forecast price fluctuations ... More
Unsupervised Adversarial Graph Alignment with Graph EmbeddingJul 01 2019Graph alignment, also known as network alignment, is a fundamental task in social network analysis. Many recent works have relied on partially labeled cross-graph node correspondences, i.e., anchor links. However, due to the privacy and security issue, ... More
Effects of Foraging in Personalized Content-based Image RecommendationJun 30 2019A major challenge of recommender systems is to help users locating interesting items. Personalized recommender systems have become very popular as they attempt to predetermine the needs of users and provide them with recommendations to personalize their ... More
Influence measures in subnetworks using vertex centralityJun 30 2019This work deals with the issue of assessing the influence of a node in the entire network and in the subnetwork to which it belongs as well, adapting the classical idea of vertex centrality. We provide a general definition of relative vertex centrality ... More
Instability of social network dynamics with stubborn linksJun 30 2019This paper studies the signed networks in the presence of stubborn links, based on the structural balance theory. Each agent in the network has a mixture of positive and negative links represent friendly and antagonistic interactions and his stubbornness ... More
Adaptive Deep Learning of Cross-Domain Loss in Collaborative FilteringJun 29 2019Nowadays, users open multiple accounts on social media platforms and e-commerce sites, expressing their personal preferences on different domains. However, users' behaviors change across domains, depending on the content that users interact with, such ... More
A Neural Attention Model for Adaptive Learning of Social Friends' PreferencesJun 29 2019Social-based recommendation systems exploit the selections of friends to combat the data sparsity on user preferences, and improve the recommendation accuracy of the collaborative filtering strategy. The main challenge is to capture and weigh friends' ... More
Fake News Detection using Stance Classification: A SurveyJun 29 2019This paper surveys and presents recent academic work carried out within the field of stance classification and fake news detection. Echo chambers and the model organism problem are examples that pose challenges to acquire data with high quality, due to ... More
Latent geometry and dynamics of proximity networksJun 28 2019Proximity networks are time-varying graphs representing the closeness among humans moving in a physical space. Their properties have been extensively studied in the past decade as they critically affect the behavior of spreading phenomena and the performance ... More
Angular separability of data clusters or network communities in geometrical space and its relevance to hyperbolic embeddingJun 28 2019Analysis of 'big data' characterized by high-dimensionality such as word vectors and complex networks requires often their representation in a geometrical space by embedding. Recent developments in machine learning and network geometry have pointed out ... More
Modeling echo chambers and polarization dynamics in social networksJun 28 2019Echo chambers and opinion polarization have been recently quantified in several sociopolitical contexts, across different social media, raising concerns for the potential impact on the spread of misinformation and the openness of debates. Despite increasing ... More
Adversarial Representation Learning on Large-Scale Bipartite GraphsJun 27 2019Graph representation on large-scale bipartite graphs is central for a variety of applications, ranging from social network analysis to recommendation system development. Existing methods exhibit two key drawbacks: 1. unable to characterize the inconsistency ... More
To Act or React: Investigating Proactive Strategies For Online Community ModerationJun 27 2019Reddit administrators have generally struggled to prevent or contain such discourse for several reasons including: (1) the inability for a handful of human administrators to track and react to millions of posts and comments per day and (2) fear of backlash ... More
Link weights recovery in heterogeneous information networksJun 27 2019Socio-technical systems usually consists of many intertwined networks, each connecting different types of objects (or actors) through a variety of means. As these networks are co-dependent, one can take advantage of this entangled structure to study interaction ... More
Critical Edge Identification: A K-Truss Based ModelJun 27 2019In a social network, the strength of relationships between users can significantly affect the stability of the network. In this paper, we use the k-truss model to measure the stability of a social network. To identify critical connections, we propose ... More
Modularity in Multilayer Networks using Redundancy-based Resolution and Projection-based Inter-Layer CouplingJun 27 2019The generalized version of modularity for multilayer networks, a.k.a. multislice modularity, is characterized by two model parameters, namely resolution factor and inter-layer coupling factor. The former corresponds to a notion of layer-specific relevance, ... More
Reducing Spreading Processes on Networks to Markov Population ModelsJun 27 2019Stochastic processes on complex networks, where each node is in one of several compartments, and neighboring nodes interact with each other, can be used to describe a variety of real-world spreading phenomena. However, computational analysis of such processes ... More
Broken Detailed Balance and Non-Equilibrium Dynamics in Noisy Social Learning ModelsJun 27 2019We propose new Degroot-type social learning models with feedback in a continuous time, to investigate the effect of a noisy information source on consensus formation in a social network. Unlike the standard Degroot framework, noisy information models ... More
K-Core Maximization through Edge AdditionsJun 27 2019A popular model to measure the stability of a network is k-core - the maximal induced subgraph in which every vertex has at least k neighbors. Many studies maximize the number of vertices in k-core to improve the stability of a network. In this paper, ... More
Security of 5G-Mobile Backhaul Networks: A SurveyJun 27 2019The rapid involution of the mobile generation with incipient data networking capabilities and utilization has exponentially increased the data traffic volumes. Such traffic drains various key issues in 5G mobile backhaul networks. Security of mobile backhaul ... More
Deception Strategies and Threats for Online DiscussionsJun 26 2019Communication plays a major role in social systems. Effective communications, which requires transmission of the messages between individuals without disruptions or noise, can be a powerful tool to deliver intended impact. Language and style of the content ... More
Hypernetwork Science via High-Order Hypergraph WalksJun 26 2019We propose high-order hypergraph walks as a framework to generalize graph-based network science techniques to hypergraphs. Edge incidence in hypergraphs is quantitative, yielding hypergraph walks with both length and width. Graph methods which then generalize ... More
NetSMF: Large-Scale Network Embedding as Sparse Matrix FactorizationJun 26 2019We study the problem of large-scale network embedding, which aims to learn latent representations for network mining applications. Previous research shows that 1) popular network embedding benchmarks, such as DeepWalk, are in essence implicitly factorizing ... More